首页 > 最新文献

2010 Second International Conference on Communication Software and Networks最新文献

英文 中文
The Evaluation of Index Poisoning in BitTorrent BitTorrent中索引中毒的评价
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.39
Jie Kong, Wandong Cai, Lei Wang
In recent year, some popular P2P file-sharing systems have been identified to be polluted by the copyright Industry to control the unauthorized distribution of content. As one of the most common P2P pollution methods, the index poisoning controls the P2P file-sharing by inserting massive numbers of bogus records into the index of the P2P file-sharing system. In this paper, the index poisoning in the structured P2P file-sharing system is introduced firstly. A term “poison multiplication” is defined to describe the level of the poisoning and the probability model that a peer receives valid peer information on the condition of the index poisoning in BitTorrent is proposed. We run index poisoning in BitTorrent and evaluate the effect of it. The result of the evaluation shows that with the poison multiplication increases, the connection time and the randomness of the connection time increases. To our knowledge, this is the first study to employ BitTorrent as the platform to evaluate the effectiveness of the index poisoning.
近年来,一些流行的P2P文件共享系统被版权行业认定为污染,以控制未经授权的内容分发。索引中毒是一种最常见的P2P污染方法,它通过在P2P文件共享系统的索引中插入大量的虚假记录来控制P2P文件共享。本文首先介绍了结构化P2P文件共享系统中的索引中毒问题。定义了“中毒倍增”一词来描述中毒的程度,并提出了BitTorrent中索引中毒情况下,对等体接收到有效对等体信息的概率模型。我们在BitTorrent中运行索引中毒并评估它的效果。评价结果表明,随着毒乘的增加,连接时间和连接时间的随机性增加。据我们所知,这是第一次使用BitTorrent作为平台来评估索引中毒效果的研究。
{"title":"The Evaluation of Index Poisoning in BitTorrent","authors":"Jie Kong, Wandong Cai, Lei Wang","doi":"10.1109/ICCSN.2010.39","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.39","url":null,"abstract":"In recent year, some popular P2P file-sharing systems have been identified to be polluted by the copyright Industry to control the unauthorized distribution of content. As one of the most common P2P pollution methods, the index poisoning controls the P2P file-sharing by inserting massive numbers of bogus records into the index of the P2P file-sharing system. In this paper, the index poisoning in the structured P2P file-sharing system is introduced firstly. A term “poison multiplication” is defined to describe the level of the poisoning and the probability model that a peer receives valid peer information on the condition of the index poisoning in BitTorrent is proposed. We run index poisoning in BitTorrent and evaluate the effect of it. The result of the evaluation shows that with the poison multiplication increases, the connection time and the randomness of the connection time increases. To our knowledge, this is the first study to employ BitTorrent as the platform to evaluate the effectiveness of the index poisoning.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Temporal Video Segmentation and Summary Generation Method Based on Shots' Abrupt and Gradual Transition Boundary Detecting 基于镜头突变与渐变边界检测的视频分割与摘要生成方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.58
Yinzi Chen, Yang Deng, Y. Guo, Wendong Wang, Y. Zou, Kongqiao Wang
A temporal video segmentation method is proposed in this paper. This method is based on the detection of shot abrupt transition and gradual transition, and then takes into account the conditions of user terminals, which could generate different video summarization for each user. The experimental results show that the video summarization is able to meet the user's browsing requirements, and allows user to enjoy better browsing experience.
