首页 > 最新文献

2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)最新文献

英文 中文
Image edge detection scheme using wavelet transform 基于小波变换的图像边缘检测方案
K. Kumar, Nadir Mustafa, Jian-ping Li, R. Shaikh, Saeed Ahmed Khan, Asif Khan
The Wavelet Transform remained quite rapidly used technique today for analysing the signals. For image edge detection, wavelet transform provides facility to select the size of the image details that will be detected. Wavelets transform separates the lower frequencies and higher frequencies easily, which is prime important for edge detection. The wavelet scale sets the size of detected edges. For discrete wavelet transform, many signals are passed through wavelet filter for choice of the scale. For 2-D image, wavelet analysis is carried out in terms of horizontal and vertical function and edges are detected separately. In this paper the Daubachies wavelet transform has been used, where 2-D image is decomposed at three levels and at each level lower and higher frequencies have been separated. As Daubachies wavelet gives appropriate edge at three levels for black and white image along with some ghost edges. Some threshold has been used to cater these ghost edges. For edges detection in an image, a MATLAB code have been developed, which tests the two-dimensional scene. Two dimensional image objects have been investigated. The intention was to test 2D images by using wavelet transform of real objects.
时至今日,小波变换仍然是一种快速应用于信号分析的技术。对于图像边缘检测,小波变换为选择要检测的图像细节的大小提供了便利。小波变换能很容易地分离低频和高频,这对边缘检测非常重要。小波尺度设置检测边缘的大小。对于离散小波变换,许多信号都要经过小波滤波器来选择尺度。对于二维图像,分别按照水平函数和垂直函数进行小波分析,并分别检测边缘。本文采用了Daubachies小波变换,对二维图像进行三层分解,并在每一层分离出低频和高频。随着Daubachies小波给出适当的边缘在三个层次的黑白图像以及一些鬼边。一些阈值已经被用来迎合这些幽灵边缘。对于图像中的边缘检测,开发了MATLAB代码,用于测试二维场景。研究了二维图像对象。目的是利用真实物体的小波变换对二维图像进行测试。
{"title":"Image edge detection scheme using wavelet transform","authors":"K. Kumar, Nadir Mustafa, Jian-ping Li, R. Shaikh, Saeed Ahmed Khan, Asif Khan","doi":"10.1109/ICCWAMTIP.2014.7073404","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073404","url":null,"abstract":"The Wavelet Transform remained quite rapidly used technique today for analysing the signals. For image edge detection, wavelet transform provides facility to select the size of the image details that will be detected. Wavelets transform separates the lower frequencies and higher frequencies easily, which is prime important for edge detection. The wavelet scale sets the size of detected edges. For discrete wavelet transform, many signals are passed through wavelet filter for choice of the scale. For 2-D image, wavelet analysis is carried out in terms of horizontal and vertical function and edges are detected separately. In this paper the Daubachies wavelet transform has been used, where 2-D image is decomposed at three levels and at each level lower and higher frequencies have been separated. As Daubachies wavelet gives appropriate edge at three levels for black and white image along with some ghost edges. Some threshold has been used to cater these ghost edges. For edges detection in an image, a MATLAB code have been developed, which tests the two-dimensional scene. Two dimensional image objects have been investigated. The intention was to test 2D images by using wavelet transform of real objects.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129694737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A fast algorithm of compressed sensing 一种快速的压缩感知算法
Hao Liu, Yuehao Yan, Junhai Wang
After studying the compressed sensing theory and its main reconstruction algorithm-Matching Pursuit (MP) algorithm, this paper proposes a new approach to improve the speed of MP algorithm, and it describes how to build a Beowulf parallel computing system with 8 PCs. Its parallel computations is implemented by Message-Passing-Interface(MPI), and a 100Mb/s high speed Ethernet network interconnects all PCs. Test is made using parallel computing program to measure the parallel efficiency of the system, results show that this approach can reduce the MP algorithm computing time-cost form 78 minutes with a PC to 11 minutes with 8 PCs.
