首页 > 最新文献

2010 Second International Conference on Computer and Network Technology最新文献

英文 中文
Performance Analysis of Y-Tree on Flash Drives u盘Y-Tree性能分析
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.126
Narong Boonyawat, J. Natwichai
Data warehousing is one of the most important fundamental components of business intelligence. One approach to improve a data warehouse is indexing. Y-tree is a type of index which is designed to facilitate one of the most critical data warehousing functionalities, i.e. data insertion. Y trees support bulk insertion efficiently and also can provide the query performance as efficient as traditional value-list indexes. In this paper, we propose a theoretical study on the performance of the Y-tree indexes when implemented on flash drives. Our work will cover two main functionalities of Y-trees on flash drives, i.e. insertion and query performance. Given that flash drives are emerging as the main storage of the server-class computers, and their price per size are getting lower. The analysis of the performance in this paper can help to estimate the performance in practices. Also, the result can help practitioners to optimize Y-tree according to the given environment.
数据仓库是商业智能最重要的基本组成部分之一。改进数据仓库的一种方法是建立索引。Y-tree是一种索引,它被设计用来促进最关键的数据仓库功能之一,即数据插入。Y树有效地支持批量插入,并且可以提供与传统值列表索引一样高效的查询性能。在本文中,我们提出了一个理论研究的性能时,y树索引在闪存驱动器上实现。我们的工作将涵盖u盘上y树的两个主要功能,即插入和查询性能。考虑到闪存驱动器正在成为服务器级计算机的主要存储设备,其每尺寸的价格也越来越低。本文的性能分析有助于在实践中对性能进行评估。同时,该结果可以帮助从业者根据给定的环境对y树进行优化。
{"title":"Performance Analysis of Y-Tree on Flash Drives","authors":"Narong Boonyawat, J. Natwichai","doi":"10.1109/ICCNT.2010.126","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.126","url":null,"abstract":"Data warehousing is one of the most important fundamental components of business intelligence. One approach to improve a data warehouse is indexing. Y-tree is a type of index which is designed to facilitate one of the most critical data warehousing functionalities, i.e. data insertion. Y trees support bulk insertion efficiently and also can provide the query performance as efficient as traditional value-list indexes. In this paper, we propose a theoretical study on the performance of the Y-tree indexes when implemented on flash drives. Our work will cover two main functionalities of Y-trees on flash drives, i.e. insertion and query performance. Given that flash drives are emerging as the main storage of the server-class computers, and their price per size are getting lower. The analysis of the performance in this paper can help to estimate the performance in practices. Also, the result can help practitioners to optimize Y-tree according to the given environment.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128920904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Providing Time Based Fairness in Multi Rate Ad Hoc Network 在多速率自组网中提供基于时间的公平性
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.17
S. Varma, V. Tokekar
Generally, there appears to be a direct relationship between the data rate and the throughput in single rate network. However, under multi rate networks, the long term throughput of each station becomes largely independent of its own data rate, rather, it gets bounded by the lowest data rate peer. The presence of a low data rate link in particular brings down the aggregate throughput, thereby restricting the benefits of higher data rates used by the peers. In this paper we propose a simple and efficient mechanism by which the stations employing higher data rates receive greater transmission opportunities, thereby increasing the aggregate throughput. The calculations are based on the baseline property, which guarantees airtime fairness in the network if all competing stations meet their target throughput. Every station attempts to meet its respective target throughput by dynamically adjusting its minimum contention window CWmin and, hence, controlling its transmission opportunities.
