首页 > 最新文献

2008 1st International Conference on Information Technology最新文献

英文 中文
A distributed description of facts in a distributed Semantic Web ontology 分布式语义Web本体中对事实的分布式描述
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621586
K. Goczyła, A. Waloszek
During the development of semantic Web there emerged a need for creating semantic descriptions of large domains of interest. However, it turned out that the large size of ontologies containing such descriptions led to many negative effects. As a result, the topics of distributing ontologies and ontology modularization gained major importance. The purpose of this paper is to present a novel approach to describe semantics of modules in distributed ontologies. We categorize problems that are encountered while working with ontology modules and describe some of the best known methods of importing data from a source ontology to a target one. Then we describe our contextual framework that generalizes our approach to the contextualization. This framework introduces a hierarchy of contexts accompanied by a hierarchy of context instances. We show how such a structure helps to solve some crucial problems with modularization, like constraining visibility and avoiding inconsistencies or incoherencies.
在语义Web的发展过程中,出现了创建大型感兴趣领域的语义描述的需求。然而,事实证明,包含此类描述的大型本体导致了许多负面影响。因此,分布式本体和本体模块化的主题变得非常重要。本文的目的是提出一种描述分布式本体中模块语义的新方法。我们对使用本体模块时遇到的问题进行了分类,并描述了将数据从源本体导入到目标本体的一些最著名的方法。然后我们描述了我们的语境框架,它概括了我们的语境化方法。这个框架引入了上下文的层次结构以及上下文实例的层次结构。我们将展示这种结构如何帮助解决模块化的一些关键问题,比如限制可见性和避免不一致或不连贯。
{"title":"A distributed description of facts in a distributed Semantic Web ontology","authors":"K. Goczyła, A. Waloszek","doi":"10.1109/INFTECH.2008.4621586","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621586","url":null,"abstract":"During the development of semantic Web there emerged a need for creating semantic descriptions of large domains of interest. However, it turned out that the large size of ontologies containing such descriptions led to many negative effects. As a result, the topics of distributing ontologies and ontology modularization gained major importance. The purpose of this paper is to present a novel approach to describe semantics of modules in distributed ontologies. We categorize problems that are encountered while working with ontology modules and describe some of the best known methods of importing data from a source ontology to a target one. Then we describe our contextual framework that generalizes our approach to the contextualization. This framework introduces a hierarchy of contexts accompanied by a hierarchy of context instances. We show how such a structure helps to solve some crucial problems with modularization, like constraining visibility and avoiding inconsistencies or incoherencies.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124759929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security evaluation of IT systems underlying critical networked infrastructures 关键网络基础设施的IT系统安全评估
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621614
R. Leszczyna, I. N. Fovino, M. Masera
Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation and assessment of security threats to information systems of industrial critical infrastructures. The description of the approach is followed with a presentation of the supporting hardware and software architecture.
关键基础设施高度依赖于信息和通信技术(ICT)。这种情况的缺点是,基础信息和通信技术网络受到干扰的后果可能很严重,因为可能发生级联效应。这对安全保障提出了很高的要求,安全评估被赋予了很高的重要性。在本文中,我们提出了一种以实验为中心的方法,用于描述和评估工业关键基础设施信息系统的安全威胁。在对该方法进行描述之后,介绍了支持的硬件和软件体系结构。
{"title":"Security evaluation of IT systems underlying critical networked infrastructures","authors":"R. Leszczyna, I. N. Fovino, M. Masera","doi":"10.1109/INFTECH.2008.4621614","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621614","url":null,"abstract":"Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation and assessment of security threats to information systems of industrial critical infrastructures. The description of the approach is followed with a presentation of the supporting hardware and software architecture.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125044412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Broadband interference in speech reinforcement systems 语音增强系统中的宽带干扰
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621652
R. Mazurek, H. Lasota
The paper undertakes underestimated problem of influence of the number and distribution of loudspeakers in speech reinforcement systems (SRS) on the quality of publicly addressed voice messages, namely the speech intelligibility in auditory rooms. Linear superposition of time-shifted broadband waves of the same form and slightly different magnitudes that reach a listener from numerous coherent sources, is accompanied by interference effects leading to a deep modification of the received signal waveform and, consequently, of its frequency spectrum. Signal transmission in a multisource SRS and distortion of fundamental voice elements (phonemes) have been simulated and analyzed with the use of linear time-invariant (LTI) model of multichannel communications system. Calculations have been made on the basis of impulse responses (IR) of modeled reverberation-less auditorium. MLS correlation measurements in a real- life lecture room have been performed as well, for verification of the SRS quality.
