首页 > 最新文献

J. Interconnect. Networks最新文献

英文 中文
The Sufficient Conditions of (δ(G) - 2)-(|F|-)Fault-Tolerant Maximal Local-(Edge-)Connectivity of Connected Graphs 连通图(δ(G) - 2)-(|F|-)容错最大局部(边)连通性的充分条件
Pub Date : 2022-02-24 DOI: 10.1142/s0219265921420184
Shanshan Yin, Liqiong Xu, Weihua Yang
An interconnection network is usually modeled by a connected graph in which vertices represent processors and edges represent links between processors. The connectivity is an important parameter to evaluate the fault tolerance of interconnection networks. A connected graph [Formula: see text] is maximally local-(edge-)connected if each pair vertices [Formula: see text] of [Formula: see text] is connected by min[Formula: see text] pairwise (edge-)disjoint paths between [Formula: see text] and [Formula: see text] in [Formula: see text]. A graph [Formula: see text] is called [Formula: see text]-fault-tolerant maximally local-(edge-)connected if [Formula: see text] is maximally local-(edge-)connected for any [Formula: see text] ([Formula: see text]) with [Formula: see text]. A graph [Formula: see text] is called [Formula: see text]-fault-tolerant maximally local-(edge-)connected of order [Formula: see text] if [Formula: see text] is maximally local-(edge-)connected for any [Formula: see text] with [Formula: see text], where [Formula: see text] is a conditional faulty vertex (edge) set of order [Formula: see text]. In this paper, we obtain the sufficient condition of connected graphs to be [Formula: see text]-edge-fault-tolerant maximally local-edge-connected. Moreover, we consider the sufficient condition of connected graphs to be [Formula: see text]-fault-tolerant maximally local-(edge-)connected of order [Formula: see text]. Some previous results in [Theor. Comput. Sci. 731 (2018) 50–67] and [Theor. Comput. Sci. 847 (2020) 39–48] are extended.
互连网络通常由连通图建模,其中顶点表示处理器,边表示处理器之间的链接。连通性是评价互联网络容错性的一个重要参数。如果[公式:见文]中的[公式:见文]的每对顶点[公式:见文]被[公式:见文]中的[公式:见文]与[公式:见文]之间的[公式:见文]的最小[公式:见文]对(边-)不相交路径连接,则连通图[公式:见文]是最大局部(边-)连通的。如果对于任何[公式:见文本]([公式:见文本])([公式:见文本])与[公式:见文本]([公式:见文本])具有[公式:见文本]的最大局部(边)连接,则图[公式:见文本]称为[公式:见文本]-容错性最大局部(边)连接。一个图[公式:见文]被称为[公式:见文]-容错性最大局部-(边-)连接的顺序[公式:见文],如果[公式:见文]是最大局部-(边-)连接的任何[公式:见文],其中[公式:见文]是一个有条件的错误顶点(边)集的顺序[公式:见文]。本文给出了连通图[公式:见文]-边容错最大局部边连通的充分条件。此外,我们认为连通图的充分条件为[公式:见文]-容错最大局部-(边-)连通的阶[公式:见文]。一些先前的结果在[理论]。第一版。科学通报,2018,(5):559 - 567。第一版。Sci. 847 (2020) 39-48 [j]。
{"title":"The Sufficient Conditions of (δ(G) - 2)-(|F|-)Fault-Tolerant Maximal Local-(Edge-)Connectivity of Connected Graphs","authors":"Shanshan Yin, Liqiong Xu, Weihua Yang","doi":"10.1142/s0219265921420184","DOIUrl":"https://doi.org/10.1142/s0219265921420184","url":null,"abstract":"An interconnection network is usually modeled by a connected graph in which vertices represent processors and edges represent links between processors. The connectivity is an important parameter to evaluate the fault tolerance of interconnection networks. A connected graph [Formula: see text] is maximally local-(edge-)connected if each pair vertices [Formula: see text] of [Formula: see text] is connected by min[Formula: see text] pairwise (edge-)disjoint paths between [Formula: see text] and [Formula: see text] in [Formula: see text]. A graph [Formula: see text] is called [Formula: see text]-fault-tolerant maximally local-(edge-)connected if [Formula: see text] is maximally local-(edge-)connected for any [Formula: see text] ([Formula: see text]) with [Formula: see text]. A graph [Formula: see text] is called [Formula: see text]-fault-tolerant maximally local-(edge-)connected of order [Formula: see text] if [Formula: see text] is maximally local-(edge-)connected for any [Formula: see text] with [Formula: see text], where [Formula: see text] is a conditional faulty vertex (edge) set of order [Formula: see text]. In this paper, we obtain the sufficient condition of connected graphs to be [Formula: see text]-edge-fault-tolerant maximally local-edge-connected. Moreover, we consider the sufficient condition of connected graphs to be [Formula: see text]-fault-tolerant maximally local-(edge-)connected of order [Formula: see text]. Some previous results in [Theor. Comput. Sci. 731 (2018) 50–67] and [Theor. Comput. Sci. 847 (2020) 39–48] are extended.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Model for Human Behavior Analysis 人类行为分析的认知模型
Pub Date : 2022-02-16 DOI: 10.1142/s0219265921460130
Xiujun Zhai, A. Rajaram, K. Ramesh
