首页 > 最新文献

5th International Conference on Computer Sciences and Convergence Information Technology最新文献

英文 中文
SCAREX: A framework for scalable, reliable, and extendable cluster computing SCAREX:用于可伸缩、可靠和可扩展的集群计算的框架
Mino Ku, D. Min, Eunmi Choi
Cluster computing has been widely used in various fields from academics to industry because of its technical advantages. Recently, cloud computing become more attractive, as cluster computing is one of the core basements of cloud computing. However, the development of cluster-based system is hard without relative knowledge such as networking, workload distribution, fault tolerant, etc. Thus, various implementations for cluster computing have been introduced to help the development of cluster-based system. However, these implementations also have the limitation for developing cluster-based system because of high performance in specified application fields. In this paper, we present the SCAREX framework which supports scalability, reliability, extendibility, and easy for implementing cluster-based system. This framework employs a fault-tolerant mechanism for the failure of workload processing, and facilitates dynamic module distribution and loading for the work module which works on the worker node. The SCAREX also provides a simple programming interface for easy development. Since the SCAREX has flexible architecture, the developer can implement various cluster architecture and extend cluster architecture by combining the SCAREX-based cluster with other packages of the SCAREX or other frameworks.
集群计算以其独特的技术优势被广泛应用于从学术到工业的各个领域。近年来,云计算变得越来越有吸引力,因为集群计算是云计算的核心基础之一。然而,如果没有相关的知识,如组网、工作负载分配、容错等,基于集群的系统开发是困难的。因此,已经引入了各种用于集群计算的实现来帮助基于集群的系统的开发。然而,由于在特定的应用领域性能不高,这些实现在开发基于集群的系统时也存在一定的局限性。在本文中,我们提出了SCAREX框架,它支持可扩展性、可靠性、可扩展性,并且易于实现基于集群的系统。该框架对工作负载处理的故障采用了容错机制,有利于工作节点上工作模块的动态分发和加载。SCAREX还提供了一个简单的编程接口,便于开发。由于SCAREX具有灵活的体系结构,开发人员可以通过将基于SCAREX的集群与SCAREX的其他包或其他框架相结合来实现各种集群体系结构和扩展集群体系结构。
{"title":"SCAREX: A framework for scalable, reliable, and extendable cluster computing","authors":"Mino Ku, D. Min, Eunmi Choi","doi":"10.1109/ICCIT.2010.5711200","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711200","url":null,"abstract":"Cluster computing has been widely used in various fields from academics to industry because of its technical advantages. Recently, cloud computing become more attractive, as cluster computing is one of the core basements of cloud computing. However, the development of cluster-based system is hard without relative knowledge such as networking, workload distribution, fault tolerant, etc. Thus, various implementations for cluster computing have been introduced to help the development of cluster-based system. However, these implementations also have the limitation for developing cluster-based system because of high performance in specified application fields. In this paper, we present the SCAREX framework which supports scalability, reliability, extendibility, and easy for implementing cluster-based system. This framework employs a fault-tolerant mechanism for the failure of workload processing, and facilitates dynamic module distribution and loading for the work module which works on the worker node. The SCAREX also provides a simple programming interface for easy development. Since the SCAREX has flexible architecture, the developer can implement various cluster architecture and extend cluster architecture by combining the SCAREX-based cluster with other packages of the SCAREX or other frameworks.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121301400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The scheduling of steel-making and continuous casting process using branch and cut method via CPLEX optimization 用CPLEX优化方法对支切法炼钢和连铸工艺进行了调度
Liangliang Sun, W. Liu, Baoxing Xu, T. Chai
The steel-making and continuous casting process is the connection between the iron process and the rolling process; it is the bottleneck in the iron and steel production. A better scheduling of this process is the key factor to ensure the whole production in a well-organized rhythm for iron and steel production manufacturing productivity. The branch and cut method in the standard commercial solver CPLEX is introduced to solve the scheduling problem. The linearization methods for the linear conversion are highlighted. Due to the limited calculation time requirement about the scheduling results and the scale of the problem, special methods for the efficiency tuning are applied according to the characters of the problem. Numerical testing supported by Shanghai Bashan steel plant demonstrated that the computational results show significant improvement compared to the traditional manual scheduling results.
