首页 > 最新文献

2010 Second International Conference on Computer and Network Technology最新文献

英文 中文
Computer Controlled Intrusion-Detector and Automatic Firing-Unit for Border Security 边境安全计算机控制入侵探测器及自动发射装置
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.32
K. Vittal, Ajay Pai P., A. B., C. Rao
This paper describes a novel computer-controlled intrusion-detector and automatic firing unit, which may be used for the surveillance of borders, either of a country, or of areas requiring high security, especially in regions of extreme climatic conditions, where it is difficult to deploy personnel. This system not only detects intrusion but also provides a video-coverage of the suspicious area, for remote vigilance, via a satellite based communication system. It is also provided with automatic firing echanisms which can be used to automatically locate and fire at the target. Thus, several kilometres of the borders, which would have otherwise required several hundred personnel, can be effortlessly monitored with this system, with only a few personnel. Since, the actual firing occurs only after an authoritative personnel has doubly confirmed the presence of an intruder, chances of firing at innocent people are completely ruled out. As thermal cameras are used for imaging, this system is immune to changes in ambient conditions, and therefore, is equally suited for operation during the night. This paper also throws light on the prototype of this system, which has been successfully developed.
本文描述了一种新型的计算机控制入侵探测器和自动发射装置,它可以用于监视边界,无论是一个国家,还是需要高安全性的地区,特别是在极端气候条件下,很难部署人员的地区。该系统不仅检测入侵,而且还提供可疑区域的视频覆盖,通过基于卫星的通信系统进行远程警戒。它还具有可用于自动定位和向目标射击的自动射击机构。因此,如果不这样做,需要几百名人员的几公里边界可以用这个系统毫不费力地监测,只需要很少的人员。由于只有在权威人员双重确认入侵者的存在后才会发生实际射击,因此完全排除了向无辜民众开枪的可能性。由于热像仪用于成像,该系统不受环境条件变化的影响,因此同样适用于夜间操作。本文还介绍了该系统的原型,该系统已成功开发。
{"title":"Computer Controlled Intrusion-Detector and Automatic Firing-Unit for Border Security","authors":"K. Vittal, Ajay Pai P., A. B., C. Rao","doi":"10.1109/ICCNT.2010.32","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.32","url":null,"abstract":"This paper describes a novel computer-controlled intrusion-detector and automatic firing unit, which may be used for the surveillance of borders, either of a country, or of areas requiring high security, especially in regions of extreme climatic conditions, where it is difficult to deploy personnel. This system not only detects intrusion but also provides a video-coverage of the suspicious area, for remote vigilance, via a satellite based communication system. It is also provided with automatic firing echanisms which can be used to automatically locate and fire at the target. Thus, several kilometres of the borders, which would have otherwise required several hundred personnel, can be effortlessly monitored with this system, with only a few personnel. Since, the actual firing occurs only after an authoritative personnel has doubly confirmed the presence of an intruder, chances of firing at innocent people are completely ruled out. As thermal cameras are used for imaging, this system is immune to changes in ambient conditions, and therefore, is equally suited for operation during the night. This paper also throws light on the prototype of this system, which has been successfully developed.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Auto-CQT Control and Management Protocol Design 自动cqt控制和管理协议设计
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.86
Xiaowan Ke, Wenjing Li, Lanlan Rui, Xue-song Qiu, Shaoyong Guo
When wireless communication comes into the era of the 3rd generation, teleservices would become unprecedented rich under the open service access (OSA). Obviously, QoS (quality of service) from customer’s view becomes one of the most important factors deciding the deployment strategies of services. CQT that is a typical measurement tool for end-to-end QoS is increasingly attracting the attention of industry. However, the existing automatic testing control mechanisms (ATCM) can not satisfy the complex testing requests. Therefore, this paper introduces a new kind of Auto-CQT Control and Management Interface Protocol with better flexibility and scalability between control system and testing terminals. ACCMP is designed on the basis of the smallest reusable testing units and a testing synchronization mechanism, so it can satisfy the complex combination test requirements of multiple services easily.