The number of autistic children and young people is rising rapidly across the world. Children with intellectual disabilities need special attention from trained experts. Educating them on improving their lifestyle is critical through the traditional teaching-learning environment. This study introduces an interactive educational framework that helps children with special needs have an improved and exciting learning process and explores the need to incorporate physical exercise into their everyday lives. Virtual Reality (VR) seeks more attention from autistic students. This research presents a Machine Learning-based Virtual Reality Application (ML-VRA) for Mentally Challenged Children and keeps the Human Behavior Analysis log files. Machine learning can predict the score of brain data ability. The visual short-term memory and visual-spatial memory are further assessed to identify students’ interaction with the VR application. Support Vector Regression prediction algorithm and Baseline Prediction algorithm are used to assess the score prediction for visual short memory and visual-spatial memory.Using an audio technology that allows autistic persons to hear various sounds, the cognitive method VRA instructs autistic children.Further, this study proposes a cognitive model for intellectual task processes and problem-solving using metacognitive architecture. Thus, children can acquire different levels of learning knowledge and skills. The case study performed on these model results with the highest prediction accuracy of 93.65%.
全世界自闭症儿童和青少年的数量正在迅速上升。智力残疾儿童需要受过训练的专家给予特别关注。通过传统的教学环境,教育他们改善生活方式是至关重要的。本研究引入互动教育框架,帮助有特殊需要的儿童有一个改善和令人兴奋的学习过程,并探讨将体育锻炼融入他们的日常生活的必要性。虚拟现实(VR)寻求自闭症学生更多的关注。本研究提出了一种基于机器学习的智障儿童虚拟现实应用(ML-VRA),并保存了人类行为分析日志文件。机器学习可以预测大脑数据能力的得分。进一步评估视觉短期记忆和视觉空间记忆,以识别学生与虚拟现实应用程序的互动。采用支持向量回归预测算法和基线预测算法对视觉短时记忆和视觉空间记忆进行评分预测。使用一种让自闭症患者听到各种声音的音频技术,认知方法VRA指导自闭症儿童。此外,本研究提出了一种基于元认知架构的智力任务过程和问题解决的认知模型。因此,孩子们可以获得不同层次的学习知识和技能。对这些模型结果进行了实例分析,预测精度最高,达到93.65%。
{"title":"Cognitive Model for Human Behavior Analysis","authors":"Xiujun Zhai, A. Rajaram, K. Ramesh","doi":"10.1142/s0219265921460130","DOIUrl":"https://doi.org/10.1142/s0219265921460130","url":null,"abstract":"The number of autistic children and young people is rising rapidly across the world. Children with intellectual disabilities need special attention from trained experts. Educating them on improving their lifestyle is critical through the traditional teaching-learning environment. This study introduces an interactive educational framework that helps children with special needs have an improved and exciting learning process and explores the need to incorporate physical exercise into their everyday lives. Virtual Reality (VR) seeks more attention from autistic students. This research presents a Machine Learning-based Virtual Reality Application (ML-VRA) for Mentally Challenged Children and keeps the Human Behavior Analysis log files. Machine learning can predict the score of brain data ability. The visual short-term memory and visual-spatial memory are further assessed to identify students’ interaction with the VR application. Support Vector Regression prediction algorithm and Baseline Prediction algorithm are used to assess the score prediction for visual short memory and visual-spatial memory.Using an audio technology that allows autistic persons to hear various sounds, the cognitive method VRA instructs autistic children.Further, this study proposes a cognitive model for intellectual task processes and problem-solving using metacognitive architecture. Thus, children can acquire different levels of learning knowledge and skills. The case study performed on these model results with the highest prediction accuracy of 93.65%.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116974556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Block Image Texture Retrieval Method Based on Depth Hash 基于深度哈希的块图像纹理检索方法研究
Pub Date : 2022-02-14 DOI: 10.1142/s0219265921430441
Jie Ding, G. Zhao, Jinyong Huang
In order to improve the retrieval ability of super-resolution multi-space block images, a texture retrieval method of block images based on depth hash is proposed. A texture feature analysis model of super-resolution multi-dimensional partitioned images is constructed, which combines texture spatial structure mapping method to realize depth information fusion of partitioned images, adopts edge feature detection and texture sparse feature clustering to realize texture hierarchical structure feature decomposition of super-resolution multi-dimensional partitioned images, and adopts deep image parameter analysis method to construct pixel structure recombination model of multi-dimensional partitioned images. Multi-dimensional texture parameter structure analysis and information clustering are realized for the collected partitioned images in multi-dimensional space. According to the information clustering results, the texture retrieval and extraction of partitioned images are realized by using the deep hash fusion algorithm, and the information detection and feature recognition capabilities of partitioned images in multi-dimensional space are improved. Simulation results show that this method has higher precision and better feature resolution in texture retrieval of partitioned images in multidimensional space, which improves the texture retrieval and recognition ability of partitioned images.
