首页 > 最新文献

2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)最新文献

英文 中文
The research on error concealment technique for internet video streaming 网络视频流错误隐藏技术的研究
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183999
Zhang Hongliang, Jiang Yuxiang
In this paper, it has summarized the error concealment techniques, and then it analyzed and researched the main algorithms of error concealment techniques, compared and contrasted these algorithms. Moreover, it also has described, analyzed and demonstrated the principle of GMM-based error concealment techniques. Finally, it prospected the future techniques of the error concealment.
本文对错误隐藏技术进行了总结,然后对错误隐藏技术的主要算法进行了分析和研究,并对这些算法进行了比较和对比。此外,还对基于gmm的错误隐藏技术的原理进行了描述、分析和论证。最后,对错误隐藏技术的发展前景进行了展望。
{"title":"The research on error concealment technique for internet video streaming","authors":"Zhang Hongliang, Jiang Yuxiang","doi":"10.1109/ICCIAUTOM.2011.6183999","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183999","url":null,"abstract":"In this paper, it has summarized the error concealment techniques, and then it analyzed and researched the main algorithms of error concealment techniques, compared and contrasted these algorithms. Moreover, it also has described, analyzed and demonstrated the principle of GMM-based error concealment techniques. Finally, it prospected the future techniques of the error concealment.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved algorithm of Apriori based on transaction compression 基于事务压缩的Apriori改进算法
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183988
Tang Jun-fang
In the data mining algorithm, Apriori algorithm is a classical algorithm of association rules. The paper proposed an improved algorithm based on classical Apriori algorithm analyzing. Through compressing transaction database, the improved algorithm record the same number of records by adding an attribute named count, and apply count to count the support of itemsets to increase efficiency and practical experience.
在数据挖掘算法中,Apriori算法是一种经典的关联规则算法。本文在经典Apriori算法分析的基础上提出了一种改进算法。改进算法通过对事务数据库进行压缩,增加一个名为count的属性来记录相同数量的记录,并利用count来计算项集的支持度,提高了效率和实践经验。
{"title":"An improved algorithm of Apriori based on transaction compression","authors":"Tang Jun-fang","doi":"10.1109/ICCIAUTOM.2011.6183988","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183988","url":null,"abstract":"In the data mining algorithm, Apriori algorithm is a classical algorithm of association rules. The paper proposed an improved algorithm based on classical Apriori algorithm analyzing. Through compressing transaction database, the improved algorithm record the same number of records by adding an attribute named count, and apply count to count the support of itemsets to increase efficiency and practical experience.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116668328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Automatic vulnerability mining with abstract interpretation and static taint trace 带有抽象解释和静态污点跟踪的自动漏洞挖掘
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183972
Xiaocong Wang, Fei Yan, Fan He
With the expansion of software scale, effective approaches for automatic vulnerability mining have been in badly needed. This paper presents a novel approach which can generate test cases of high pertinence and reachability. Unlike standard fuzzing techniques which explore the test space blindly, our approach utilizes abstract interpretation based on intervals to locate the Frail-Points of program which may cause buffer over-flow in some special conditions and the technique of static taint trace to build mappings between the Frail-Points and program inputs. Moreover, acquire path constraints of each Frail-Point through symbolic execution. Finally, combine information of mappings and path constraints to propose a policy for guiding test case generation.
随着软件规模的不断扩大,迫切需要有效的漏洞自动挖掘方法。本文提出了一种生成高针对性和高可达性测试用例的新方法。与标准模糊测试技术盲目地探索测试空间不同,我们的方法利用基于间隔的抽象解释来定位在某些特殊条件下可能导致缓冲区溢出的程序弱点,并利用静态污染跟踪技术建立弱点与程序输入之间的映射。此外,通过符号执行获取每个脆弱点的路径约束。最后,结合映射信息和路径约束,提出了指导测试用例生成的策略。
{"title":"Automatic vulnerability mining with abstract interpretation and static taint trace","authors":"Xiaocong Wang, Fei Yan, Fan He","doi":"10.1109/ICCIAUTOM.2011.6183972","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183972","url":null,"abstract":"With the expansion of software scale, effective approaches for automatic vulnerability mining have been in badly needed. This paper presents a novel approach which can generate test cases of high pertinence and reachability. Unlike standard fuzzing techniques which explore the test space blindly, our approach utilizes abstract interpretation based on intervals to locate the Frail-Points of program which may cause buffer over-flow in some special conditions and the technique of static taint trace to build mappings between the Frail-Points and program inputs. Moreover, acquire path constraints of each Frail-Point through symbolic execution. Finally, combine information of mappings and path constraints to propose a policy for guiding test case generation.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116680356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of measurement and display terminal in the central heating room and research of the charging method by indoor temperature measured 集中供暖室内测量显示终端的设计及室内测温计费方法的研究
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6184013
Zhang Wan-jiang, Yang Guang, Hou Jing
The paper explores a new method of the heating measurement and charging in the central heating system. The method is different from mechanical heat metering and ultrasonic heat metering existing now. However, by measuring the indoor temperature and recording the temperature periodically during the heating period, and upload the data which are measured and stored in the terminal to the PC for analyzing after the heating period. It can adjust the charging according to the actual indoor temperature which is recorded in the terminal. And regulate the quantity of heating in the next heating period according to the data. Finally not only can the system meet the requirements of the users in the heating period, but also achieve the building energy efficiency. Adhere to people-oriented principle. Make the service of heating become more and more humanized.