炼钢连铸工艺是炼铁工艺与轧制工艺的连接;这是钢铁生产的瓶颈。对这一过程进行更好的调度,是保证整个生产过程井然有序,提高钢铁生产生产效率的关键因素。引入标准商用求解器CPLEX中的分支切割法来求解调度问题。重点介绍了线性转换的线性化方法。由于调度结果的计算时间要求和问题的规模有限,根据问题的特点,采用了特殊的效率调优方法。上海巴山钢铁厂的数值试验表明,与传统的人工调度结果相比,计算结果有明显改善。
{"title":"The scheduling of steel-making and continuous casting process using branch and cut method via CPLEX optimization","authors":"Liangliang Sun, W. Liu, Baoxing Xu, T. Chai","doi":"10.1109/ICCIT.2010.5711147","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711147","url":null,"abstract":"The steel-making and continuous casting process is the connection between the iron process and the rolling process; it is the bottleneck in the iron and steel production. A better scheduling of this process is the key factor to ensure the whole production in a well-organized rhythm for iron and steel production manufacturing productivity. The branch and cut method in the standard commercial solver CPLEX is introduced to solve the scheduling problem. The linearization methods for the linear conversion are highlighted. Due to the limited calculation time requirement about the scheduling results and the scale of the problem, special methods for the efficiency tuning are applied according to the characters of the problem. Numerical testing supported by Shanghai Bashan steel plant demonstrated that the computational results show significant improvement compared to the traditional manual scheduling results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A data hiding algorithm based on histogram re-quantization 一种基于直方图重量化的数据隐藏算法
C. Teng, Y. Shiau, C. Chen
Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.
隐写术作为一种数据隐藏技术,随着互联网通信的不断扩大,其作用越来越重要。因此,近年来提出了各种隐写算法,如Ni等人提出了一种基于直方图修改的无损数据隐藏算法。为了增强安全性和更大的数据嵌入容量,本文对Ni算法进行了扩展,采用随机排列和直方图重量化。首先,应用随机排列,安全性不容易被暴力攻击破坏。此外,通过采用直方图再量化,可以将嵌入容量增强约3倍。我们的方法在视觉上无法区分掩蔽图像和隐写图像,并且具有很大的嵌入容量。
{"title":"A data hiding algorithm based on histogram re-quantization","authors":"C. Teng, Y. Shiau, C. Chen","doi":"10.1109/ICCIT.2010.5711225","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711225","url":null,"abstract":"Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Color image transform coding based on three dimensional variable vector matrix size segmentation 基于三维可变矢量矩阵大小分割的彩色图像变换编码
A. Sang, Xin Zhao, Hexin Chen, Silin Mang
Three-dimensional vector matrix discrete cosine transform coding (3DVMDCT) deals with each component of color image in a unified model, fully eliminates the correlation between them and gets an obvious advantage. But its block-size of image segmentation is fixed and does not fully take into account that there are different statistical properties in different regions. In this paper, we take gradient as the image measure activity (IAM), propose a new method—variable matrix-size three-dimensional vector matrix image segmentation (VMS-3DVMDCT), and implement the corresponding multi-dimensional vector matrix discrete cosine transform coding, experimental results show that, compared with the fixed block partition, the proposed algorithm improves PSNR at most 1dB, and the quality of the reconstructed image is improved in subject evaluation, much better than JPEG.
三维矢量矩阵离散余弦变换编码(3DVMDCT)对彩色图像的各个分量进行统一的处理,充分消除了它们之间的相关性,具有明显的优势。但其图像分割的块大小是固定的,没有充分考虑到不同区域的统计性质不同。本文以梯度作为图像度量活动(IAM),提出了一种新的方法——变矩阵大小的三维矢量矩阵图像分割(VMS-3DVMDCT),并实现了相应的多维矢量矩阵离散余弦变换编码,实验结果表明,与固定块分割相比,所提算法的PSNR最多提高了1dB,重构图像的质量在受试者评价中得到了提高,远优于JPEG。
{"title":"Color image transform coding based on three dimensional variable vector matrix size segmentation","authors":"A. Sang, Xin Zhao, Hexin Chen, Silin Mang","doi":"10.1109/ICCIT.2010.5711048","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711048","url":null,"abstract":"Three-dimensional vector matrix discrete cosine transform coding (3DVMDCT) deals with each component of color image in a unified model, fully eliminates the correlation between them and gets an obvious advantage. But its block-size of image segmentation is fixed and does not fully take into account that there are different statistical properties in different regions. In this paper, we take gradient as the image measure activity (IAM), propose a new method—variable matrix-size three-dimensional vector matrix image segmentation (VMS-3DVMDCT), and implement the corresponding multi-dimensional vector matrix discrete cosine transform coding, experimental results show that, compared with the fixed block partition, the proposed algorithm improves PSNR at most 1dB, and the quality of the reconstructed image is improved in subject evaluation, much better than JPEG.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128778431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of ad hoc network under location-based attacks 基于位置攻击的ad hoc网络性能评估
Chen Tianye, Liu Ning, Yi Ping, Wu Yue, Zhai Qiang
In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of attackers. In this paper, we pay specific attention to two common attacks in ad hoc network - flooding and active black-hole attack. We established several network scenery to illustrate possible unbalanced network in realistic occasions. And through extensive simulation work on those scenes, we study the connection between the locations of the malicious attackers and influence on network performance. We evaluate both long-term influence and transient impact of flooding attack. We also study active black hole's victim range in both random scene and internet-connected gateway node scene. By comparing attack severity of differently located attackers, we propose theories for attackers to achieve maximized performance influence by strategically placing the malicious nodes. We also provide guidelines for defenders to figure out key zones of defensive importance as well as possible locations of attackers.