当无线通信进入第三代时代时,开放业务接入(OSA)下的远程业务将空前丰富。显然,从客户的角度来看,QoS(服务质量)成为决定服务部署策略的最重要因素之一。CQT作为端到端QoS的典型度量工具,越来越受到业界的关注。然而,现有的自动测试控制机制已不能满足复杂的测试要求。为此,本文提出了一种新的Auto-CQT控制与管理接口协议,该协议在控制系统与测试终端之间具有更好的灵活性和可扩展性。ACCMP基于最小的可重用测试单元和测试同步机制进行设计,可以轻松满足多种业务的复杂组合测试需求。
{"title":"Auto-CQT Control and Management Protocol Design","authors":"Xiaowan Ke, Wenjing Li, Lanlan Rui, Xue-song Qiu, Shaoyong Guo","doi":"10.1109/ICCNT.2010.86","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.86","url":null,"abstract":"When wireless communication comes into the era of the 3rd generation, teleservices would become unprecedented rich under the open service access (OSA). Obviously, QoS (quality of service) from customer’s view becomes one of the most important factors deciding the deployment strategies of services. CQT that is a typical measurement tool for end-to-end QoS is increasingly attracting the attention of industry. However, the existing automatic testing control mechanisms (ATCM) can not satisfy the complex testing requests. Therefore, this paper introduces a new kind of Auto-CQT Control and Management Interface Protocol with better flexibility and scalability between control system and testing terminals. ACCMP is designed on the basis of the smallest reusable testing units and a testing synchronization mechanism, so it can satisfy the complex combination test requirements of multiple services easily.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116547755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusion Detection and Attack Classification Using Feed-Forward Neural Network 基于前馈神经网络的入侵检测与攻击分类
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.28
Fariba Haddadi, Sara Khanchi, Mehran Shetabi, V. Derhami
Fast Internet growth and increase in number of users make network security essential in recent decades. Lately one of the most hot research topics in network security is intrusion detection systems (IDSs) which try to keep security at the highest level. This paper addresses a IDS using a 2-layered feed-forward neural network. In training phase, “early stopping” strategy is used to overcome the “over-fitting” problem in neural networks. The proposed system is evaluated by DARPA dataset. The connections selected from DARPA is preprocessed and feature range is converted into [-1, 1]. These modifications affect final detection results notably. Experimental results show that the system, with simplicity in comparison with similar cases, has suitable performance with high precision.
近几十年来,互联网的快速发展和用户数量的增加使得网络安全变得至关重要。近年来,入侵检测系统一直是网络安全领域的研究热点之一。本文利用两层前馈神经网络解决了一个入侵检测系统。在训练阶段,采用“提前停止”策略克服了神经网络的“过拟合”问题。采用DARPA数据集对系统进行了评估。对从DARPA中选择的连接进行预处理,并将特征范围转换为[- 1,1]。这些修改对最终检测结果影响较大。实验结果表明,与同类案例相比,该系统简单,性能合适,精度高。
{"title":"Intrusion Detection and Attack Classification Using Feed-Forward Neural Network","authors":"Fariba Haddadi, Sara Khanchi, Mehran Shetabi, V. Derhami","doi":"10.1109/ICCNT.2010.28","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.28","url":null,"abstract":"Fast Internet growth and increase in number of users make network security essential in recent decades. Lately one of the most hot research topics in network security is intrusion detection systems (IDSs) which try to keep security at the highest level. This paper addresses a IDS using a 2-layered feed-forward neural network. In training phase, “early stopping” strategy is used to overcome the “over-fitting” problem in neural networks. The proposed system is evaluated by DARPA dataset. The connections selected from DARPA is preprocessed and feature range is converted into [-1, 1]. These modifications affect final detection results notably. Experimental results show that the system, with simplicity in comparison with similar cases, has suitable performance with high precision.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122159267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
An Algorithm for Joint Multi-item Replenishment Problem under Trade Credits 贸易信用下的多项目联合补货算法
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.117
Yu-Chung Tsao, Lu-Wen Liao
This study deals with the joint multi-item replenishment problem under trade credit. All existing studies about trade credit focused on single-item replenishment policy. However, joint multi-item replenishment has been widely applied in many industries to take advantage of trans port economies of scale. In this paper we extend the traditional inventory model by considering trade credit t and multi-item replenishment so as to better reflect the real-world business situation. The objective is to determine the optimal replenishment schedule for each item while minimizing the total cost. Two heuristics, Cost-balancing heuristic and Extreme finding heuristic, are developed to solve the problem. From computational analysis, we illustrate and compare the two heuristics. Our performance study shows that Extreme-finding heuristic is better than Cost-balancing heuristic.