本文探讨了一种集中供热系统测热收费的新方法。该方法不同于现有的机械热计量和超声波热计量。但是,通过在采暖期间定期测量室内温度并记录温度,并在采暖期结束后将测量到的数据上传到PC机进行分析。可根据终端记录的室内实际温度调节充电。并根据数据调节下一个采暖期的采暖量。最终系统既能满足用户采暖期的使用要求,又能达到建筑节能的目的。坚持以人为本。使供暖服务越来越人性化。
{"title":"Design of measurement and display terminal in the central heating room and research of the charging method by indoor temperature measured","authors":"Zhang Wan-jiang, Yang Guang, Hou Jing","doi":"10.1109/ICCIAUTOM.2011.6184013","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184013","url":null,"abstract":"The paper explores a new method of the heating measurement and charging in the central heating system. The method is different from mechanical heat metering and ultrasonic heat metering existing now. However, by measuring the indoor temperature and recording the temperature periodically during the heating period, and upload the data which are measured and stored in the terminal to the PC for analyzing after the heating period. It can adjust the charging according to the actual indoor temperature which is recorded in the terminal. And regulate the quantity of heating in the next heating period according to the data. Finally not only can the system meet the requirements of the users in the heating period, but also achieve the building energy efficiency. Adhere to people-oriented principle. Make the service of heating become more and more humanized.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125145188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of bootloader for embedded system based on S3C44b0X 基于S3C44b0X的嵌入式系统引导程序的设计与实现
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183984
Guo Ying, Yu Zongzuo
The bootloader process is introduced based on the S3C44B0X processor, after the embedded system has powered on. With the file operating function in the file system, the bootloader program for translatable initializing code with convenient UI for embedded system and the load code is designed. The experiment proves that the method is stable and efficient.
介绍了嵌入式系统上电后,基于S3C44B0X处理器的引导加载过程。结合文件系统中的文件操作功能,设计了可翻译的、方便用户界面的嵌入式系统初始化代码引导加载程序和加载代码。实验证明,该方法稳定、高效。
{"title":"Design and implementation of bootloader for embedded system based on S3C44b0X","authors":"Guo Ying, Yu Zongzuo","doi":"10.1109/ICCIAUTOM.2011.6183984","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183984","url":null,"abstract":"The bootloader process is introduced based on the S3C44B0X processor, after the embedded system has powered on. With the file operating function in the file system, the bootloader program for translatable initializing code with convenient UI for embedded system and the load code is designed. The experiment proves that the method is stable and efficient.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A corrective method for image completion based on SPBP and SP 基于SPBP和SP的图像补全校正方法
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183925
Jingping Zhang, Yahong Han
In this paper a novel approach to image completion is introduced, which based on algorithm of Structure Priority Belief Propagation (SPBP) and Structure Propagation (SP). It is to use the user input line segment as auxiliary and use other one kind of distribution to source patches and destination patches. Namely in the auxiliary line source part which shows the belt-shaped discrete distribution, to destination patches which needs to complete, So each destination patch, which containing auxiliary line segment, is the similar overlap scheme for SPBP algorithm. The experimental results indicated that this optimized method surpasses the first two algorithms obviously in the image completion effect, and enhances the operation efficiency as well.