一般来说,在单速率网络中,数据速率和吞吐量之间似乎有直接的关系。然而,在多速率网络中,每个站的长期吞吐量在很大程度上与自己的数据速率无关,而是受到数据速率最低的对等体的限制。特别是低数据速率链路的存在降低了总吞吐量,从而限制了对等体使用更高数据速率的好处。在本文中,我们提出了一种简单而有效的机制,通过该机制,采用较高数据速率的站可以获得更多的传输机会,从而提高总吞吐量。计算是基于基线属性的,如果所有竞争电台都达到目标吞吐量,基线属性可以保证网络中的播出时间公平。每个站都试图通过动态调整其最小争用窗口CWmin来满足其各自的目标吞吐量,从而控制其传输机会。
{"title":"Providing Time Based Fairness in Multi Rate Ad Hoc Network","authors":"S. Varma, V. Tokekar","doi":"10.1109/ICCNT.2010.17","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.17","url":null,"abstract":"Generally, there appears to be a direct relationship between the data rate and the throughput in single rate network. However, under multi rate networks, the long term throughput of each station becomes largely independent of its own data rate, rather, it gets bounded by the lowest data rate peer. The presence of a low data rate link in particular brings down the aggregate throughput, thereby restricting the benefits of higher data rates used by the peers. In this paper we propose a simple and efficient mechanism by which the stations employing higher data rates receive greater transmission opportunities, thereby increasing the aggregate throughput. The calculations are based on the baseline property, which guarantees airtime fairness in the network if all competing stations meet their target throughput. Every station attempts to meet its respective target throughput by dynamically adjusting its minimum contention window CWmin and, hence, controlling its transmission opportunities.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117086488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of Single Phase Inverter of Photovoltaic System Using System Identification 基于系统辨识的光伏系统单相逆变器建模
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.120
N. Patcharaprakiti, K. Kirtikara, D. Chenvidhya, V. Monyakul, B. Muenpinij
This paper proposes a new method to modeling a power inverter of grid-connected photovoltaic system by using a system identification approach. In this method, the system is considered as a black box of which it is not necessary to know structures and parameters inside. Modeling of one type of grid connected single phase inverter is carried out. Four linear models have been compared, i.e. an Autoregressive with Exogenous (ARX) model, an Autoregressive Moving Average with Exogenous (ARMAX) model, a Box-Jenkins (BJ) model an Output Error (OE) model. Four nonlinear models are studied, i.e, a Nonlinear Autoregressive with Exogenous (ARX) model, a Hammerstein model, a Wiener Model and a Hammerstein-Wiener Model. The best linear model is an Output Error model whereas the best nonlinear model is a Hammerstein-Wiener model with wavelet network estimators. Comparing modeling of the inverter by an Output-Error (OE) model and a Hammerstein-Wiener model, a Hammerstein-Wiener model is better because of its lower order and higher percentage of best fit.
本文提出了一种利用系统辨识方法对并网光伏系统逆变器进行建模的新方法。在这种方法中,系统被视为一个黑盒子,不需要知道里面的结构和参数。对一种并网型单相逆变器进行了建模。比较了四种线性模型,即自回归外生(ARX)模型,自回归外生移动平均(ARMAX)模型,Box-Jenkins (BJ)模型和输出误差(OE)模型。研究了四种非线性模型,即非线性自回归与外生(ARX)模型、Hammerstein模型、Wiener模型和Hammerstein-Wiener模型。最好的线性模型是输出误差模型,而最好的非线性模型是带小波网络估计的Hammerstein-Wiener模型。对比输出误差模型和Hammerstein-Wiener模型对逆变器的建模,Hammerstein-Wiener模型具有较低阶和较高的最佳拟合百分比的优点。
{"title":"Modeling of Single Phase Inverter of Photovoltaic System Using System Identification","authors":"N. Patcharaprakiti, K. Kirtikara, D. Chenvidhya, V. Monyakul, B. Muenpinij","doi":"10.1109/ICCNT.2010.120","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.120","url":null,"abstract":"This paper proposes a new method to modeling a power inverter of grid-connected photovoltaic system by using a system identification approach. In this method, the system is considered as a black box of which it is not necessary to know structures and parameters inside. Modeling of one type of grid connected single phase inverter is carried out. Four linear models have been compared, i.e. an Autoregressive with Exogenous (ARX) model, an Autoregressive Moving Average with Exogenous (ARMAX) model, a Box-Jenkins (BJ) model an Output Error (OE) model. Four nonlinear models are studied, i.e, a Nonlinear Autoregressive with Exogenous (ARX) model, a Hammerstein model, a Wiener Model and a Hammerstein-Wiener Model. The best linear model is an Output Error model whereas the best nonlinear model is a Hammerstein-Wiener model with wavelet network estimators. Comparing modeling of the inverter by an Output-Error (OE) model and a Hammerstein-Wiener model, a Hammerstein-Wiener model is better because of its lower order and higher percentage of best fit.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125778919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Towards Forecasting Low Network Traffic for Software Patch Downloads: An ARMA Model Forecast Using CRONOS 预测软件补丁下载的低网络流量:使用CRONOS的ARMA模型预测
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.35
I. Tan, Poo Kuan Hoong, C. Y. Keong
The usage of the Internet has become ubiquitous, even for desktop applications to assume that the computer system it is running on is connected to the Internet. Desktop applications rely on the Internet connectivity for software license authentication and also for maintenance through downloading of software patches. However, the latter can pose an annoyance to the user when he or she is relying on the Internet for real-time gaming or during heavy downloading of multimedia files. In this paper, we study the effectiveness of using the ARMA model to provide short range forecasting of Internet network TCP traffic for a single broadband line. The outcome of the research is positive and indicates that a step size of 30 seconds and irrespective of the window size gives the most accurate forecast. Through amplification of the results, this method shows strong indication that it can be implemented by software application developers to determine the most appropriate non-disruptive period to download their software patches. For small sized software patches, the software application can activate the download and a period of 120 seconds would be sufficient.