本文提出了一种时域视频分割方法。该方法在检测镜头突变和渐变的基础上,考虑到用户终端的情况,为每个用户生成不同的视频摘要。实验结果表明,视频摘要能够满足用户的浏览需求,使用户享受到更好的浏览体验。
{"title":"A Temporal Video Segmentation and Summary Generation Method Based on Shots' Abrupt and Gradual Transition Boundary Detecting","authors":"Yinzi Chen, Yang Deng, Y. Guo, Wendong Wang, Y. Zou, Kongqiao Wang","doi":"10.1109/ICCSN.2010.58","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.58","url":null,"abstract":"A temporal video segmentation method is proposed in this paper. This method is based on the detection of shot abrupt transition and gradual transition, and then takes into account the conditions of user terminals, which could generate different video summarization for each user. The experimental results show that the video summarization is able to meet the user's browsing requirements, and allows user to enjoy better browsing experience.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134193718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Simple Grid-Based Localization Technique in Wireless Sensor Networks for Forest Fire Detection 森林火灾探测无线传感器网络中一种简单的网格定位技术
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.108
Thuykhanh Le, P. Chong, Xue Jun Li, W. Y. Leong
This research aims to develop a new sensor-based localization technique which is exclusively used for forest fire detecting systems. Our algorithm addresses three key criteria of forest fire detecting systems deployed in nature, which are: low complexity, high efficiency and low power consumption, by the 2 features: estimating a grid-based output and adopting an event-triggering mechanism. The algorithm’s low complexity and high efficiency is indicated by its average-case running time of O(N_a ) - where N_a is the number of anchors. Despite of being simple, our proposed technique can achieve a good performance in terms of outputted region’s area, such as: More than 60% of inputs can result in a small-enough region-based output for monitored fields with dimension up to 6 times of sensors’ transmission range.
本研究旨在开发一种新的基于传感器的定位技术,该技术专门用于森林火灾探测系统。我们的算法通过估计基于网格的输出和采用事件触发机制这两个特征,解决了在自然界部署的森林火灾探测系统的三个关键标准:低复杂性、高效率和低功耗。算法的平均运行时间为O(N_a),其中N_a为锚点的个数,这表明了算法的低复杂度和高效率。尽管简单,但我们提出的技术在输出区域面积方面可以实现良好的性能,例如:超过60%的输入可以产生足够小的基于区域的输出,其尺寸可达传感器传输范围的6倍。
{"title":"A Simple Grid-Based Localization Technique in Wireless Sensor Networks for Forest Fire Detection","authors":"Thuykhanh Le, P. Chong, Xue Jun Li, W. Y. Leong","doi":"10.1109/ICCSN.2010.108","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.108","url":null,"abstract":"This research aims to develop a new sensor-based localization technique which is exclusively used for forest fire detecting systems. Our algorithm addresses three key criteria of forest fire detecting systems deployed in nature, which are: low complexity, high efficiency and low power consumption, by the 2 features: estimating a grid-based output and adopting an event-triggering mechanism. The algorithm’s low complexity and high efficiency is indicated by its average-case running time of O(N_a ) - where N_a is the number of anchors. Despite of being simple, our proposed technique can achieve a good performance in terms of outputted region’s area, such as: More than 60% of inputs can result in a small-enough region-based output for monitored fields with dimension up to 6 times of sensors’ transmission range.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123066940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
REDS: Robust and Energy Efficient Dynamic Single Path Routing in a Multi Hop Sensor Network red:多跳传感器网络中鲁棒和节能的动态单路径路由
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.73
Seong-Yong Choi, Jin-Su Kim, Jung-Hyun Lee, Joong-Kyung Ryu, K. Rim
As a sensor network has a limited node resources and unexpected changes of external environment, its nodes should show energy efficiency, reliable data transmission, and topological adaptation to the change of external environment. However, it is not easy to satisfy these requirements at the same time. This study proposes Robust and Energy efficient Dynamic Single path routing (REDS), a routing mechanism that satisfies the above-mentioned conditions at the same time using a dynamic single path in a multi hop sensor network. In REDS, each node transmits data through the optimal single path using hop count to the sink and average residual energy according to the change of external environment. For reliable data transmission, each node monitors its own transmission process. In case of a topological change, only the changed part is reconstructed instead of the whole network, and this enhances the energy efficiency of the network. The results of experiment showed that REDS proposed in this study is superior in energy efficiency and provide its adaptability to topological changes.
