首页 > 最新文献

2013 International Conference on Information Science and Cloud Computing Companion最新文献

英文 中文
A College Teaching Building Lighting Control System Based on Power Line Carrier
Yanming Huo, Haochen Wang, X. Zuo, Zhimin Cui
With the increasing of university enrolment, the registered students are becoming more and more. Almost all the universities are in the state of saturation. This leads to a big trial for the strength of the building. In the process of using the teaching buildings, lights are used more frequently and massively. Meanwhile because of the poor management and the students' lack of saving up electricity, a lot of energy is wasted, at the same time resulting in the pollution for the environment. In order to keep pace with the idea of a low-carbon life, and to provide convenience for the students' study, this essay introduces a new light-control system with artificial intelligence. This system can control all the lights by knowing the distribution of the students, the light intensity, the total number of the students, even the number in each classroom. Each sensor connects with each other by Power Line Carrier. This can greatly reduce the waste of the energy and the cost of building this system.
随着大学招生的增加,注册学生越来越多。几乎所有的大学都处于饱和状态。这导致了对建筑强度的一次大试验。在教学建筑的使用过程中,照明的使用越来越频繁和大量。同时,由于管理不善和学生缺乏节电,大量的能源被浪费,同时造成了对环境的污染。为了跟上低碳生活的理念,并为学生的学习提供便利,本文介绍了一种新型的人工智能光控系统。该系统可以通过了解学生的分布,光照强度,学生总数,甚至每个教室的人数来控制所有的灯。每个传感器通过电力线载波相互连接。这可以大大减少能源的浪费和建设这个系统的成本。
{"title":"A College Teaching Building Lighting Control System Based on Power Line Carrier","authors":"Yanming Huo, Haochen Wang, X. Zuo, Zhimin Cui","doi":"10.1109/ISCC-C.2013.11","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.11","url":null,"abstract":"With the increasing of university enrolment, the registered students are becoming more and more. Almost all the universities are in the state of saturation. This leads to a big trial for the strength of the building. In the process of using the teaching buildings, lights are used more frequently and massively. Meanwhile because of the poor management and the students' lack of saving up electricity, a lot of energy is wasted, at the same time resulting in the pollution for the environment. In order to keep pace with the idea of a low-carbon life, and to provide convenience for the students' study, this essay introduces a new light-control system with artificial intelligence. This system can control all the lights by knowing the distribution of the students, the light intensity, the total number of the students, even the number in each classroom. Each sensor connects with each other by Power Line Carrier. This can greatly reduce the waste of the energy and the cost of building this system.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128617954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Collaborative Filtering Model Considering Item Similarity 考虑项目相似度的改进协同过滤模型
Yefei Zha, Yuqing Zhai
Because of its simplicity and effectiveness, collaborative filtering (CF) became one of the most successful recommendation algorithms. User-based CF is one classic method of CF algorithms. In order to solve the problem that common rating items are often too few to be used to effectively calculate the similarity of two users in user-based CF, we proposed an improved collaborative filtering model with item similarity called ISCF in this paper. In ISCF model, the similarity of items was considered in user-based collaborative filtering, which contributes to alleviate the problem of data sparsity and therefore calculate the similarity of user. Experimental results illustrate that our approach ISCF outperforms the average method and user-based CF. Compared with user-based CF, the average improvement in the percentage of ISCF at MAE and RMSE are 21.9% and 17.7%, respectively. In addition, our approach ISCF can predict more items than user-based CF, and the average improvement in the percentage of ISCF at prediction diversity is 33.86%.
