首页 > 最新文献

2012 Fourth International Conference on Computational and Information Sciences最新文献

英文 中文
Hybrid Behavior Ant Colony Algorithm for Vehicle Routing Problem 车辆路径问题的混合行为蚁群算法
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.168
Miao Wang
Vehicle Routing Problem (VRP) is one of critical problems in modern logistics service. In order to overcome the shortcomings of the basic Ant Colony Optimization (ACO) algorithm, which has long searching time and easily jumps into local optimal solution, a hybrid behavior ACO algorithm is presented for solving the VRP problem. A series of rules of the ants' behaviors are defined. The simulation results show that the above approach is reasonable and efficient.
车辆路径问题(VRP)是现代物流服务中的关键问题之一。为了克服蚁群算法搜索时间长、易陷入局部最优解的缺点,提出了一种求解VRP问题的混合行为蚁群算法。定义了蚂蚁的一系列行为规则。仿真结果表明,该方法是合理有效的。
{"title":"Hybrid Behavior Ant Colony Algorithm for Vehicle Routing Problem","authors":"Miao Wang","doi":"10.1109/ICCIS.2012.168","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.168","url":null,"abstract":"Vehicle Routing Problem (VRP) is one of critical problems in modern logistics service. In order to overcome the shortcomings of the basic Ant Colony Optimization (ACO) algorithm, which has long searching time and easily jumps into local optimal solution, a hybrid behavior ACO algorithm is presented for solving the VRP problem. A series of rules of the ants' behaviors are defined. The simulation results show that the above approach is reasonable and efficient.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132025113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AJAX Crawling Scheme Based on Document Object Model 基于文档对象模型的AJAX抓取方案
Xuesong Zhang, Honglei Wang
Many web applications adopt AJAX to enhance their user experience. But AJAX has a number of properties making it extremely difficult for traditional search engines to crawl. Google's AJAX crawling scheme suggests webmasters change their website architectures and add additional codes. It is so complicated that it be currently supported only by Google. The paper proposed an AJAX crawling scheme based on DOM and breadth-first AJAX crawling algorithm. It can build a State Transition Graph (STG) of an AJAX web application by tracking the changes of DOM tree triggered by some AJAX events, and then generate a static mirror site of the original AJAX web application.
许多web应用程序采用AJAX来增强用户体验。但是AJAX有很多属性,使得传统的搜索引擎很难抓取。Google的AJAX爬行方案建议网站管理员改变他们的网站架构并添加额外的代码。它是如此复杂,目前只有谷歌支持。提出了一种基于DOM和宽度优先AJAX爬行算法的AJAX爬行方案。它可以通过跟踪一些AJAX事件触发的DOM树的变化来构建AJAX web应用程序的状态转换图(STG),然后生成原始AJAX web应用程序的静态镜像站点。
{"title":"AJAX Crawling Scheme Based on Document Object Model","authors":"Xuesong Zhang, Honglei Wang","doi":"10.1109/ICCIS.2012.61","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.61","url":null,"abstract":"Many web applications adopt AJAX to enhance their user experience. But AJAX has a number of properties making it extremely difficult for traditional search engines to crawl. Google's AJAX crawling scheme suggests webmasters change their website architectures and add additional codes. It is so complicated that it be currently supported only by Google. The paper proposed an AJAX crawling scheme based on DOM and breadth-first AJAX crawling algorithm. It can build a State Transition Graph (STG) of an AJAX web application by tracking the changes of DOM tree triggered by some AJAX events, and then generate a static mirror site of the original AJAX web application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Optimizing the Deployment of Maintenance Persons Based on Dynamic Programming Method 基于动态规划法的维修人员配置优化
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.199
Hu Qiang, Liu Feng, Wu Wei, Wu Mingfei
This paper sets up a model for optimizing the deployment of equipment maintenance persons. With a case study, the model optimizes the deployment of three levels of equipment maintenance persons using dynamic programming method and provides an effective quantifiable measure for scientific distribution of equipment support deployment.