在研究压缩感知理论及其主要重构算法——匹配追踪(MP)算法的基础上,提出了一种提高MP算法速度的新方法,并描述了如何构建一个8台pc机的贝奥武夫并行计算系统。它的并行计算是通过消息传递接口(MPI)实现的,一个100Mb/s的高速以太网连接了所有的pc机。利用并行计算程序进行测试,测量系统的并行效率,结果表明,该方法可以将MP算法的计算时间成本从一台PC机的78分钟降低到8台PC机的11分钟。
{"title":"A fast algorithm of compressed sensing","authors":"Hao Liu, Yuehao Yan, Junhai Wang","doi":"10.1109/ICCWAMTIP.2014.7073450","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073450","url":null,"abstract":"After studying the compressed sensing theory and its main reconstruction algorithm-Matching Pursuit (MP) algorithm, this paper proposes a new approach to improve the speed of MP algorithm, and it describes how to build a Beowulf parallel computing system with 8 PCs. Its parallel computations is implemented by Message-Passing-Interface(MPI), and a 100Mb/s high speed Ethernet network interconnects all PCs. Test is made using parallel computing program to measure the parallel efficiency of the system, results show that this approach can reduce the MP algorithm computing time-cost form 78 minutes with a PC to 11 minutes with 8 PCs.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117193675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Target tracking in internet of things based on sensing subtraction and compressed sensing 基于感知减法和压缩感知的物联网目标跟踪
X. Lu, Liangyan Cheng
A target tracking algorithm based on compressed sensing and sensing subtraction was proposed in this paper. We presented the concept of sensing subtraction, combined sensing subtraction and compressed sensing, sparsely sampled the distributed sensing information in Internet of Things (IoT), and reconstructed sensing subtraction matrix by compressed sensing theory, and then located and tracked moving target by sensing subtraction method. Simulation results show that the proposed algorithm recovers sensing data well, and the sparse sampling strategy reduces network communication traffic and improves the energy-efficiency of system.
提出了一种基于压缩感知和感知减法的目标跟踪算法。提出了感知减法的概念,将感知减法与压缩感知相结合,对物联网中的分布式感知信息进行稀疏采样,利用压缩感知理论重构感知减法矩阵,利用感知减法对运动目标进行定位和跟踪。仿真结果表明,该算法能较好地恢复感知数据,稀疏采样策略减少了网络通信流量,提高了系统的能效。
{"title":"Target tracking in internet of things based on sensing subtraction and compressed sensing","authors":"X. Lu, Liangyan Cheng","doi":"10.1109/ICCWAMTIP.2014.7073388","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073388","url":null,"abstract":"A target tracking algorithm based on compressed sensing and sensing subtraction was proposed in this paper. We presented the concept of sensing subtraction, combined sensing subtraction and compressed sensing, sparsely sampled the distributed sensing information in Internet of Things (IoT), and reconstructed sensing subtraction matrix by compressed sensing theory, and then located and tracked moving target by sensing subtraction method. Simulation results show that the proposed algorithm recovers sensing data well, and the sparse sampling strategy reduces network communication traffic and improves the energy-efficiency of system.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115485204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of CMA-base blind equalizer on FPGA 基于cma的盲均衡器的FPGA实现
Quan Wang, Ping Li, Rongbin Liu, Jian-Pin Li
In PCM/FM remote sensing receiving system, when the bit rate is above 1Mbps, the signal suffers frequency select fading, which causes the serious inter-symbol interference (ISI); power allowance can no longer guarantee the system quota. Besides signal reflection such as buildings, ground, mountains and atmospheric refraction eventually become the multipath interference signals. Thus an adaptive filter is needed for equalization before the sample-decision detector in the receiver [1]. The traditional method is based on training sequence channel equalization. However, considering to these two problems, two issues are discussed in this dissertation: blind equalization based on the adaptive filter theory; the realization of blind equalizer on FPGA.