协同过滤(CF)以其简单、有效的特点,成为目前最成功的推荐算法之一。基于用户的CF是CF算法的一种经典方法。为了解决基于用户的CF中常用评分项太少而无法有效计算两个用户相似度的问题,本文提出了一种改进的基于项相似度的协同过滤模型ISCF。在ISCF模型中,在基于用户的协同过滤中考虑了项目的相似度,有助于缓解数据稀疏性问题,从而计算用户的相似度。实验结果表明,我们的方法ISCF优于平均方法和基于用户的CF。与基于用户的CF相比,在MAE和RMSE下ISCF的平均百分比分别提高了21.9%和17.7%。此外,我们的方法ISCF比基于用户的CF可以预测更多的项目,ISCF在预测多样性方面的平均改进百分比为33.86%。
{"title":"An Improved Collaborative Filtering Model Considering Item Similarity","authors":"Yefei Zha, Yuqing Zhai","doi":"10.1109/ISCC-C.2013.40","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.40","url":null,"abstract":"Because of its simplicity and effectiveness, collaborative filtering (CF) became one of the most successful recommendation algorithms. User-based CF is one classic method of CF algorithms. In order to solve the problem that common rating items are often too few to be used to effectively calculate the similarity of two users in user-based CF, we proposed an improved collaborative filtering model with item similarity called ISCF in this paper. In ISCF model, the similarity of items was considered in user-based collaborative filtering, which contributes to alleviate the problem of data sparsity and therefore calculate the similarity of user. Experimental results illustrate that our approach ISCF outperforms the average method and user-based CF. Compared with user-based CF, the average improvement in the percentage of ISCF at MAE and RMSE are 21.9% and 17.7%, respectively. In addition, our approach ISCF can predict more items than user-based CF, and the average improvement in the percentage of ISCF at prediction diversity is 33.86%.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128724477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CloudFlame: Cyberinfrastructure for Combustion Research CloudFlame:燃烧研究的网络基础设施
G. Goteng, Naveena Nettyam, S. M. Sarathy
Combustion experiments and chemical kinetics simulations generate huge data that is computationally and data intensive. A cloud-based cyber infrastructure known as Cloud Flame is implemented to improve the computational efficiency, scalability and availability of data for combustion research. The architecture consists of an application layer, a communication layer and distributed cloud servers running in a mix environment of Windows, Macintosh and Linux systems. The application layer runs software such as CHEMKIN modeling application. The communication layer provides secure transfer/archive of kinetic, thermodynamic, transport and gas surface data using private/public keys between clients and cloud servers. A robust XML schema based on the Process Informatics Model (Prime) combined with a workflow methodology for digitizing, verifying and uploading data from scientific graphs/tables to Prime is implemented for chemical molecular structures of compounds. The outcome of using this system by combustion researchers at King Abdullah University of Science and Technology (KAUST) Clean Combustion Research Center and its collaborating partners indicated a significant improvement in efficiency in terms of speed of chemical kinetics and accuracy in searching for the right chemical kinetic data.
燃烧实验和化学动力学模拟产生了大量的计算和数据密集型数据。一种基于云的网络基础设施被称为Cloud Flame,用于提高燃烧研究的计算效率、可扩展性和数据可用性。该体系结构由应用层、通信层和运行在Windows、Macintosh和Linux系统混合环境中的分布式云服务器组成。应用层运行CHEMKIN建模等软件。通信层使用私钥/公钥在客户端和云服务器之间提供动力学、热力学、传输和气体表面数据的安全传输/存档。基于过程信息学模型(Process Informatics Model, Prime)的健壮的XML模式与用于数字化、验证和上传科学图表/表格数据到Prime的工作流方法相结合,实现了化合物的化学分子结构。阿卜杜拉国王科技大学(KAUST)清洁燃烧研究中心的燃烧研究人员及其合作伙伴使用该系统的结果表明,在化学动力学的速度和寻找正确化学动力学数据的准确性方面,效率有了显著提高。
{"title":"CloudFlame: Cyberinfrastructure for Combustion Research","authors":"G. Goteng, Naveena Nettyam, S. M. Sarathy","doi":"10.1109/ISCC-C.2013.57","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.57","url":null,"abstract":"Combustion experiments and chemical kinetics simulations generate huge data that is computationally and data intensive. A cloud-based cyber infrastructure known as Cloud Flame is implemented to improve the computational efficiency, scalability and availability of data for combustion research. The architecture consists of an application layer, a communication layer and distributed cloud servers running in a mix environment of Windows, Macintosh and Linux systems. The application layer runs software such as CHEMKIN modeling application. The communication layer provides secure transfer/archive of kinetic, thermodynamic, transport and gas surface data using private/public keys between clients and cloud servers. A robust XML schema based on the Process Informatics Model (Prime) combined with a workflow methodology for digitizing, verifying and uploading data from scientific graphs/tables to Prime is implemented for chemical molecular structures of compounds. The outcome of using this system by combustion researchers at King Abdullah University of Science and Technology (KAUST) Clean Combustion Research Center and its collaborating partners indicated a significant improvement in efficiency in terms of speed of chemical kinetics and accuracy in searching for the right chemical kinetic data.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114587496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Fast Adaptive Bilateral Filtering with Fixed Parameters for Sharpness Enhancement and Noise Reduction 固定参数快速自适应双边滤波,增强清晰度和降噪
Yuanzhong Shu, Ye Chen, Yannan Su
In this paper, based on Chaudhury's fast O(1) bilateral filtering (FBF) and the shift-variant technique, we present a fast adaptive bilateral filtering (FABF) for sharpness enhancement and noise removal with good computational efficiency. FABF sharpens an image by increasing the slope of the edges without producing overshoot or undershoot. Compared with FBF, FABF-restored images are significantly sharper. Compared with adaptive bilateral filter (ABF), FABF shows a similar performance in terms of noise removal and sharpness enhancement, while the execution time of FABF is substantially shorter than that of ABF.