互联网的使用已经变得无处不在,甚至对于桌面应用程序来说,假设它所运行的计算机系统已连接到互联网。桌面应用程序依靠互联网连接进行软件许可证认证,并通过下载软件补丁进行维护。然而,当用户依赖互联网进行实时游戏或大量下载多媒体文件时,后者可能会给用户带来烦恼。在本文中,我们研究了使用ARMA模型对单个宽带网络TCP流量进行短期预测的有效性。研究结果是积极的,表明步长为30秒,无论窗口大小如何,都能给出最准确的预测。通过放大结果,该方法显示出强烈的迹象,表明软件应用程序开发人员可以实施该方法,以确定下载其软件补丁的最合适的非中断期。对于较小的软件补丁,软件应用程序可以激活下载,120秒的时间就足够了。
{"title":"Towards Forecasting Low Network Traffic for Software Patch Downloads: An ARMA Model Forecast Using CRONOS","authors":"I. Tan, Poo Kuan Hoong, C. Y. Keong","doi":"10.1109/ICCNT.2010.35","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.35","url":null,"abstract":"The usage of the Internet has become ubiquitous, even for desktop applications to assume that the computer system it is running on is connected to the Internet. Desktop applications rely on the Internet connectivity for software license authentication and also for maintenance through downloading of software patches. However, the latter can pose an annoyance to the user when he or she is relying on the Internet for real-time gaming or during heavy downloading of multimedia files. In this paper, we study the effectiveness of using the ARMA model to provide short range forecasting of Internet network TCP traffic for a single broadband line. The outcome of the research is positive and indicates that a step size of 30 seconds and irrespective of the window size gives the most accurate forecast. Through amplification of the results, this method shows strong indication that it can be implemented by software application developers to determine the most appropriate non-disruptive period to download their software patches. For small sized software patches, the software application can activate the download and a period of 120 seconds would be sufficient.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Framework for Personalized Information Retrieval Model 个性化信息检索模型框架
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.125
F. Gemechu, Yu Zhang, Liu Ting
Existing search engines ignore the user’s search context and return results to the user solely based on their relevance value to the query. Hence, the need for personalized information retrieval system which takes into account the actual user’s profile during the retrieval process is “mandatory.” In this paper, we propose a framework for personalized information retrieval model using user profiles. It incorporates the user profile module into the retrieval process to filter results returned by traditional search engine so that they meet the specific needs of the user.
现有的搜索引擎忽略用户的搜索上下文,只根据与查询的相关性值返回结果给用户。因此,在检索过程中考虑到实际用户的配置文件的个性化信息检索系统的需求是“强制性的”。本文提出了一种基于用户档案的个性化信息检索模型框架。它将用户档案模块集成到检索过程中,对传统搜索引擎返回的结果进行过滤,使其符合用户的特定需求。
{"title":"A Framework for Personalized Information Retrieval Model","authors":"F. Gemechu, Yu Zhang, Liu Ting","doi":"10.1109/ICCNT.2010.125","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.125","url":null,"abstract":"Existing search engines ignore the user’s search context and return results to the user solely based on their relevance value to the query. Hence, the need for personalized information retrieval system which takes into account the actual user’s profile during the retrieval process is “mandatory.” In this paper, we propose a framework for personalized information retrieval model using user profiles. It incorporates the user profile module into the retrieval process to filter results returned by traditional search engine so that they meet the specific needs of the user.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Energy-Efficient Clustering Protocol for Wireless Sensor Networks 一种面向无线传感器网络的节能聚类协议
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.85
Yun-Sheng Yen, R. Chang, Sin-Lung Ke
In recent years, wireless sensor networks become a new way to obtain information from an interesting area. There are many extensive applications of wireless sensor networks such as environment monitoring, surveillance, enemy tracking, etc. Since the available energy of sensor nodes are limited and hard to renew, energy supervision is critical for nodes and network lifetime in wireless sensor networks. In this paper, we propose a new method to improve ACPM and solve the problem of isolated nodes and to prolong their lifetime. After cluster construction, the isolated nodes gradually enhance their transmission range till finding an adjacent cluster to link. Furthermore, after collecting all data within a cluster, a cluster-head node will assign the most powerful member node in the cluster to forward the data to the base station. Simulation results show that our approach effectively conserves energy for isolated nodes.