为了提高超分辨率多空间块图像的检索能力,提出了一种基于深度哈希的块图像纹理检索方法。构建了超分辨率多维分割图像的纹理特征分析模型,结合纹理空间结构映射方法实现分割图像的深度信息融合,采用边缘特征检测和纹理稀疏特征聚类实现超分辨率多维分割图像的纹理分层结构特征分解;并采用深度图像参数分析方法构建多维分割图像的像素结构重组模型。对采集到的分割图像在多维空间中实现了多维纹理参数结构分析和信息聚类。根据信息聚类结果,利用深度哈希融合算法实现了分割图像的纹理检索和提取,提高了分割图像在多维空间中的信息检测和特征识别能力。仿真结果表明,该方法在多维空间分割图像的纹理检索中具有较高的精度和较好的特征分辨率,提高了分割图像的纹理检索和识别能力。
{"title":"Research on Block Image Texture Retrieval Method Based on Depth Hash","authors":"Jie Ding, G. Zhao, Jinyong Huang","doi":"10.1142/s0219265921430441","DOIUrl":"https://doi.org/10.1142/s0219265921430441","url":null,"abstract":"In order to improve the retrieval ability of super-resolution multi-space block images, a texture retrieval method of block images based on depth hash is proposed. A texture feature analysis model of super-resolution multi-dimensional partitioned images is constructed, which combines texture spatial structure mapping method to realize depth information fusion of partitioned images, adopts edge feature detection and texture sparse feature clustering to realize texture hierarchical structure feature decomposition of super-resolution multi-dimensional partitioned images, and adopts deep image parameter analysis method to construct pixel structure recombination model of multi-dimensional partitioned images. Multi-dimensional texture parameter structure analysis and information clustering are realized for the collected partitioned images in multi-dimensional space. According to the information clustering results, the texture retrieval and extraction of partitioned images are realized by using the deep hash fusion algorithm, and the information detection and feature recognition capabilities of partitioned images in multi-dimensional space are improved. Simulation results show that this method has higher precision and better feature resolution in texture retrieval of partitioned images in multidimensional space, which improves the texture retrieval and recognition ability of partitioned images.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126971256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent Feature Subset Selection with Machine Learning Based Detection and Mitigation of DDoS Attacks in 5G Environment 5G环境下基于机器学习的DDoS攻击检测与缓解智能特征子集选择
Pub Date : 2022-02-14 DOI: 10.1142/s0219265921410322
A. G. Nagesha, G. Mahesh, Gowrishankar
The fifth-generation (5G) technology is anticipated to permit connectivity to billions of devices, called the Internet of Things (IoT). The primary benefit of 5G is that it has maximum bandwidth and can drastically expand service beyond cell phones to standard internet service for conventionally fixed connectivity to homes, offices, factories, etc. But IoT devices will unavoidably be the primary target of diverse kinds of cyberattacks, notably distributed denial of service (DDoS) attacks. Since the conventional DDoS mitigation techniques are ineffective for 5G networks, machine learning (ML) approaches find helpful to accomplish better security. With this motivation, this study resolves the network security issues posed by network devices in the 5G networks and mitigates the harmful effects of DDoS attacks. This paper presents a new pigeon-inspired optimization-based feature selection with optimal functional link neural network (FLNN), PIOFS-OFLNN model for mitigating DDoS attacks in the 5G environment. The proposed PIOFS-OFLNN model aims to detect DDoS attacks with the inclusion of feature selection and classification processes. The proposed PIOFS-OFLNN model incorporates different techniques such as pre-processing, feature selection, classification, and parameter tuning. In addition, the PIOFS algorithm is employed to choose an optimal subset of features from the pre-processed data. Besides, the OFLNN based classification model is applied to determine DDoS attacks where the Rat Swarm Optimizer (RSO) parameter tuning takes place to adjust the parameters involved in the FLNN model optimally. FLNN is a low computational interconnectivity higher cognitive neural network. There are still no hidden layers. FLNN’s input vector is operationally enlarged to produce non-linear remedies. More details can be accessed application of Nature-Inspired Method to Odia Written by hand Number system Recognition. To validate the improved DDoS detection performance of the proposed model, a benchmark dataset is used.
