首页 > 最新文献

2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)最新文献

英文 中文
A Learning Automata Based Dynamic Resource Provisioning in Cloud Computing Environments 云计算环境下基于学习自动机的动态资源配置
H. Qavami, S. Jamali, M. Akbari, B. Javadi
Cloud computing provides more reliable and flexible access to IT resources, on-demand and self-service service request are some key advantages of it. Managing up-layer cloud services efficiently, while promising those advantages and SLA, motivates the challenge of provisioning and allocating resource on-demand in infrastructure layer, in response to dynamic workloads. Studies mostly have been focused on managing these demands in the physical layer and few in the application layer. This paper focuses on resource allocation method in application level that allocates an appropriate number of virtual machines to an application which requires a dynamic amount of resources. A Learning Automata based approach has been chosen to implement the method. Experimental results demonstrate that the proposed technique offers more cost effective resource provisioning approach while provisions enough resource for applications.
云计算提供了更可靠、更灵活的IT资源访问,按需服务和自助服务请求是它的一些关键优势。有效地管理上层云服务,同时保证这些优势和SLA,激发了在基础设施层按需供应和分配资源的挑战,以响应动态工作负载。研究大多集中在物理层的需求管理上,应用层的需求管理很少。本文主要研究应用程序级的资源分配方法,该方法为需要动态资源的应用程序分配适当数量的虚拟机。选择了一种基于学习自动机的方法来实现该方法。实验结果表明,该技术在为应用提供足够资源的同时,提供了一种更具成本效益的资源配置方法。
{"title":"A Learning Automata Based Dynamic Resource Provisioning in Cloud Computing Environments","authors":"H. Qavami, S. Jamali, M. Akbari, B. Javadi","doi":"10.1109/PDCAT.2017.00086","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00086","url":null,"abstract":"Cloud computing provides more reliable and flexible access to IT resources, on-demand and self-service service request are some key advantages of it. Managing up-layer cloud services efficiently, while promising those advantages and SLA, motivates the challenge of provisioning and allocating resource on-demand in infrastructure layer, in response to dynamic workloads. Studies mostly have been focused on managing these demands in the physical layer and few in the application layer. This paper focuses on resource allocation method in application level that allocates an appropriate number of virtual machines to an application which requires a dynamic amount of resources. A Learning Automata based approach has been chosen to implement the method. Experimental results demonstrate that the proposed technique offers more cost effective resource provisioning approach while provisions enough resource for applications.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"689 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cost-Aware Software-Defined Hybrid Object-Based Storage System 成本感知型软件定义混合对象存储系统
Yung-Feng Lu, Chin-Fu Kuo, Shih-Chun Chou, Jhong-Syuan Li, Yan-Wei Lai
Object-based storage is a storage architecture that manages data as objects, as opposed to other storage architectures like file systems which manage data as a file hierarchy and block storage which manages data as blocks within sectors and tracks. In general, each object typically includes the data itself, a variable amount of metadata, and a globally unique identifier. Object storage seeks to enable capabilities not addressed by other storage architectures such as data replication and data distribution at object-level granularity. A distributed data store is a computer network where information is stored on more than one node, often in a replicated fashion. Recently, there are many excellent researches target on energy aware, performance-aware, and trade-of on cloud storage. However, less on the scheduling on the cost-efficient designs. This paper, aims to evaluate the data storage performance with hybrid storage. We try to provide a cost-aware scheme for tier-based hybrid storage. Our scheme can provide a proper placement for data. Thus, users and venders can use lower cost to get the performance that they need.