由于传感器网络节点资源有限,且外部环境变化不可预测,因此传感器网络中的节点应具有能源效率、可靠的数据传输和对外部环境变化的拓扑适应性。然而,同时满足这些要求并不容易。本研究提出了一种鲁棒和节能的动态单路径路由(red),它是一种在多跳传感器网络中使用动态单路径同时满足上述条件的路由机制。在red中,每个节点根据外部环境的变化,利用到sink的跳数和平均剩余能量,通过最优单路径传输数据。为了保证数据的可靠传输,每个节点都监控自己的传输过程。当拓扑结构发生变化时,只对变化的部分进行重构,而不是对整个网络进行重构,从而提高了网络的能效。实验结果表明,本研究提出的红外光谱具有优越的能效和对拓扑变化的适应性。
{"title":"REDS: Robust and Energy Efficient Dynamic Single Path Routing in a Multi Hop Sensor Network","authors":"Seong-Yong Choi, Jin-Su Kim, Jung-Hyun Lee, Joong-Kyung Ryu, K. Rim","doi":"10.1109/ICCSN.2010.73","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.73","url":null,"abstract":"As a sensor network has a limited node resources and unexpected changes of external environment, its nodes should show energy efficiency, reliable data transmission, and topological adaptation to the change of external environment. However, it is not easy to satisfy these requirements at the same time. This study proposes Robust and Energy efficient Dynamic Single path routing (REDS), a routing mechanism that satisfies the above-mentioned conditions at the same time using a dynamic single path in a multi hop sensor network. In REDS, each node transmits data through the optimal single path using hop count to the sink and average residual energy according to the change of external environment. For reliable data transmission, each node monitors its own transmission process. In case of a topological change, only the changed part is reconstructed instead of the whole network, and this enhances the energy efficiency of the network. The results of experiment showed that REDS proposed in this study is superior in energy efficiency and provide its adaptability to topological changes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Risk Modeling 威胁风险建模
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.29
S. Al-Fedaghi, Asad A. Alrashed
Application development security utilizes a list of threats that identify and organize application security classes of attack. The developed system is decomposed into relevant components and then each component is analyzed for threats. Data flow diagrams (DFDs) are typically used to graphically represent a system. In this paper we propose a flow-based model as an alternative methodology for identification and classification of threats.
应用程序开发安全性利用威胁列表来识别和组织应用程序安全攻击类别。将开发的系统分解成相关的组件,然后对每个组件进行威胁分析。数据流程图(dfd)通常用于图形化地表示系统。在本文中,我们提出了一种基于流的模型作为识别和分类威胁的替代方法。
{"title":"Threat Risk Modeling","authors":"S. Al-Fedaghi, Asad A. Alrashed","doi":"10.1109/ICCSN.2010.29","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.29","url":null,"abstract":"Application development security utilizes a list of threats that identify and organize application security classes of attack. The developed system is decomposed into relevant components and then each component is analyzed for threats. Data flow diagrams (DFDs) are typically used to graphically represent a system. In this paper we propose a flow-based model as an alternative methodology for identification and classification of threats.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130168450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Sentiment Classification Based on Ontology and SVM Classifier 基于本体和支持向量机分类器的情感分类
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.35
Khin Phyu Phyu Shein, T. Nyunt
There are a lot of text documents on the Web which contain opinions or sentiments about an object such as software reviews, product reviews, movies reviews, music reviews, and book reviews etc. Opinion mining or sentiment classification aim to extract the features on which the reviewers express their opinions and determine they are positive or negative. In this paper we proposed an ontology based combination approach to enhance the existing approaches of the sentiment classification. We also used the supervised learning techniques for classification of the sentiments in the software reviews. This paper proposed the combination of using Natural Language Processing techniques (NLP), ontology based on Formal Concept Analysis (FCA) design, and Support Vector Machine (SVM) for classifying the software reviews are positive, negative or neutral.