预计第五代(5G)技术将允许连接数十亿台设备,称为物联网(IoT)。5G的主要好处是它具有最大的带宽,可以将服务从手机扩展到标准互联网服务,用于家庭、办公室、工厂等的传统固定连接。但物联网设备将不可避免地成为各种网络攻击的主要目标,尤其是分布式拒绝服务(DDoS)攻击。由于传统的DDoS缓解技术对5G网络无效,机器学习(ML)方法有助于实现更好的安全性。基于此动机,本研究解决了5G网络中网络设备带来的网络安全问题,减轻了DDoS攻击的有害影响。针对5G环境下的DDoS攻击,提出了一种基于最优功能链路神经网络(FLNN)、PIOFS-OFLNN模型的基于鸽子启发优化的特征选择方法。提出的PIOFS-OFLNN模型旨在通过包含特征选择和分类过程来检测DDoS攻击。提出的PIOFS-OFLNN模型结合了预处理、特征选择、分类和参数调优等不同的技术。此外,采用PIOFS算法从预处理数据中选择最优特征子集。此外,将基于OFLNN的分类模型应用于DDoS攻击的判断,并通过RSO (Rat Swarm Optimizer)参数调优,对FLNN模型中涉及的参数进行最优调整。FLNN是一种低计算互联性的高级认知神经网络。仍然没有隐藏层。FLNN的输入向量在操作上被放大以产生非线性补救。更多的细节可以访问自然启发法在Odia手写数字系统识别中的应用。为了验证该模型改进后的DDoS检测性能,使用了一个基准数据集。
{"title":"Intelligent Feature Subset Selection with Machine Learning Based Detection and Mitigation of DDoS Attacks in 5G Environment","authors":"A. G. Nagesha, G. Mahesh, Gowrishankar","doi":"10.1142/s0219265921410322","DOIUrl":"https://doi.org/10.1142/s0219265921410322","url":null,"abstract":"The fifth-generation (5G) technology is anticipated to permit connectivity to billions of devices, called the Internet of Things (IoT). The primary benefit of 5G is that it has maximum bandwidth and can drastically expand service beyond cell phones to standard internet service for conventionally fixed connectivity to homes, offices, factories, etc. But IoT devices will unavoidably be the primary target of diverse kinds of cyberattacks, notably distributed denial of service (DDoS) attacks. Since the conventional DDoS mitigation techniques are ineffective for 5G networks, machine learning (ML) approaches find helpful to accomplish better security. With this motivation, this study resolves the network security issues posed by network devices in the 5G networks and mitigates the harmful effects of DDoS attacks. This paper presents a new pigeon-inspired optimization-based feature selection with optimal functional link neural network (FLNN), PIOFS-OFLNN model for mitigating DDoS attacks in the 5G environment. The proposed PIOFS-OFLNN model aims to detect DDoS attacks with the inclusion of feature selection and classification processes. The proposed PIOFS-OFLNN model incorporates different techniques such as pre-processing, feature selection, classification, and parameter tuning. In addition, the PIOFS algorithm is employed to choose an optimal subset of features from the pre-processed data. Besides, the OFLNN based classification model is applied to determine DDoS attacks where the Rat Swarm Optimizer (RSO) parameter tuning takes place to adjust the parameters involved in the FLNN model optimally. FLNN is a low computational interconnectivity higher cognitive neural network. There are still no hidden layers. FLNN’s input vector is operationally enlarged to produce non-linear remedies. More details can be accessed application of Nature-Inspired Method to Odia Written by hand Number system Recognition. To validate the improved DDoS detection performance of the proposed model, a benchmark dataset is used.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129001448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning CNN Framework for Detection and Classification of Internet Worms 网络蠕虫检测与分类的深度学习CNN框架
Pub Date : 2022-02-14 DOI: 10.1142/s0219265921440242
M. V. Rao, Divya Midhunchakkaravarthy, Sujatha Dandu
A worm is a standalone program, which is self-replicating malware that distributes itself to other computers and networks. An Internet worm can spread across the network and infect millions of computers in truly little time and the damages caused from such attacks are considered extremely high. In addition, these worms also affect the network packet and its performance, where the packets are analyzed by the signature-based intrusion detection system (IDS) and the network performance is analyzed by the NetFlow based IDS. Hence, this article proposes a joint detection of both the signature based and NetFlow based Internet worms using deep learning convolution neural network (DLCNN) with respect to various attacks and it can also prevent the suspicious actions of attackers (cyber-criminals). Additionally, it provides the security for users’ data maintenance, countermeasures, and controls the spreading of the internet worms. The effectiveness of proposed DLCNN model is evaluated using both packet capture (PCAP) and KDD-CUP-99 datasets. Finally, various quality metrics are employed to disclose the superiority of proposed DLCNN model as compared existing machine learning, and back propagated neural network models.