基于对象的存储是一种将数据作为对象进行管理的存储体系结构,与其他存储体系结构相反,如文件系统将数据作为文件层次结构进行管理,块存储将数据作为扇区和轨道中的块进行管理。一般来说,每个对象通常包括数据本身、可变数量的元数据和一个全局唯一标识符。对象存储寻求实现其他存储体系结构无法解决的功能,例如对象级粒度的数据复制和数据分发。分布式数据存储是一种计算机网络,其中信息存储在多个节点上,通常以复制方式存储。近年来,在云存储的能源感知、性能感知和交易等方面有很多优秀的研究。然而,在成本效益设计上的调度较少。本文旨在对混合存储的数据存储性能进行评估。我们尝试为基于层的混合存储提供成本意识方案。我们的方案可以为数据提供适当的位置。因此,用户和供应商可以使用更低的成本来获得他们需要的性能。
{"title":"Cost-Aware Software-Defined Hybrid Object-Based Storage System","authors":"Yung-Feng Lu, Chin-Fu Kuo, Shih-Chun Chou, Jhong-Syuan Li, Yan-Wei Lai","doi":"10.1109/PDCAT.2017.00081","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00081","url":null,"abstract":"Object-based storage is a storage architecture that manages data as objects, as opposed to other storage architectures like file systems which manage data as a file hierarchy and block storage which manages data as blocks within sectors and tracks. In general, each object typically includes the data itself, a variable amount of metadata, and a globally unique identifier. Object storage seeks to enable capabilities not addressed by other storage architectures such as data replication and data distribution at object-level granularity. A distributed data store is a computer network where information is stored on more than one node, often in a replicated fashion. Recently, there are many excellent researches target on energy aware, performance-aware, and trade-of on cloud storage. However, less on the scheduling on the cost-efficient designs. This paper, aims to evaluate the data storage performance with hybrid storage. We try to provide a cost-aware scheme for tier-based hybrid storage. Our scheme can provide a proper placement for data. Thus, users and venders can use lower cost to get the performance that they need.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132922403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing Bytecode and ISA Compatibility with an Enhanced Toolchain 使用增强的工具链管理字节码和ISA兼容性
R. Duncan
We describe an approach to deploying only those bytecodes that can be executed by the current operating system and hardware resources in an environment that combines parallelism, processor heterogeneity and software-defined networking capabilities (SDN). Packet processing’s escalating speed requirements necessitate parallel processing and, typically, heterogeneous processing via specialized processors acting as accelerators. We use bytecodes for an abstract machine to drive the dissimilar processors with interpreters running in parallel. However, processors and SDN are evolving; thus, bytecodes must evolve as well. We must execute reliable programs for packet processing, so we need to deploy only bytecodes that the interpreters and system resources can support. Our solution combines: (a) correlating supported features, interpreter versions and hardware variants in a manifest file, (b) instrumenting a compiler to recognize key feature use, (c) carrying detected feature data in an object module section and (d) running a checking tool at pre-linking stages to prevent linking or deploying a bytecode that cannot be correctly executed. The scheme has handled deprecating features and adding a broad variety of new features. It has been stress-tested by significant changes in hardware variants.
我们描述了一种方法,在结合并行性、处理器异构性和软件定义网络功能(SDN)的环境中,只部署那些可以由当前操作系统和硬件资源执行的字节码。分组处理不断增长的速度要求需要并行处理,并且通常需要通过充当加速器的专用处理器进行异构处理。我们对抽象机器使用字节码来驱动具有并行运行的解释器的不同处理器。然而,处理器和SDN正在不断发展;因此,字节码也必须进化。我们必须为数据包处理执行可靠的程序,因此我们只需要部署解释器和系统资源能够支持的字节码。我们的解决方案结合了:(a)在清单文件中关联支持的功能,解释器版本和硬件变体,(b)对编译器进行检测以识别关键功能的使用,(c)在目标模块部分中携带检测到的功能数据,以及(d)在预链接阶段运行检查工具以防止链接或部署无法正确执行的字节码。该方案处理了不赞成的特性,并添加了各种各样的新特性。它已经通过硬件变体的重大变化进行了压力测试。
{"title":"Managing Bytecode and ISA Compatibility with an Enhanced Toolchain","authors":"R. Duncan","doi":"10.1109/PDCAT.2017.00073","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00073","url":null,"abstract":"We describe an approach to deploying only those bytecodes that can be executed by the current operating system and hardware resources in an environment that combines parallelism, processor heterogeneity and software-defined networking capabilities (SDN). Packet processing’s escalating speed requirements necessitate parallel processing and, typically, heterogeneous processing via specialized processors acting as accelerators. We use bytecodes for an abstract machine to drive the dissimilar processors with interpreters running in parallel. However, processors and SDN are evolving; thus, bytecodes must evolve as well. We must execute reliable programs for packet processing, so we need to deploy only bytecodes that the interpreters and system resources can support. Our solution combines: (a) correlating supported features, interpreter versions and hardware variants in a manifest file, (b) instrumenting a compiler to recognize key feature use, (c) carrying detected feature data in an object module section and (d) running a checking tool at pre-linking stages to prevent linking or deploying a bytecode that cannot be correctly executed. The scheme has handled deprecating features and adding a broad variety of new features. It has been stress-tested by significant changes in hardware variants.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"49 52","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113957673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Online Algorithms for One-Dimensional BinPacking with Advice 带通知的一维打包的改进在线算法
Xiaofan Zhao, Xin Li, Hong Shen
In this paper, we study the problem of online bin packing with advice. Assume that there is an oracle with infinite computation power which can provide specific information with regard to each incoming item of the online bin packing problem. With this information, we want to pack the list L of items, one at a time, into a minimum number of bins. The bin capacity is 1 and all items have size no larger than 1. The total size of packed items in each bin cannot exceed the bin capacity. Inspired by the work of Boyar et al. of competitive ratio 4/3 with two advice bits per item, we show that if the oracle provides three bits of advice per item, applying a different item classification scheme from Boyar et als, we can obtain an online algorithm with competitive ratio 5/4 to pack list L. Furthermore, we show that our algorithm can retain the same competitive ratio 5/4 with only two advice bits per item, hence improving the known result.