本文建立了设备维修人员优化配置模型。通过实例分析,该模型采用动态规划方法对三级装备保障人员配置进行优化,为科学分配装备保障部署提供了有效的量化措施。
{"title":"Optimizing the Deployment of Maintenance Persons Based on Dynamic Programming Method","authors":"Hu Qiang, Liu Feng, Wu Wei, Wu Mingfei","doi":"10.1109/ICCIS.2012.199","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.199","url":null,"abstract":"This paper sets up a model for optimizing the deployment of equipment maintenance persons. With a case study, the model optimizes the deployment of three levels of equipment maintenance persons using dynamic programming method and provides an effective quantifiable measure for scientific distribution of equipment support deployment.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123314367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive Approach to Eliciting Users' Preference Using Comparisons 使用比较的交互式方法来引出用户偏好
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.178
Jianfeng Zhang, Weihong Han, Yan Jia, Peng Zou
The complexity of today's networks and distributed systems makes the process of network monitoring difficult. The amount of data produced by many distributed security tools can be overwhelming. So it's very difficult and limited to get the most risky alert through manual process based on the huge network alerts with many attributes, such as asset, priority, reliability, risk, type et al. The common method used to rank the alerts is scoring function, the higher the score, the more risky of the alert. Our motivation is that many times user can not precisely specify the weights for the scoring function as their preference in order to produce the preferred order of results. In this paper, we propose a new interactive preference searching method to elicit user's preference. An extensive performance study using both synthetic and real datasets is reported to verify its effectiveness and efficiency.
当今网络和分布式系统的复杂性给网络监控过程带来了困难。许多分布式安全工具产生的数据量可能是压倒性的。因此,基于具有资产、优先级、可靠性、风险、类型等多种属性的庞大网络警报,通过人工流程获取风险最大的警报是非常困难和有限的。对警报进行排名的常用方法是评分函数,评分越高,警报的风险越大。我们的动机是,很多时候用户不能精确地指定评分函数的权重作为他们的偏好,以产生结果的首选顺序。本文提出了一种新的交互式偏好搜索方法来获取用户的偏好。使用合成和真实数据集进行了广泛的性能研究,以验证其有效性和效率。
{"title":"Interactive Approach to Eliciting Users' Preference Using Comparisons","authors":"Jianfeng Zhang, Weihong Han, Yan Jia, Peng Zou","doi":"10.1109/ICCIS.2012.178","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.178","url":null,"abstract":"The complexity of today's networks and distributed systems makes the process of network monitoring difficult. The amount of data produced by many distributed security tools can be overwhelming. So it's very difficult and limited to get the most risky alert through manual process based on the huge network alerts with many attributes, such as asset, priority, reliability, risk, type et al. The common method used to rank the alerts is scoring function, the higher the score, the more risky of the alert. Our motivation is that many times user can not precisely specify the weights for the scoring function as their preference in order to produce the preferred order of results. In this paper, we propose a new interactive preference searching method to elicit user's preference. An extensive performance study using both synthetic and real datasets is reported to verify its effectiveness and efficiency.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Method of Fuzzy Comprehensive Evaluation for Fracturing Effect 压裂效果模糊综合评价新方法
L. Tiejun, Tang Zhihao, Guo Dali, Ke Xijun
This paper studied fuzzy comprehensive evaluation for fracturing in depth and pointed out the drawbacks of Max-product Composition. And then, based on Einstein operator, this paper established the model of fuzzy comprehensive evaluation for fracturing effect which can be used to analyze and optimize various parameters such as fracture length, conductivity, height, etc.. Finally, it is proved that this model is practical and effective in real applications.
研究了深度压裂模糊综合评价方法,指出了最大积法的不足。然后,基于爱因斯坦算子,建立了压裂效果模糊综合评价模型,可对裂缝长度、导流能力、裂缝高度等参数进行分析和优化。最后,在实际应用中证明了该模型的实用性和有效性。
{"title":"A New Method of Fuzzy Comprehensive Evaluation for Fracturing Effect","authors":"L. Tiejun, Tang Zhihao, Guo Dali, Ke Xijun","doi":"10.1109/ICCIS.2012.28","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.28","url":null,"abstract":"This paper studied fuzzy comprehensive evaluation for fracturing in depth and pointed out the drawbacks of Max-product Composition. And then, based on Einstein operator, this paper established the model of fuzzy comprehensive evaluation for fracturing effect which can be used to analyze and optimize various parameters such as fracture length, conductivity, height, etc.. Finally, it is proved that this model is practical and effective in real applications.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finite Element Analysis of Normal Contact Stiffness between Real Rough Surfaces Based on ANSYS 基于ANSYS的实际粗糙表面法向接触刚度有限元分析
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.156
Wei Wang, Q. Tang, Xiaodong Xu, S. Gong
The data of real rough surface are captured by using the morphology measuring instrument LEXT OLS4000. Contraposing the scarcities that no rough surface produced with either statistical model or fractal model can represent the real surface and reflect the surface stress, the real rough surface model is built based on the idea of reverse engineering. ANSYS is employed in research on the normal contact between the real rough surfaces, which is predigested with the contact between a rigid plane and a rough surface. The study shows that hysteresis phenomenon presents itself between the normal loading curve and the normal unloading curve as a result of some asperities' plastic deformation, which also brings on residual press-stress benefits for material properties on the rough surface after unloading completely and the residual stress varies with the amount of load at the start of unloading. Normal contact stiffness increases first and then decreases along with the normal load, and is also affected by surface topography and the residual surface stress of the micro-body.