本文基于Chaudhury快速O(1)双边滤波(FBF)和shift-variant技术,提出了一种快速自适应双边滤波(FABF),用于图像的锐度增强和噪声去除,计算效率高。FABF通过增加边缘的斜率来锐化图像,而不会产生过调或过调。与FBF相比,fabf恢复的图像明显清晰。与自适应双边滤波器(ABF)相比,FABF在去噪和增强清晰度方面表现出相似的性能,而FABF的执行时间明显短于ABF。
{"title":"Fast Adaptive Bilateral Filtering with Fixed Parameters for Sharpness Enhancement and Noise Reduction","authors":"Yuanzhong Shu, Ye Chen, Yannan Su","doi":"10.1109/ISCC-C.2013.73","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.73","url":null,"abstract":"In this paper, based on Chaudhury's fast O(1) bilateral filtering (FBF) and the shift-variant technique, we present a fast adaptive bilateral filtering (FABF) for sharpness enhancement and noise removal with good computational efficiency. FABF sharpens an image by increasing the slope of the edges without producing overshoot or undershoot. Compared with FBF, FABF-restored images are significantly sharper. Compared with adaptive bilateral filter (ABF), FABF shows a similar performance in terms of noise removal and sharpness enhancement, while the execution time of FABF is substantially shorter than that of ABF.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Research of Embedded Software Reliability Modeling Analysis Based on AADL 基于AADL的嵌入式软件可靠性建模分析研究
T. Chuan, Yujun Liu, Xin Li, Qingling Duan
This paper proposes an analysis method of embedded and distributed software reliability modeling based on AADL. By using the key information in AADL structural model, AADL fault model is established, to describe the fault behavior of computer distributed software. On this basis, the reliability analysis is carried through the sensitivity analysis method. We analyze the reliability of the system, which can help designers to find out the key modules that affect the reliability of the system in the early stages of development and provides a strategic decision foundation to enhance the system reliability.
提出了一种基于AADL的嵌入式和分布式软件可靠性建模分析方法。利用AADL结构模型中的关键信息,建立AADL故障模型,用于描述计算机分布式软件的故障行为。在此基础上,通过灵敏度分析方法进行可靠性分析。对系统的可靠性进行分析,可以帮助设计人员在开发初期找出影响系统可靠性的关键模块,为提高系统可靠性提供战略决策依据。
{"title":"The Research of Embedded Software Reliability Modeling Analysis Based on AADL","authors":"T. Chuan, Yujun Liu, Xin Li, Qingling Duan","doi":"10.1109/ISCC-C.2013.143","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.143","url":null,"abstract":"This paper proposes an analysis method of embedded and distributed software reliability modeling based on AADL. By using the key information in AADL structural model, AADL fault model is established, to describe the fault behavior of computer distributed software. On this basis, the reliability analysis is carried through the sensitivity analysis method. We analyze the reliability of the system, which can help designers to find out the key modules that affect the reliability of the system in the early stages of development and provides a strategic decision foundation to enhance the system reliability.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114812312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement 基于同态加密和密钥协议的位置隐私保护协议
Xiao-ling Zhu, Yang Lu, Xiaojuan Zhu, Shuwei Qiu
Location-based services (LBS) bring so much convenience to our daily life. However they have incurred serious location privacy problems. K-anonymity is the one of most popular privacy-preserving methods. The method relying on a trusted third party (TTP) might cause the TTP to become a performance bottleneck. So TTP-free protocols are proposed. But existing TTP-free protocols cannot resist attacks from multiple users colluding with a LBS provider. To solve the problems, this paper proposes a novel location privacy-preserving protocol. The protocol uses key agreement to construct the perturbations which can be removed on the whole. The perturbations are used to disguise real locations, meanwhile, they do not affect LBS service quality. With the help of homomorphic encryption, the LBS provider can compute the centroid of a companion set while it does not know the locations of the members in the set. The analysis shows that the protocol can resist location privacy attacks from insiders and outsiders, especially from multiple users colluding with the LBS provider. The protocol achieves high service quality while providing strong location privacy protection for LBS.