本文研究了带建议的在线装箱问题。假设存在一个具有无限计算能力的oracle,它可以提供关于在线装箱问题的每个进站物品的具体信息。有了这些信息,我们想要将列表L中的物品打包,一次一个,放入最少数量的箱子中。垃圾箱容量为1,所有物品的大小不大于1。每个箱中包装物品的总尺寸不能超过箱容量。灵感来自Boyar等人的工作竞争比4/3位/项目有两个建议,我们表明,如果每项,oracle提供三位的建议应用不同的物品分类方案Boyar als,我们可以获得一个在线算法与竞争比5/4包装列表l .此外,我们表明,我们的算法可以保持相同的竞争比5/4每项只有两个建议,因此改善已知的结果。
{"title":"Improved Online Algorithms for One-Dimensional BinPacking with Advice","authors":"Xiaofan Zhao, Xin Li, Hong Shen","doi":"10.1109/PDCAT.2017.00042","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00042","url":null,"abstract":"In this paper, we study the problem of online bin packing with advice. Assume that there is an oracle with infinite computation power which can provide specific information with regard to each incoming item of the online bin packing problem. With this information, we want to pack the list L of items, one at a time, into a minimum number of bins. The bin capacity is 1 and all items have size no larger than 1. The total size of packed items in each bin cannot exceed the bin capacity. Inspired by the work of Boyar et al. of competitive ratio 4/3 with two advice bits per item, we show that if the oracle provides three bits of advice per item, applying a different item classification scheme from Boyar et als, we can obtain an online algorithm with competitive ratio 5/4 to pack list L. Furthermore, we show that our algorithm can retain the same competitive ratio 5/4 with only two advice bits per item, hence improving the known result.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"228 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113988931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Case Study in Higher Education Domain Based on a Prototype for Business Process Models Improvement: BPMoQualAssess 基于业务流程模型改进原型的高等教育领域案例研究:bpmoqualevaluate
Fouzia Kahloun, Sonia Ayachi Ghannouchi
Business process modeling is essential for improving and automating business processes and for comparing them. Furthermore, evaluating their quality must be based on a set of measures. In this context, our contribution in this paper consists in proposing a prototype for Process model assessment and applying it on a real business process model in the higher education. Our prototype is based on four main steps (modeling, measurement, evaluation and improvement). It takes as input a BPMN model for which some measures are applied to define its level of quality. After that, we compare the obtained measures with the threshold values presented in literature with the purpose of evaluating the considered BPMN model level of quality. Finally, based on guidelines applied to each exceeding measure, we help the designer to improve his/her model.
