首页 > 最新文献

2013 16th International Conference on Network-Based Information Systems最新文献

英文 中文
Internal Filtering Approach toward Efficiency Optimization of Matching Large Scale XML Schemas 面向大规模XML模式匹配效率优化的内部过滤方法
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.77
Ahmad Abdullah Alqarni, E. Pardede
XML Schema matching plays a significant role in the integration of different XML Schemas by finding similar corresponding elements. XML Schema elements' properties and their relation to surrounding elements play significant role in improving the quality of matching process. Investigating all measures for each element in two schemas can result in a long execution time, which reduces the performance of the matching process. The feasibility of performance is becoming significant in particular in large scale XML Schema with all that features and surroundings. Since internal features of an element represents between 40-60% of the total similarity value, it should be utilised to filter elements that yield lower internal similarity value based on a predefined threshold. Thus, we propose to use element's internal features as a filter to exclude any element that is lower to certain predefined threshold. We also present an optimum threshold that can be used in the filtering approach. The idea is to detect using the internal features the elements that are highly likely to be dissimilar and excluded them from the next phase of element's context (element's surroundings) investigations. The outcome of imposing this approach is promising not only for improving the matching efficiency per see, but also for maintaining an acceptable quality results that are very close to non-filter approach.
XML模式匹配通过查找相似的对应元素,在不同XML模式的集成中起着重要作用。XML模式元素的属性及其与周围元素的关系对提高匹配过程的质量起着重要作用。调查两个模式中每个元素的所有度量可能会导致较长的执行时间,从而降低匹配过程的性能。性能的可行性变得越来越重要,特别是在具有所有这些特性和环境的大规模XML模式中。由于元素的内部特征占总相似度值的40-60%,因此应该根据预定义的阈值来过滤产生较低内部相似度值的元素。因此,我们建议使用元素的内部特征作为过滤器,以排除低于某个预定义阈值的任何元素。我们还提出了一个可用于滤波方法的最佳阈值。这个想法是使用内部特征来检测非常可能不同的元素,并将它们排除在元素上下文(元素周围环境)调查的下一阶段之外。实施这种方法的结果不仅有希望提高每次查看的匹配效率,而且还可以保持非常接近非过滤器方法的可接受的质量结果。
{"title":"Internal Filtering Approach toward Efficiency Optimization of Matching Large Scale XML Schemas","authors":"Ahmad Abdullah Alqarni, E. Pardede","doi":"10.1109/NBiS.2013.77","DOIUrl":"https://doi.org/10.1109/NBiS.2013.77","url":null,"abstract":"XML Schema matching plays a significant role in the integration of different XML Schemas by finding similar corresponding elements. XML Schema elements' properties and their relation to surrounding elements play significant role in improving the quality of matching process. Investigating all measures for each element in two schemas can result in a long execution time, which reduces the performance of the matching process. The feasibility of performance is becoming significant in particular in large scale XML Schema with all that features and surroundings. Since internal features of an element represents between 40-60% of the total similarity value, it should be utilised to filter elements that yield lower internal similarity value based on a predefined threshold. Thus, we propose to use element's internal features as a filter to exclude any element that is lower to certain predefined threshold. We also present an optimum threshold that can be used in the filtering approach. The idea is to detect using the internal features the elements that are highly likely to be dissimilar and excluded them from the next phase of element's context (element's surroundings) investigations. The outcome of imposing this approach is promising not only for improving the matching efficiency per see, but also for maintaining an acceptable quality results that are very close to non-filter approach.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129230607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Parallelization of Interactive Animation Software with Web Workers 交互式动画软件与Web工作者的并行化
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.74
Yuta Watanabe, S. Okamoto, Masaki Kohana, M. Kamada, T. Yonekura
Our interactive animation software is written in JavaScript, and is serial execution. However, it has a problem, which is related to drawing intervals. In case the software has to process a number of animation objects, it takes a long time. The longer drawing intervals are, the slower speed of animation playing is. So, we parallelize interactive animation software with Web Workers that is one part of HTML5. We partition drawing animation with some approaches, and parallelize their process. This time, we report the parallelization approach that takes into consideration the property of Web Workers and the interactive animation software.
