首页 > 最新文献

Tenth International Conference on Computer Modeling and Simulation (uksim 2008)最新文献

英文 中文
Punjabi Dialects Conversion System for Majhi, Malwai and Doabi Dialects 旁遮普方言Majhi, Malwai和Doabi方言转换系统
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3036339
A. Kaur, Parminder Singh, K. Kaur
In today's modern era of technology, more number of people use internet for the purpose of expressing their opinions, thoughts and ideas through social media as well as articles. This leads to increased informal text available for public access. Such text may also be available in different dialectal forms of the specific language and may attract natives of that region. Moreover, literature, local news, articles, etc. written in a particular dialectal form of language is more expressive. For this purpose, dialect conversion systems plays vital role. This paper describes the dialect conversion system for Punjabi language that converts input text to either of three Punjabi dialects namely Majhi, Malwai and Doabi. A rule based approach is adopted for defining the conversion rules and bilingual dictionary is also used for this purpose.
在今天的现代科技时代,越来越多的人使用互联网,目的是通过社交媒体和文章来表达他们的观点、想法和想法。这导致可供公众查阅的非正式文本增加。这种文本也可能以特定语言的不同方言形式提供,并可能吸引该地区的当地人。此外,用某种方言语言书写的文学作品、地方新闻、文章等更具表现力。为此,方言转换系统起着至关重要的作用。本文描述了旁遮普语的方言转换系统,该系统将输入文本转换为旁遮普语的三种方言,即Majhi, Malwai和Doabi。采用基于规则的方法定义转换规则,并为此使用双语词典。
{"title":"Punjabi Dialects Conversion System for Majhi, Malwai and Doabi Dialects","authors":"A. Kaur, Parminder Singh, K. Kaur","doi":"10.1145/3036331.3036339","DOIUrl":"https://doi.org/10.1145/3036331.3036339","url":null,"abstract":"In today's modern era of technology, more number of people use internet for the purpose of expressing their opinions, thoughts and ideas through social media as well as articles. This leads to increased informal text available for public access. Such text may also be available in different dialectal forms of the specific language and may attract natives of that region. Moreover, literature, local news, articles, etc. written in a particular dialectal form of language is more expressive. For this purpose, dialect conversion systems plays vital role. This paper describes the dialect conversion system for Punjabi language that converts input text to either of three Punjabi dialects namely Majhi, Malwai and Doabi. A rule based approach is adopted for defining the conversion rules and bilingual dictionary is also used for this purpose.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"1 1","pages":"125-128"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79326795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Model Design for Agent-based Simulation 基于agent的仿真模型设计
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3036335
H. Veeke, J. Ottjes, Lodewijks Lodewijks
This paper describes the complete modelling process for simulation, starting with the identification of agents and ending with a clear and unambiguous description of their behaviour that can be easily translated into each process-oriented simulation platform. It focuses on the definition of agents, a subject which is described rarely. Agents usually "are there", emerging from the things one can see. Defining agents however, determines completely the range and content of a simulation and is not a trivial case. After a deliberate definition of the agents, a natural way to describe their behaviour is presented. These behaviour descriptions match the real process interaction approach. The described method is developed for educational reasons in order to teach discrete event simulation in a non-mathematical way, but is rather complete, coherent and well-defined.
