The performance of genetic algorithm(GA) is determined by the capability of search and optimization for satisfactory solutions. The new adaptive genetic algorithm(AGA) is built for inducing suitable search and optimiz...The performance of genetic algorithm(GA) is determined by the capability of search and optimization for satisfactory solutions. The new adaptive genetic algorithm(AGA) is built for inducing suitable search and optimization relationship. The use of six fuzzy logic controllers(6FLCs) is proposed for dynamic control genetic operating parameters of a symbolic-coded GA. This paper uses AGA based on 6FLCs to deal with the travelling salesman problem (TSP). Experimental results show that AGA based on 6FLCs is more efficient than a standard GA in solving combinatorial optimization problems similar to TSP.展开更多
To solve the traveling salesman problem with the characteristics of clustering,a novel hybrid algorithm,the ant colony algorithm combined with the C-means algorithm,is presented.In order to improve the speed of conver...To solve the traveling salesman problem with the characteristics of clustering,a novel hybrid algorithm,the ant colony algorithm combined with the C-means algorithm,is presented.In order to improve the speed of convergence,the traveling salesman problem(TSP)data is specially clustered by the C-means algorithm,then,the result is processed by the ant colony algorithm to solve the problem.The proposed algorithm treats the C-means algorithm as a new search operator and adopts a kind of local searching strategy—2-opt,so as to improve the searching performance.Given the cluster number,the algorithm can obtain the preferable solving result.Compared with the three other algorithms—the ant colony algorithm,the genetic algorithm and the simulated annealing algorithm,the proposed algorithm can make the results converge to the global optimum faster and it has higher accuracy.The algorithm can also be extended to solve other correlative clustering combination optimization problems.Experimental results indicate the validity of the proposed algorithm.展开更多
Estimation and detection algorithms for orthogonal frequency division multiplexing (OFDM) systems can be de-veloped based on the sum-product algorithms, which operate by message passing in factor graphs. In this paper...Estimation and detection algorithms for orthogonal frequency division multiplexing (OFDM) systems can be de-veloped based on the sum-product algorithms, which operate by message passing in factor graphs. In this paper, we apply the sampling method (Monte Carlo) to factor graphs, and then the integrals in the sum-product algorithm can be approximated by sums, which results in complexity reduction. The blind receiver for OFDM systems can be derived via Sequential Monte Carlo (SMC) in factor graphs, the previous SMC blind receiver can be regarded as the special case of the sum-product algorithms using sampling methods. The previous SMC blind receiver for OFDM systems needs generating samples of the channel vector assuming the channel has an a priori Gaussian distribution. In the newly-built blind receiver, we generate samples of the virtual-pilots instead of the channel vector, with channel vector which can be easily computed based on virtual-pilots. As the size of the vir-tual-pilots space is much smaller than the channel vector space, only small number of samples are necessary, with the blind de-tection being much simpler. Furthermore, only one pilot tone is needed to resolve phase ambiguity and differential encoding is not used anymore. Finally, the results of computer simulations demonstrate that the proposal can perform well while providing sig-nificant complexity reduction.展开更多
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me...Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.展开更多
Granular computing is a very hot research field in recent years. In our previous work an algebraic quotient space model was proposed,where the quotient structure could not be deduced if the granulation was based on an...Granular computing is a very hot research field in recent years. In our previous work an algebraic quotient space model was proposed,where the quotient structure could not be deduced if the granulation was based on an equivalence relation. In this paper,definitions were given and formulas of the lower quotient congruence and upper quotient congruence were calculated to roughly represent the quotient structure. Then the accuracy and roughness were defined to measure the quotient structure in quantification. Finally,a numerical example was given to demonstrate that the rough representation and measuring methods are efficient and applicable. The work has greatly enriched the algebraic quotient space model and granular computing theory.展开更多
The efficiency of any organizations at manufacturing sector or service sector, profit making or non-profit making, is most important factor for survival and growth of the organization. The Data Envelopment Analysis (...The efficiency of any organizations at manufacturing sector or service sector, profit making or non-profit making, is most important factor for survival and growth of the organization. The Data Envelopment Analysis (DEA) technique is one of the most popular and effective tool to measure relative efficiency hence is appropriate to make comparison among similar organizations with multiple output and input. This study performs frontier analysis and measures the relative efficiency of Nepalese commercial banks using DEA approach with two output and two input variables.展开更多