蠕虫是一种独立的程序,它是一种自我复制的恶意软件,可以将自己传播到其他计算机和网络上。互联网蠕虫可以在很短的时间内传播到整个网络并感染数百万台计算机,这种攻击造成的损害被认为是非常高的。此外,这些蠕虫还会影响网络数据包及其性能,其中基于签名的入侵检测系统(IDS)对数据包进行分析,基于NetFlow的入侵检测系统(IDS)对网络性能进行分析。因此,本文提出了一种基于签名和基于NetFlow的互联网蠕虫的联合检测方法,该方法使用深度学习卷积神经网络(DLCNN)对各种攻击进行联合检测,并且还可以防止攻击者(网络犯罪分子)的可疑行为。为用户的数据维护、防范提供安全保障,控制互联网蠕虫的传播。使用数据包捕获(PCAP)和KDD-CUP-99数据集评估了所提出的DLCNN模型的有效性。最后,采用各种质量指标来揭示所提出的DLCNN模型与现有机器学习和反向传播神经网络模型相比的优越性。
{"title":"Deep Learning CNN Framework for Detection and Classification of Internet Worms","authors":"M. V. Rao, Divya Midhunchakkaravarthy, Sujatha Dandu","doi":"10.1142/s0219265921440242","DOIUrl":"https://doi.org/10.1142/s0219265921440242","url":null,"abstract":"A worm is a standalone program, which is self-replicating malware that distributes itself to other computers and networks. An Internet worm can spread across the network and infect millions of computers in truly little time and the damages caused from such attacks are considered extremely high. In addition, these worms also affect the network packet and its performance, where the packets are analyzed by the signature-based intrusion detection system (IDS) and the network performance is analyzed by the NetFlow based IDS. Hence, this article proposes a joint detection of both the signature based and NetFlow based Internet worms using deep learning convolution neural network (DLCNN) with respect to various attacks and it can also prevent the suspicious actions of attackers (cyber-criminals). Additionally, it provides the security for users’ data maintenance, countermeasures, and controls the spreading of the internet worms. The effectiveness of proposed DLCNN model is evaluated using both packet capture (PCAP) and KDD-CUP-99 datasets. Finally, various quality metrics are employed to disclose the superiority of proposed DLCNN model as compared existing machine learning, and back propagated neural network models.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"38 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Project Cost Accounting Based on Internet of Things Technology 基于物联网技术的项目成本核算
Pub Date : 2022-02-14 DOI: 10.1142/s0219265921450122
Yi Jiang
In order to improve the effect of engineering cost accounting, this paper applies the Internet of Things technology to the engineering cost accounting system, and combines the chaotic data processing method with the Internet of Things technology. Moreover, this paper uses the Internet of Things technology to construct the engineering cost accounting system, uses the Internet of Things technology to collect various data in the real-time process of the project, and builds the engineering cost accounting system based on the actual situation. In addition, this paper combines improved intelligent algorithms to improve system performance to enable the system to collect data, manage data, process data, transmit data, and output data. It can be seen from the research results that the project cost evaluation system constructed in this paper is rated above good, which is higher than the existing project cost evaluation methods.The experimental research shows that the project cost accounting system based on the Internet of Things technology proposed in this paper has a good engineering data processing effect.