基于位置的服务(LBS)给我们的日常生活带来了很多便利。然而,它们已经引起了严重的位置隐私问题。k -匿名是最流行的隐私保护方法之一。依赖于可信第三方(TTP)的方法可能导致TTP成为性能瓶颈。因此提出了无ttp协议。但是现有的无ttp协议无法抵御来自多个用户与一个LBS提供商串通的攻击。为了解决这些问题,本文提出了一种新的位置隐私保护协议。该协议使用密钥一致性来构造可以从整体上消除的扰动。这些扰动用于掩盖真实位置,同时不影响LBS服务质量。在同态加密的帮助下,LBS提供者可以在不知道同伴集中成员位置的情况下计算同伴集的质心。分析表明,该协议可以抵御来自内部和外部的位置隐私攻击,特别是来自多个用户与LBS提供商串通的攻击。该协议在实现高服务质量的同时,为LBS提供了较强的位置隐私保护。
{"title":"A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement","authors":"Xiao-ling Zhu, Yang Lu, Xiaojuan Zhu, Shuwei Qiu","doi":"10.1109/ISCC-C.2013.17","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.17","url":null,"abstract":"Location-based services (LBS) bring so much convenience to our daily life. However they have incurred serious location privacy problems. K-anonymity is the one of most popular privacy-preserving methods. The method relying on a trusted third party (TTP) might cause the TTP to become a performance bottleneck. So TTP-free protocols are proposed. But existing TTP-free protocols cannot resist attacks from multiple users colluding with a LBS provider. To solve the problems, this paper proposes a novel location privacy-preserving protocol. The protocol uses key agreement to construct the perturbations which can be removed on the whole. The perturbations are used to disguise real locations, meanwhile, they do not affect LBS service quality. With the help of homomorphic encryption, the LBS provider can compute the centroid of a companion set while it does not know the locations of the members in the set. The analysis shows that the protocol can resist location privacy attacks from insiders and outsiders, especially from multiple users colluding with the LBS provider. The protocol achieves high service quality while providing strong location privacy protection for LBS.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient Identity-Based Encryption from Lattice 基于格子的高效身份加密
Huiyan Chen, Dongmei Chen, Yanshuo Zhang
At present, most of the identity based encryption (IBE) schemes from the lattice originate from the results of Gentry et.al., and regard each identity as a bit string with equal length and then map a matrix to every bit of identity string. Consequently, they are considerably less efficient. In our paper, we construct an IBE which is efficient from standard learning with errors problem and handles identities as a chunk for performance. In the standard model, our paper gives a proof which our IBE is IND-sID-CCA secure. Mean-while, we also show which our IBE construction is also IND-ID-CCA secure via the technique i.e., imposing additional restrictions on the identities, presented by Boyen and Boneh.
