Robots play a major role in flexible manufacturing system (FMS) and the performance measure of a robot is one of the critical issues in the design of robotic work cells. Performance measure and selection of robot for an application is usually done based on experience, intuition and at most using the kinematic considerations like workspace, manipulability, etc. This problem has become more cumbersome in recent years due to increasing complexity, available features, and facilities offered by different robotic products. In the present work a systematic procedure is developed for performance measure of robots based on various attributes. Subsequently, the selection procedure proceeds to select the alternatives in the shortlist by employing different attributes based specification methods. This is an attempt to create exhaustive procedure by identifying maximum possible number of attributes for robot manipulators. The selection procedures are illustrated with example.
{"title":"A Model for Performance Measure of Industrial Robots","authors":"B. B. Choudhury, Anshuman Mishra, B. Biswal","doi":"10.1109/ICCNT.2010.118","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.118","url":null,"abstract":"Robots play a major role in flexible manufacturing system (FMS) and the performance measure of a robot is one of the critical issues in the design of robotic work cells. Performance measure and selection of robot for an application is usually done based on experience, intuition and at most using the kinematic considerations like workspace, manipulability, etc. This problem has become more cumbersome in recent years due to increasing complexity, available features, and facilities offered by different robotic products. In the present work a systematic procedure is developed for performance measure of robots based on various attributes. Subsequently, the selection procedure proceeds to select the alternatives in the shortlist by employing different attributes based specification methods. This is an attempt to create exhaustive procedure by identifying maximum possible number of attributes for robot manipulators. The selection procedures are illustrated with example.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128249263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Association rule mining has been an area of active research in the field of knowledge discovery and numerous algorithms have been developed to this end. Of late, data mining researchers have improved upon the quality of association rule mining for business development by incorporating the influential factors like value (utility), quantity of items sold (weight) and more, for the mining of association patterns. In this paper, we propose an efficient approach based on weight factor and utility for effectual mining of significant association rules. Initially, the proposed approach makes use of the traditional Apriori algorithm to generate a set of association rules from a database. The proposed approach exploits the anti-monotone property of the Apriori algorithm, which states that for a k-itemset to be frequent all (k-1) subsets of this itemset also have to be frequent. Subsequently, the set of association rules mined are subjected to weight age (W-gain) and utility (U-gain) constraints, and for every association rule mined, a combined Utility Weighted Score (UW-Score) is computed. Ultimately, we determine a subset of valuable association rules based on the UW-Score computed. The experimental results demonstrate the effectiveness of the proposed approach in generating high utility association rules that can be lucratively applied for business development.
{"title":"An Improvement in Apriori Algorithm Using Profit and Quantity","authors":"P. Sandhu, D. Dhaliwal, S. Panda, A. Bisht","doi":"10.1109/ICCNT.2010.46","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.46","url":null,"abstract":"Association rule mining has been an area of active research in the field of knowledge discovery and numerous algorithms have been developed to this end. Of late, data mining researchers have improved upon the quality of association rule mining for business development by incorporating the influential factors like value (utility), quantity of items sold (weight) and more, for the mining of association patterns. In this paper, we propose an efficient approach based on weight factor and utility for effectual mining of significant association rules. Initially, the proposed approach makes use of the traditional Apriori algorithm to generate a set of association rules from a database. The proposed approach exploits the anti-monotone property of the Apriori algorithm, which states that for a k-itemset to be frequent all (k-1) subsets of this itemset also have to be frequent. Subsequently, the set of association rules mined are subjected to weight age (W-gain) and utility (U-gain) constraints, and for every association rule mined, a combined Utility Weighted Score (UW-Score) is computed. Ultimately, we determine a subset of valuable association rules based on the UW-Score computed. The experimental results demonstrate the effectiveness of the proposed approach in generating high utility association rules that can be lucratively applied for business development.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134636672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the technology of sensor, RFID, and GPS, many researches are recently being carried out on monitoring animal behavior and interactions with the environment. Plus, the technology is applicable to develop new zoological systems for animal trace ability, identification, and anti-theft. Yet, there is a lack of studies of providing zoos with intelligent animal tracking and management services based on RFID, GPS, and sensors. Accordingly, in this paper, we propose an intelligent animal situation tracking service for zoological gardens, based on GPS, RFID, and sensors. Firstly, we present a service scenario of animal situation tracking and introduce the tracking system configuration. The proposed system can provide real-time animal situation information such as the current location, bodily temperature, and pictures. Plus, it can track the animals based on the information even when they escape their cages. Next, we design and implement a prototype of the proposed animal situation tracking system.