在PCM/FM遥感接收系统中,当比特率超过1Mbps时,信号会发生频率选择衰落,造成严重的码间干扰(ISI);电量补贴已不能保证系统配额。除了信号反射外,建筑物、地面、山脉和大气的折射最终都会成为多径干扰信号。因此,在接收机中的采样判决检测器之前,需要一个自适应滤波器进行均衡[1]。传统的方法是基于训练序列信道均衡。针对这两个问题,本文主要研究了基于自适应滤波理论的盲均衡问题;在FPGA上实现盲均衡器。
{"title":"Implementation of CMA-base blind equalizer on FPGA","authors":"Quan Wang, Ping Li, Rongbin Liu, Jian-Pin Li","doi":"10.1109/ICCWAMTIP.2014.7073430","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073430","url":null,"abstract":"In PCM/FM remote sensing receiving system, when the bit rate is above 1Mbps, the signal suffers frequency select fading, which causes the serious inter-symbol interference (ISI); power allowance can no longer guarantee the system quota. Besides signal reflection such as buildings, ground, mountains and atmospheric refraction eventually become the multipath interference signals. Thus an adaptive filter is needed for equalization before the sample-decision detector in the receiver [1]. The traditional method is based on training sequence channel equalization. However, considering to these two problems, two issues are discussed in this dissertation: blind equalization based on the adaptive filter theory; the realization of blind equalizer on FPGA.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130827203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A group attack detecter for collaborative filtering recommendation 协同过滤推荐的组攻击检测器
Qing-xian Wang, Yan Ren, Neng-Qiang He, Meng Wan, Guo-Bo Lu
Collaborative filtering recommender systems are now popular both commercially and in the research community. However, they are vulnerable to manipulation by malicious users, where attackers inject into some fake user profiles in order to bias the recommendation results to their benefits. To solve the problem, a lots of methods have been proposed but mainly focus on identification the attacker at the individual level, i.e., to find the fake user one by one, while do not consider the similarity between attack users. In this paper, we present an algorithm to detect the attackers in group level. It works based on an effective algorithm for detecting individual malicious user and an effective clustering algorithm. More precisely, we cluster all users into group, and then find the group characters of attacked items, finally we find the attack user group. We test the algorithm on a benchmark dataset using four kinds of typical attack models, the results show that our solution is both efficient and effective, particularly in the popular attack model and the segment attack model, and the performance is significant in the segment attack model with large attack size.
协同过滤推荐系统现在在商业和研究社区都很流行。然而,他们很容易受到恶意用户的操纵,攻击者注入一些虚假的用户配置文件,以便使推荐结果偏向于他们的利益。为了解决这个问题,已经提出了很多方法,但主要集中在个人层面上识别攻击者,即逐个发现假用户,而没有考虑攻击用户之间的相似性。本文提出了一种在组级检测攻击者的算法。它基于一种有效的检测单个恶意用户的算法和一种有效的聚类算法。更准确地说,我们将所有用户聚类成组,然后找到被攻击物品的组特征,最后找到被攻击的用户组。在四种典型攻击模型的基准数据集上对算法进行了测试,结果表明,该算法在流行攻击模型和分段攻击模型中都是高效有效的,在攻击规模较大的分段攻击模型中性能显著。
{"title":"A group attack detecter for collaborative filtering recommendation","authors":"Qing-xian Wang, Yan Ren, Neng-Qiang He, Meng Wan, Guo-Bo Lu","doi":"10.1109/ICCWAMTIP.2014.7073448","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073448","url":null,"abstract":"Collaborative filtering recommender systems are now popular both commercially and in the research community. However, they are vulnerable to manipulation by malicious users, where attackers inject into some fake user profiles in order to bias the recommendation results to their benefits. To solve the problem, a lots of methods have been proposed but mainly focus on identification the attacker at the individual level, i.e., to find the fake user one by one, while do not consider the similarity between attack users. In this paper, we present an algorithm to detect the attackers in group level. It works based on an effective algorithm for detecting individual malicious user and an effective clustering algorithm. More precisely, we cluster all users into group, and then find the group characters of attacked items, finally we find the attack user group. We test the algorithm on a benchmark dataset using four kinds of typical attack models, the results show that our solution is both efficient and effective, particularly in the popular attack model and the segment attack model, and the performance is significant in the segment attack model with large attack size.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113976522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mining consumer's opinion target based on translation model and word representation 基于翻译模型和词表示的消费者意见目标挖掘
Dongyu Li, Guang Chen, Yan Li, Weiran Xu
In recent years, the E-commercial plays an important role in people's daily life. When on the Internet, people often buy commodities from Taobao, Tmall and make comments on them, the comments of the goods may have closely connections with commercial value, which often reflect what's the consumers really care when they choose one piece of good among thousands of other similar ones. How to mining these aspects which the consumers really concern is a problem left unsolved. As a potential effective solution to construct structured information for people's preference, Information Extraction(IE) has attracted more and more scholar's attention. A meaningful research area is Opinion Target Extraction(OTE). This paper proposed a system using translation model as well as word representation method to obtain user's interests on dataset in Chinese. To release the word segmentation error, a finely generated system with new Chinese word detection module is proposed. The experiments on two corpus subjected on digital product verify the effective of our method.