Web上有许多文本文档,其中包含对某个对象的意见或看法,例如软件评论、产品评论、电影评论、音乐评论和书评等。意见挖掘或情感分类的目的是提取评论者表达意见的特征,并确定这些特征是积极的还是消极的。本文提出了一种基于本体的组合方法,对现有的情感分类方法进行了改进。我们还使用监督学习技术对软件评审中的情感进行分类。本文提出了利用自然语言处理技术(NLP)、基于形式概念分析(FCA)设计的本体和支持向量机(SVM)相结合对软件评价进行正面、负面和中性分类的方法。
{"title":"Sentiment Classification Based on Ontology and SVM Classifier","authors":"Khin Phyu Phyu Shein, T. Nyunt","doi":"10.1109/ICCSN.2010.35","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.35","url":null,"abstract":"There are a lot of text documents on the Web which contain opinions or sentiments about an object such as software reviews, product reviews, movies reviews, music reviews, and book reviews etc. Opinion mining or sentiment classification aim to extract the features on which the reviewers express their opinions and determine they are positive or negative. In this paper we proposed an ontology based combination approach to enhance the existing approaches of the sentiment classification. We also used the supervised learning techniques for classification of the sentiments in the software reviews. This paper proposed the combination of using Natural Language Processing techniques (NLP), ontology based on Formal Concept Analysis (FCA) design, and Support Vector Machine (SVM) for classifying the software reviews are positive, negative or neutral.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130627615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A Scalable Per-flow Priority Scheduling Scheme for High-Speed Network 一种高速网络可伸缩的按流优先级调度方案
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.17
Guodong Li, Zhen Chen, An'an Luo, Y. Xue, Jun Li, Chuang Lin
In order to provide the service differentiation for various network applications, and guarantee delay and bandwidth requirement, packet scheduling is considered as a hot research topic and a crucial module in network device. In high speed network, it is hard to maintain and schedule a great number of queues for millions of in-progress flows in memory in line speed. In this paper, we propose a scalable per-flow scheduling scheme using a small fast memory to achieve fine-grained service guarantee. A limited number of queues are dynamically shared among concurrent flows based on the interesting fact that the number of simultaneous active flows is only in hundreds whatever the link speed is. The scheduling scheme is in a scalable hierarchical manner, in which the first layer supplies service differentiation and the second guarantees bandwidth and delay. We also implement an instance based on this scheme called DQS-SPQ-DRR (Dynamic Queue Sharing-Strict Priority Queue-Deficit Round Robin). Experiments based on real and synthetic traces are conducted to evaluate the DQS-SPQ-DRR. The results demonstrate that DQS-SPQ-DRR is well held in small memory and supplies per-flow service guarantee.
为了给各种网络应用提供差异化的服务,保证时延和带宽需求,分组调度是网络设备中的一个研究热点和关键模块。在高速网络中,很难以线速维护和调度内存中数百万正在进行的流的大量队列。在本文中,我们提出了一种使用小的快速内存来实现细粒度服务保证的可扩展的逐流调度方案。在并发流之间动态共享的队列数量有限,这是基于一个有趣的事实,即无论链接速度如何,同时活动流的数量都只有数百个。该调度方案采用可扩展的分层方式,第一层提供业务差异化,第二层保证带宽和时延。我们还在此基础上实现了一个实例DQS-SPQ-DRR(动态队列共享-严格优先级队列亏缺轮询)。基于真实迹线和合成迹线对DQS-SPQ-DRR进行了评价。结果表明,DQS-SPQ-DRR在小内存环境下保持良好,并提供了逐流服务保障。
{"title":"A Scalable Per-flow Priority Scheduling Scheme for High-Speed Network","authors":"Guodong Li, Zhen Chen, An'an Luo, Y. Xue, Jun Li, Chuang Lin","doi":"10.1109/ICCSN.2010.17","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.17","url":null,"abstract":"In order to provide the service differentiation for various network applications, and guarantee delay and bandwidth requirement, packet scheduling is considered as a hot research topic and a crucial module in network device. In high speed network, it is hard to maintain and schedule a great number of queues for millions of in-progress flows in memory in line speed. In this paper, we propose a scalable per-flow scheduling scheme using a small fast memory to achieve fine-grained service guarantee. A limited number of queues are dynamically shared among concurrent flows based on the interesting fact that the number of simultaneous active flows is only in hundreds whatever the link speed is. The scheduling scheme is in a scalable hierarchical manner, in which the first layer supplies service differentiation and the second guarantees bandwidth and delay. We also implement an instance based on this scheme called DQS-SPQ-DRR (Dynamic Queue Sharing-Strict Priority Queue-Deficit Round Robin). Experiments based on real and synthetic traces are conducted to evaluate the DQS-SPQ-DRR. The results demonstrate that DQS-SPQ-DRR is well held in small memory and supplies per-flow service guarantee.