{"title":"Animal Situation Tracking Service Using RFID, GPS, and Sensors","authors":"So-Hyeon Kim, Do-Hyeun Kim, Hee-Dong Park","doi":"10.1109/ICCNT.2010.40","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.40","url":null,"abstract":"With the technology of sensor, RFID, and GPS, many researches are recently being carried out on monitoring animal behavior and interactions with the environment. Plus, the technology is applicable to develop new zoological systems for animal trace ability, identification, and anti-theft. Yet, there is a lack of studies of providing zoos with intelligent animal tracking and management services based on RFID, GPS, and sensors. Accordingly, in this paper, we propose an intelligent animal situation tracking service for zoological gardens, based on GPS, RFID, and sensors. Firstly, we present a service scenario of animal situation tracking and introduce the tracking system configuration. The proposed system can provide real-time animal situation information such as the current location, bodily temperature, and pictures. Plus, it can track the animals based on the information even when they escape their cages. Next, we design and implement a prototype of the proposed animal situation tracking system.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128309959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shehzad Ahmad, A. Shahid, R. M. Ahmad, Adeel Akram, M. A. Nasim
This paper presents the novel idea for opportunity detection (detecting unoccupied sub-carriers/sub-channels) in downlink (DL) orthogonal frequency division multiple access (OFDMA) systems using cognitive radio (CR) sensing techniques and sub-channel utilization history information. Assuming availability of information about the basic parameters of the primary system as well as time and frequency synchronization of CR user with primary system, three techniques have been proposed for detection of unoccupied sub-channels in DL OFDMA systems: 1) Detection Method— it identifies unoccupied sub-carriers/sub-channel in DL OFDMA systems by exploiting the CR sensing techniques (i.e. matched filter and energy detection). 2) Prediction Method— it forecasts the future sub-channel state (empty or occupied) by classifying sub-channel history into different traffic patterns using ‘Traffic Classification Algorithm’. 3) Hybrid of Detection and Prediction Method— it also utilizes ‘Traffic Classification Algorithm’ to decide when to use detection and prediction methods in order to determine either sub-channel will remain empty or occupied in next time slot.
{"title":"Opportunistic Spectrum Access in OFDMA Systems","authors":"Shehzad Ahmad, A. Shahid, R. M. Ahmad, Adeel Akram, M. A. Nasim","doi":"10.1109/ICCNT.2010.30","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.30","url":null,"abstract":"This paper presents the novel idea for opportunity detection (detecting unoccupied sub-carriers/sub-channels) in downlink (DL) orthogonal frequency division multiple access (OFDMA) systems using cognitive radio (CR) sensing techniques and sub-channel utilization history information. Assuming availability of information about the basic parameters of the primary system as well as time and frequency synchronization of CR user with primary system, three techniques have been proposed for detection of unoccupied sub-channels in DL OFDMA systems: 1) Detection Method— it identifies unoccupied sub-carriers/sub-channel in DL OFDMA systems by exploiting the CR sensing techniques (i.e. matched filter and energy detection). 2) Prediction Method— it forecasts the future sub-channel state (empty or occupied) by classifying sub-channel history into different traffic patterns using ‘Traffic Classification Algorithm’. 3) Hybrid of Detection and Prediction Method— it also utilizes ‘Traffic Classification Algorithm’ to decide when to use detection and prediction methods in order to determine either sub-channel will remain empty or occupied in next time slot.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115889621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Book reviews are comments written by readers regarding their experiences about a particular book. Some reviews contain useful information and may help prospective buyers in making a purchase decision, while some are viewed as less helpful, such as, complaints about shipping delay. The review’s content is the key to differentiating them. Presenting a methodology for evaluating the helpfulness of a book view, this research employed the part-of-speech (POS) approach. A review’s content initially underwent a POS tagging process. Various features were then extracted and used as attributes for classification algorithms. The relation between adjectives and review’s helpfulness was also analyzed. The system’s effectiveness was assessed using textbook reviews obtained from an on-line bookstore.