业务流程建模对于改进和自动化业务流程以及比较业务流程至关重要。此外,评估它们的质量必须基于一套措施。在这种情况下,我们在本文中的贡献包括提出流程模型评估的原型,并将其应用于高等教育中的实际业务流程模型。我们的原型基于四个主要步骤(建模、测量、评估和改进)。它将BPMN模型作为输入,并对该模型应用一些度量来定义其质量水平。之后,我们将获得的测量值与文献中提出的阈值进行比较,目的是评估所考虑的BPMN模型的质量水平。最后,根据每项超标措施的指导原则,我们帮助设计师改进他/她的模型。
{"title":"A Case Study in Higher Education Domain Based on a Prototype for Business Process Models Improvement: BPMoQualAssess","authors":"Fouzia Kahloun, Sonia Ayachi Ghannouchi","doi":"10.1109/PDCAT.2017.00077","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00077","url":null,"abstract":"Business process modeling is essential for improving and automating business processes and for comparing them. Furthermore, evaluating their quality must be based on a set of measures. In this context, our contribution in this paper consists in proposing a prototype for Process model assessment and applying it on a real business process model in the higher education. Our prototype is based on four main steps (modeling, measurement, evaluation and improvement). It takes as input a BPMN model for which some measures are applied to define its level of quality. After that, we compare the obtained measures with the threshold values presented in literature with the purpose of evaluating the considered BPMN model level of quality. Finally, based on guidelines applied to each exceeding measure, we help the designer to improve his/her model.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis on the Security and Use of Password Managers 密码管理器的安全性及使用分析
Carlos Luevanos, John Elizarraras, K. Hirschi, Jyh-haw Yeh
Cybersecurity has become one of the largest growing fields in computer science and the technology industry. Faulty security has cost the global economy immense losses. Oftentimes, the pitfall in such financial loss is due to the security of passwords. Companies and regular people alike do not do enough to enforce strict password guidelines like the NIST (National Institute of Standard Technology) recommends. When big security breaches happen, thousands to millions of passwords can be exposed and stored into files, meaning people are susceptible to dictionary and rainbow table attacks. Those are only two examples of attacks that are used to crack passwords. In this paper, we will be going over three open-source password managers, each chosen for their own uniqueness. Our results will conclude on the overall security of each password manager using a list of established attacks and development of new potential attacks on such software. Additionally, we will compare our research with the limited research already conducted on password managers. Finally, we will provide some general guidelines of how to develop a better and more secure password manager.
网络安全已经成为计算机科学和技术行业中增长最快的领域之一。安全问题给全球经济造成了巨大损失。通常,这种经济损失的陷阱是由于密码的安全性。公司和普通人都没有像NIST(美国国家标准技术研究院)建议的那样严格执行密码指南。当发生重大安全漏洞时,成千上万的密码可能会暴露并存储在文件中,这意味着人们很容易受到字典和彩虹表的攻击。这只是用来破解密码的两个例子。在本文中,我们将介绍三个开源密码管理器,每个密码管理器都有其独特之处。我们的研究结果将总结每个密码管理器的整体安全性,使用已建立的攻击列表和针对此类软件的新潜在攻击的开发。此外,我们将把我们的研究与已经对密码管理器进行的有限研究进行比较。最后,我们将提供一些关于如何开发更好、更安全的密码管理器的一般指导方针。
{"title":"Analysis on the Security and Use of Password Managers","authors":"Carlos Luevanos, John Elizarraras, K. Hirschi, Jyh-haw Yeh","doi":"10.1109/PDCAT.2017.00013","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00013","url":null,"abstract":"Cybersecurity has become one of the largest growing fields in computer science and the technology industry. Faulty security has cost the global economy immense losses. Oftentimes, the pitfall in such financial loss is due to the security of passwords. Companies and regular people alike do not do enough to enforce strict password guidelines like the NIST (National Institute of Standard Technology) recommends. When big security breaches happen, thousands to millions of passwords can be exposed and stored into files, meaning people are susceptible to dictionary and rainbow table attacks. Those are only two examples of attacks that are used to crack passwords. In this paper, we will be going over three open-source password managers, each chosen for their own uniqueness. Our results will conclude on the overall security of each password manager using a list of established attacks and development of new potential attacks on such software. Additionally, we will compare our research with the limited research already conducted on password managers. Finally, we will provide some general guidelines of how to develop a better and more secure password manager.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132576216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Exact Algorithm for the Biobjective 0-1 Linear Knapsack Problem with a Single Continuous Variable 单连续变量双目标0-1线性背包问题的精确算法
Hongtao Liu
In this paper, we study one variant of the multiobjective knapsack problem, i.e., the biobjective 0-1 linear knapsack problem with a single continuous variable (BKPC). An exact algorithm, the biobjective branch and bound method (BOBB), is presented to find all nondominated points of the BKPC. We analyze the nondominated frontier of the BKPC and design a new branching strategy to improve the algorithm. Finally an illustrative example shows how the algorithm solves a practical problem.