我们的交互式动画软件是用JavaScript编写的,并且是串行执行的。然而,它有一个问题,这是有关绘制间隔。如果软件必须处理许多动画对象,则需要很长时间。绘图间隔越长,动画播放速度越慢。因此,我们将交互式动画软件与Web Workers并行化,这是HTML5的一部分。我们用一些方法对绘图动画进行了划分,并对其过程进行了并行化。这一次,我们报告了考虑到Web Workers和交互式动画软件的特性的并行化方法。
{"title":"A Parallelization of Interactive Animation Software with Web Workers","authors":"Yuta Watanabe, S. Okamoto, Masaki Kohana, M. Kamada, T. Yonekura","doi":"10.1109/NBiS.2013.74","DOIUrl":"https://doi.org/10.1109/NBiS.2013.74","url":null,"abstract":"Our interactive animation software is written in JavaScript, and is serial execution. However, it has a problem, which is related to drawing intervals. In case the software has to process a number of animation objects, it takes a long time. The longer drawing intervals are, the slower speed of animation playing is. So, we parallelize interactive animation software with Web Workers that is one part of HTML5. We partition drawing animation with some approaches, and parallelize their process. This time, we report the parallelization approach that takes into consideration the property of Web Workers and the interactive animation software.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123811478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
System Design of Self-Actualization Support Service through Friendly Rivalry 基于友好竞争的自我实现支持服务系统设计
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.69
Yoshihiro Kawano, Yuka Obu
Social media, such as Twitter and Facebook, has been popularized. In the social media times, many people become more active between online and offline. Personal branding is very important strategy in order to use individual strong points, and contributes to self-actualization. Existence of mentors supports to find own strong points for self-actualization. In this paper, we propose a personal branding support service named "Mentors". The concept of Mentors is "Everyone has face of both mentor and mentee", surely it is friendly and rivalry. The most featuring function is to share components of self-analysis in human life design, that is, value, mission, and strategy. Mentors aims at promotion of human life by understanding their strong points and using social media effectively. Future works are to launch Mentors, and evaluation of Mentors.
Twitter和Facebook等社交媒体已经普及。在社交媒体时代,许多人在线上和线下之间变得更加活跃。个人品牌是发挥个人优势的重要策略,有助于自我实现。导师的存在有助于找到自我实现的长处。在本文中,我们提出了一种名为“导师”的个人品牌支持服务。导师的概念是“每个人都有导师和被徒弟的面孔”,当然是友好和竞争的。最具特色的功能是分享人生设计中自我分析的组成部分,即价值观、使命和战略。导师的目标是通过了解他们的长处和有效地使用社交媒体来促进人类生活。未来的工作是推出导师,并对导师进行评价。
{"title":"System Design of Self-Actualization Support Service through Friendly Rivalry","authors":"Yoshihiro Kawano, Yuka Obu","doi":"10.1109/NBiS.2013.69","DOIUrl":"https://doi.org/10.1109/NBiS.2013.69","url":null,"abstract":"Social media, such as Twitter and Facebook, has been popularized. In the social media times, many people become more active between online and offline. Personal branding is very important strategy in order to use individual strong points, and contributes to self-actualization. Existence of mentors supports to find own strong points for self-actualization. In this paper, we propose a personal branding support service named \"Mentors\". The concept of Mentors is \"Everyone has face of both mentor and mentee\", surely it is friendly and rivalry. The most featuring function is to share components of self-analysis in human life design, that is, value, mission, and strategy. Mentors aims at promotion of human life by understanding their strong points and using social media effectively. Future works are to launch Mentors, and evaluation of Mentors.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"269 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120907154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Long-Distance Health Care Network Using Minimized Portable Sensors and Active Alert System 利用最小化便携式传感器和主动警报系统构建远程医疗网络
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.64
C. Shih, Kuang-Yi Chou, H. Keh, Yuan-Cheng Cheng, Po-Yuan Yu, Nan-Ching Huang
The accelerated aging population around the world will be more obvious. In the USA, there will be about 72 million people aged 65 by 2030, There will have nearly 36.98% of the elderly population in Taiwan until 2050. Those people will need health care too. Nowadays, the current health care focus on the passive home care in Taiwan, however, the devices which can provide elder to carrying in outdoor will be huge and heavy, and also the devices will hard to actively send the alert message for the medical units when the patient have problem in their health. Therefore, the proposed of this study is to miniaturized vital sign detection and active alert system. The system will give elder the privacy, convenience, and security as well. Hoping this study can not only reduce the medical unit's work but lower the medical resources cost, moreover, it will also enhance the quality of life for the patients.