为了提高工程造价核算的效果,本文将物联网技术应用到工程造价核算系统中,将混沌数据处理方法与物联网技术相结合。此外,本文利用物联网技术构建工程造价核算体系,利用物联网技术采集项目实时过程中的各种数据,结合实际情况构建工程造价核算体系。此外,本文结合改进的智能算法,提高系统性能,使系统能够采集数据、管理数据、处理数据、传输数据、输出数据。从研究结果可以看出,本文构建的工程造价评价体系被评为“好”以上,高于现有的工程造价评价方法。实验研究表明,本文提出的基于物联网技术的工程造价核算系统具有良好的工程数据处理效果。
{"title":"Project Cost Accounting Based on Internet of Things Technology","authors":"Yi Jiang","doi":"10.1142/s0219265921450122","DOIUrl":"https://doi.org/10.1142/s0219265921450122","url":null,"abstract":"In order to improve the effect of engineering cost accounting, this paper applies the Internet of Things technology to the engineering cost accounting system, and combines the chaotic data processing method with the Internet of Things technology. Moreover, this paper uses the Internet of Things technology to construct the engineering cost accounting system, uses the Internet of Things technology to collect various data in the real-time process of the project, and builds the engineering cost accounting system based on the actual situation. In addition, this paper combines improved intelligent algorithms to improve system performance to enable the system to collect data, manage data, process data, transmit data, and output data. It can be seen from the research results that the project cost evaluation system constructed in this paper is rated above good, which is higher than the existing project cost evaluation methods.The experimental research shows that the project cost accounting system based on the Internet of Things technology proposed in this paper has a good engineering data processing effect.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124964560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving Energy Efficiency Using Optimized Energy Model Virtual Machine Algorithm in Cloud Computing 云计算中利用优化的能源模型虚拟机算法提高能源效率
Pub Date : 2022-02-14 DOI: 10.1142/s0219265921410334
S. Manjunatha, L. Suresh
Cloud computing is the emerging trend that provides a variety of applications to promote corporate business across the globe over the internet. Cloud computing offers services to deploy the infrastructure in the specified environment. Different computing techniques are used to manipulate the cloud services. One of the most eminent techniques is Virtual Machine (VM) Migration which enables to set up the compute resources and storages from one to another host without detaching the application or client. Virtual Machine Migration helpful in minimizing energy dissipation, load balancing, and fault management. It is based on the migration and down time with live and non-live categorization. Live VM Migration in data hubs has potential to minimize energy consumption. The proposed Optimized Energy Model Virtual Machine Algorithm is used to calculate each host in the data hub, while the energy consumed by the system in each hour is increasing exponentially then the proposed algorithm is also responsible for reorders the node and the minimizing the energy after reordering.
云计算是一种新兴趋势,它提供了各种应用程序,通过互联网在全球范围内促进公司业务。云计算提供在指定环境中部署基础设施的服务。不同的计算技术被用来操作云服务。最著名的技术之一是虚拟机(VM)迁移,它允许将计算资源和存储从一台主机设置到另一台主机,而无需分离应用程序或客户端。虚拟机迁移有助于最大限度地降低能耗、均衡负载和故障管理。它是基于迁移和停机时间与活动和非活动分类。数据中心中的实时虚拟机迁移具有最小化能耗的潜力。本文提出的优化能量模型虚拟机算法用于计算数据中心中的每个主机,当系统每小时消耗的能量呈指数增长时,本文提出的算法还负责对节点进行重新排序以及重新排序后的能量最小化。
{"title":"Improving Energy Efficiency Using Optimized Energy Model Virtual Machine Algorithm in Cloud Computing","authors":"S. Manjunatha, L. Suresh","doi":"10.1142/s0219265921410334","DOIUrl":"https://doi.org/10.1142/s0219265921410334","url":null,"abstract":"Cloud computing is the emerging trend that provides a variety of applications to promote corporate business across the globe over the internet. Cloud computing offers services to deploy the infrastructure in the specified environment. Different computing techniques are used to manipulate the cloud services. One of the most eminent techniques is Virtual Machine (VM) Migration which enables to set up the compute resources and storages from one to another host without detaching the application or client. Virtual Machine Migration helpful in minimizing energy dissipation, load balancing, and fault management. It is based on the migration and down time with live and non-live categorization. Live VM Migration in data hubs has potential to minimize energy consumption. The proposed Optimized Energy Model Virtual Machine Algorithm is used to calculate each host in the data hub, while the energy consumed by the system in each hour is increasing exponentially then the proposed algorithm is also responsible for reorders the node and the minimizing the energy after reordering.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Application of Computer Image Processing Technology in Painting Creation 计算机图像处理技术在绘画创作中的应用研究
Pub Date : 2022-02-10 DOI: 10.1142/s0219265921470204
Yuanjing Zhao, R. D. J. Samuel, Adhiyaman Manickam
The professional painting industry has experienced a dramatic breakthrough with the rapid expansion of computer science and technology. In the current digital era, digital painting art is extending the more significant creative space to add new content. Digital painting is the modern trend of mainstream painting presented to the public as a new generation of visual art. Creativity may show up, and new techniques of creating art can arise infinitely with the assistance of computer intelligence technology. This article explains how computer image processing is used in the production of art. The report offers a painting technique based on Image Rendering (IR), which does not rely on human expertise in the past, and a color image is turned into a photo with a painting effect automated. Image-based rendering is a novel way in which computer graphics and picture processing are drawn and combined with the requirement to build geometric models, get information from the input image simply by interpolating views, deforming images, and reconstructing the desired action. This article proposes the indirect use of picture processing technology and computer technology to produce oil painting. It will investigate the application of contemporary digital picture technology in order not only to maintain traditional tastes, and to keep pace with the pace of the times, to create traditional optimization.