本文研究了贸易信贷下的联合多项目补货问题。现有关于贸易信贷的研究都集中在单项补充政策上。然而,为了利用运输规模经济效益,联合多项目补货已被广泛应用于许多行业。本文对传统的库存模型进行了扩展,考虑了贸易信用和多项目补货,从而更好地反映了实际的商业情况。目标是确定每个项目的最佳补货计划,同时使总成本最小化。为了解决这一问题,提出了成本平衡法和极值查找法两种启发式方法。从计算分析的角度对这两种启发式方法进行了说明和比较。我们的性能研究表明,极值查找启发式优于成本平衡启发式。
{"title":"An Algorithm for Joint Multi-item Replenishment Problem under Trade Credits","authors":"Yu-Chung Tsao, Lu-Wen Liao","doi":"10.1109/ICCNT.2010.117","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.117","url":null,"abstract":"This study deals with the joint multi-item replenishment problem under trade credit. All existing studies about trade credit focused on single-item replenishment policy. However, joint multi-item replenishment has been widely applied in many industries to take advantage of trans port economies of scale. In this paper we extend the traditional inventory model by considering trade credit t and multi-item replenishment so as to better reflect the real-world business situation. The objective is to determine the optimal replenishment schedule for each item while minimizing the total cost. Two heuristics, Cost-balancing heuristic and Extreme finding heuristic, are developed to solve the problem. From computational analysis, we illustrate and compare the two heuristics. Our performance study shows that Extreme-finding heuristic is better than Cost-balancing heuristic.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125594961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Network Virtual Laboratory System 网络虚拟实验室系统的研究
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.92
He Wei
The virtual instrument’s gradually developing into the direction to network make Network Virtual Laboratory(NVL) becomes an important mode of laboratory construction. Starting from analysis on characteristics of virtual laboratory system, the paper carries through overall design on network virtual laboratory system, and designed the structure of system website and constitutes in detail. Then, the main functions of the NVL were discussed. The frequency characteristic measurement experiment based on NVL was designed to lay foundation for practical application of NVL.
虚拟仪器逐渐向网络化方向发展,使得网络虚拟实验室成为实验室建设的一种重要模式。本文从分析虚拟实验室系统的特点入手,对网络虚拟实验室系统进行了总体设计,并对系统网站的结构进行了详细的设计和构成。然后,讨论了NVL的主要功能。设计了基于NVL的频率特性测量实验,为NVL的实际应用奠定基础。
{"title":"Research on Network Virtual Laboratory System","authors":"He Wei","doi":"10.1109/ICCNT.2010.92","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.92","url":null,"abstract":"The virtual instrument’s gradually developing into the direction to network make Network Virtual Laboratory(NVL) becomes an important mode of laboratory construction. Starting from analysis on characteristics of virtual laboratory system, the paper carries through overall design on network virtual laboratory system, and designed the structure of system website and constitutes in detail. Then, the main functions of the NVL were discussed. The frequency characteristic measurement experiment based on NVL was designed to lay foundation for practical application of NVL.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126178658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Model of Order Promise Mechanism for TV Advertising 电视广告的订单承诺机制模型
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.57
Lu-Wen Liao, Yu-Chung Tsao
In this paper, we deal with the problem of the order promising for TV advertising. Traditionally, sales representative manually check commercial time slots according to customer requests. However, this check process is very complex and takes a long time, which results in losing sales opportunities and reducing customer satisfaction. Therefore, we propose an order promise mechanism using the Architecture of Integrated Information Systems modeling method, helping TV stations quickly response customer requirements and efficiently use valuable commercial time slots.
本文主要研究电视广告中的订单承诺问题。传统上,销售代表根据客户的要求手动检查商业时段。然而,这个检查过程非常复杂,需要很长时间,这会导致失去销售机会,降低客户满意度。因此,我们提出了一种基于集成信息系统体系结构建模方法的订单承诺机制,帮助电视台快速响应客户需求,高效利用有价值的商业时段。
{"title":"The Model of Order Promise Mechanism for TV Advertising","authors":"Lu-Wen Liao, Yu-Chung Tsao","doi":"10.1109/ICCNT.2010.57","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.57","url":null,"abstract":"In this paper, we deal with the problem of the order promising for TV advertising. Traditionally, sales representative manually check commercial time slots according to customer requests. However, this check process is very complex and takes a long time, which results in losing sales opportunities and reducing customer satisfaction. Therefore, we propose an order promise mechanism using the Architecture of Integrated Information Systems modeling method, helping TV stations quickly response customer requirements and efficiently use valuable commercial time slots.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128835840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Multiple Pattern Detection Algorithm 动态多模式检测算法
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.90
Chouvalit Khancome, V. Boonjing
The multiple pattern matching has always been a significant principle for applying to a network security system. This principle is adapted to accommodate the target patterns to be detected in a pre-processing phase, and the objective text and the suspect patterns are simultaneously detected by comparing with the existing structure. This research article introduces a new algorithm of multi-string pattern matching by means of a new data structure called inverted lists. The inverted lists structure, inherited from the inverted index, is represented by the positions of characters which appear in the patterns. The new algorithm, which is more efficient time than the traditional algorithms, scans the given text in a single pass. More importantly, the structure of patterns is able to update the patterns over time.