在部署路由攻击的实际ad hoc网络场景中,攻击者可能位于特定的地理区域,这可能会对网络性能造成不同的影响。尽管许多模拟工作已经完成,以区分不同类型的攻击,但很少有工作集中在攻击严重程度和攻击者部署之间的潜在联系上。本文重点研究了自组网中常见的两种攻击——泛洪攻击和主动黑洞攻击。我们建立了几个网络场景来说明现实场合中可能出现的不平衡网络。并通过对这些场景的大量仿真工作,研究了恶意攻击者的位置之间的联系以及对网络性能的影响。我们评估了洪水袭击的长期影响和短暂影响。我们还研究了随机场景和联网网关节点场景下活动黑洞的受害范围。通过比较不同位置攻击者的攻击严重程度,我们提出了攻击者通过策略性地放置恶意节点来实现最大性能影响的理论。我们还为防御者提供了指导方针,以确定防御重要性的关键区域以及攻击者的可能位置。
{"title":"Performance evaluation of ad hoc network under location-based attacks","authors":"Chen Tianye, Liu Ning, Yi Ping, Wu Yue, Zhai Qiang","doi":"10.1109/ICCIT.2010.5711210","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711210","url":null,"abstract":"In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of attackers. In this paper, we pay specific attention to two common attacks in ad hoc network - flooding and active black-hole attack. We established several network scenery to illustrate possible unbalanced network in realistic occasions. And through extensive simulation work on those scenes, we study the connection between the locations of the malicious attackers and influence on network performance. We evaluate both long-term influence and transient impact of flooding attack. We also study active black hole's victim range in both random scene and internet-connected gateway node scene. By comparing attack severity of differently located attackers, we propose theories for attackers to achieve maximized performance influence by strategically placing the malicious nodes. We also provide guidelines for defenders to figure out key zones of defensive importance as well as possible locations of attackers.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An framework for team cooperation in engineering project management 工程项目管理中的团队合作框架
Zhao Shide, X. Xue
In order to achieve effective cooperation of the engineering project team, this paper constructed the cooperation model of the engineering project team and analyzed the cultural regulating, profit regulating and institution regulating in the engineering project team form the viewing angle of system theory based on existing research results. Furthermore, this paper proposed four kinds of management methods of engineering project team cooperation, such as team reliance management, team conflict management, team study management and team encouragement management.
为了实现工程项目团队的有效合作,本文在已有研究成果的基础上,构建了工程项目团队的合作模型,并以系统论的视角对工程项目团队中的文化调节、利益调节和制度调节进行了分析。在此基础上,提出了工程项目团队合作的四种管理方法:团队信赖管理、团队冲突管理、团队学习管理和团队鼓励管理。
{"title":"An framework for team cooperation in engineering project management","authors":"Zhao Shide, X. Xue","doi":"10.1109/ICCIT.2010.5711154","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711154","url":null,"abstract":"In order to achieve effective cooperation of the engineering project team, this paper constructed the cooperation model of the engineering project team and analyzed the cultural regulating, profit regulating and institution regulating in the engineering project team form the viewing angle of system theory based on existing research results. Furthermore, this paper proposed four kinds of management methods of engineering project team cooperation, such as team reliance management, team conflict management, team study management and team encouragement management.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130993675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An enhanced SVD based watermarking using U matrix 基于U矩阵的增强SVD水印
Iman Omidvar Tehrani, S. Ibrahim
Protecting images against illegal duplications is an important fact and recently many watermarking algorithms have been published. In this paper an enhanced SVD-based watermarking algorithm is proposed. In the proposed method U component is explored for embedding the watermark. Experimental results show that imperceptibility and robustness of the algorithm is good.