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130585516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Algorithm for Business Process Mining Based on Modified FP-Tree Algorithm 一种基于改进FP-Tree算法的业务流程挖掘算法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.77
Gun-Woo Kim, Seung Hoon Lee, Jae Hyung Kim, J. Son
A number of business organizations are beginning to realize the importance of business process management. However, process can often go the way they were initially not designed for or a non-efficient performance process model could be designed. To solve this problem, business process mining which can be used as the basis for the business process re-engineering has been recognized to an important concept. However, current research in the domain of process mining has only focused on extracting a workflow-based process model from completed process logs. Thus, there is a limitation in expressing various types of business processes, and moreover, process discovery and log scanning take a considerable amount of time. In this paper, we present a modified FP-tree algorithm for FP-tree based business processes, which are used for association analysis in data mining. Our modified algorithm supports the discovery of an appropriate level of the process model according to the user's need without re-scanning all the process logs during updating.
许多业务组织开始意识到业务流程管理的重要性。然而,流程通常会按照最初没有设计的方式进行,或者可能会设计出低效的性能流程模型。为了解决这一问题,可以作为业务流程再造基础的业务流程挖掘已被公认为一个重要的概念。然而,目前在过程挖掘领域的研究只关注于从已完成的过程日志中提取基于工作流的过程模型。因此,在表达各种类型的业务流程方面存在限制,而且,流程发现和日志扫描需要花费相当多的时间。本文针对基于fp树的业务流程,提出了一种改进的fp树算法,用于数据挖掘中的关联分析。我们修改后的算法支持根据用户需要发现适当级别的流程模型,而无需在更新期间重新扫描所有流程日志。
{"title":"An Effective Algorithm for Business Process Mining Based on Modified FP-Tree Algorithm","authors":"Gun-Woo Kim, Seung Hoon Lee, Jae Hyung Kim, J. Son","doi":"10.1109/ICCSN.2010.77","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.77","url":null,"abstract":"A number of business organizations are beginning to realize the importance of business process management. However, process can often go the way they were initially not designed for or a non-efficient performance process model could be designed. To solve this problem, business process mining which can be used as the basis for the business process re-engineering has been recognized to an important concept. However, current research in the domain of process mining has only focused on extracting a workflow-based process model from completed process logs. Thus, there is a limitation in expressing various types of business processes, and moreover, process discovery and log scanning take a considerable amount of time. In this paper, we present a modified FP-tree algorithm for FP-tree based business processes, which are used for association analysis in data mining. Our modified algorithm supports the discovery of an appropriate level of the process model according to the user's need without re-scanning all the process logs during updating.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116308016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of Microstrip Filters Using Neural Network 基于神经网络的微带滤波器设计
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.103
G. Tomar, V. Kushwah, Shilpam Saxena
This paper is intended to present the design procedure for microstrip filters using artificial neural networks to provide better resolution and cutoff characteristics. The design concept has been evaluated with specific design of Low pass filters at the application specific frequencies. In this design procedure, synthesis is defined as the forward side and then analysis as the reverse side of the problem. To achieve results, the neural network is employed as a tool in design of microstrip filters. Neural network Training algorithms are used to train the samples so that error can be minimized and sharpness of slop is improved.