本文描述了仿真的完整建模过程,从识别代理开始,以对其行为的清晰而明确的描述结束,这些描述可以很容易地转化为每个面向过程的仿真平台。它侧重于agent的定义,这是一个很少被描述的主题。代理人通常“就在那里”,从人们能看到的事物中浮现出来。然而,定义代理完全决定了模拟的范围和内容,这不是一个微不足道的例子。在对代理进行深思熟虑的定义之后,提出了描述其行为的自然方法。这些行为描述与实际流程交互方法相匹配。所描述的方法是为了教育目的而开发的,以便以非数学的方式教授离散事件模拟,但相当完整,连贯和定义良好。
{"title":"Model Design for Agent-based Simulation","authors":"H. Veeke, J. Ottjes, Lodewijks Lodewijks","doi":"10.1145/3036331.3036335","DOIUrl":"https://doi.org/10.1145/3036331.3036335","url":null,"abstract":"This paper describes the complete modelling process for simulation, starting with the identification of agents and ending with a clear and unambiguous description of their behaviour that can be easily translated into each process-oriented simulation platform. It focuses on the definition of agents, a subject which is described rarely. Agents usually \"are there\", emerging from the things one can see. Defining agents however, determines completely the range and content of a simulation and is not a trivial case. After a deliberate definition of the agents, a natural way to describe their behaviour is presented. These behaviour descriptions match the real process interaction approach. The described method is developed for educational reasons in order to teach discrete event simulation in a non-mathematical way, but is rather complete, coherent and well-defined.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"22 1","pages":"42-46"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89442059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NS-2 Simulation of VANET for Safety Applications: Issues and Solutions 安全应用VANET的NS-2模拟:问题和解决方案
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3036349
Jingyu Li, Yunan Zhang, Jing Zhao, Yanbin Wang, Xiaomin Ma, Wei Wu
NS-2, as an open-source network simulator, is widely used in wireless communication studies and VANET safety applications. In [1], Chen et al. implemented a completely modified architecture about IEEE 802.11 MAC and physical layer modules which depicted the signal transmission and reception process in IEEE 802.11, as well as the method of handling collision. However, in the process of using the latest version of NS2, we found some problems. First, its approach of deciding whether to receive the signal by comparing the SINR and threshold is not flexible in actual simulation. Second, the capture thresholds for collision do not work well. Third, as for the RXThreshold_ property, class WirelessPhyExt doesn't achieve relevant functions. In this paper, we put forward a viable scheme to solve these problems by deeply understanding the signal reception process based on SINR.
NS-2作为一个开源的网络模拟器,广泛应用于无线通信研究和VANET安全应用。在[1]中,Chen等人对IEEE 802.11 MAC和物理层模块进行了完全修改后的架构,描述了IEEE 802.11中信号的发送和接收过程,以及处理碰撞的方法。但是在使用最新版本的NS2的过程中,我们发现了一些问题。首先,它通过比较信噪比和阈值来决定是否接收信号的方法在实际仿真中不够灵活。其次,碰撞的捕获阈值不能很好地工作。第三,对于RXThreshold_属性,类WirelessPhyExt没有实现相关功能。本文通过深入了解基于信噪比的信号接收过程,提出了解决这些问题的可行方案。
{"title":"NS-2 Simulation of VANET for Safety Applications: Issues and Solutions","authors":"Jingyu Li, Yunan Zhang, Jing Zhao, Yanbin Wang, Xiaomin Ma, Wei Wu","doi":"10.1145/3036331.3036349","DOIUrl":"https://doi.org/10.1145/3036331.3036349","url":null,"abstract":"NS-2, as an open-source network simulator, is widely used in wireless communication studies and VANET safety applications. In [1], Chen et al. implemented a completely modified architecture about IEEE 802.11 MAC and physical layer modules which depicted the signal transmission and reception process in IEEE 802.11, as well as the method of handling collision. However, in the process of using the latest version of NS2, we found some problems. First, its approach of deciding whether to receive the signal by comparing the SINR and threshold is not flexible in actual simulation. Second, the capture thresholds for collision do not work well. Third, as for the RXThreshold_ property, class WirelessPhyExt doesn't achieve relevant functions. In this paper, we put forward a viable scheme to solve these problems by deeply understanding the signal reception process based on SINR.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"29 1","pages":"67-72"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89429840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Framework of Real-time Wandering Management for Person with Dementia 痴呆患者实时漫游管理框架
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3050424
Ashish Kumar, M. Ma, C. Lau, Syin Chan
Recently, several solutions have been designed to detect and identify the wandering patterns for Person with Dementia (PwD). Thus, many applications have been developed which collects Spatio-temporal and contextual information from the environment. These data have not been fully utilized to its potential. The data were mainly used for the simple pattern recognition. The long-time benefit which can arise by properly managing, storing and analyzing these data has not been realized. We propose a framework for wandering data management and analytics tool which can be beneficial to the patients, caregivers as well as researchers. In this paper, we first present a novel system architecture and then discuss its key components with the integration into the system. We use web API standard for the implementation of the services. Security also forms an integral part of our design in dealing with sensitive medical data. We also demonstrate the feasibility of the system with sample analytics such as "trend in the wandering pattern" which has been done on the real-world dataset. We have done the analysis on the daytime movement data of a patient residing in Assisted Living Facility (ALF).