近年来,电子商务在人们的日常生活中扮演着重要的角色。在互联网上,人们经常在淘宝、天猫上购买商品并对其进行评论,这些评论可能与商品的商业价值密切相关,这往往反映了消费者在成千上万的同类商品中选择一件商品时真正关心的是什么。如何挖掘消费者真正关心的这些方面是一个尚未解决的问题。信息抽取(information Extraction, IE)作为一种潜在的针对人们偏好构建结构化信息的有效解决方案,受到了越来越多学者的关注。一个有意义的研究领域是意见目标提取(OTE)。本文提出了一种利用翻译模型和词表示方法来获取用户对中文数据集兴趣的系统。为了消除分词误差,提出了一种带有中文词检测模块的精细生成系统。在数字产品的两个语料库上进行了实验,验证了该方法的有效性。
{"title":"Mining consumer's opinion target based on translation model and word representation","authors":"Dongyu Li, Guang Chen, Yan Li, Weiran Xu","doi":"10.1109/ICCWAMTIP.2014.7073369","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073369","url":null,"abstract":"In recent years, the E-commercial plays an important role in people's daily life. When on the Internet, people often buy commodities from Taobao, Tmall and make comments on them, the comments of the goods may have closely connections with commercial value, which often reflect what's the consumers really care when they choose one piece of good among thousands of other similar ones. How to mining these aspects which the consumers really concern is a problem left unsolved. As a potential effective solution to construct structured information for people's preference, Information Extraction(IE) has attracted more and more scholar's attention. A meaningful research area is Opinion Target Extraction(OTE). This paper proposed a system using translation model as well as word representation method to obtain user's interests on dataset in Chinese. To release the word segmentation error, a finely generated system with new Chinese word detection module is proposed. The experiments on two corpus subjected on digital product verify the effective of our method.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The research and implementation of cloud computing platform based on docker 基于docker的云计算平台的研究与实现
D. Liu, L. Zhao
Cloud computing is now leading-edge Internet technology and virtualization technology is one of the important part of cloud computing system. Virtualization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Docker is a new type of virtualization technology. In this paper, through an application instance, we will describe docker's applications and advantages in the cloud Computing.
云计算是当今互联网的前沿技术,虚拟化技术是云计算系统的重要组成部分之一。在计算领域,虚拟化指的是创建某种东西的虚拟(而不是实际)版本的行为,包括但不限于虚拟计算机硬件平台、操作系统、存储设备或计算机网络资源。Docker是一种新型的虚拟化技术。本文将通过一个应用实例来描述docker在云计算中的应用和优势。
{"title":"The research and implementation of cloud computing platform based on docker","authors":"D. Liu, L. Zhao","doi":"10.1109/ICCWAMTIP.2014.7073453","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073453","url":null,"abstract":"Cloud computing is now leading-edge Internet technology and virtualization technology is one of the important part of cloud computing system. Virtualization, in computing, refers to the act of creating a virtual (rather than actual) version of something, including but not limited to a virtual computer hardware platform, operating system (OS), storage device, or computer network resources. Docker is a new type of virtualization technology. In this paper, through an application instance, we will describe docker's applications and advantages in the cloud Computing.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122182288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Contemporary integration of content based image retrieval 基于内容的图像检索的当代集成
R. Shaikh, S. Deep, Jian-ping Li, K. Kumar, Asif Khan, I. Memon
Content Based Image Retrieval (CBIR) has been a challenging research area among researchers of both industries and academic institutions. Human can judge and respond by memory to obtain and locate the target image and relate it by specific object, but for computer vision it's a challenging issue to retrieve image from complex database that is difficult to balance with an efficient algorithm. Simultaneous situation and complex object has been always a big challenge to retrieve an object from image or query image from database. In this paper, we propose to combine Neural Network to sense a specific objective image that is content based and easily retrieving from complex database.