{"title":"Part-of-Speech Approach to Evaluation of Textbook Reviews","authors":"P. Tanawongsuwan","doi":"10.1109/ICCNT.2010.31","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.31","url":null,"abstract":"Book reviews are comments written by readers regarding their experiences about a particular book. Some reviews contain useful information and may help prospective buyers in making a purchase decision, while some are viewed as less helpful, such as, complaints about shipping delay. The review’s content is the key to differentiating them. Presenting a methodology for evaluating the helpfulness of a book view, this research employed the part-of-speech (POS) approach. A review’s content initially underwent a POS tagging process. Various features were then extracted and used as attributes for classification algorithms. The relation between adjectives and review’s helpfulness was also analyzed. The system’s effectiveness was assessed using textbook reviews obtained from an on-line bookstore.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The growth in the number of mobile users is motivating the new technology of mobile computing to offer many new types of services like location-based services that pose many challenging problems for location-dependent query processing and data management. In this paper, we discuss the various challenges in distributed processing of location-dependent continuous queries in a mobile environment by studying the different scenarios in which both the querying unit and the object being queried are in motion. Then we proceed to classify different types of location dependent queries. We discuss the different solutions to solve these complex location dependent queries using caching techniques that facilitate fast access to data and at the same time minimize the massive network traffic generated due to location dependent query processing in a wireless environment. To further reduce the data transfer the query results are cached so that these results are reusable. The conventional query processing method like join processing of data from mobile units and server is directly applied in the mobile environment. Additionally this paper also focuses on the methods of location-dependent query processing and applications. The main goal of this paper is to study the various location dependent query processing methods along with data management problems involved in evaluation of Location-dependent queries and classify them.
{"title":"Location Dependent Query Processing – Issues, Challenges and Applications","authors":"Kahkashan Tabassum, Maniza Hijab, A. Damodaram","doi":"10.1109/ICCNT.2010.39","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.39","url":null,"abstract":"The growth in the number of mobile users is motivating the new technology of mobile computing to offer many new types of services like location-based services that pose many challenging problems for location-dependent query processing and data management. In this paper, we discuss the various challenges in distributed processing of location-dependent continuous queries in a mobile environment by studying the different scenarios in which both the querying unit and the object being queried are in motion. Then we proceed to classify different types of location dependent queries. We discuss the different solutions to solve these complex location dependent queries using caching techniques that facilitate fast access to data and at the same time minimize the massive network traffic generated due to location dependent query processing in a wireless environment. To further reduce the data transfer the query results are cached so that these results are reusable. The conventional query processing method like join processing of data from mobile units and server is directly applied in the mobile environment. Additionally this paper also focuses on the methods of location-dependent query processing and applications. The main goal of this paper is to study the various location dependent query processing methods along with data management problems involved in evaluation of Location-dependent queries and classify them.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114692562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In multi-hop wireless mobile ad hoc network each node is capable of sending, receiving and forwarding data packets. Since it is an infrastructure-less networks, it makes it feasible to set up at anyplace and at any time. Supporting Quality of Service (QoS) in such network is a challenge due to limited available resources like bandwidth etc. This paper describes a new approach of Medium Access Control (MAC) which supports QoS for real time applications. Each node is assigned priorities dynamically based on their roles (as sender, receiver or forwarding node) and type of traffics (Real Time Packet – RTP or Non Real Time Packet - NRTP) in the networks. This approach enhances QoS for Real Time data in terms of bandwidth utilization and delay. This ensures higher network throughput with lower delay for packet delivery. New queue has been designed to fit in to the proposed MAC protocol. Simulation shows that our proposed MAC performs much better than the standard IEEE 802.11 DCF in terms of average throughput, delay, MAC overheads in support of RTP and fairness within a class of traffic also increases.
{"title":"Prioritized Quality of Service Support Medium Access Control for Real Time Flows","authors":"Jims Marchang, Sukumar Nandi, N. Sarma","doi":"10.1109/ICCNT.2010.69","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.69","url":null,"abstract":"In multi-hop wireless mobile ad hoc network each node is capable of sending, receiving and forwarding data packets. Since it is an infrastructure-less networks, it makes it feasible to set up at anyplace and at any time. Supporting Quality of Service (QoS) in such network is a challenge due to limited available resources like bandwidth etc. This paper describes a new approach of Medium Access Control (MAC) which supports QoS for real time applications. Each node is assigned priorities dynamically based on their roles (as sender, receiver or forwarding node) and type of traffics (Real Time Packet – RTP or Non Real Time Packet - NRTP) in the networks. This approach enhances QoS for Real Time data in terms of bandwidth utilization and delay. This ensures higher network throughput with lower delay for packet delivery. New queue has been designed to fit in to the proposed MAC protocol. Simulation shows that our proposed MAC performs much better than the standard IEEE 802.11 DCF in terms of average throughput, delay, MAC overheads in support of RTP and fairness within a class of traffic also increases.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we investigate predicting the Stock Exchange of Thailand Index movement. Currently, there are two stock markets in Thailand; the Stock Exchange of Thailand (SET) and the Market for Alternative Investment (MAI). This paper focuses on the movement of the Stock Exchange of Thailand Index (SET Index). The back propagation neural network (BPNN) technology was employed in forecasting the SET index. An experiment was conducted by using data of 124 trading days from 2 July 2004 to 30 December 2004. The data were divided into two groups: 53 days for BPNN training and 71 days for testing. The experimental results show that the BPNN successfully predicts the SET Index with less than 2% error. The BPNN also achieves a lower prediction error when compared with the Adaptive Evolution Strategy, but a higher prediction error when compared with the (1+1) Evolution Strategy.