采用LEXT OLS4000形貌测量仪采集真实粗糙表面数据。针对统计模型和分形模型均不能反映真实表面和表面应力的不足,基于逆向工程的思想建立了真实粗糙表面模型。利用ANSYS对实际粗糙表面的法向接触进行了研究,将其简化为刚性平面与粗糙表面的接触。研究表明,正常加载曲线与正常卸载曲线之间存在滞回现象,这是由于某些凸起的塑性变形导致的,完全卸载后,粗糙表面的残余压应力对材料性能有利,并且残余应力随卸载开始时的加载量而变化。法向接触刚度随法向载荷先增大后减小,并受微体表面形貌和残余表面应力的影响。
{"title":"Finite Element Analysis of Normal Contact Stiffness between Real Rough Surfaces Based on ANSYS","authors":"Wei Wang, Q. Tang, Xiaodong Xu, S. Gong","doi":"10.1109/ICCIS.2012.156","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.156","url":null,"abstract":"The data of real rough surface are captured by using the morphology measuring instrument LEXT OLS4000. Contraposing the scarcities that no rough surface produced with either statistical model or fractal model can represent the real surface and reflect the surface stress, the real rough surface model is built based on the idea of reverse engineering. ANSYS is employed in research on the normal contact between the real rough surfaces, which is predigested with the contact between a rigid plane and a rough surface. The study shows that hysteresis phenomenon presents itself between the normal loading curve and the normal unloading curve as a result of some asperities' plastic deformation, which also brings on residual press-stress benefits for material properties on the rough surface after unloading completely and the residual stress varies with the amount of load at the start of unloading. Normal contact stiffness increases first and then decreases along with the normal load, and is also affected by surface topography and the residual surface stress of the micro-body.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120957538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Security Issue of Internet of Things Based on RFID 基于RFID的物联网安全问题研究
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.301
Shao Xi-wen
In recent years, the use of radio frequency identification technology (RFlD: Radio Frequency Identification) to establish the current system of things becomes one of the mainstream models. This paper analyzes the internet system structure of things based on RFID, elaborates on the limitations of RFID technology to the things security threats, and analyzes RFID-based things that should meet the security demand and the corresponding security policies.
近年来,利用射频识别技术(rld: radio frequency identification)建立物联网系统成为当前的主流模式之一。本文分析了基于RFID的物联网体系结构,阐述了RFID技术对物联网安全威胁的局限性,分析了基于RFID的物联网应满足的安全需求及相应的安全策略。
{"title":"Study on Security Issue of Internet of Things Based on RFID","authors":"Shao Xi-wen","doi":"10.1109/ICCIS.2012.301","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.301","url":null,"abstract":"In recent years, the use of radio frequency identification technology (RFlD: Radio Frequency Identification) to establish the current system of things becomes one of the mainstream models. This paper analyzes the internet system structure of things based on RFID, elaborates on the limitations of RFID technology to the things security threats, and analyzes RFID-based things that should meet the security demand and the corresponding security policies.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116138095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Research and Design of Electric Power Private Cloud Data Storage Model 电力私有云数据存储模型的研究与设计
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.221
Li Su, Lin Li, Lu Zhang, Xiaoqian Nie
With the rapid development of cloud computing technology, the concept of cloud storage application appears. Faced with the unusually large amount of data in the electric power information system and the insufficient data redundancy because of storage space, searching data resources quickly and reducing storage costs become an inevitable need. In this article, the data storage technology based on cloud computing will be discussed. I will give the private cloud model of the power companies, research and design a five-story model of the data storage power private cloud and analysis the model's data security briefly to enhance data's flexibility and reliability.