本文研究了多目标背包问题的一种变体,即具有单连续变量的双目标0-1线性背包问题。提出了一种精确的算法——双目标分支定界法(BOBB)来求出BKPC的所有非支配点。我们分析了BKPC的非支配边界,并设计了一种新的分支策略来改进算法。最后,通过实例说明了该算法是如何解决实际问题的。
{"title":"An Exact Algorithm for the Biobjective 0-1 Linear Knapsack Problem with a Single Continuous Variable","authors":"Hongtao Liu","doi":"10.1109/PDCAT.2017.00022","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00022","url":null,"abstract":"In this paper, we study one variant of the multiobjective knapsack problem, i.e., the biobjective 0-1 linear knapsack problem with a single continuous variable (BKPC). An exact algorithm, the biobjective branch and bound method (BOBB), is presented to find all nondominated points of the BKPC. We analyze the nondominated frontier of the BKPC and design a new branching strategy to improve the algorithm. Finally an illustrative example shows how the algorithm solves a practical problem.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125852652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integer Programming Model to Optimize Waste Management System (Case Study: Surakarta City Indonesia) 优化废物管理系统的整数规划模型(以印尼泗水市为例)
Yusuf Sutanto, Siti Hayati Efi Friantin, S. Wulandari
This research develops binary integer programming model for optimization of garbage transportation by arranging the type of vehicle used to transport garbage at each garbage disposal based on the distance travel by each vehicle, the maximum carrying capacity of the vehicle, and the maximum capacity of the landfill. This model is applied to the market garbage transportation in Surakarta City. The result shows that the fleet used only 6 trucks from 10 trucks, and from 6 trucks only 3 trucks that do the ritual, so it is expected to minimize the operational cost of the garbage transportation market.
本研究根据车辆行驶距离、车辆最大承载能力和填埋场最大承载能力,对各垃圾处理场运输垃圾的车辆类型进行排序,建立垃圾运输优化的二进制整数规划模型。将该模型应用于泗水市的市场垃圾运输。结果表明,车队只使用了10辆卡车中的6辆卡车,而6辆卡车中只有3辆卡车进行了仪式,因此预计将最小化垃圾运输市场的运营成本。
{"title":"Integer Programming Model to Optimize Waste Management System (Case Study: Surakarta City Indonesia)","authors":"Yusuf Sutanto, Siti Hayati Efi Friantin, S. Wulandari","doi":"10.1109/PDCAT.2017.00084","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00084","url":null,"abstract":"This research develops binary integer programming model for optimization of garbage transportation by arranging the type of vehicle used to transport garbage at each garbage disposal based on the distance travel by each vehicle, the maximum carrying capacity of the vehicle, and the maximum capacity of the landfill. This model is applied to the market garbage transportation in Surakarta City. The result shows that the fleet used only 6 trucks from 10 trucks, and from 6 trucks only 3 trucks that do the ritual, so it is expected to minimize the operational cost of the garbage transportation market.","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human Action Recognition Using Wavelets of Derived Beta Distributions 利用衍生Beta分布的小波进行人体动作识别
Neziha Jaouedi, Noureddine Boujnah, M. Bouhlel
In the framework of human machine interaction systems enhancement, we focus throw this paper on human behavior analysis and action recognition. Human behavior is characterized by actions and reactions duality (movements, psychological modification, verbal and emotional expression. Its worth noting that many information are hidden behind gesture, sudden motion points trajectories and speeds, many research works reconstructed an information retrieval issues. In our work we will focus on motion extraction, tracking and action recognition using wavelet network approaches. Our contribution uses an analysis of human subtraction by Gaussian Mixture Model (GMM) and body movement through trajectory models of motion constructed from kalman filter. These models allow to remove the noise using the extraction of the main motion features and constitute a stable base to identify the evolutions of human activity .Each modality is used to recognize a human action using wavelets of derived beta distributions approach. The proposed approach has been validated successfully on a subset of KTH and UCF sport database