最近,已经设计了几种解决方案来检测和识别痴呆症患者(PwD)的徘徊模式。因此,已经开发了许多从环境中收集时空和上下文信息的应用程序。这些数据尚未充分发挥其潜力。数据主要用于简单的模式识别。妥善管理、存储和分析这些数据所能带来的长期效益尚未实现。我们提出了一个框架的流浪数据管理和分析工具,可以有利于患者,护理人员和研究人员。本文首先提出了一种新的系统架构,然后讨论了其关键组件与系统的集成。我们使用web API标准来实现服务。在处理敏感医疗数据时,安全性也是我们设计中不可或缺的一部分。我们还通过样本分析(例如在真实数据集上完成的“漫游模式趋势”)证明了该系统的可行性。我们对一位居住在辅助生活设施(ALF)的患者的日间活动数据进行了分析。
{"title":"A Framework of Real-time Wandering Management for Person with Dementia","authors":"Ashish Kumar, M. Ma, C. Lau, Syin Chan","doi":"10.1145/3036331.3050424","DOIUrl":"https://doi.org/10.1145/3036331.3050424","url":null,"abstract":"Recently, several solutions have been designed to detect and identify the wandering patterns for Person with Dementia (PwD). Thus, many applications have been developed which collects Spatio-temporal and contextual information from the environment. These data have not been fully utilized to its potential. The data were mainly used for the simple pattern recognition. The long-time benefit which can arise by properly managing, storing and analyzing these data has not been realized. We propose a framework for wandering data management and analytics tool which can be beneficial to the patients, caregivers as well as researchers. In this paper, we first present a novel system architecture and then discuss its key components with the integration into the system. We use web API standard for the implementation of the services. Security also forms an integral part of our design in dealing with sensitive medical data. We also demonstrate the feasibility of the system with sample analytics such as \"trend in the wandering pattern\" which has been done on the real-world dataset. We have done the analysis on the daytime movement data of a patient residing in Assisted Living Facility (ALF).","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"181 1","pages":"146-150"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86517764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Ontology-based Aspect Extraction for an Improved Sentiment Analysis in Summarization of Product Reviews 基于本体的面向改进的产品评论摘要情感分析的方面提取
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3036362
Ali Marstawi, N. Sharef, T. N. M. Aris, A. Mustapha
Current approaches in aspect-based sentiment analysis ignore or neutralize unhandled issues emerging from the lexicon-based scoring (i.e., SentiWordNet), whereby lexical sentiment analysis only classifies text based on affect word presence and word count are limited to these surface features. This is coupled with considerably low detection rate among implicit concepts in the text. To address this issues, this paper proposed the use of ontology to i) enhance aspect extraction process by identifying features pertaining to implicit entities, and ii) eliminate lexicon-based sentiment scoring issues which, in turn, improve sentiment analysis and summarization accuracy. Concept-level sentiment analysis aims to go beyond word-level analysis by employing ontologies which act as a semantic knowledge base rather than the lexicon. The outcome is an Ontology-Based Product Sentiment Summarization (OBPSS) framework which outperformed other existing summarization systems in terms of aspect extraction and sentiment scoring. The improved performance is supported by the sentence-level linguistic rules applied by OBPSS in providing a more accurate sentiment analysis.