保护图像免受非法复制是一个重要的事实,近年来已经发表了许多水印算法。本文提出了一种增强的基于奇异值分解的水印算法。在该方法中,利用U分量来嵌入水印。实验结果表明,该算法具有良好的不可感知性和鲁棒性。
{"title":"An enhanced SVD based watermarking using U matrix","authors":"Iman Omidvar Tehrani, S. Ibrahim","doi":"10.1109/ICCIT.2010.5711130","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711130","url":null,"abstract":"Protecting images against illegal duplications is an important fact and recently many watermarking algorithms have been published. In this paper an enhanced SVD-based watermarking algorithm is proposed. In the proposed method U component is explored for embedding the watermark. Experimental results show that imperceptibility and robustness of the algorithm is good.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A review on the PKC-based security architecture for wireless sensor networks 基于pkc的无线传感器网络安全体系结构综述
Md. Iftekhar Salam, Hoonjae Lee
A wireless sensor network (WSN) is formed of low powered, battery driven electromechanical devices called sensor nodes which communicate with each other through the wireless medium. Secure data communication is a major concern for many sensor network applications. To ensure the confidentiality, it is necessary to establish a secure communication link among sensor nodes by means of cryptographic keys. However, due to the sensor network deployment scenario and several other constraints it is not an easy task to establish a security mechanism for WSN. Recently Haque et. al. proposed a PKC based security architecture to achieve secure data communication in WSN. In this paper, we point out some weaknesses in the PKC based scheme and propose an enhanced scheme to withstand these weaknesses. It is shown that the PKC based security scheme is susceptible to selective node capture attack. Moreover, this scheme requires contacting with the base station for each and every single communication which will add extra communication overhead. In our enhanced scheme, a sensor node establishes unique link key with its neighboring nodes once they are deployed which in turn increases the resiliency against nodes capture attack. Compared to the original scheme our modified scheme reduces the complexity and communication cost of the system while achieving a sufficient level of security.
无线传感器网络(WSN)由低功耗、电池驱动的机电设备组成,这些设备被称为传感器节点,它们通过无线媒介相互通信。安全的数据通信是许多传感器网络应用的主要关注点。为了保证数据的保密性,需要在传感器节点之间通过密钥建立安全的通信链路。然而,由于传感器网络的部署场景和其他一些限制,建立WSN的安全机制并不是一件容易的事情。最近Haque等人提出了一种基于PKC的安全架构来实现WSN中的安全数据通信。在本文中,我们指出了基于PKC的方案的一些弱点,并提出了一个增强的方案来抵御这些弱点。结果表明,基于PKC的安全方案容易受到选择性节点捕获攻击。此外,该方案每次通信都需要与基站联系,这将增加额外的通信开销。在我们的增强方案中,传感器节点与其相邻节点一旦部署就建立唯一的链路密钥,从而增加了对节点捕获攻击的弹性。与原方案相比,改进后的方案在保证足够安全性的同时降低了系统的复杂度和通信成本。
{"title":"A review on the PKC-based security architecture for wireless sensor networks","authors":"Md. Iftekhar Salam, Hoonjae Lee","doi":"10.1109/ICCIT.2010.5711135","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711135","url":null,"abstract":"A wireless sensor network (WSN) is formed of low powered, battery driven electromechanical devices called sensor nodes which communicate with each other through the wireless medium. Secure data communication is a major concern for many sensor network applications. To ensure the confidentiality, it is necessary to establish a secure communication link among sensor nodes by means of cryptographic keys. However, due to the sensor network deployment scenario and several other constraints it is not an easy task to establish a security mechanism for WSN. Recently Haque et. al. proposed a PKC based security architecture to achieve secure data communication in WSN. In this paper, we point out some weaknesses in the PKC based scheme and propose an enhanced scheme to withstand these weaknesses. It is shown that the PKC based security scheme is susceptible to selective node capture attack. Moreover, this scheme requires contacting with the base station for each and every single communication which will add extra communication overhead. In our enhanced scheme, a sensor node establishes unique link key with its neighboring nodes once they are deployed which in turn increases the resiliency against nodes capture attack. Compared to the original scheme our modified scheme reduces the complexity and communication cost of the system while achieving a sufficient level of security.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Key factors influencing the decision-making of lump-sum contracting project delivery methods in China 影响中国总承包工程交付方式决策的关键因素
Wang Xuetong
20 factors are selected to frame a primary factor set from 38 factors obtained through literature study. The methods of Mean Score and Ranking Agreement Factor are applied to calculate the sorting order and analyze the consistency of market survey data. The results show that 17 factors concerning owner's engineering capabilities, owner's preferences to project construction, project properties, and lump-sum contracting market conditions exert a profound influence on the decision-making of lump-sum contracting project delivery methods. Finally, countermeasures and suggestions are proposed to promote a rapid and sound development of lump-sum contracting system in Chinese construction industry.