随着云计算技术的飞速发展,云存储应用的概念应运而生。面对电力信息系统中异常庞大的数据量和存储空间导致的数据冗余不足,快速搜索数据资源、降低存储成本成为必然需求。本文将讨论基于云计算的数据存储技术。我将给出电力公司的私有云模型,研究设计一个数据存储电力私有云的五层模型,并简要分析该模型的数据安全性,以增强数据的灵活性和可靠性。
{"title":"Research and Design of Electric Power Private Cloud Data Storage Model","authors":"Li Su, Lin Li, Lu Zhang, Xiaoqian Nie","doi":"10.1109/ICCIS.2012.221","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.221","url":null,"abstract":"With the rapid development of cloud computing technology, the concept of cloud storage application appears. Faced with the unusually large amount of data in the electric power information system and the insufficient data redundancy because of storage space, searching data resources quickly and reducing storage costs become an inevitable need. In this article, the data storage technology based on cloud computing will be discussed. I will give the private cloud model of the power companies, research and design a five-story model of the data storage power private cloud and analysis the model's data security briefly to enhance data's flexibility and reliability.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drilling Tool Failure Diagnosis Based on GA-SVM 基于GA-SVM的钻具故障诊断
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.132
Yang Min, Liang Bin
Drilling tool failure is a major reason for low drilling speed, thus early drilling tool failure diagnosis is very important. Based on the generalization and approximation of non-linear capability of support vector machine (SVM) and the powerful ability of global optimization of genetic algorithm (GA), this paper establishes combined GA-SVM model through optimizing SVM parameters by GA. Then the model is used to forecast drilling tool failure of actual engineering practice. The experiment results show that optimal parameters searched by GA do significantly improve the forecast performance, and validates the effectiveness of the proposed algorithm, which provides a new method to forecast drilling tool failure.
钻具故障是钻井速度低的主要原因,因此早期诊断钻具故障非常重要。基于支持向量机(SVM)非线性能力的泛化和近似,以及遗传算法(GA)强大的全局寻优能力,通过遗传算法优化支持向量机参数,建立了GA-SVM组合模型。并将该模型应用于实际工程中钻具失效预测。实验结果表明,通过遗传算法搜索的最优参数显著提高了预测性能,验证了算法的有效性,为预测钻具故障提供了一种新的方法。
{"title":"Drilling Tool Failure Diagnosis Based on GA-SVM","authors":"Yang Min, Liang Bin","doi":"10.1109/ICCIS.2012.132","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.132","url":null,"abstract":"Drilling tool failure is a major reason for low drilling speed, thus early drilling tool failure diagnosis is very important. Based on the generalization and approximation of non-linear capability of support vector machine (SVM) and the powerful ability of global optimization of genetic algorithm (GA), this paper establishes combined GA-SVM model through optimizing SVM parameters by GA. Then the model is used to forecast drilling tool failure of actual engineering practice. The experiment results show that optimal parameters searched by GA do significantly improve the forecast performance, and validates the effectiveness of the proposed algorithm, which provides a new method to forecast drilling tool failure.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131373523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation and Analysis of a Streaming Media Congestion Control Algorithm Based on NS-2 基于NS-2的流媒体拥塞控制算法仿真与分析
Pub Date : 2012-08-17 DOI: 10.1109/ICCIS.2012.282
Wei Mao, D. Qi, Congming Wu, Kangyi Zhang
NS(Simulator Network) is an object-oriented visual simulator based on large-scale discrete event. It simulates not only the transmission of network data and topology architecture, but also all kinds of IP network circumstance. This paper describes the architecture and characteristics of NS, and also gives the technique and the general process based on NS. The instance of a streaming media applications-based adaptive congestion control algorithm is implemented and simulation results are analyzed. The experimental result shows that when the network is congested, the delay, delay jitter and throughput will be corresponding changes in objective phenomenon.
NS(Simulator Network)是一种基于大规模离散事件的面向对象可视化模拟器。它不仅模拟了网络数据的传输和拓扑结构,而且还模拟了各种IP网络环境。本文介绍了网络信息系统的体系结构和特点,给出了基于网络信息系统的技术和一般流程。实现了一种基于流媒体应用的自适应拥塞控制算法实例,并对仿真结果进行了分析。实验结果表明,当网络拥塞时,时延、时延抖动和吞吐量都会有相应的客观现象变化。
{"title":"Simulation and Analysis of a Streaming Media Congestion Control Algorithm Based on NS-2","authors":"Wei Mao, D. Qi, Congming Wu, Kangyi Zhang","doi":"10.1109/ICCIS.2012.282","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.282","url":null,"abstract":"NS(Simulator Network) is an object-oriented visual simulator based on large-scale discrete event. It simulates not only the transmission of network data and topology architecture, but also all kinds of IP network circumstance. This paper describes the architecture and characteristics of NS, and also gives the technique and the general process based on NS. The instance of a streaming media applications-based adaptive congestion control algorithm is implemented and simulation results are analyzed. The experimental result shows that when the network is congested, the delay, delay jitter and throughput will be corresponding changes in objective phenomenon.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127601847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2012 Fourth International Conference on Computational and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1