随着计算机科学技术的迅速发展,专业绘画行业经历了一个戏剧性的突破。在当前的数字时代,数字绘画艺术正在延伸更有意义的创作空间,增加新的内容。数字绘画是主流绘画作为新一代视觉艺术呈现给大众的现代趋势。在计算机智能技术的帮助下,创造力可能会出现,创造艺术的新技术可能会无限地出现。这篇文章解释了计算机图像处理在艺术创作中的应用。该报告书提供了过去不依赖人类专业知识的“图像渲染(IR)”技术,将彩色图像自动转换为具有绘画效果的照片。基于图像的渲染是一种新颖的方法,它将计算机图形学和图像处理与建立几何模型的需求结合起来,通过插值视图、变形图像和重建所需的动作来从输入图像中获取信息。本文提出间接利用图像处理技术和计算机技术进行油画创作。它将探讨当代数字图像技术的应用,以便既保持传统的口味,又跟上时代的步伐,创造传统的优化。
{"title":"Research on the Application of Computer Image Processing Technology in Painting Creation","authors":"Yuanjing Zhao, R. D. J. Samuel, Adhiyaman Manickam","doi":"10.1142/s0219265921470204","DOIUrl":"https://doi.org/10.1142/s0219265921470204","url":null,"abstract":"The professional painting industry has experienced a dramatic breakthrough with the rapid expansion of computer science and technology. In the current digital era, digital painting art is extending the more significant creative space to add new content. Digital painting is the modern trend of mainstream painting presented to the public as a new generation of visual art. Creativity may show up, and new techniques of creating art can arise infinitely with the assistance of computer intelligence technology. This article explains how computer image processing is used in the production of art. The report offers a painting technique based on Image Rendering (IR), which does not rely on human expertise in the past, and a color image is turned into a photo with a painting effect automated. Image-based rendering is a novel way in which computer graphics and picture processing are drawn and combined with the requirement to build geometric models, get information from the input image simply by interpolating views, deforming images, and reconstructing the desired action. This article proposes the indirect use of picture processing technology and computer technology to produce oil painting. It will investigate the application of contemporary digital picture technology in order not only to maintain traditional tastes, and to keep pace with the pace of the times, to create traditional optimization.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121597527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Monitoring Method of Mechanical Joint Rotational Friction in Bench Press Training 卧推训练中机械关节旋转摩擦监测方法研究
Pub Date : 2022-02-10 DOI: 10.1142/s0219265921410176
Xie Yong, Qingliang Zhang, Ravindra Luhach, Muhammed Alshehri
Bench press training seems to be the most common exercise for increasing upper-body strength and control among athletes, fitness enthusiasts, and wellness buffs. Bench presses are usually done by lying down on the bench with the back, shoulders, and buttocks in touch. The bench press training surveillance systems with technical advancements are rarely seen in the research domain. Therefore, this paper presents a novel bench press training monitoring method (BPTMM) by evaluating mechanical joint rotational friction using Internet of Things (IoT) sensors. The bench press is a common upper body strength-building and muscle-building conditioning exercise. The bench press and the squat and deadlift are the three primary lifts performed in powerlifting competitions. Artificial intelligence aids in risk prediction and suggests possible positions. There is a 96.8% accuracy rate in surveillance and categorization, according to the findings of the experiments.