多模式匹配一直是应用于网络安全系统的一个重要原则。这一原则在预处理阶段适应了要检测的目标模式,并通过与现有结构的比较同时检测客观文本和可疑模式。本文利用一种新的数据结构——倒排表,提出了一种新的多字符串模式匹配算法。倒排列表结构继承自倒排索引,由出现在模式中的字符的位置表示。该算法可以一次扫描给定文本,比传统算法效率更高。更重要的是,模式的结构能够随时间更新模式。
{"title":"Dynamic Multiple Pattern Detection Algorithm","authors":"Chouvalit Khancome, V. Boonjing","doi":"10.1109/ICCNT.2010.90","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.90","url":null,"abstract":"The multiple pattern matching has always been a significant principle for applying to a network security system. This principle is adapted to accommodate the target patterns to be detected in a pre-processing phase, and the objective text and the suspect patterns are simultaneously detected by comparing with the existing structure. This research article introduces a new algorithm of multi-string pattern matching by means of a new data structure called inverted lists. The inverted lists structure, inherited from the inverted index, is represented by the positions of characters which appear in the patterns. The new algorithm, which is more efficient time than the traditional algorithms, scans the given text in a single pass. More importantly, the structure of patterns is able to update the patterns over time.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113932929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block-Level Data Migration in Tiered Storage System 分级存储中的块级数据迁移
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.61
Xiaonan Zhao, Zhanhuai Li, Xiao Zhang, Leijie Zeng
Managing data growth continues to be the biggest challenge for IT. And tiered storage, a solid way to Information Lifecycle Management (ILM), is very helpful to reduce the cost and improve the storage efficiency in data center. However, data migration is the primary challenge to implement tiered storage management, and it's hard to be resolved by traditional data migration solutions, which are mainly relying on experience of administrators and manual migration according to storage capacity usage and data access frequency. This paper proposes a novel bi-directional migration policy (migration with double thresholds based on feedback, MDTF), based on block-level data valuation and fully automation process. MDTF aims to achieve balance between storage QoS and migration costs by double thresholds, to narrow the migration scope of block-level data objects, and the analysis shows that MDTF is an efficient block-level data migration policy comparing with traditional migration policies.
管理数据增长仍然是IT面临的最大挑战。分层存储作为信息生命周期管理(ILM)的一种坚实的方式,有助于降低数据中心的成本,提高数据中心的存储效率。然而,数据迁移是实现分级存储管理的主要挑战,传统的数据迁移方案主要依靠管理员的经验,根据存储容量的使用情况和数据访问频率进行手动迁移,难以解决这一问题。本文提出了一种基于块级数据评估和全自动化过程的双向迁移策略(基于反馈的双阈值迁移,MDTF)。MDTF旨在通过双阈值实现存储QoS和迁移成本的平衡,缩小块级数据对象的迁移范围,分析表明,与传统的块级数据迁移策略相比,MDTF是一种高效的块级数据迁移策略。
{"title":"Block-Level Data Migration in Tiered Storage System","authors":"Xiaonan Zhao, Zhanhuai Li, Xiao Zhang, Leijie Zeng","doi":"10.1109/ICCNT.2010.61","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.61","url":null,"abstract":"Managing data growth continues to be the biggest challenge for IT. And tiered storage, a solid way to Information Lifecycle Management (ILM), is very helpful to reduce the cost and improve the storage efficiency in data center. However, data migration is the primary challenge to implement tiered storage management, and it's hard to be resolved by traditional data migration solutions, which are mainly relying on experience of administrators and manual migration according to storage capacity usage and data access frequency. This paper proposes a novel bi-directional migration policy (migration with double thresholds based on feedback, MDTF), based on block-level data valuation and fully automation process. MDTF aims to achieve balance between storage QoS and migration costs by double thresholds, to narrow the migration scope of block-level data objects, and the analysis shows that MDTF is an efficient block-level data migration policy comparing with traditional migration policies.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Data Load Distribution by Semi Real Time Data Warehouse 半实时数据仓库的数据负载分配
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.104
M. Javed, A. Nawaz
Today many organizations used data warehouse for strategic decision making. Today's real-time business stresses the potential to process increasingly volumes of data at very high speed in order to stay competitive in market. Data Warehouse is populated by data extraction, transformation and loading from different data sources by software utilities called ETL (Extraction, transformation & loading). ETL process is a time consuming process as it has to process large volume of data. ETL processes must have certain completion time window and ETL process must have to finish within this time window. In this paper we discusses a technique to distribute the volume of data to be extracted, transformed and loaded into data warehouse by merging both conventional and real-time techniques, so ETL process finishes its job within its time window by utilizing ETL idle time.