全球人口老龄化加速的趋势将更加明显。到2030年,美国65岁的老人将达到7200万左右;到2050年,台湾的老年人口将接近36.98%。这些人也需要医疗保健。目前台湾的医疗保健多以被动居家照护为主,但可供老人在户外携带的设备体积庞大、重量大,且当病人出现健康问题时,设备难以主动向医疗单位发出警报讯息。因此,本研究提出了小型化的生命体征检测和主动报警系统。该系统将为老年人提供隐私、方便和安全。希望本研究不仅可以减轻医疗单位的工作量,降低医疗资源成本,而且可以提高患者的生活质量。
{"title":"Building Long-Distance Health Care Network Using Minimized Portable Sensors and Active Alert System","authors":"C. Shih, Kuang-Yi Chou, H. Keh, Yuan-Cheng Cheng, Po-Yuan Yu, Nan-Ching Huang","doi":"10.1109/NBiS.2013.64","DOIUrl":"https://doi.org/10.1109/NBiS.2013.64","url":null,"abstract":"The accelerated aging population around the world will be more obvious. In the USA, there will be about 72 million people aged 65 by 2030, There will have nearly 36.98% of the elderly population in Taiwan until 2050. Those people will need health care too. Nowadays, the current health care focus on the passive home care in Taiwan, however, the devices which can provide elder to carrying in outdoor will be huge and heavy, and also the devices will hard to actively send the alert message for the medical units when the patient have problem in their health. Therefore, the proposed of this study is to miniaturized vital sign detection and active alert system. The system will give elder the privacy, convenience, and security as well. Hoping this study can not only reduce the medical unit's work but lower the medical resources cost, moreover, it will also enhance the quality of life for the patients.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121177144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking Environments 异构网络环境下改进的物联网身份认证方案
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.98
F. Chu, Runtong Zhang, R. Ni, W. Dai
Considering the differences between the Internet and the Internet of Things in security problems, we propose an identity authentication scheme based on elliptic curve algorithm for public and private key pair in order to meet the security requirements of the Internet of Things in heterogeneous networking environments. After being simulated with OPNET, the plan proves to be both safe and effective.
考虑到互联网和物联网在安全问题上的差异,为满足异构网络环境下物联网的安全需求,提出了一种基于椭圆曲线算法的公私钥对身份认证方案。通过OPNET仿真,验证了该方案的安全性和有效性。
{"title":"An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking Environments","authors":"F. Chu, Runtong Zhang, R. Ni, W. Dai","doi":"10.1109/NBiS.2013.98","DOIUrl":"https://doi.org/10.1109/NBiS.2013.98","url":null,"abstract":"Considering the differences between the Internet and the Internet of Things in security problems, we propose an identity authentication scheme based on elliptic curve algorithm for public and private key pair in order to meet the security requirements of the Internet of Things in heterogeneous networking environments. After being simulated with OPNET, the plan proves to be both safe and effective.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Dynamic High Performance Service Resources Management 动态高性能服务资源管理
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.95
Jonathan J. Liu, W. Dai
A service system addresses the interactions and balances between the supplier communities and consumer communities with the help of appropriate infrastructure such as Service Oriented Architecture (SOA). This paper extends an existing service system prototype for e-business with the focus on in-memory processing of XML-based large volumes of data, information and knowledge without the I/O operations with the traditional RDBMS. An Open Source Gateway Interface (OSGi) environment was used which offers the fundamental support of SOA applications to carry out preliminary design and implementation of a high performance services management framework.