当前基于方面的情感分析方法忽略或消除了基于词典的评分(即SentiWordNet)中出现的未处理问题,即词汇情感分析仅根据影响词的存在对文本进行分类,而字数仅限于这些表面特征。这与文本中隐含概念的相当低的检测率相结合。为了解决这一问题,本文提出使用本体来i)通过识别与隐式实体相关的特征来增强方面提取过程,ii)消除基于词典的情感评分问题,从而提高情感分析和总结的准确性。概念级情感分析的目的是超越词级分析,使用本体作为语义知识库而不是词汇。结果是一个基于本体的产品情感摘要(OBPSS)框架,该框架在方面提取和情感评分方面优于其他现有的摘要系统。OBPSS应用的句子级语言规则支持了性能的提高,从而提供了更准确的情感分析。
{"title":"Ontology-based Aspect Extraction for an Improved Sentiment Analysis in Summarization of Product Reviews","authors":"Ali Marstawi, N. Sharef, T. N. M. Aris, A. Mustapha","doi":"10.1145/3036331.3036362","DOIUrl":"https://doi.org/10.1145/3036331.3036362","url":null,"abstract":"Current approaches in aspect-based sentiment analysis ignore or neutralize unhandled issues emerging from the lexicon-based scoring (i.e., SentiWordNet), whereby lexical sentiment analysis only classifies text based on affect word presence and word count are limited to these surface features. This is coupled with considerably low detection rate among implicit concepts in the text. To address this issues, this paper proposed the use of ontology to i) enhance aspect extraction process by identifying features pertaining to implicit entities, and ii) eliminate lexicon-based sentiment scoring issues which, in turn, improve sentiment analysis and summarization accuracy. Concept-level sentiment analysis aims to go beyond word-level analysis by employing ontologies which act as a semantic knowledge base rather than the lexicon. The outcome is an Ontology-Based Product Sentiment Summarization (OBPSS) framework which outperformed other existing summarization systems in terms of aspect extraction and sentiment scoring. The improved performance is supported by the sentence-level linguistic rules applied by OBPSS in providing a more accurate sentiment analysis.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"58 1","pages":"100-104"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87644083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Mesh Simplification Method Based on Reverse Interpolation Loop Subdivision 基于逆插值环细分的网格简化方法
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3036356
Zhuo Shi, Y. An, Songhua Xu, Zhongshuai Wang, K. Yu, Xiaonan Luo
In this paper, a mesh simplification method based on a reverse interpolation loop subdivision is proposed. Combined with the treatment of extraordinary vertex in the improved butterfly subdivision, the loop subdivision mask is expanded, thereby improving the traditional loop subdivision algorithm into interpolation subdivision. The reverse operation of the interpolation loop subdivision is used to simplify the complex 3D mesh; a progressive mesh is generated by an initial mesh and a series of vertex offsets. The algorithm reduces the regular point relative reverse butterfly subdivision of compensation operation and greatly reduces simplification and reconstruction. Likewise, the reverse butterfly subdivision algorithm reduces the regular point compensation operation and greatly reduces simplification and reconstruction compared with the existing reverse loop subdivision by considering more control vertices. Furthermore, the edge point with respect to the center point is compensated by sacrificing a small amount of time to calculate the smaller vertex offset, this method gives high transmission speed and low offset. In addition, in future, it can be applied to the large-scale point cloud model simplification and other fields.
提出了一种基于逆插值环细分的网格化简方法。结合改进的蝴蝶细分中异常顶点的处理,扩展了环路细分掩模,从而将传统的环路细分算法改进为插值细分。利用插值环细分的逆操作,简化了复杂的三维网格;渐进网格是由初始网格和一系列顶点偏移生成的。该算法减少了正则点相对逆蝶细分的补偿运算,大大减少了简化和重构。同样,反向蝴蝶细分算法通过考虑更多的控制顶点,减少了常规的点补偿操作,与现有的反向环路细分相比,大大减少了简化和重构。此外,通过牺牲少量的时间来计算较小的顶点偏移量来补偿边缘点相对于中心点的偏移量,该方法具有高传输速度和低偏移量的优点。此外,在未来,它还可以应用于大规模点云模型简化等领域。
{"title":"Mesh Simplification Method Based on Reverse Interpolation Loop Subdivision","authors":"Zhuo Shi, Y. An, Songhua Xu, Zhongshuai Wang, K. Yu, Xiaonan Luo","doi":"10.1145/3036331.3036356","DOIUrl":"https://doi.org/10.1145/3036331.3036356","url":null,"abstract":"In this paper, a mesh simplification method based on a reverse interpolation loop subdivision is proposed. Combined with the treatment of extraordinary vertex in the improved butterfly subdivision, the loop subdivision mask is expanded, thereby improving the traditional loop subdivision algorithm into interpolation subdivision. The reverse operation of the interpolation loop subdivision is used to simplify the complex 3D mesh; a progressive mesh is generated by an initial mesh and a series of vertex offsets. The algorithm reduces the regular point relative reverse butterfly subdivision of compensation operation and greatly reduces simplification and reconstruction. Likewise, the reverse butterfly subdivision algorithm reduces the regular point compensation operation and greatly reduces simplification and reconstruction compared with the existing reverse loop subdivision by considering more control vertices. Furthermore, the edge point with respect to the center point is compensated by sacrificing a small amount of time to calculate the smaller vertex offset, this method gives high transmission speed and low offset. In addition, in future, it can be applied to the large-scale point cloud model simplification and other fields.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"24 1","pages":"141-145"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74059990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Backward range simulation of Java bytecodes and reduction of its processing time Java字节码的倒向范围模拟和减少其处理时间
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3036340
Y. Hiranaka, Tetsuya Inafune, S. Miura, T. Taketa
In this paper we introduce a backward simulation of machine code program and report results of reduction methods of its processing time. It may be efficient to analyze a program by tracing back from the final result for detecting all the bugs caused by some codes in the program. We describe the backward simulator of Java bytecode program and methods of processing time reduction such as range division, stepwise resolution improvement, setting of search path, and exponential range division. Results of two short programs and effects of reduction methods are shown.