With the great impact of WTO and the business globalization, professional internationalized business people are heavily demanding, which imposes pressure and necessity on practical and effective Business English progr...With the great impact of WTO and the business globalization, professional internationalized business people are heavily demanding, which imposes pressure and necessity on practical and effective Business English program. This essay intends to design an intensive, non-assessed, inservice oral business English course for intermediate business people.展开更多
Train control systems ensure the safety of railways. This paper begins with a summary of the typical train control systems in Japan and Europe. Based on this summary, the author then raises the following question rega...Train control systems ensure the safety of railways. This paper begins with a summary of the typical train control systems in Japan and Europe. Based on this summary, the author then raises the following question regarding current train control systems: What approach should be adopted in order to enhance the functionality, safety, and reliability of train control systems and assist in commercial operations on railways? Next, the author provides a desirable architecture that is likely to assist with the development of new train control systems based on current information and communication technologies. A new unified train control system (UTCS) is proposed that is effective in enhancing the robustness and com- petitiveness of a train control system. The ultimate architecture of the UTCS will be only composed of essential elements such as point machines and level crossing control devices in the field. Finally, a pro- cessing method of the UTCS is discussed.展开更多
Factor graph, so named because it graphically represents function factorization, with which and its sum-product algorithm the iterative algorithm can be derived clearly. An iterative multiuser receiver based on factor...Factor graph, so named because it graphically represents function factorization, with which and its sum-product algorithm the iterative algorithm can be derived clearly. An iterative multiuser receiver based on factor graph for asynchronous coded CDMA system is proposed. In this paper, the a posteriori probability of users information bits conditioned on the noise-whitening filters output is represented by factor graphs, after numbers of iterations with the sum-product algorithm the information bits are estimated. The authors also propose a reduced complexity algorithm. Simulation results show that with this proposed receiver, near-single-user performance can be achieved, and small performance degradation for the reduced complexity algorithm with significant complexity reduction.展开更多
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ...With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely.展开更多
Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the ac...Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the actual domestic fashion industry environment, ideal model that could quickly respond to the market's changes is proposed which includes naming brand, target-market position, circumstances analysis and popularity anticipation, brand concept and style setting, fashion design, fashion category component, and sale strategy.展开更多
In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super...In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded.展开更多
In Malaysia, the Islamic commercial institutions were established under respective legislations which contain express term on their status as a body corporate. Examples of these institutions are Islamic banks, zakah i...In Malaysia, the Islamic commercial institutions were established under respective legislations which contain express term on their status as a body corporate. Examples of these institutions are Islamic banks, zakah institutions, Pilgrimage Board and Islamic insurance (takaful) companies. In 1998, Johor Corporation (JCorp) initiated a corporate waqf entity known as Waqaf An-Nur Corporation Berhad (WANCorp). In 2011, Majlis Agama Islam Wilayah Persekutuan (MAIWP) collaborated with Tabung Haji to develop a Class AWaqf building leased to Bank Islam Malaysia Berhad (BIMB). The developments in waqf involving corporate entities are worth to be analyzed in order to create a new framework of waqf practice. This paper deliberated the attributes of corporations under the Malaysian law and compares them with the principles of Islamic law (Shari'ah). For the purpose of discussion, this paper refers to WANCorp and Awqaf Holdings as examples ofwaqf corporations in Malaysia.展开更多
This paper describes an innovative adaptive algorithmic modeling approach, for solving a wide class of e-business and strategic management problems under uncertainty conditions. The proposed methodology is based on ba...This paper describes an innovative adaptive algorithmic modeling approach, for solving a wide class of e-business and strategic management problems under uncertainty conditions. The proposed methodology is based on basic ideas and concepts of four key-field interrelated sciences, i.e., computing science, applied mathematics, management sciences and economic sciences. Furthermore, the fundamental scientific concepts of adaptability and uncertainty are shown to play a critical role of major importance for a (near) optimum solution of a class of complex e-business/services and strategic management problems. Two characteristic case studies, namely measuring e-business performance under certain environmental pressures and organizational constraints and describing the relationships between technology, innovation and firm performance, are considered as effective applications of the proposed adaptive algorithmic modeling approach. A theoretical time-dependent model for the evaluation of firm e-business performances is also proposed.展开更多