近年来,无线传感器网络成为获取信息的一种新途径。无线传感器网络在环境监测、监视、敌情跟踪等方面有着广泛的应用。在无线传感器网络中,由于传感器节点的可用能量有限且难以更新,因此能量监控对节点和网络寿命至关重要。本文提出了一种改进ACPM的新方法,解决了孤立节点的问题,延长了节点的寿命。集群构建后,孤立节点的传输范围逐渐增大,直到找到相邻的集群进行连接。此外,在收集集群内的所有数据后,集群头节点将分配集群中功能最强大的成员节点将数据转发给基站。仿真结果表明,该方法有效地节省了孤立节点的能量。
{"title":"An Energy-Efficient Clustering Protocol for Wireless Sensor Networks","authors":"Yun-Sheng Yen, R. Chang, Sin-Lung Ke","doi":"10.1109/ICCNT.2010.85","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.85","url":null,"abstract":"In recent years, wireless sensor networks become a new way to obtain information from an interesting area. There are many extensive applications of wireless sensor networks such as environment monitoring, surveillance, enemy tracking, etc. Since the available energy of sensor nodes are limited and hard to renew, energy supervision is critical for nodes and network lifetime in wireless sensor networks. In this paper, we propose a new method to improve ACPM and solve the problem of isolated nodes and to prolong their lifetime. After cluster construction, the isolated nodes gradually enhance their transmission range till finding an adjacent cluster to link. Furthermore, after collecting all data within a cluster, a cluster-head node will assign the most powerful member node in the cluster to forward the data to the base station. Simulation results show that our approach effectively conserves energy for isolated nodes.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Computational Intelligence-Based Intelligent Business Intelligence System: Concept and Framework 基于计算智能的智能商业智能系统:概念与框架
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.23
Jui-Yu Wu
Decision making is an important task for enterprise managers, and is typically based on various data sources derived from information systems, such as enterprise resource planning, supply chain management and customer relationship management. Numerous business intelligence tools (BI) thus have been developed to support decision making. Some existing BI tools have several limitations, for example lacking data analysis and visualization capabilities. To increase the data analysis capability of BI tools, this study focuses on efficient data mining tools and presents an intelligent BI system framework based on many computational intelligence paradigms, including a predictor tool based on neuro-computing (cerebellar model articulation controller neural network, CMAC NN), a classifier tool based on neuro-computing (CMAC NN) and optimizer tools based on evolutionary computing and artificial life (such as real-coded genetic algorithm and artificial immune system). The predictor tool can be used to make predictions or conduct time series forecasting, the classifier tool can be applied to solve classification tasks, and the optimizer tools can be employed to optimize the parameter settings of the predictor and classifier tools. The proposed BI system can potentially be considered as an efficient data analysis tool for supporting business decisions.