服务系统在适当的基础设施(如面向服务的体系结构(SOA))的帮助下处理供应商社区和消费者社区之间的交互和平衡。本文对现有的电子商务服务系统原型进行了扩展,重点是在内存中处理基于xml的大量数据、信息和知识,而不需要传统RDBMS的I/O操作。使用了开放源代码网关接口(OSGi)环境,该环境为SOA应用程序提供基本支持,以执行高性能服务管理框架的初步设计和实现。
{"title":"Dynamic High Performance Service Resources Management","authors":"Jonathan J. Liu, W. Dai","doi":"10.1109/NBiS.2013.95","DOIUrl":"https://doi.org/10.1109/NBiS.2013.95","url":null,"abstract":"A service system addresses the interactions and balances between the supplier communities and consumer communities with the help of appropriate infrastructure such as Service Oriented Architecture (SOA). This paper extends an existing service system prototype for e-business with the focus on in-memory processing of XML-based large volumes of data, information and knowledge without the I/O operations with the traditional RDBMS. An Open Source Gateway Interface (OSGi) environment was used which offers the fundamental support of SOA applications to carry out preliminary design and implementation of a high performance services management framework.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126341343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposal for the Deterrence of Information Leakage Using Anti-virus Software 利用杀毒软件遏制信息泄露的建议
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.17
Takuya Kaneko, T. Nagaya, K. Takemori, Yutaka Miyake, M. Nishigaki
In recent years, the leakage of confidential files through the P2P (peer-to-peer) file sharing software has become a problem. Once sensitive files have been leaked to a P2P network, they are distributed rapidly and at random to a great many computers, bringing the danger of far-reaching damage. To deal with this, we propose a method to control the diffusion of sensitive file leakage on P2P networks by deleting the leaked sensitive files in the destination PC of the P2P user. In this method, we focus on the characteristic of anti-virus software that reacts to the unique patterns of a virus, automatically isolating and deleting a file concerned. By using the unique pattern of a virus to make the leaked sensitive file appear as a viral infection file, the anti-virus software installed on the destination PC will automatically delete the file. This is the concept of our method.
近年来,通过P2P(点对点)文件共享软件泄露机密文件已成为一个问题。敏感文件一旦泄露到P2P网络上,就会迅速、随机地传播到大量的计算机上,带来影响深远的危险。为了解决这个问题,我们提出了一种通过删除P2P用户目标PC中泄露的敏感文件来控制敏感文件在P2P网络上扩散的方法。在这种方法中,我们着重于杀毒软件的特性,它对病毒的独特模式作出反应,自动隔离和删除有关文件。目的电脑上安装的杀毒软件利用病毒的独特模式,使泄露的敏感文件显示为病毒感染文件,自动删除该文件。这是我们方法的概念。
{"title":"A Proposal for the Deterrence of Information Leakage Using Anti-virus Software","authors":"Takuya Kaneko, T. Nagaya, K. Takemori, Yutaka Miyake, M. Nishigaki","doi":"10.1109/NBiS.2013.17","DOIUrl":"https://doi.org/10.1109/NBiS.2013.17","url":null,"abstract":"In recent years, the leakage of confidential files through the P2P (peer-to-peer) file sharing software has become a problem. Once sensitive files have been leaked to a P2P network, they are distributed rapidly and at random to a great many computers, bringing the danger of far-reaching damage. To deal with this, we propose a method to control the diffusion of sensitive file leakage on P2P networks by deleting the leaked sensitive files in the destination PC of the P2P user. In this method, we focus on the characteristic of anti-virus software that reacts to the unique patterns of a virus, automatically isolating and deleting a file concerned. By using the unique pattern of a virus to make the leaked sensitive file appear as a viral infection file, the anti-virus software installed on the destination PC will automatically delete the file. This is the concept of our method.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jitter Considerations in On-Demand Route Discovery for Mobile Ad Hoc Networks 移动Ad Hoc网络按需路由发现中的抖动问题
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.28
Jiazi Yi, Juan Antonio Cordero, T. Clausen
Jittering (a small, random variation in timing of control message emission) is widely used in protocols for wireless communication, in order to avoid simultaneous packet transmissions over the same channel by adjacent nodes in the network. Used for both regularly scheduled packets, for event-triggered packets, and for scheduled resets in the network, jittering is a particularly important mechanism when a network event may cause multiple adjacent nodes to react concurrently. Introduced in the proactive MANET routing protocol OLSR, the "LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation" (LOADng), a derivative of AODV, is specified so as to also use jitter for flooding Route Request (RREQ) messages during route discovery. This use of jitter in RREQ flooding is, however, not without drawbacks, which are identified and addressed in this paper within the framework of a more general study of jitter mechanisms used for route discovery in reactive routing protocols. The paper studies the behavior of route discovery when using "naive" jitter (simply, delaying RREQ retransmission by a small uniformly distributed random delay), in order to identify and analyze the problems hereof, mostly related to route sub-optimality and excessive control traffic overhead. A Window Jitter mechanism is then proposed to address these issues - with the performance hereof, when compared to "naive" jitter being evaluated by way of modeling, theoretical analysis and experiments. The paper shows that the use of Window Jitter improves indeed the efficiency of route discovery in AODV and overcome the drawbacks identified for "naive" jitter.