本文研究了语音增强系统(SRS)中扬声器的数量和分布对公共语音信息质量(即听觉室中的语音可理解度)的影响的低估问题。从众多相干源到达听者的时移宽带波的相同形式和大小略有不同的线性叠加,伴随着干扰效应,导致接收信号波形的深度修改,从而改变其频谱。利用多通道通信系统的线性时不变(LTI)模型,对多源SRS中的信号传输和基本语音元素(音素)的失真进行了仿真和分析。根据模拟无混响礼堂的脉冲响应进行了计算。为了验证SRS的质量,还在一个真实的教室中进行了MLS相关测量。
{"title":"Broadband interference in speech reinforcement systems","authors":"R. Mazurek, H. Lasota","doi":"10.1109/INFTECH.2008.4621652","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621652","url":null,"abstract":"The paper undertakes underestimated problem of influence of the number and distribution of loudspeakers in speech reinforcement systems (SRS) on the quality of publicly addressed voice messages, namely the speech intelligibility in auditory rooms. Linear superposition of time-shifted broadband waves of the same form and slightly different magnitudes that reach a listener from numerous coherent sources, is accompanied by interference effects leading to a deep modification of the received signal waveform and, consequently, of its frequency spectrum. Signal transmission in a multisource SRS and distortion of fundamental voice elements (phonemes) have been simulated and analyzed with the use of linear time-invariant (LTI) model of multichannel communications system. Calculations have been made on the basis of impulse responses (IR) of modeled reverberation-less auditorium. MLS correlation measurements in a real- life lecture room have been performed as well, for verification of the SRS quality.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131448407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a technology of trust: Decisional DNA and Reflexive Ontologies 迈向信任技术:决策DNA和自反本体论
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621584
C. Sanín, E. Szczerbicki, C. Toro
In this article, we introduce the necessary elements that must integrate a decisional technology that can offer trust and use them for the implementation of decisional trust systems. Thus, we refer to these elements as Decisional Trust, which can be achieved through the use of elements such as the Decisional DNA and the reflexive ontologies. Decisional Trust operates in two fronts: (i) the construction of Reflexive Ontologies as descriptions of concepts and relations with a set of self contained queries in a domain of study; and (ii) the construction of Decisional DNA as a knowledge structure capable of collecting organizationspsila decisional fingerprints. Our approach extends the use of Reflexive Ontologies and Decisional DNA with the aim of offering trustable decisions, and introduces elements for the exploitation of embedded trustable decisional knowledge. Fully developed, it would advance the notion of administering trustable knowledge in the current decision making environment.
在本文中,我们将介绍必须集成能够提供信任的决策技术的必要元素,并将它们用于决策信任系统的实现。因此,我们将这些元素称为decision Trust,这可以通过使用decision DNA和自反本体论等元素来实现。决策信任在两个方面起作用:(i)构建自反本体论,作为研究领域中一组自包含查询的概念和关系的描述;(ii)构建决策DNA作为一种知识结构,能够收集组织的决策指纹。我们的方法扩展了自反本体论和决策DNA的使用,目的是提供可信的决策,并引入了用于开发嵌入式可信决策知识的元素。如果得到充分发展,它将促进在当前决策环境中管理可靠知识的概念。
{"title":"Towards a technology of trust: Decisional DNA and Reflexive Ontologies","authors":"C. Sanín, E. Szczerbicki, C. Toro","doi":"10.1109/INFTECH.2008.4621584","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621584","url":null,"abstract":"In this article, we introduce the necessary elements that must integrate a decisional technology that can offer trust and use them for the implementation of decisional trust systems. Thus, we refer to these elements as Decisional Trust, which can be achieved through the use of elements such as the Decisional DNA and the reflexive ontologies. Decisional Trust operates in two fronts: (i) the construction of Reflexive Ontologies as descriptions of concepts and relations with a set of self contained queries in a domain of study; and (ii) the construction of Decisional DNA as a knowledge structure capable of collecting organizationspsila decisional fingerprints. Our approach extends the use of Reflexive Ontologies and Decisional DNA with the aim of offering trustable decisions, and introduces elements for the exploitation of embedded trustable decisional knowledge. Fully developed, it would advance the notion of administering trustable knowledge in the current decision making environment.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The discrete logarithm problem in cyclic subgroups of not necessary cyclic groups 非必要循环群的循环子群中的离散对数问题
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621640
P. Popescu, Sanda Osiceanu
The security of many cryptographic techniques depends on the intractability of the discrete logarithm problem (DLP). As a starting point, we consider the particular case of this problem, the discrete logarithm problem in subgroups of Zopfp* (p prime number), which is of special interest because its presumed intractability is the basis for the security of the U.S. Government NIST Digital Signature Algorithm, among other cryptographic techniques. Our intention is to generalize the discrete logarithm problem in subgroups of Zopfp*, first by considering an arbitrary finite cyclic group G, instead of Zopfp*; and then, more generally, by considering an arbitrary finite group G instead of Zopfp*. Then, following the same idea, we try to generalize a problem closely related to the DLP, the Diffie-Hellman problem (DHP), which is of significance to public-key cryptography because its apparent intractability forms the basis for the security of many cryptographic schemes, including Diffie-Hellman key agreement and its derivatives, and ElGamal public-key encryption. Our paper will give the mathematical description of the general problems, using group theory, as well as provide a mathematical algorithm for solving them.