提出了一种基于结构优先信念传播(SPBP)和结构传播(SP)算法的图像补全方法。即以用户输入线段为辅助,对源补丁和目的补丁使用另一种分布。即在辅助线源部分呈现带状离散分布,到需要补全的目标补片,因此每个包含辅助线段的目标补片都是SPBP算法的类似重叠方案。实验结果表明,该优化方法在图像补全效果上明显优于前两种算法,同时提高了运算效率。
{"title":"A corrective method for image completion based on SPBP and SP","authors":"Jingping Zhang, Yahong Han","doi":"10.1109/ICCIAUTOM.2011.6183925","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183925","url":null,"abstract":"In this paper a novel approach to image completion is introduced, which based on algorithm of Structure Priority Belief Propagation (SPBP) and Structure Propagation (SP). It is to use the user input line segment as auxiliary and use other one kind of distribution to source patches and destination patches. Namely in the auxiliary line source part which shows the belt-shaped discrete distribution, to destination patches which needs to complete, So each destination patch, which containing auxiliary line segment, is the similar overlap scheme for SPBP algorithm. The experimental results indicated that this optimized method surpasses the first two algorithms obviously in the image completion effect, and enhances the operation efficiency as well.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on data recovery based on virtual machine technology 基于虚拟机技术的数据恢复研究
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183915
Liang Zhi-yong, Wang Yuan
As the popularity of computer popularization, data becomes more and more important in the information age. However computer users often have to face to the reality that the data is lost and damaged. This article will be based on virtual machine technology, testing and analyzing which one is more suitable for the people to use the data recovery software.
随着计算机的普及,数据在信息时代变得越来越重要。然而,计算机用户经常不得不面对数据丢失和损坏的现实。本文将基于虚拟机技术,测试分析哪一种更适合人们使用的数据恢复软件。
{"title":"Research on data recovery based on virtual machine technology","authors":"Liang Zhi-yong, Wang Yuan","doi":"10.1109/ICCIAUTOM.2011.6183915","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183915","url":null,"abstract":"As the popularity of computer popularization, data becomes more and more important in the information age. However computer users often have to face to the reality that the data is lost and damaged. This article will be based on virtual machine technology, testing and analyzing which one is more suitable for the people to use the data recovery software.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of VSP technology in the C37-6 well drilling VSP技术在C37-6井钻井中的应用
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183903
Min Xu, Rui Li, Jianku Sun, Kenan Liu, Hanyu Lu
With the seismic prospecting developing into the complex and difficulty area, it is highly requested for structure interpretation. Calibration of horizon by the normal AC log usually can't correspond with through-well seismic profile, especially in the complex aloft-steep structure whose transverse velocity changes greatly, it is very easy to cause underground structure distort. It can exactly calibrate horizon of complex aloft-steep structure, confirm structural feature and location of fault point by the multi-azimuth VSP technology. The article illustrate the significance of technology in the objective argumentation of complex structure loss well sidetrack drilling through analysis the successfully application of C37-6 well area in the LW buried structure in East SiChuan basin.
随着地震勘探向复杂、困难地区发展,对构造解释提出了更高的要求。常规交流测井标定的层位通常不能与井内地震剖面相对应,特别是在横向速度变化较大的复杂高陡构造中,很容易造成地下构造变形。利用多方位VSP技术,可以精确标定复杂高陡构造的层位,确定构造特征和断层点位置。通过对川东LW隐伏构造C37-6井区成功应用的分析,说明了技术在复杂构造损失井侧钻客观论证中的重要意义。
{"title":"Application of VSP technology in the C37-6 well drilling","authors":"Min Xu, Rui Li, Jianku Sun, Kenan Liu, Hanyu Lu","doi":"10.1109/ICCIAUTOM.2011.6183903","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183903","url":null,"abstract":"With the seismic prospecting developing into the complex and difficulty area, it is highly requested for structure interpretation. Calibration of horizon by the normal AC log usually can't correspond with through-well seismic profile, especially in the complex aloft-steep structure whose transverse velocity changes greatly, it is very easy to cause underground structure distort. It can exactly calibrate horizon of complex aloft-steep structure, confirm structural feature and location of fault point by the multi-azimuth VSP technology. The article illustrate the significance of technology in the objective argumentation of complex structure loss well sidetrack drilling through analysis the successfully application of C37-6 well area in the LW buried structure in East SiChuan basin.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"77 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116359160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PCFuzzing: A penetration combinatorial fuzzing framework by simulating attack trace PCFuzzing:一种模拟攻击轨迹的渗透组合模糊测试框架
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6184020
Jian Yang, Huanguo Zhang, Jianming Fu, Fan Yang
In essence, fuzzing is a kind of penetration testing by injecting fault to simulate the attacks. However, current fuzzings do not simulate the attacks in a real sense. They pay more attention to the injection of malformed semi-valid data at a single input point. Nevertheless, an attack is usually a set of cooperative aggressive behaviors at multi input points. In this paper, we present PCFuzzing, a penetration combinatorial fuzzing framework for the software in host environment by simulating attack trace at multi input points. Based on the attack attributes plug-in gained by means of static analysis in advance, PCFuzzing uses dynamic taint tracing to automatically find the input vector that influence values used at key program attack points (points where the program may contain an error), uses symbolic execution and constraint solving to identify the constraint boundary of every input in input vector and constraint relationship of the inputs in input vector, uses combinatorial testing strategies to generate and combine the malformed test case vector, and then injects the combinatorial test case vector to find security vulnerabilities in programs according to the attack strategies in the attack attributes plug-in. Our experimental results indicate that our PCFuzzing can not only effectively expose errors located deep within large applications, but also can avoid the combination explosion to a certain extent because taint tracer in framework uses dynamic taint tracing to reduce the number of inputs involved in the combination and constraint collector in framework uses symbolic execution and constraint solving to narrow the value ranges of input data.