基于内容的图像检索(CBIR)一直是一个具有挑战性的研究领域。人类可以通过记忆判断和响应来获取和定位目标图像,并将其与特定对象联系起来,但对于计算机视觉来说,从复杂的数据库中检索图像是一个具有挑战性的问题,难以用高效的算法来平衡。同时存在的情况和复杂的对象,从图像中检索对象或从数据库中查询图像一直是一个很大的挑战。在本文中,我们提出结合神经网络来感知特定的客观图像,该图像是基于内容的,并且易于从复杂的数据库中检索。
{"title":"Contemporary integration of content based image retrieval","authors":"R. Shaikh, S. Deep, Jian-ping Li, K. Kumar, Asif Khan, I. Memon","doi":"10.1109/ICCWAMTIP.2014.7073413","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073413","url":null,"abstract":"Content Based Image Retrieval (CBIR) has been a challenging research area among researchers of both industries and academic institutions. Human can judge and respond by memory to obtain and locate the target image and relate it by specific object, but for computer vision it's a challenging issue to retrieve image from complex database that is difficult to balance with an efficient algorithm. Simultaneous situation and complex object has been always a big challenge to retrieve an object from image or query image from database. In this paper, we propose to combine Neural Network to sense a specific objective image that is content based and easily retrieving from complex database.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129797635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Message transport system of distributed stream computing 分布式流计算的消息传输系统
D. Liu, Dong Pan
In stream computing system, a very important part is the message transport subsystem. This article describes a lightweighted message transport system coded by nodejs. It could be used to build message flows in various ways flexible.
在流计算系统中,消息传输子系统是一个非常重要的组成部分。本文描述了一个由nodejs编码的轻量级消息传输系统。它可用于以各种灵活的方式构建消息流。
{"title":"Message transport system of distributed stream computing","authors":"D. Liu, Dong Pan","doi":"10.1109/ICCWAMTIP.2014.7073455","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073455","url":null,"abstract":"In stream computing system, a very important part is the message transport subsystem. This article describes a lightweighted message transport system coded by nodejs. It could be used to build message flows in various ways flexible.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of delay risk factors for the delivery of suppliers based on association rules 基于关联规则的供应商交货延迟风险因素分析
Fan Zhang, Fajie Wei, S. Tian
With the order production model prevalent in the enterprise, the delivery delays of supplier occur frequently. The delay risk of supplier in delivery will cause bad effect on enterprises to fulfill customers' orders. Based on the procurement data of the enterprise ERP system, this paper identifies delay risk factors of supplier in delivery and get the relationship between the delay risk factors and the delay degree with data mining method. The conclusions can help the enterprise select suppliers more reasonable and mitigate delay risk more effective.
随着订单生产模式在企业中的盛行,供应商的交货延迟频繁发生。供应商的交货延迟风险会对企业完成客户订单造成不良影响。基于企业ERP系统的采购数据,识别供应商在交货中的延迟风险因素,利用数据挖掘方法得到延迟风险因素与延迟程度之间的关系。研究结论可以帮助企业更合理地选择供应商,更有效地降低延迟风险。
{"title":"Analysis of delay risk factors for the delivery of suppliers based on association rules","authors":"Fan Zhang, Fajie Wei, S. Tian","doi":"10.1109/ICCWAMTIP.2014.7073423","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073423","url":null,"abstract":"With the order production model prevalent in the enterprise, the delivery delays of supplier occur frequently. The delay risk of supplier in delivery will cause bad effect on enterprises to fulfill customers' orders. Based on the procurement data of the enterprise ERP system, this paper identifies delay risk factors of supplier in delivery and get the relationship between the delay risk factors and the delay degree with data mining method. The conclusions can help the enterprise select suppliers more reasonable and mitigate delay risk more effective.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1