许多加密技术的安全性取决于离散对数问题(DLP)的难解性。作为起点,我们考虑这个问题的特殊情况,即Zopfp* (p素数)子群中的离散对数问题,这是一个特别有趣的问题,因为它假定的难解性是美国政府NIST数字签名算法(以及其他加密技术)安全性的基础。我们的目的是推广Zopfp*子群中的离散对数问题,首先考虑一个任意有限循环群G,而不是Zopfp*;然后,更一般地,通过考虑任意有限群G而不是Zopfp*。然后,遵循同样的思想,我们尝试推广一个与DLP密切相关的问题,Diffie-Hellman问题(DHP),它对公钥密码学很重要,因为它明显的难解性构成了许多加密方案安全性的基础,包括Diffie-Hellman密钥协议及其衍生物,以及ElGamal公钥加密。本文将利用群论对一般问题进行数学描述,并给出求解这些问题的数学算法。
{"title":"The discrete logarithm problem in cyclic subgroups of not necessary cyclic groups","authors":"P. Popescu, Sanda Osiceanu","doi":"10.1109/INFTECH.2008.4621640","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621640","url":null,"abstract":"The security of many cryptographic techniques depends on the intractability of the discrete logarithm problem (DLP). As a starting point, we consider the particular case of this problem, the discrete logarithm problem in subgroups of Zopfp* (p prime number), which is of special interest because its presumed intractability is the basis for the security of the U.S. Government NIST Digital Signature Algorithm, among other cryptographic techniques. Our intention is to generalize the discrete logarithm problem in subgroups of Zopfp*, first by considering an arbitrary finite cyclic group G, instead of Zopfp*; and then, more generally, by considering an arbitrary finite group G instead of Zopfp*. Then, following the same idea, we try to generalize a problem closely related to the DLP, the Diffie-Hellman problem (DHP), which is of significance to public-key cryptography because its apparent intractability forms the basis for the security of many cryptographic schemes, including Diffie-Hellman key agreement and its derivatives, and ElGamal public-key encryption. Our paper will give the mathematical description of the general problems, using group theory, as well as provide a mathematical algorithm for solving them.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"40 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132644114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An attempt to use a type-2 fuzzy logic system to assist with real estate appraisals 尝试使用2型模糊逻辑系统来协助房地产评估
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621620
Michał Sygnowski, B. Trawinski, Aleksander Zgrzywa
A Takagi-Sugeno-Kang type-1 fuzzy system to assist with real estate appraisals was developed with the aid of experts and comprised input variables relating to main attributes of a property being appraised. The rule bases of TSK zero-order fuzzy systems were generated using evolutionary algorithms. In order to reflect the uncertainty of available data, the type-1 fuzzy model was extended to the type-2 one using a singleton function as the second degree membership function. The comparative study of both models was carried out. The experiments were conducted using actual data.