在人机交互系统增强的框架下,重点研究了人的行为分析和动作识别。人类行为的特点是行动和反应的二元性(动作、心理修正、语言和情感表达)。值得注意的是,许多信息隐藏在手势、突然运动点的轨迹和速度背后,许多研究工作重构了信息检索问题。在我们的工作中,我们将重点关注运动提取,跟踪和动作识别使用小波网络方法。我们的贡献使用高斯混合模型(GMM)对人体减法进行分析,并通过卡尔曼滤波构建的运动轨迹模型对身体运动进行分析。这些模型允许通过提取主要运动特征来去除噪声,并构成一个稳定的基础来识别人类活动的演变。每个模态都被用来识别人类行为,使用衍生的β分布方法的小波。该方法已在KTH和UCF体育数据库的一个子集上成功验证
{"title":"Human Action Recognition Using Wavelets of Derived Beta Distributions","authors":"Neziha Jaouedi, Noureddine Boujnah, M. Bouhlel","doi":"10.1109/PDCAT.2017.00088","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00088","url":null,"abstract":"In the framework of human machine interaction systems enhancement, we focus throw this paper on human behavior analysis and action recognition. Human behavior is characterized by actions and reactions duality (movements, psychological modification, verbal and emotional expression. Its worth noting that many information are hidden behind gesture, sudden motion points trajectories and speeds, many research works reconstructed an information retrieval issues. In our work we will focus on motion extraction, tracking and action recognition using wavelet network approaches. Our contribution uses an analysis of human subtraction by Gaussian Mixture Model (GMM) and body movement through trajectory models of motion constructed from kalman filter. These models allow to remove the noise using the extraction of the main motion features and constitute a stable base to identify the evolutions of human activity .Each modality is used to recognize a human action using wavelets of derived beta distributions approach. The proposed approach has been validated successfully on a subset of KTH and UCF sport database","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122582827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
5G Cellular: Survey on Some Challenging Techniques 5G蜂窝:一些具有挑战性的技术调查
Yosra Benchaabene, Noureddine Boujnah, F. Zarai
The evolving fifth generation (5G) cellular wireless networks are envisioned to provide higher data rates, enhance end-user quality-of-experience (QoE), reduce end-to-end latency, and lower energy consumption. This article presents several emerging technologies which could enable and define future 5G mobile communication standards and cellular networks. This article discusses novel design techniques including dense hetergeounes networks and stochastic geometry as an approach that will be used to design 5G cellular networks and new features are discussed such as the new mm-wave , Massive Multiple Input Multiple Out (Massive MIMO)and new access technique (Filter Bank multi Carrier). FBMC, cloud Radio Acess Network C-RAN and virtualization of wireless resources . Finally, the study presents new 5G applications, namely Machine type communication and IoT .
不断发展的第五代(5G)蜂窝无线网络有望提供更高的数据速率,增强最终用户体验质量(QoE),减少端到端延迟,并降低能耗。本文介绍了几种可以实现和定义未来5G移动通信标准和蜂窝网络的新兴技术。本文讨论了新的设计技术,包括密集异质网络和随机几何,作为一种将用于设计5G蜂窝网络的方法,并讨论了新毫米波、大规模多输入多输出(Massive MIMO)和新接入技术(滤波器组多载波)等新特性。FBMC,云无线接入网C-RAN和无线资源虚拟化。最后,该研究提出了新的5G应用,即机器类型通信和物联网。
{"title":"5G Cellular: Survey on Some Challenging Techniques","authors":"Yosra Benchaabene, Noureddine Boujnah, F. Zarai","doi":"10.1109/PDCAT.2017.00064","DOIUrl":"https://doi.org/10.1109/PDCAT.2017.00064","url":null,"abstract":"The evolving fifth generation (5G) cellular wireless networks are envisioned to provide higher data rates, enhance end-user quality-of-experience (QoE), reduce end-to-end latency, and lower energy consumption. This article presents several emerging technologies which could enable and define future 5G mobile communication standards and cellular networks. This article discusses novel design techniques including dense hetergeounes networks and stochastic geometry as an approach that will be used to design 5G cellular networks and new features are discussed such as the new mm-wave , Massive Multiple Input Multiple Out (Massive MIMO)and new access technique (Filter Bank multi Carrier). FBMC, cloud Radio Acess Network C-RAN and virtualization of wireless resources . Finally, the study presents new 5G applications, namely Machine type communication and IoT .","PeriodicalId":119197,"journal":{"name":"2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126616720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1