今天,许多组织使用数据仓库进行战略决策。当今的实时业务强调以非常高的速度处理越来越多的数据的潜力,以保持在市场上的竞争力。数据仓库由称为ETL(提取、转换和加载)的软件实用程序从不同的数据源中提取、转换和加载数据组成。ETL过程是一个耗时的过程,因为它必须处理大量的数据。ETL进程必须有一定的完成时间窗口,ETL进程必须在这个时间窗口内完成。本文讨论了一种将传统技术和实时技术相结合,将需要提取、转换和加载的数据量分配到数据仓库的技术,使ETL进程利用ETL空闲时间在其时间窗口内完成其工作。
{"title":"Data Load Distribution by Semi Real Time Data Warehouse","authors":"M. Javed, A. Nawaz","doi":"10.1109/ICCNT.2010.104","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.104","url":null,"abstract":"Today many organizations used data warehouse for strategic decision making. Today's real-time business stresses the potential to process increasingly volumes of data at very high speed in order to stay competitive in market. Data Warehouse is populated by data extraction, transformation and loading from different data sources by software utilities called ETL (Extraction, transformation & loading). ETL process is a time consuming process as it has to process large volume of data. ETL processes must have certain completion time window and ETL process must have to finish within this time window. In this paper we discusses a technique to distribute the volume of data to be extracted, transformed and loaded into data warehouse by merging both conventional and real-time techniques, so ETL process finishes its job within its time window by utilizing ETL idle time.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
TCP Performance Enhancement Using ECN and Snoop Protocol for Wi-Fi Network 利用ECN和Snoop协议增强Wi-Fi网络的TCP性能
Pub Date : 2010-04-23 DOI: 10.1109/ICCNT.2010.36
M. Chawhan, A. Kapur
Providing Internet services over wireless links has grown rapidly in recent years. TCP (Transmission Control Protocol) has been performing well over the traditional wired networks where packet losses occur mostly because of congestion, it cannot react efficiently in wireless networks, which suffer from significant non-congestion-related losses due to reasons such as bit errors and handoffs. The paper shows how Explicit Congestion Notification (ECN), Snoop protocol and their combination can be used to improve the performance of TCP in Wi-Fi Bi-directional Network and in Handoff. ECN will help in congestion control and SNOOP will retransmit the packets that are lost from nodes in between, saving nearly half the retransmission time and avoiding the decreasing in transmission speed. This paper investigates the performance of above mentioned protocols over Wi-Fi wireless scenario which improves the various parameters of TCP such as throughput and goodput. The results of the same can be demonstrated on NS2 simulator.
通过无线链路提供互联网服务近年来发展迅速。TCP(传输控制协议)在传统的有线网络中表现良好,其中数据包丢失主要是由于拥塞造成的,但它在无线网络中不能有效地反应,无线网络由于比特错误和切换等原因而遭受重大的非拥塞相关损失。本文介绍了显式拥塞通知(ECN)、Snoop协议及其组合如何提高TCP在Wi-Fi双向网络和切换中的性能。ECN将有助于拥塞控制,SNOOP将重新传输中间节点丢失的数据包,节省了近一半的重传时间,避免了传输速度的下降。本文研究了上述协议在Wi-Fi无线场景下的性能,提高了TCP的吞吐量和goodput等各项参数。同样的结果可以在NS2模拟器上得到验证。
{"title":"TCP Performance Enhancement Using ECN and Snoop Protocol for Wi-Fi Network","authors":"M. Chawhan, A. Kapur","doi":"10.1109/ICCNT.2010.36","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.36","url":null,"abstract":"Providing Internet services over wireless links has grown rapidly in recent years. TCP (Transmission Control Protocol) has been performing well over the traditional wired networks where packet losses occur mostly because of congestion, it cannot react efficiently in wireless networks, which suffer from significant non-congestion-related losses due to reasons such as bit errors and handoffs. The paper shows how Explicit Congestion Notification (ECN), Snoop protocol and their combination can be used to improve the performance of TCP in Wi-Fi Bi-directional Network and in Handoff. ECN will help in congestion control and SNOOP will retransmit the packets that are lost from nodes in between, saving nearly half the retransmission time and avoiding the decreasing in transmission speed. This paper investigates the performance of above mentioned protocols over Wi-Fi wireless scenario which improves the various parameters of TCP such as throughput and goodput. The results of the same can be demonstrated on NS2 simulator.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2010 Second International Conference on Computer and Network Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1