本文介绍了一种对机器码程序进行逆向仿真的方法,并报告了减少机器码程序处理时间的方法的结果。通过从最终结果追溯来检测由程序中的某些代码引起的所有错误,可能是有效的分析程序。介绍了Java字节码程序的后向模拟器和缩短处理时间的方法,如距离分割、逐步提高分辨率、设置搜索路径和指数距离分割。给出了两种简化方法的结果和效果。
{"title":"Backward range simulation of Java bytecodes and reduction of its processing time","authors":"Y. Hiranaka, Tetsuya Inafune, S. Miura, T. Taketa","doi":"10.1145/3036331.3036340","DOIUrl":"https://doi.org/10.1145/3036331.3036340","url":null,"abstract":"In this paper we introduce a backward simulation of machine code program and report results of reduction methods of its processing time. It may be efficient to analyze a program by tracing back from the final result for detecting all the bugs caused by some codes in the program. We describe the backward simulator of Java bytecode program and methods of processing time reduction such as range division, stepwise resolution improvement, setting of search path, and exponential range division. Results of two short programs and effects of reduction methods are shown.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"13 1","pages":"129-133"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79184571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Participant Selection Problem: Relative Performance of Five Optimization Solvers 参与者选择问题:五个优化解的相对性能
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3036334
C. Y. Lin, J. W. Liu, K. Yeh, E. Chu
This paper presents integer linear programming formulations of four variants of the participant selection problem (PSP) that we may encounter in likely disaster scenarios. An evaluation study was carried out to get data on the relative performance of popular optimization solvers and a greedy heuristic algorithm when used to solve the PSP. The paper presents the parameters used by the study to characterize PSP problem instances and figures of merits used for comparing the performances of evaluated methods, as well as performance data obtained from the study.
本文给出了在可能的灾难情景中可能遇到的参与者选择问题(PSP)的四个变量的整数线性规划公式。对常用优化算法和贪心启发式算法在求解PSP问题时的相对性能进行了评价研究。本文给出了研究中用于表征PSP问题实例的参数,以及用于比较所评估方法性能的优劣值,以及研究中获得的性能数据。
{"title":"Participant Selection Problem: Relative Performance of Five Optimization Solvers","authors":"C. Y. Lin, J. W. Liu, K. Yeh, E. Chu","doi":"10.1145/3036331.3036334","DOIUrl":"https://doi.org/10.1145/3036331.3036334","url":null,"abstract":"This paper presents integer linear programming formulations of four variants of the participant selection problem (PSP) that we may encounter in likely disaster scenarios. An evaluation study was carried out to get data on the relative performance of popular optimization solvers and a greedy heuristic algorithm when used to solve the PSP. The paper presents the parameters used by the study to characterize PSP problem instances and figures of merits used for comparing the performances of evaluated methods, as well as performance data obtained from the study.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"12 1","pages":"24-31"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73248292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mitigation of DOS Attacks on Video Trafficin Wireless Networks for better QoS 缓解无线视频流量网络中的DOS攻击,提高服务质量
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3050416
Ekbal M. Al-Hurani, Hussein R. Al-Zoubi
Security in wireless computer networks is of great importance because wireless networks are always thought to be as more vulnerable to various types of attacks than ordinary wired networks. This vulnerability is due to the nature of wireless networks that rely on using a wireless shared medium. Video is becoming a more popular type of data being transported in contemporary networks, especially with the advent of many emergent Internet and Mobile applications. To achieve user satisfaction, the transmission of video must comply with a number of quality of service (QoS) requirements. However, network attacks affect in some way or another these requirements. In this paper, we study the benefits of a selected solution to the denial of service (DOS)attackto provide betterQoS of video, which leads to improved performance of various wireless networks.