Community Question Answering (CQA) websites have greatly facilitated users' lives, with an increasing number of people seeking help and exchanging ideas on the Internet. This newlymerged community features two char...Community Question Answering (CQA) websites have greatly facilitated users' lives, with an increasing number of people seeking help and exchanging ideas on the Internet. This newlymerged community features two characteristics: social relations and an ask-reply mechanism. As users' behaviours and social statuses play a more important role in CQA services than traditional answer retrieving websites, researchers' concerns have shifted from the need to passively find existing answers to actively seeking potential reply providers that may give answers in the near future. We analyse datasets derived from an online CQA system named "Quora", and observed that compared with traditional question answering services, users tend to contribute replies rather than questions for help in the CQA system. Inspired by the findings, we seek ways to evaluate the users' ability to offer prompt and reliable help, taking into account activity, authority and social reputation char- acteristics. We propose a hybrid method that is based on a Question-User network and social network using optimised PageRank algorithm. Experimental results show the efficiency of the proposed method for ranking potential answer-providers.展开更多
The aim of the article is to determine the extent to which customer satisfaction's in the e-banking in Semnan area had organizational and customer readiness for developing their services. One of the most important se...The aim of the article is to determine the extent to which customer satisfaction's in the e-banking in Semnan area had organizational and customer readiness for developing their services. One of the most important sectors that plays key role for grasping developed condition is banking sector. Banks like other institutions also look for augmenting their profits and increasing their strength by expansion. The designing of bank must involve selection of those that have sufficient success potential. Hence, from several factors of success, the following three criteria factors have been: selected-customer satisfied, one dimensional, and product fully functional. These factors offers three question multi criteria group extracted from a 16 norms. Also, three criteria factors have been studied over a period of five years and important criteria for evaluating the norms. The Analytical Hierarchy Process (AHP) has been employed to calculate the success potential of each norm. The empirical data comprises the longitudinal survey of the agricultural banking of the Semnan province. The paper, also, finds that product fully functional is placed as the first priority.展开更多
The quality of methods for determining energy transits on the tie lines (lines that connect two neighboring power system) can have significant impact on business activity of the TSOs (transmission system operators...The quality of methods for determining energy transits on the tie lines (lines that connect two neighboring power system) can have significant impact on business activity of the TSOs (transmission system operators). Existing law regulation is not enough precise regarding definition of methods for metering energy transits (energy interchanged between neighboring TSOs). This paper analyses disadvantages of method for line losses metering with electric meters and suggests introduction of the measured value corrections.展开更多
文摘The performance of genetic algorithm(GA) is determined by the capability of search and optimization for satisfactory solutions. The new adaptive genetic algorithm(AGA) is built for inducing suitable search and optimization relationship. The use of six fuzzy logic controllers(6FLCs) is proposed for dynamic control genetic operating parameters of a symbolic-coded GA. This paper uses AGA based on 6FLCs to deal with the travelling salesman problem (TSP). Experimental results show that AGA based on 6FLCs is more efficient than a standard GA in solving combinatorial optimization problems similar to TSP.
基金The National Key Technology R&D Program of China during the 11th Five-Year Plan Period(No.2006BAH02A06)
文摘To solve the traveling salesman problem with the characteristics of clustering,a novel hybrid algorithm,the ant colony algorithm combined with the C-means algorithm,is presented.In order to improve the speed of convergence,the traveling salesman problem(TSP)data is specially clustered by the C-means algorithm,then,the result is processed by the ant colony algorithm to solve the problem.The proposed algorithm treats the C-means algorithm as a new search operator and adopts a kind of local searching strategy—2-opt,so as to improve the searching performance.Given the cluster number,the algorithm can obtain the preferable solving result.Compared with the three other algorithms—the ant colony algorithm,the genetic algorithm and the simulated annealing algorithm,the proposed algorithm can make the results converge to the global optimum faster and it has higher accuracy.The algorithm can also be extended to solve other correlative clustering combination optimization problems.Experimental results indicate the validity of the proposed algorithm.