从文献研究得到的38个因子中选取20个因子构成主因子集。采用均分法和排序一致因子法计算市场调查数据的排序顺序,分析市场调查数据的一致性。结果表明,业主的工程能力、业主对工程建设的偏好、工程性质、总承包市场条件等17个因素对总承包工程交付方式的决策产生了深远的影响。最后,提出了促进我国建筑业总承包制度快速健康发展的对策建议。
{"title":"Key factors influencing the decision-making of lump-sum contracting project delivery methods in China","authors":"Wang Xuetong","doi":"10.1109/ICCIT.2010.5711165","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711165","url":null,"abstract":"20 factors are selected to frame a primary factor set from 38 factors obtained through literature study. The methods of Mean Score and Ranking Agreement Factor are applied to calculate the sorting order and analyze the consistency of market survey data. The results show that 17 factors concerning owner's engineering capabilities, owner's preferences to project construction, project properties, and lump-sum contracting market conditions exert a profound influence on the decision-making of lump-sum contracting project delivery methods. Finally, countermeasures and suggestions are proposed to promote a rapid and sound development of lump-sum contracting system in Chinese construction industry.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human arm-like robot control using the viscoelasticity of human multi-joint arm 仿人手臂机器人利用人体多关节手臂的粘弹性控制
Aihui Wang, M. Deng
The human arm performs a variety of skillful movements by adjusting dynamic characteristics of musculoskeletal system. Such characteristics of musculoskeletal system can be mainly described as viscoelasticity of human multi-joint arm. Many biomedical applications of robotics require knowledge of the viscoelasticity of human multi-joint arm in order to make motion appear more natural and accurately. Till now, the real time viscoelasticity of human multi-joint arm has not finally been used absolutely in robot control. This paper reviews a robust estimation method of the human multi-joint arm viscoelasticity during natural movement. A human arm-like robot control scheme using the real time measuring viscoelasticity of human multi-joint arm is proposed. An improved forward gaze model is used in order to study how to adjust the human multi-joint arm viscoelasticity by central nervous system according to external environment. The effectiveness of the proposed method is confirmed by the simulation and experimental results.
人的手臂通过调节肌肉骨骼系统的动态特性来完成各种熟练的动作。肌肉骨骼系统的这种特性主要可以描述为人体多关节臂的粘弹性。机器人的许多生物医学应用都需要了解人体多关节臂的粘弹性,以使运动显得更加自然和准确。到目前为止,人体多关节臂的实时粘弹性还没有完全应用于机器人控制。本文综述了一种人体多关节臂在自然运动过程中粘弹性的鲁棒估计方法。提出了一种实时测量人体多关节臂粘弹性的仿人手臂机器人控制方案。为了研究中枢神经系统如何根据外界环境调节人体多关节臂的粘弹性,提出了一种改进的前视模型。仿真和实验结果验证了该方法的有效性。
{"title":"Human arm-like robot control using the viscoelasticity of human multi-joint arm","authors":"Aihui Wang, M. Deng","doi":"10.1109/ICCIT.2010.5711151","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711151","url":null,"abstract":"The human arm performs a variety of skillful movements by adjusting dynamic characteristics of musculoskeletal system. Such characteristics of musculoskeletal system can be mainly described as viscoelasticity of human multi-joint arm. Many biomedical applications of robotics require knowledge of the viscoelasticity of human multi-joint arm in order to make motion appear more natural and accurately. Till now, the real time viscoelasticity of human multi-joint arm has not finally been used absolutely in robot control. This paper reviews a robust estimation method of the human multi-joint arm viscoelasticity during natural movement. A human arm-like robot control scheme using the real time measuring viscoelasticity of human multi-joint arm is proposed. An improved forward gaze model is used in order to study how to adjust the human multi-joint arm viscoelasticity by central nervous system according to external environment. The effectiveness of the proposed method is confirmed by the simulation and experimental results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
5th International Conference on Computer Sciences and Convergence Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1