抖动(控制消息发射时间的一种小的随机变化)广泛应用于无线通信协议中,以避免网络中相邻节点在同一信道上同时传输数据包。当网络事件可能导致多个相邻节点并发反应时,抖动是一种特别重要的机制,它既用于定期调度的数据包、事件触发的数据包,也用于网络中的定时重置。在主动MANET路由协议OLSR中引入了“LLN按需自组织距离矢量路由协议-下一代”(LOADng),该协议是AODV的衍生产品,在路由发现过程中也使用抖动来处理洪水路由请求(RREQ)消息。然而,在RREQ泛洪中使用抖动并非没有缺点,本文在对响应路由协议中用于路由发现的抖动机制进行更一般研究的框架内确定并解决了这些缺点。本文研究了使用“幼稚”抖动(简单地说,用一个小的均匀分布随机延迟延迟RREQ重传)时的路由发现行为,以识别和分析其中的问题,主要涉及路由次优性和控制流量开销过大。然后提出了一个窗口抖动机制来解决这些问题-通过建模,理论分析和实验来评估与“朴素”抖动的性能。本文表明,窗口抖动的使用确实提高了AODV路由发现的效率,克服了“幼稚”抖动的缺点。
{"title":"Jitter Considerations in On-Demand Route Discovery for Mobile Ad Hoc Networks","authors":"Jiazi Yi, Juan Antonio Cordero, T. Clausen","doi":"10.1109/NBiS.2013.28","DOIUrl":"https://doi.org/10.1109/NBiS.2013.28","url":null,"abstract":"Jittering (a small, random variation in timing of control message emission) is widely used in protocols for wireless communication, in order to avoid simultaneous packet transmissions over the same channel by adjacent nodes in the network. Used for both regularly scheduled packets, for event-triggered packets, and for scheduled resets in the network, jittering is a particularly important mechanism when a network event may cause multiple adjacent nodes to react concurrently. Introduced in the proactive MANET routing protocol OLSR, the \"LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation\" (LOADng), a derivative of AODV, is specified so as to also use jitter for flooding Route Request (RREQ) messages during route discovery. This use of jitter in RREQ flooding is, however, not without drawbacks, which are identified and addressed in this paper within the framework of a more general study of jitter mechanisms used for route discovery in reactive routing protocols. The paper studies the behavior of route discovery when using \"naive\" jitter (simply, delaying RREQ retransmission by a small uniformly distributed random delay), in order to identify and analyze the problems hereof, mostly related to route sub-optimality and excessive control traffic overhead. A Window Jitter mechanism is then proposed to address these issues - with the performance hereof, when compared to \"naive\" jitter being evaluated by way of modeling, theoretical analysis and experiments. The paper shows that the use of Window Jitter improves indeed the efficiency of route discovery in AODV and overcome the drawbacks identified for \"naive\" jitter.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Investigation of Diffracted Waves between Parallel and Arbitrary Angle of Edges: A Comparison Study 平行边与任意角边之间绕射波的比较研究
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.83
Jiro Iwashige, L. Barolli, Motohiko Iwaida, Saki Kameyama
Estimation of the scattering of electromagnetic waves by buildings and other obstacles is very important for wireless communications. In our previous work, we have examined the diffracted fields by two edges with an arbitrary angle which change in both horizontal and vertical directions. In this paper, we compare the diffracted fields between parallel and arbitrary angle of edges. The numerical calculation results show that when the angle between two edges increases, relatively strong orthogonal polarized wave components appear, but the principal components are almost the same as the incident wave.