从本质上讲,模糊测试是一种通过注入故障来模拟攻击的渗透测试。然而,目前的模糊测试并不能模拟真正意义上的攻击。它们更注重在单个输入点注入畸形的半有效数据。然而,攻击通常是一组多输入点的合作攻击行为。本文通过模拟多输入点的攻击轨迹,提出了一种针对主机环境下软件的渗透组合模糊测试框架PCFuzzing。PCFuzzing基于事先通过静态分析获得的攻击属性插件,采用动态污点跟踪的方法自动查找影响值在程序关键攻击点(程序可能包含错误的点)所使用的输入向量,采用符号执行和约束求解的方法识别输入向量中每个输入的约束边界和输入向量中输入的约束关系;使用组合测试策略生成并组合畸形测试用例向量,然后根据攻击属性插件中的攻击策略注入组合测试用例向量来发现程序中的安全漏洞。我们的实验结果表明,我们的PCFuzzing不仅可以有效地暴露大型应用程序中深层的错误,而且可以在一定程度上避免组合爆炸,因为框架中的污点跟踪器使用动态污点跟踪来减少组合中涉及的输入数量,框架中的约束收集器使用符号执行和约束求解来缩小输入数据的值范围。
{"title":"PCFuzzing: A penetration combinatorial fuzzing framework by simulating attack trace","authors":"Jian Yang, Huanguo Zhang, Jianming Fu, Fan Yang","doi":"10.1109/ICCIAUTOM.2011.6184020","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184020","url":null,"abstract":"In essence, fuzzing is a kind of penetration testing by injecting fault to simulate the attacks. However, current fuzzings do not simulate the attacks in a real sense. They pay more attention to the injection of malformed semi-valid data at a single input point. Nevertheless, an attack is usually a set of cooperative aggressive behaviors at multi input points. In this paper, we present PCFuzzing, a penetration combinatorial fuzzing framework for the software in host environment by simulating attack trace at multi input points. Based on the attack attributes plug-in gained by means of static analysis in advance, PCFuzzing uses dynamic taint tracing to automatically find the input vector that influence values used at key program attack points (points where the program may contain an error), uses symbolic execution and constraint solving to identify the constraint boundary of every input in input vector and constraint relationship of the inputs in input vector, uses combinatorial testing strategies to generate and combine the malformed test case vector, and then injects the combinatorial test case vector to find security vulnerabilities in programs according to the attack strategies in the attack attributes plug-in. Our experimental results indicate that our PCFuzzing can not only effectively expose errors located deep within large applications, but also can avoid the combination explosion to a certain extent because taint tracer in framework uses dynamic taint tracing to reduce the number of inputs involved in the combination and constraint collector in framework uses symbolic execution and constraint solving to narrow the value ranges of input data.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116517511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity evaluation for dynamic route based on maximum flow in network theory 网络理论中基于最大流量的动态路由容量评价
Pub Date : 2011-12-01 DOI: 10.1109/ICCIAUTOM.2011.6183932
Y. Guohui, Dai Fu-qing
This paper has researched the capacity evaluation of dynamic route. In the evaluation process, take the original routes as a factor and establish the capacity evaluation model for dynamic route based on maximum flow in network theory. Finally, a example proves that the model is reasonable and availability. The research result shows that the capacity of dynamic route will be restricted by the original routes in the network, while we open a dynamic route in the original airspace.
本文对动态路线的容量评价进行了研究。在评价过程中,以原有路线为因素,建立了网络理论中基于最大流量的动态路线容量评价模型。最后通过实例验证了该模型的合理性和有效性。研究结果表明,当我们在原有空域中开辟一条动态航线时,动态航线的容量会受到网络中原有航线的限制。
{"title":"Capacity evaluation for dynamic route based on maximum flow in network theory","authors":"Y. Guohui, Dai Fu-qing","doi":"10.1109/ICCIAUTOM.2011.6183932","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183932","url":null,"abstract":"This paper has researched the capacity evaluation of dynamic route. In the evaluation process, take the original routes as a factor and establish the capacity evaluation model for dynamic route based on maximum flow in network theory. Finally, a example proves that the model is reasonable and availability. The research result shows that the capacity of dynamic route will be restricted by the original routes in the network, while we open a dynamic route in the original airspace.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124327438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1