{"title":"Stock Exchange of Thailand Index Prediction Using Back Propagation Neural Networks","authors":"P. Sutheebanjard, W. Premchaiswadi","doi":"10.1109/ICCNT.2010.21","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.21","url":null,"abstract":"In this paper, we investigate predicting the Stock Exchange of Thailand Index movement. Currently, there are two stock markets in Thailand; the Stock Exchange of Thailand (SET) and the Market for Alternative Investment (MAI). This paper focuses on the movement of the Stock Exchange of Thailand Index (SET Index). The back propagation neural network (BPNN) technology was employed in forecasting the SET index. An experiment was conducted by using data of 124 trading days from 2 July 2004 to 30 December 2004. The data were divided into two groups: 53 days for BPNN training and 71 days for testing. The experimental results show that the BPNN successfully predicts the SET Index with less than 2% error. The BPNN also achieves a lower prediction error when compared with the Adaptive Evolution Strategy, but a higher prediction error when compared with the (1+1) Evolution Strategy.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Breast carcinoma is considered as the second major cause of death in females. Malignant tumor affects some tissues of breast and may spread over neighboring tissues. Early detection of this malignant mass is very important to save the precious lives. Although the death rate is reduced by application of modern tools yet research for optimal solutions is still in progress to bring more comprehensive mechanisms. In this paper, we are proposing an interspersed approach for breast tumor pigeonholing and vatic nation. We trained our neural network over datasets obtained from the University of Wisconsin Hospitals, Madison and tested over many other datasets with diverse network architectures. The proposed approach was sectioned in applications of data filters. Our network architecture showed 96% of malignant and 99.45% of benign diagnosis for training confusion matrix and 100% for malignant and 97% benign for cross validation matrix. We have given detailed experimentations in light of training and cross validation mean square errors and demonstrated results even for minute curve fluctuations.
{"title":"Breast Carcinoma Pigeonholing and Vaticination Using an Interspersed and Malleable Approach","authors":"H. Mathkour, Muneer Ahmad","doi":"10.1109/ICCNT.2010.96","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.96","url":null,"abstract":"Breast carcinoma is considered as the second major cause of death in females. Malignant tumor affects some tissues of breast and may spread over neighboring tissues. Early detection of this malignant mass is very important to save the precious lives. Although the death rate is reduced by application of modern tools yet research for optimal solutions is still in progress to bring more comprehensive mechanisms. In this paper, we are proposing an interspersed approach for breast tumor pigeonholing and vatic nation. We trained our neural network over datasets obtained from the University of Wisconsin Hospitals, Madison and tested over many other datasets with diverse network architectures. The proposed approach was sectioned in applications of data filters. Our network architecture showed 96% of malignant and 99.45% of benign diagnosis for training confusion matrix and 100% for malignant and 97% benign for cross validation matrix. We have given detailed experimentations in light of training and cross validation mean square errors and demonstrated results even for minute curve fluctuations.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116733422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A crucial aspect in the development of a fault management system is the selection of backup paths. The main issue in this selection is a tradeoff between the resource consumption and the minimization of failure recovery time, link failure, and packet loss. In this paper, a general QoS backup protection optimization policy applicable to a wide range of network situations and traffic types is proposed. A comparison between the proposed policy and the conventional protection backup methods is performed. The numerical results show a significant improvement of the QoS protection over conventional protection backup methods at variable protection parameters, network constraints and traffic types.
{"title":"Protection Optimization for MPLS Networks","authors":"R. Rizk, A. Elmaghraby, Mahmoud Mariee","doi":"10.1109/ICCNT.2010.94","DOIUrl":"https://doi.org/10.1109/ICCNT.2010.94","url":null,"abstract":"A crucial aspect in the development of a fault management system is the selection of backup paths. The main issue in this selection is a tradeoff between the resource consumption and the minimization of failure recovery time, link failure, and packet loss. In this paper, a general QoS backup protection optimization policy applicable to a wide range of network situations and traffic types is proposed. A comparison between the proposed policy and the conventional protection backup methods is performed. The numerical results show a significant improvement of the QoS protection over conventional protection backup methods at variable protection parameters, network constraints and traffic types.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}