在无线通信中,建筑物和其他障碍物对电磁波散射的估计是非常重要的。在我们以前的工作中,我们已经通过在水平和垂直方向上具有任意角度变化的两条边来检查衍射场。本文比较了平行边和任意角边的衍射场。数值计算结果表明,当边角增大时,出现较强的正交极化波分量,但主分量与入射波基本一致。
{"title":"Investigation of Diffracted Waves between Parallel and Arbitrary Angle of Edges: A Comparison Study","authors":"Jiro Iwashige, L. Barolli, Motohiko Iwaida, Saki Kameyama","doi":"10.1109/NBiS.2013.83","DOIUrl":"https://doi.org/10.1109/NBiS.2013.83","url":null,"abstract":"Estimation of the scattering of electromagnetic waves by buildings and other obstacles is very important for wireless communications. In our previous work, we have examined the diffracted fields by two edges with an arbitrary angle which change in both horizontal and vertical directions. In this paper, we compare the diffracted fields between parallel and arbitrary angle of edges. The numerical calculation results show that when the angle between two edges increases, relatively strong orthogonal polarized wave components appear, but the principal components are almost the same as the incident wave.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133795715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single Document Summarization Based on Triangle Analysis of Dependency Graphs 基于依赖图三角分析的单文档摘要
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.9
K. Cheng, Yanting Li, Xin Wang
Extractive document summarization is a fundamental technique for document summarization. Most well-known approaches to extractive document summarization utilize supervised learning where algorithms are trained on collections of "ground truth" summaries built for a relatively large number of documents. In this paper, we propose a novel algorithm, called Triangle Sum for key sentence extraction from single document based on graph theory. The algorithm builds a dependency graph for the underlying document based on co-occurrence relation as well as syntactic dependency relations. In such a dependency graph, nodes represent words or phrases of high frequency, and edges represent dependency-co-occurrence relations between them. The clustering coefficient is computed from each node to measure the strength of connection between a node and its neighbors in a dependency graph. By identifying triangles of nodes in the graph, a part of the dependency graph can be extracted as marks of key sentences. At last, a set of key sentences that represent the main document information can be extracted.
抽取式文档摘要是文档摘要的一项基本技术。大多数著名的提取文档摘要方法利用监督学习,其中算法是在为相对大量的文档构建的“基础事实”摘要集合上训练的。本文提出了一种基于图论的三角和算法,用于从单个文档中提取关键句子。该算法基于共现关系和句法依赖关系为底层文档构建依赖图。在这种依赖图中,节点表示高频词或短语,边表示它们之间的依赖共现关系。从每个节点计算聚类系数,以衡量依赖图中节点与其相邻节点之间的连接强度。通过识别图中节点的三角形,可以提取依赖图的一部分作为关键句子的标记。最后,提取出一组代表文档主要信息的关键句子。
{"title":"Single Document Summarization Based on Triangle Analysis of Dependency Graphs","authors":"K. Cheng, Yanting Li, Xin Wang","doi":"10.1109/NBiS.2013.9","DOIUrl":"https://doi.org/10.1109/NBiS.2013.9","url":null,"abstract":"Extractive document summarization is a fundamental technique for document summarization. Most well-known approaches to extractive document summarization utilize supervised learning where algorithms are trained on collections of \"ground truth\" summaries built for a relatively large number of documents. In this paper, we propose a novel algorithm, called Triangle Sum for key sentence extraction from single document based on graph theory. The algorithm builds a dependency graph for the underlying document based on co-occurrence relation as well as syntactic dependency relations. In such a dependency graph, nodes represent words or phrases of high frequency, and edges represent dependency-co-occurrence relations between them. The clustering coefficient is computed from each node to measure the strength of connection between a node and its neighbors in a dependency graph. By identifying triangles of nodes in the graph, a part of the dependency graph can be extracted as marks of key sentences. At last, a set of key sentences that represent the main document information can be extracted.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116329307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 16th International Conference on Network-Based Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1