基金Project supported by the National Hi-Tech Research and Develop-ment Program (863) of China (No. 2003AA123310) and the National Natural Science Foundation of China (No. 60332030)
文摘Estimation and detection algorithms for orthogonal frequency division multiplexing (OFDM) systems can be de-veloped based on the sum-product algorithms, which operate by message passing in factor graphs. In this paper, we apply the sampling method (Monte Carlo) to factor graphs, and then the integrals in the sum-product algorithm can be approximated by sums, which results in complexity reduction. The blind receiver for OFDM systems can be derived via Sequential Monte Carlo (SMC) in factor graphs, the previous SMC blind receiver can be regarded as the special case of the sum-product algorithms using sampling methods. The previous SMC blind receiver for OFDM systems needs generating samples of the channel vector assuming the channel has an a priori Gaussian distribution. In the newly-built blind receiver, we generate samples of the virtual-pilots instead of the channel vector, with channel vector which can be easily computed based on virtual-pilots. As the size of the vir-tual-pilots space is much smaller than the channel vector space, only small number of samples are necessary, with the blind de-tection being much simpler. Furthermore, only one pilot tone is needed to resolve phase ambiguity and differential encoding is not used anymore. Finally, the results of computer simulations demonstrate that the proposal can perform well while providing sig-nificant complexity reduction.
文摘Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared.
基金Supported by the National Natural Science Foundation of China(No.61772031)the Special Energy Saving Foundation of Changsha,Hunan Province in 2017
文摘Granular computing is a very hot research field in recent years. In our previous work an algebraic quotient space model was proposed,where the quotient structure could not be deduced if the granulation was based on an equivalence relation. In this paper,definitions were given and formulas of the lower quotient congruence and upper quotient congruence were calculated to roughly represent the quotient structure. Then the accuracy and roughness were defined to measure the quotient structure in quantification. Finally,a numerical example was given to demonstrate that the rough representation and measuring methods are efficient and applicable. The work has greatly enriched the algebraic quotient space model and granular computing theory.
文摘The efficiency of any organizations at manufacturing sector or service sector, profit making or non-profit making, is most important factor for survival and growth of the organization. The Data Envelopment Analysis (DEA) technique is one of the most popular and effective tool to measure relative efficiency hence is appropriate to make comparison among similar organizations with multiple output and input. This study performs frontier analysis and measures the relative efficiency of Nepalese commercial banks using DEA approach with two output and two input variables.
文摘With the great impact of WTO and the business globalization, professional internationalized business people are heavily demanding, which imposes pressure and necessity on practical and effective Business English program. This essay intends to design an intensive, non-assessed, inservice oral business English course for intermediate business people.
文摘Train control systems ensure the safety of railways. This paper begins with a summary of the typical train control systems in Japan and Europe. Based on this summary, the author then raises the following question regarding current train control systems: What approach should be adopted in order to enhance the functionality, safety, and reliability of train control systems and assist in commercial operations on railways? Next, the author provides a desirable architecture that is likely to assist with the development of new train control systems based on current information and communication technologies. A new unified train control system (UTCS) is proposed that is effective in enhancing the robustness and com- petitiveness of a train control system. The ultimate architecture of the UTCS will be only composed of essential elements such as point machines and level crossing control devices in the field. Finally, a pro- cessing method of the UTCS is discussed.
基金the National Science Foundation of China and Key Subject Project of the Ministry of Education.
文摘Factor graph, so named because it graphically represents function factorization, with which and its sum-product algorithm the iterative algorithm can be derived clearly. An iterative multiuser receiver based on factor graph for asynchronous coded CDMA system is proposed. In this paper, the a posteriori probability of users information bits conditioned on the noise-whitening filters output is represented by factor graphs, after numbers of iterations with the sum-product algorithm the information bits are estimated. The authors also propose a reduced complexity algorithm. Simulation results show that with this proposed receiver, near-single-user performance can be achieved, and small performance degradation for the reduced complexity algorithm with significant complexity reduction.
基金supported in part by NSFC under Grant No.61172090National Science and Technology Major Project under Grant 2012ZX03002001+3 种基金Research Fund for the Doctoral Program of Higher Education of China under Grant No.20120201110013Scientific and Technological Project in Shaanxi Province under Grant(No.2012K06-30, No.2014JQ8322)Basic Science Research Fund in Xi'an Jiaotong University(No. XJJ2014049,No.XKJC2014008)Shaanxi Science and Technology Innovation Project (2013SZS16-Z01/P01/K01)
文摘With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely.
基金the national education ministry key research project 02107.
文摘Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the actual domestic fashion industry environment, ideal model that could quickly respond to the market's changes is proposed which includes naming brand, target-market position, circumstances analysis and popularity anticipation, brand concept and style setting, fashion design, fashion category component, and sale strategy.