卧推训练似乎是运动员、健身爱好者和健康爱好者中最常见的增强上肢力量和控制力的运动。卧推通常是躺在长凳上,背部、肩膀和臀部相互接触。随着技术的进步,卧推训练监控系统在研究领域很少见到。因此,本文提出了一种利用物联网传感器评估机械关节旋转摩擦的新型卧推训练监测方法(BPTMM)。卧推是一种常见的上半身力量锻炼和肌肉锻炼。卧推、深蹲和硬举是力量举重比赛中的三个主要动作。人工智能有助于风险预测,并建议可能的立场。实验结果表明,监测和分类准确率为96.8%。
{"title":"Research on Monitoring Method of Mechanical Joint Rotational Friction in Bench Press Training","authors":"Xie Yong, Qingliang Zhang, Ravindra Luhach, Muhammed Alshehri","doi":"10.1142/s0219265921410176","DOIUrl":"https://doi.org/10.1142/s0219265921410176","url":null,"abstract":"Bench press training seems to be the most common exercise for increasing upper-body strength and control among athletes, fitness enthusiasts, and wellness buffs. Bench presses are usually done by lying down on the bench with the back, shoulders, and buttocks in touch. The bench press training surveillance systems with technical advancements are rarely seen in the research domain. Therefore, this paper presents a novel bench press training monitoring method (BPTMM) by evaluating mechanical joint rotational friction using Internet of Things (IoT) sensors. The bench press is a common upper body strength-building and muscle-building conditioning exercise. The bench press and the squat and deadlift are the three primary lifts performed in powerlifting competitions. Artificial intelligence aids in risk prediction and suggests possible positions. There is a 96.8% accuracy rate in surveillance and categorization, according to the findings of the experiments.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133786367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Hierarchical Dynamic Adjustment of Integrated Circuit Flow Based on Nonlinear Detection 基于非线性检测的集成电路流量分层动态调整研究
Pub Date : 2022-02-10 DOI: 10.1142/s0219265921480030
Lei Cheng, Lin Lu, J. Bhola, Ahmed Mateen Butter
In order to solve the problem that the test time is long and the test efficiency is affected in the process of IC test. With the increase in the complexity of integrated circuits, it is difficult now to diagnose the faults. To overcome this situation, there is a need to upgrade the test strategies. Based on the fault probability model, the order of test types and test vector is being adjusted. To improve the test efficiency, the high-quality test types and test vectors are loaded first, and the fault circuits are hit earlier. A hierarchical dynamic method for IC test flow is proposed. The Bayesian probability model was established by counting the failure rates of each test type and each test vector in the sample integrated circuit, and the loading sequence of each test vector was adjusted according to the probability of hitting the fault point. As the test progresses, the test data are collected constantly, the test failure rates of test type and test vector are dynamically updated, and the loading sequence of test type and test vector is adjusted synchronously. It is proved that the final circuit test time is reduced to 32.172s by the dynamic adjustment method, and the test time is reduced by 53.9%. The use of dynamically adjusted test process can find the fault circuit earlier, significantly reduce the test time of the fault circuit, and improve the test efficiency.
为了解决集成电路测试过程中测试时间长,影响测试效率的问题。随着集成电路复杂程度的不断提高,故障诊断变得越来越困难。为了克服这种情况,需要升级测试策略。基于故障概率模型,调整测试类型和测试向量的顺序。为了提高测试效率,首先加载高质量的测试类型和测试向量,并尽早命中故障电路。提出了一种集成电路测试流程的分层动态分析方法。通过统计样本集成电路中各测试类型和各测试向量的故障率,建立贝叶斯概率模型,并根据到达故障点的概率调整各测试向量的加载顺序。随着试验的进行,不断采集试验数据,动态更新试验类型和试验矢量的试验故障率,同步调整试验类型和试验矢量的加载顺序。实验证明,采用动态调整方法,最终电路测试时间缩短为32.172s,测试时间缩短53.9%。采用动态调整的测试过程可以更早地发现故障电路,显著缩短故障电路的测试时间,提高测试效率。
{"title":"Study on Hierarchical Dynamic Adjustment of Integrated Circuit Flow Based on Nonlinear Detection","authors":"Lei Cheng, Lin Lu, J. Bhola, Ahmed Mateen Butter","doi":"10.1142/s0219265921480030","DOIUrl":"https://doi.org/10.1142/s0219265921480030","url":null,"abstract":"In order to solve the problem that the test time is long and the test efficiency is affected in the process of IC test. With the increase in the complexity of integrated circuits, it is difficult now to diagnose the faults. To overcome this situation, there is a need to upgrade the test strategies. Based on the fault probability model, the order of test types and test vector is being adjusted. To improve the test efficiency, the high-quality test types and test vectors are loaded first, and the fault circuits are hit earlier. A hierarchical dynamic method for IC test flow is proposed. The Bayesian probability model was established by counting the failure rates of each test type and each test vector in the sample integrated circuit, and the loading sequence of each test vector was adjusted according to the probability of hitting the fault point. As the test progresses, the test data are collected constantly, the test failure rates of test type and test vector are dynamically updated, and the loading sequence of test type and test vector is adjusted synchronously. It is proved that the final circuit test time is reduced to 32.172s by the dynamic adjustment method, and the test time is reduced by 53.9%. The use of dynamically adjusted test process can find the fault circuit earlier, significantly reduce the test time of the fault circuit, and improve the test efficiency.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127650525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
J. Interconnect. Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1