决策是企业管理者的一项重要任务,决策通常基于来自信息系统的各种数据源,如企业资源规划、供应链管理和客户关系管理。因此,开发了许多商业智能工具(BI)来支持决策制定。一些现有的BI工具有一些限制,例如缺乏数据分析和可视化功能。为了提高BI工具的数据分析能力,本研究重点研究了高效的数据挖掘工具,并提出了一个基于多种计算智能范式的智能BI系统框架,包括基于神经计算的预测工具(小脑模型关节控制器神经网络,CMAC NN),基于神经计算(CMAC NN)的分类器工具和基于进化计算和人工生命(如实数编码遗传算法和人工免疫系统)的优化器工具。预测器工具可用于预测或进行时间序列预测,分类器工具可用于解决分类任务,优化器工具可用于优化预测器和分类器工具的参数设置。建议的BI系统可以被视为支持业务决策的有效数据分析工具。
{"title":"Computational Intelligence-Based Intelligent Business Intelligence System: Concept and Framework","authors":"Jui-Yu Wu","doi":"10.1109/ICCNT.2010.23","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.23","url":null,"abstract":"Decision making is an important task for enterprise managers, and is typically based on various data sources derived from information systems, such as enterprise resource planning, supply chain management and customer relationship management. Numerous business intelligence tools (BI) thus have been developed to support decision making. Some existing BI tools have several limitations, for example lacking data analysis and visualization capabilities. To increase the data analysis capability of BI tools, this study focuses on efficient data mining tools and presents an intelligent BI system framework based on many computational intelligence paradigms, including a predictor tool based on neuro-computing (cerebellar model articulation controller neural network, CMAC NN), a classifier tool based on neuro-computing (CMAC NN) and optimizer tools based on evolutionary computing and artificial life (such as real-coded genetic algorithm and artificial immune system). The predictor tool can be used to make predictions or conduct time series forecasting, the classifier tool can be applied to solve classification tasks, and the optimizer tools can be employed to optimize the parameter settings of the predictor and classifier tools. The proposed BI system can potentially be considered as an efficient data analysis tool for supporting business decisions.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115257984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Virtualization: A Survey on Concepts, Taxonomy and Associated Security Issues 虚拟化:概念、分类和相关安全问题综述
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.49
Jyotiprakash Sahoo, Subasish Mohapatra, Radha Lath
Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, virtualization at all levels (system, storage, and network) became important again as a way to improve system security, reliability and availability, reduce costs, and provide greater flexibility. This paper explains the basics of system virtualization and addresses pros and cons of virtualization along with taxonomy and challenges.
虚拟化是一个术语,指的是计算机资源的抽象。虚拟计算环境的目的是通过对异构和自治资源的聚合,为用户和应用提供统一的集成操作平台,从而提高资源利用率。最近,所有级别(系统、存储和网络)的虚拟化作为提高系统安全性、可靠性和可用性、降低成本和提供更大灵活性的一种方式再次变得重要起来。本文解释了系统虚拟化的基础知识,讨论了虚拟化的优缺点以及分类和挑战。
{"title":"Virtualization: A Survey on Concepts, Taxonomy and Associated Security Issues","authors":"Jyotiprakash Sahoo, Subasish Mohapatra, Radha Lath","doi":"10.1109/ICCNT.2010.49","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.49","url":null,"abstract":"Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, virtualization at all levels (system, storage, and network) became important again as a way to improve system security, reliability and availability, reduce costs, and provide greater flexibility. This paper explains the basics of system virtualization and addresses pros and cons of virtualization along with taxonomy and challenges.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122652202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 321
Buddhist Amulet Recognition System (BARS) 佛教护身符识别系统
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.128
C. Pornpanomchai, Juti Wongkorsub, Terapong Pornaudomdaj, Pimluk Vessawasdi
There are many kinds of Buddha amulets, which are difficult for people who want to recognize all of them. The objective of this research is to build the computer system that can recognize some Thai Buddhist amulets. Our system is called -Buddhist Amulet Recognition System or BARS¿. It consists of 4 main components; 1) image acquisition, 2) image preprocessing, 3) image recognition, and 4) display result. In image acquisition component, the Buddhist amulet picture is taken by a digital camera with a white paper for the picture background. In image preprocessing component, the Buddhist amulet image is enhanced for improving a recognition precision rate in the next stage. In recognition component, a template matching technique is applied to recognize the Buddhist amulet image. In display result component, a graphic user interface (GUI) is created for displaying the recognition results. We have collected 52 kinds of Buddhist amulets with the total of 318 images for the training data set. We determine correlation value equal to 500 and this program precision equal to 80 percent and take 0.76 milliseconds per image.