无线计算机网络的安全性非常重要,因为无线网络一直被认为比普通有线网络更容易受到各种类型的攻击。此漏洞是由于依赖于使用无线共享介质的无线网络的性质造成的。视频正在成为当代网络中传输的一种更流行的数据类型,特别是随着许多新兴的互联网和移动应用程序的出现。为了使用户满意,视频的传输必须符合一系列的服务质量(QoS)要求。然而,网络攻击会以某种方式影响这些需求。在本文中,我们研究了一种针对拒绝服务(DOS)攻击的选择解决方案的好处,以提供更好的视频qos,从而提高各种无线网络的性能。
{"title":"Mitigation of DOS Attacks on Video Trafficin Wireless Networks for better QoS","authors":"Ekbal M. Al-Hurani, Hussein R. Al-Zoubi","doi":"10.1145/3036331.3050416","DOIUrl":"https://doi.org/10.1145/3036331.3050416","url":null,"abstract":"Security in wireless computer networks is of great importance because wireless networks are always thought to be as more vulnerable to various types of attacks than ordinary wired networks. This vulnerability is due to the nature of wireless networks that rely on using a wireless shared medium. Video is becoming a more popular type of data being transported in contemporary networks, especially with the advent of many emergent Internet and Mobile applications. To achieve user satisfaction, the transmission of video must comply with a number of quality of service (QoS) requirements. However, network attacks affect in some way or another these requirements. In this paper, we study the benefits of a selected solution to the denial of service (DOS)attackto provide betterQoS of video, which leads to improved performance of various wireless networks.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"4 1","pages":"166-169"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86215148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Interdependency Analysis for the SUDEMIL Framework SUDEMIL框架的相互依赖分析
Pub Date : 2017-01-20 DOI: 10.1145/3036331.3036337
J. Jagiello, Yue-Jin Wang, Richard Taylor
This paper aims to explore an analytical methodology to identify, quantify, and assess the interdependencies across Defence capability development projects, products and programs. To represent the service complexities of project/product interdependencies, a graph theory method is applied. With a network analysis approach, the relative importance and criticality of each project/product are computed according to the graph structure using several models, including a modified Page Ranking algorithm, a node weight balance model, and a degree based algorithm. The preliminary results have shown that the proposed modelling method has the potential to provide a structure and methodology for quantitatively evaluating Defence program interdependencies. The use of the analysis and supporting visualisation tools will enhance the awareness of program interdependencies and provide a decision-aid for identifying program/project/product development priorities, gaps, risks and issues in the interdependency context.
本文旨在探索一种分析方法,以识别、量化和评估国防能力发展项目、产品和计划之间的相互依赖性。为了表示项目/产品相互依赖的服务复杂性,应用了图论方法。采用网络分析方法,利用改进的页面排名算法、节点权重平衡模型和基于度的算法,根据图结构计算每个项目/产品的相对重要性和临界性。初步结果表明,所提出的建模方法有潜力为定量评估国防计划相互依赖性提供结构和方法。分析和支持性可视化工具的使用将增强对项目相互依赖性的认识,并为确定相互依赖性背景下的项目/项目/产品开发优先级、差距、风险和问题提供决策援助。
{"title":"Interdependency Analysis for the SUDEMIL Framework","authors":"J. Jagiello, Yue-Jin Wang, Richard Taylor","doi":"10.1145/3036331.3036337","DOIUrl":"https://doi.org/10.1145/3036331.3036337","url":null,"abstract":"This paper aims to explore an analytical methodology to identify, quantify, and assess the interdependencies across Defence capability development projects, products and programs. To represent the service complexities of project/product interdependencies, a graph theory method is applied. With a network analysis approach, the relative importance and criticality of each project/product are computed according to the graph structure using several models, including a modified Page Ranking algorithm, a node weight balance model, and a degree based algorithm. The preliminary results have shown that the proposed modelling method has the potential to provide a structure and methodology for quantitatively evaluating Defence program interdependencies. The use of the analysis and supporting visualisation tools will enhance the awareness of program interdependencies and provide a decision-aid for identifying program/project/product development priorities, gaps, risks and issues in the interdependency context.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"24 1","pages":"32-37"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86709327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Tenth International Conference on Computer Modeling and Simulation (uksim 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1