在专家的帮助下,开发了一个协助房地产评估的Takagi-Sugeno-Kang 1型模糊系统,该系统包含与被评估财产的主要属性有关的输入变量。采用进化算法生成了TSK零阶模糊系统的规则库。为了反映现有数据的不确定性,将1型模糊模型扩展为2型模糊模型,采用单例函数作为二度隶属函数。对两种模型进行了比较研究。实验是用实际数据进行的。
{"title":"An attempt to use a type-2 fuzzy logic system to assist with real estate appraisals","authors":"Michał Sygnowski, B. Trawinski, Aleksander Zgrzywa","doi":"10.1109/INFTECH.2008.4621620","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621620","url":null,"abstract":"A Takagi-Sugeno-Kang type-1 fuzzy system to assist with real estate appraisals was developed with the aid of experts and comprised input variables relating to main attributes of a property being appraised. The rule bases of TSK zero-order fuzzy systems were generated using evolutionary algorithms. In order to reflect the uncertainty of available data, the type-1 fuzzy model was extended to the type-2 one using a singleton function as the second degree membership function. The comparative study of both models was carried out. The experiments were conducted using actual data.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Scanning networks with cactus topology 用仙人掌拓扑扫描网络
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621646
L. Wrona
The family of pursuit and evasion problems is widely studied because of its numerous practical applications, ranging from communication protocols to cybernetic and physical security. Calculating the search number of a graph is one of most commonly analyzed members of this problem family. The search number is the smallest number of mobile agents required to capture an invisible and arbitrarily fast fugitive, for instance piece of malicious software, in a given graph. It is closely related to some other well known graph parameters, such as treewidth and pathwidth, and has been studied in a wide range of variants (edge, node, mixed, monotonous, connected, distributed, and others). Calculating the edge search number of a general graph is NP-hard, while it can be computed in linear time for trees. Calculating the search number of cacti, however, has not yet been widely covered. In this work we focus on this class of graphs, as it may be used to model token ring networks as well as some other network topologies when we assume that backup links are present. We address the problem of calculating the search number, as well as generating search strategy for cacti.
由于在通信协议、控制论和物理安全等方面有大量的实际应用,追逃问题家族被广泛研究。计算图的搜索数是这个问题族中最常分析的成员之一。搜索数是在给定的图中捕获一个不可见且任意快速的逃犯(例如恶意软件)所需的移动代理的最小数量。它与其他一些众所周知的图参数密切相关,如树宽度和路径宽度,并且已经在广泛的变体(边缘,节点,混合,单调,连接,分布等)中进行了研究。计算一般图的边缘搜索次数是np困难的,而对于树的边缘搜索次数可以在线性时间内计算出来。然而,计算仙人掌的搜索数量还没有被广泛报道。在这项工作中,我们将重点关注这类图,因为当我们假设存在备份链路时,它可以用于对令牌环网络以及其他一些网络拓扑进行建模。我们解决了计算搜索次数的问题,以及生成仙人掌的搜索策略。
{"title":"Scanning networks with cactus topology","authors":"L. Wrona","doi":"10.1109/INFTECH.2008.4621646","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621646","url":null,"abstract":"The family of pursuit and evasion problems is widely studied because of its numerous practical applications, ranging from communication protocols to cybernetic and physical security. Calculating the search number of a graph is one of most commonly analyzed members of this problem family. The search number is the smallest number of mobile agents required to capture an invisible and arbitrarily fast fugitive, for instance piece of malicious software, in a given graph. It is closely related to some other well known graph parameters, such as treewidth and pathwidth, and has been studied in a wide range of variants (edge, node, mixed, monotonous, connected, distributed, and others). Calculating the edge search number of a general graph is NP-hard, while it can be computed in linear time for trees. Calculating the search number of cacti, however, has not yet been widely covered. In this work we focus on this class of graphs, as it may be used to model token ring networks as well as some other network topologies when we assume that backup links are present. We address the problem of calculating the search number, as well as generating search strategy for cacti.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134608747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identification of regions of interest in video for a traffic monitoring system 交通监控系统视频中感兴趣区域的识别
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621654
G. Szwoch, P. Dalka
A system for automatic event detection in the camera image is presented in this paper. A method of limiting a region of interest to relevant parts of the image using a set of processing procedures is proposed. Image processing includes object detection with shadow removal performed in the modified YCbCr color space instead of RGB. The proposed procedures help to reduce the complexity of image processing algorithm and result in extraction of objects in the image that fulfill the imposed criteria. The selected objects may be then processed by the rule-based event detection system.
本文介绍了一种摄像机图像事件自动检测系统。提出了一种使用一组处理程序将感兴趣的区域限制到图像的相关部分的方法。图像处理包括在修改后的YCbCr颜色空间而不是RGB空间中进行对象检测和阴影去除。所提出的方法有助于降低图像处理算法的复杂性,并能够从图像中提取出符合规定标准的目标。然后,所选对象可以由基于规则的事件检测系统进行处理。
{"title":"Identification of regions of interest in video for a traffic monitoring system","authors":"G. Szwoch, P. Dalka","doi":"10.1109/INFTECH.2008.4621654","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621654","url":null,"abstract":"A system for automatic event detection in the camera image is presented in this paper. A method of limiting a region of interest to relevant parts of the image using a set of processing procedures is proposed. Image processing includes object detection with shadow removal performed in the modified YCbCr color space instead of RGB. The proposed procedures help to reduce the complexity of image processing algorithm and result in extraction of objects in the image that fulfill the imposed criteria. The selected objects may be then processed by the rule-based event detection system.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Testing aggressive TCP configurations 测试野蛮TCP配置
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621596
Jerzy Konorski, Janusz Lis
It has been recognized in the past that selfish configuration of the TCP congestion avoidance mechanism can lead to aggressive usage of network resources by some packet flows at the cost of other flows. It can be imagined that with multiple selfishly configured TCP connections, a game similar to the prisonerspsila dilemma arises whose strategic equilibria may occur at various levels of network resource utilization, depending on the TCP version and traffic conditions. This paper focuses on the effects of selfish TCP configuration in realistic network environments. Of interest is the impact of selfish TCP configuration in large networks with multiple bottlenecks, and the possibility of configuring TCP so as to avoid being exploited by aggressive packet flows competing for the same resources. Quantitative results are presented based on a special-purpose simulator.