佛像护身符的种类很多,想要全部辨认出来的人很难做到。本研究的目的是建立能够识别一些泰国佛教护身符的计算机系统。我们的系统被称为佛教护身符识别系统或BARS¿。它由4个主要部分组成;1)图像采集,2)图像预处理,3)图像识别,4)显示结果。在图像采集部分,利用数码相机拍摄佛教护身符图像,并以白纸作为图像背景。在图像预处理部分,对佛教护身符图像进行了增强处理,以提高下一阶段的识别准确率。在识别部分,采用模板匹配技术对佛教护身符图像进行识别。在显示结果组件中,创建用于显示识别结果的图形用户界面(GUI)。我们收集了52种佛教护身符,总共318张图像作为训练数据集。我们确定相关值等于500,该程序精度等于80%,每张图像占用0.76毫秒。
{"title":"Buddhist Amulet Recognition System (BARS)","authors":"C. Pornpanomchai, Juti Wongkorsub, Terapong Pornaudomdaj, Pimluk Vessawasdi","doi":"10.1109/ICCNT.2010.128","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.128","url":null,"abstract":"There are many kinds of Buddha amulets, which are difficult for people who want to recognize all of them. The objective of this research is to build the computer system that can recognize some Thai Buddhist amulets. Our system is called -Buddhist Amulet Recognition System or BARS¿. It consists of 4 main components; 1) image acquisition, 2) image preprocessing, 3) image recognition, and 4) display result. In image acquisition component, the Buddhist amulet picture is taken by a digital camera with a white paper for the picture background. In image preprocessing component, the Buddhist amulet image is enhanced for improving a recognition precision rate in the next stage. In recognition component, a template matching technique is applied to recognize the Buddhist amulet image. In display result component, a graphic user interface (GUI) is created for displaying the recognition results. We have collected 52 kinds of Buddhist amulets with the total of 318 images for the training data set. We determine correlation value equal to 500 and this program precision equal to 80 percent and take 0.76 milliseconds per image.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Self-Optimizing Mobility Management Scheme Based on Cell ID Information in High Velocity Environment 高速环境下基于小区ID信息的自优化移动管理方案
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.64
Dongming Su, X. Wen, Haijun Zhang, Wei Zheng
Reduction of the operational effort and cost is a key driver for RAN LTE (Long Term Evolution or E-UTRAN). Self-configuring and self-optimizing mechanisms are introduced as a part of Self Organizing Network (SON) to maximize the integrated performance of LTE/LTE-Advanced by improving the efficient of operation and maintenance. Optimization of handover is one of the optimization aspects of Self Organizing Network in LTE-Advanced. High velocity environment, especially multi-service environment usually needs extensively investigation to optimize. Using layer3 filter, hysteresis, and time-to-trigger mechanisms is standardized for LTE Hard handover. In this paper, an interacting self-optimizing handover mechanism based on cell ID information is proposed. We have shown that significant gain can be achieved by the use of optimization mechanism while maintaining low handover rates and ping-pong handover rate.
减少运营工作量和成本是RAN LTE(长期演进或E-UTRAN)的关键驱动因素。自组织网络(SON)引入自配置和自优化机制,通过提高运维效率,最大限度地提高LTE/LTE- advanced的综合性能。切换优化是LTE-Advanced自组织网络优化的一个方面。高速环境,特别是多业务环境,通常需要广泛的研究来优化。使用layer3滤波器,迟滞和触发时间机制是标准化的LTE硬切换。提出了一种基于小区ID信息的交互自优化切换机制。我们已经证明,在保持低切换率和乒乓切换率的情况下,使用优化机制可以获得显著的增益。
{"title":"A Self-Optimizing Mobility Management Scheme Based on Cell ID Information in High Velocity Environment","authors":"Dongming Su, X. Wen, Haijun Zhang, Wei Zheng","doi":"10.1109/ICCNT.2010.64","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.64","url":null,"abstract":"Reduction of the operational effort and cost is a key driver for RAN LTE (Long Term Evolution or E-UTRAN). Self-configuring and self-optimizing mechanisms are introduced as a part of Self Organizing Network (SON) to maximize the integrated performance of LTE/LTE-Advanced by improving the efficient of operation and maintenance. Optimization of handover is one of the optimization aspects of Self Organizing Network in LTE-Advanced. High velocity environment, especially multi-service environment usually needs extensively investigation to optimize. Using layer3 filter, hysteresis, and time-to-trigger mechanisms is standardized for LTE Hard handover. In this paper, an interacting self-optimizing handover mechanism based on cell ID information is proposed. We have shown that significant gain can be achieved by the use of optimization mechanism while maintaining low handover rates and ping-pong handover rate.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134406582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2010 Second International Conference on Computer and Network Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1