本文旨在介绍利用人工神经网络设计微带滤波器的过程,以提供更好的分辨率和截止特性。设计理念已被评估与特定设计的低通滤波器在特定频率的应用。在这个设计过程中,综合被定义为问题的正面,然后分析被定义为问题的反面。为此,将神经网络作为设计微带滤波器的工具。采用神经网络训练算法对样本进行训练,使误差最小化,提高了斜坡的清晰度。
{"title":"Design of Microstrip Filters Using Neural Network","authors":"G. Tomar, V. Kushwah, Shilpam Saxena","doi":"10.1109/ICCSN.2010.103","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.103","url":null,"abstract":"This paper is intended to present the design procedure for microstrip filters using artificial neural networks to provide better resolution and cutoff characteristics. The design concept has been evaluated with specific design of Low pass filters at the application specific frequencies. In this design procedure, synthesis is defined as the forward side and then analysis as the reverse side of the problem. To achieve results, the neural network is employed as a tool in design of microstrip filters. Neural network Training algorithms are used to train the samples so that error can be minimized and sharpness of slop is improved.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121764778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Evaluation of Handoff Queuing Schemes 切换排队方案的性能评价
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.44
M. Ahmed, Noureddin M. Ibrahim, H.H. El-Tamally
One of the main advantages of new wireless systems is the freedom to make and receive calls anywhere and at any time; handovers are considered a key element for providing this mobility. This paper presents the handoff queuing problem in cellular networks. We propose a model to study three handoff queuing schemes, and provide a performance evaluation of these ones. The paper begin by a presentation of the different handoff queuing scheme to evaluate. Then, gives an evaluation model with the different assumption considered in the simulations. The evaluation concerns the blocking probability for handoff and original calls. These simulations are conducted for each scheme, according to different offered loads, size of call (original and handoff) queue, and number of voice channels. A model is proposed and introduced in this paper for the study of three channel assignment schemes; namely, they are the non prioritized schemes (NPS), the original call queuing schemes, and the handoff call queuing schemes.
新的无线系统的主要优点之一是可以随时随地自由地拨打和接听电话;移交被认为是提供这种移动性的关键因素。研究了蜂窝网络中的切换排队问题。我们提出了一个模型来研究三种切换排队方案,并给出了这些方案的性能评价。论文首先对不同的切换排队方案进行了介绍和评价。在此基础上,给出了仿真中考虑不同假设的评价模型。评估涉及切换和原始呼叫的阻塞概率。根据所提供的负载、呼叫队列(原始和切换)的大小以及语音通道的数量,对每种方案进行了仿真。本文提出并介绍了三种信道分配方案的模型;即非优先级方案(NPS)、原始呼叫排队方案和切换呼叫排队方案。
{"title":"Performance Evaluation of Handoff Queuing Schemes","authors":"M. Ahmed, Noureddin M. Ibrahim, H.H. El-Tamally","doi":"10.1109/ICCSN.2010.44","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.44","url":null,"abstract":"One of the main advantages of new wireless systems is the freedom to make and receive calls anywhere and at any time; handovers are considered a key element for providing this mobility. This paper presents the handoff queuing problem in cellular networks. We propose a model to study three handoff queuing schemes, and provide a performance evaluation of these ones. The paper begin by a presentation of the different handoff queuing scheme to evaluate. Then, gives an evaluation model with the different assumption considered in the simulations. The evaluation concerns the blocking probability for handoff and original calls. These simulations are conducted for each scheme, according to different offered loads, size of call (original and handoff) queue, and number of voice channels. A model is proposed and introduced in this paper for the study of three channel assignment schemes; namely, they are the non prioritized schemes (NPS), the original call queuing schemes, and the handoff call queuing schemes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128402378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2010 Second International Conference on Communication Software and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1