过去已经认识到,TCP拥塞避免机制的自私配置可能导致一些数据包流以牺牲其他流为代价来积极使用网络资源。可以想象,如果有多个自私配置的TCP连接,就会出现类似囚徒困境的博弈,根据TCP版本和流量条件的不同,在不同的网络资源利用水平上可能出现战略均衡。本文主要研究了TCP自私配置在实际网络环境中的影响。我们感兴趣的是在具有多个瓶颈的大型网络中自私的TCP配置的影响,以及配置TCP以避免被竞争相同资源的侵略性数据包流利用的可能性。给出了基于专用模拟器的定量结果。
{"title":"Testing aggressive TCP configurations","authors":"Jerzy Konorski, Janusz Lis","doi":"10.1109/INFTECH.2008.4621596","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621596","url":null,"abstract":"It has been recognized in the past that selfish configuration of the TCP congestion avoidance mechanism can lead to aggressive usage of network resources by some packet flows at the cost of other flows. It can be imagined that with multiple selfishly configured TCP connections, a game similar to the prisonerspsila dilemma arises whose strategic equilibria may occur at various levels of network resource utilization, depending on the TCP version and traffic conditions. This paper focuses on the effects of selfish TCP configuration in realistic network environments. Of interest is the impact of selfish TCP configuration in large networks with multiple bottlenecks, and the possibility of configuring TCP so as to avoid being exploited by aggressive packet flows competing for the same resources. Quantitative results are presented based on a special-purpose simulator.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132055756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resonant ultrasonic spectroscopy in high-voltage varistor diagnostics 高压压敏电阻器诊断中的共振超声光谱
Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621693
L. Hasse, J. Smulko
Resonant spectroscopy is an effective nondestructive testing method focused on defects in tested objects. The testing procedure, based on the resonant pattern, allows rejection of the tested samples with defects which do not fit the pattern. A sweeping frequency method has been used to measure the spectrum of resonances in high-voltage varistors. As a result we can observe resonances that depend directly on inhomogeneity of the object. A few hundreds of high-voltage varistors have been measured using resonant ultrasonic spectroscopy. The shift to a lower frequency caused by the defected material has been observed and this can be the basis for rejecting the defective parts during manufacturing process. The parameter Q relating to the homogeneity of the varistor structure has been proposed as a criterion for the ldquogo- no gordquo testing.
共振光谱法是一种有效的无损检测方法,主要针对被测物体的缺陷进行检测。基于共振模式的测试程序允许拒绝具有不符合模式的缺陷的测试样品。采用扫频法测量高压压敏电阻器的谐振谱。因此,我们可以观察到直接依赖于物体非均匀性的共振。用共振超声光谱法测量了几百个高压压敏电阻。已观察到由缺陷材料引起的低频偏移,这可以作为在制造过程中拒绝缺陷部件的基础。与压敏电阻结构的均匀性有关的参数Q已被提出作为ldquo - no测试的标准。
{"title":"Resonant ultrasonic spectroscopy in high-voltage varistor diagnostics","authors":"L. Hasse, J. Smulko","doi":"10.1109/INFTECH.2008.4621693","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621693","url":null,"abstract":"Resonant spectroscopy is an effective nondestructive testing method focused on defects in tested objects. The testing procedure, based on the resonant pattern, allows rejection of the tested samples with defects which do not fit the pattern. A sweeping frequency method has been used to measure the spectrum of resonances in high-voltage varistors. As a result we can observe resonances that depend directly on inhomogeneity of the object. A few hundreds of high-voltage varistors have been measured using resonant ultrasonic spectroscopy. The shift to a lower frequency caused by the defected material has been observed and this can be the basis for rejecting the defective parts during manufacturing process. The parameter Q relating to the homogeneity of the varistor structure has been proposed as a criterion for the ldquogo- no gordquo testing.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114525118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 1st International Conference on Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1