目前,基于格的身份加密(IBE)方案大多来源于Gentry等人的成果。,并将每个单位视为长度相等的位串,然后将矩阵映射到单位串的每一位。因此,它们的效率要低得多。在我们的论文中,我们构建了一个高效的IBE,从标准学习的错误问题,并处理身份作为一个块的性能。在标准模型下,证明了我们的IBE是IND-sID-CCA安全的。同时,我们还通过Boyen和Boneh提出的技术证明了我们的IBE结构也是IND-ID-CCA安全的,即对身份施加额外的限制。
{"title":"Efficient Identity-Based Encryption from Lattice","authors":"Huiyan Chen, Dongmei Chen, Yanshuo Zhang","doi":"10.1109/ISCC-C.2013.67","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.67","url":null,"abstract":"At present, most of the identity based encryption (IBE) schemes from the lattice originate from the results of Gentry et.al., and regard each identity as a bit string with equal length and then map a matrix to every bit of identity string. Consequently, they are considerably less efficient. In our paper, we construct an IBE which is efficient from standard learning with errors problem and handles identities as a chunk for performance. In the standard model, our paper gives a proof which our IBE is IND-sID-CCA secure. Mean-while, we also show which our IBE construction is also IND-ID-CCA secure via the technique i.e., imposing additional restrictions on the identities, presented by Boyen and Boneh.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123322321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Effect of the Adjustable Parameter Applied to Information Theoretic Criteria Based Spectrum Sensing Method 基于信息理论准则的频谱感知方法中可调参数的影响研究
Tingting Liu, Jian Zhang, Zhi-ming Wang
Cognitive radio is now emerging as a popular technology to end the resource scarcity. Cognitive radio has four fundamental technologies that is spectrum sensing, resource allocation, disturbance avoidance and opportunistic spectrum access. Among them, spectrum sensing technology is the foremost. Blind sensing method attracts much attention for its easiness to implement and the few requirements for prior knowledge. The spectrum sensing method employing Information Theoretic Criteria (ITC) method is a blind sensing technology that can sense the activity of primary user with little prior information. However, it can not agilely set the false alarm probability which is usually required in communication systems. In this paper, a research on the effect of the adjustable parameter is carried out. The effectiveness of this method is set up by simulation in several scenarios with different numbers of sampling samples and receiving antennas. It is shown in the simulation that the adjustable parameter can change the false alarm probability on the basis of the requirement of the system and also the sensing method with an adjustable parameter can overcome the noise uncertainty.
认知无线电正在成为解决资源短缺的一种流行技术。认知无线电有四种基本技术,即频谱感知、资源分配、干扰避免和机会频谱接入。其中,频谱传感技术是最重要的。盲感知方法以其易于实现和对先验知识要求少而备受关注。采用信息理论准则(ITC)方法的频谱感知方法是一种可以在很少先验信息的情况下感知主用户活动的盲感知技术。但是,它不能灵活地设置通信系统中通常需要的虚警概率。本文对可调参数的影响进行了研究。在不同采样数和接收天线的情况下,通过仿真验证了该方法的有效性。仿真结果表明,参数可调可以根据系统的要求改变虚警概率,参数可调的传感方法可以克服噪声的不确定性。
{"title":"Research on the Effect of the Adjustable Parameter Applied to Information Theoretic Criteria Based Spectrum Sensing Method","authors":"Tingting Liu, Jian Zhang, Zhi-ming Wang","doi":"10.1109/ISCC-C.2013.116","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.116","url":null,"abstract":"Cognitive radio is now emerging as a popular technology to end the resource scarcity. Cognitive radio has four fundamental technologies that is spectrum sensing, resource allocation, disturbance avoidance and opportunistic spectrum access. Among them, spectrum sensing technology is the foremost. Blind sensing method attracts much attention for its easiness to implement and the few requirements for prior knowledge. The spectrum sensing method employing Information Theoretic Criteria (ITC) method is a blind sensing technology that can sense the activity of primary user with little prior information. However, it can not agilely set the false alarm probability which is usually required in communication systems. In this paper, a research on the effect of the adjustable parameter is carried out. The effectiveness of this method is set up by simulation in several scenarios with different numbers of sampling samples and receiving antennas. It is shown in the simulation that the adjustable parameter can change the false alarm probability on the basis of the requirement of the system and also the sensing method with an adjustable parameter can overcome the noise uncertainty.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Optimum Model for the Best Link of Expert System 专家系统最佳环节的最优模型研究
Chen Guo, Jiaman Ma, Yuefan Liu
According to the observation of known facts, researcher finds all performances which are conform to the observation of cognitive to associate with form knowledge base, and then build an initial network model. Based on this model, we complete the mutual uncertainty constraint by using the new achieve probability and effect probability between evidences and adjacent nodes. And on this basis, using the drive method which satisfied competition threshold, keeping reasoning to the high level, until find an object conclusion meets the expectation. The confirming result makes the best assuming evidence become the centre of focus from competition. It decides the orientation of evidence which is priority to be chosen, and give a high efficiency solution for choosing deterministic target by rapid positioning and accurate selection.