文摘In this paper, the operating performances of the main commercial banks' information security management system applications are empirically researched using the DEA method of operating efficiency's multi-stage super efficiency. The DEA model of multi-stage super efficiency is established for the commercial bank information security system applications of China's banks using data envelopment analysis (DEA), and then output efficiency, taxation efficiency, and comprehensive efficiency are analyzed by choosing eight banks such as Industrial and Commercial bank of China as sample data, and finally the operating performance of Chinese commercial banks' information security management system is concluded.
文摘In Malaysia, the Islamic commercial institutions were established under respective legislations which contain express term on their status as a body corporate. Examples of these institutions are Islamic banks, zakah institutions, Pilgrimage Board and Islamic insurance (takaful) companies. In 1998, Johor Corporation (JCorp) initiated a corporate waqf entity known as Waqaf An-Nur Corporation Berhad (WANCorp). In 2011, Majlis Agama Islam Wilayah Persekutuan (MAIWP) collaborated with Tabung Haji to develop a Class AWaqf building leased to Bank Islam Malaysia Berhad (BIMB). The developments in waqf involving corporate entities are worth to be analyzed in order to create a new framework of waqf practice. This paper deliberated the attributes of corporations under the Malaysian law and compares them with the principles of Islamic law (Shari'ah). For the purpose of discussion, this paper refers to WANCorp and Awqaf Holdings as examples ofwaqf corporations in Malaysia.
文摘This paper describes an innovative adaptive algorithmic modeling approach, for solving a wide class of e-business and strategic management problems under uncertainty conditions. The proposed methodology is based on basic ideas and concepts of four key-field interrelated sciences, i.e., computing science, applied mathematics, management sciences and economic sciences. Furthermore, the fundamental scientific concepts of adaptability and uncertainty are shown to play a critical role of major importance for a (near) optimum solution of a class of complex e-business/services and strategic management problems. Two characteristic case studies, namely measuring e-business performance under certain environmental pressures and organizational constraints and describing the relationships between technology, innovation and firm performance, are considered as effective applications of the proposed adaptive algorithmic modeling approach. A theoretical time-dependent model for the evaluation of firm e-business performances is also proposed.
基金supported by the Fundamental Research Funds for the Central Universitiesthe National Natural Science Foundation of China under Grant No.61271041+2 种基金the National Basic Research Program of China (973 Program) under Grant No.2009CB320504the iCore Integrated Project under Grant No.287708the National Scienceand Technology Major Project under Grants No.2012ZX03005008-001,No.2012ZX03002008
文摘Community Question Answering (CQA) websites have greatly facilitated users' lives, with an increasing number of people seeking help and exchanging ideas on the Internet. This newlymerged community features two characteristics: social relations and an ask-reply mechanism. As users' behaviours and social statuses play a more important role in CQA services than traditional answer retrieving websites, researchers' concerns have shifted from the need to passively find existing answers to actively seeking potential reply providers that may give answers in the near future. We analyse datasets derived from an online CQA system named "Quora", and observed that compared with traditional question answering services, users tend to contribute replies rather than questions for help in the CQA system. Inspired by the findings, we seek ways to evaluate the users' ability to offer prompt and reliable help, taking into account activity, authority and social reputation char- acteristics. We propose a hybrid method that is based on a Question-User network and social network using optimised PageRank algorithm. Experimental results show the efficiency of the proposed method for ranking potential answer-providers.
文摘The aim of the article is to determine the extent to which customer satisfaction's in the e-banking in Semnan area had organizational and customer readiness for developing their services. One of the most important sectors that plays key role for grasping developed condition is banking sector. Banks like other institutions also look for augmenting their profits and increasing their strength by expansion. The designing of bank must involve selection of those that have sufficient success potential. Hence, from several factors of success, the following three criteria factors have been: selected-customer satisfied, one dimensional, and product fully functional. These factors offers three question multi criteria group extracted from a 16 norms. Also, three criteria factors have been studied over a period of five years and important criteria for evaluating the norms. The Analytical Hierarchy Process (AHP) has been employed to calculate the success potential of each norm. The empirical data comprises the longitudinal survey of the agricultural banking of the Semnan province. The paper, also, finds that product fully functional is placed as the first priority.
文摘The quality of methods for determining energy transits on the tie lines (lines that connect two neighboring power system) can have significant impact on business activity of the TSOs (transmission system operators). Existing law regulation is not enough precise regarding definition of methods for metering energy transits (energy interchanged between neighboring TSOs). This paper analyses disadvantages of method for line losses metering with electric meters and suggests introduction of the measured value corrections.