根据对已知事实的观察,找出所有符合认知观察的表现与形成知识库相关联,然后建立初始网络模型。在此模型的基础上,利用证据与相邻节点之间新的实现概率和效果概率来完成相互不确定性约束。并在此基础上,采用满足竞争阈值的驱动方法,将推理保持在较高水平,直到找到一个符合预期的对象结论。结果的确认使得最佳假设证据从竞争中成为焦点。它确定了证据的优先选择方向,通过快速定位和准确选择,为确定性目标的选择提供了高效的解决方案。
{"title":"Research on Optimum Model for the Best Link of Expert System","authors":"Chen Guo, Jiaman Ma, Yuefan Liu","doi":"10.1109/ISCC-C.2013.113","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.113","url":null,"abstract":"According to the observation of known facts, researcher finds all performances which are conform to the observation of cognitive to associate with form knowledge base, and then build an initial network model. Based on this model, we complete the mutual uncertainty constraint by using the new achieve probability and effect probability between evidences and adjacent nodes. And on this basis, using the drive method which satisfied competition threshold, keeping reasoning to the high level, until find an object conclusion meets the expectation. The confirming result makes the best assuming evidence become the centre of focus from competition. It decides the orientation of evidence which is priority to be chosen, and give a high efficiency solution for choosing deterministic target by rapid positioning and accurate selection.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131844802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of the Multi-level Inventory Control Model and Solution Algorithm for the Spare Parts 备件多级库存控制模型设计及求解算法
Yu Cao, Tiening Wang, Shengliang Xu, Yu Zhu
The inventory control model based on the multi-objective programming of the spare parts is set up. The algorithm of particle swarm optimization (PSO) is designed and improved to solve the inventory control multi-objective programming model. Aiming at the question of the particle that deviates from the solution space and the prematurity problem in the searching course, the regain mechanism and interference mechanism are built up to improve the classical PSO, and the switching mechanism from the Cartesian space to the discrete space of inventory control model is established, and then the optimized solution algorithm based on the improved PSO is presented. At last, the simulation experiments of inventory control are made to validate the multi-objective programming model. It lays the foundation for design and realization of simulation and optimization of inventory control of the spare parts.
建立了基于多目标规划的备件库存控制模型。针对库存控制多目标规划模型,设计并改进了粒子群优化算法。针对粒子偏离解空间的问题和搜索过程中存在的早熟问题,建立了改进经典粒子群算法的恢复机制和干扰机制,建立了库存控制模型从笛卡尔空间到离散空间的切换机制,提出了基于改进粒子群算法的优化求解算法。最后,通过库存控制仿真实验对多目标规划模型进行了验证。为备件库存控制仿真与优化的设计与实现奠定了基础。
{"title":"Design of the Multi-level Inventory Control Model and Solution Algorithm for the Spare Parts","authors":"Yu Cao, Tiening Wang, Shengliang Xu, Yu Zhu","doi":"10.1109/ISCC-C.2013.63","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.63","url":null,"abstract":"The inventory control model based on the multi-objective programming of the spare parts is set up. The algorithm of particle swarm optimization (PSO) is designed and improved to solve the inventory control multi-objective programming model. Aiming at the question of the particle that deviates from the solution space and the prematurity problem in the searching course, the regain mechanism and interference mechanism are built up to improve the classical PSO, and the switching mechanism from the Cartesian space to the discrete space of inventory control model is established, and then the optimized solution algorithm based on the improved PSO is presented. At last, the simulation experiments of inventory control are made to validate the multi-objective programming model. It lays the foundation for design and realization of simulation and optimization of inventory control of the spare parts.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 International Conference on Information Science and Cloud Computing Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1