首页 > 最新文献

2013 10th International Conference on Information Technology: New Generations最新文献

英文 中文
Security Concerns in Cloud Computing 云计算中的安全问题
Issa M. Khalil, Abdallah Khreishah, S. Bouktif, Azeem Ahmad
The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Security issues in cloud computing is shown to be the biggest obstacle that could subvert the wide benefits of cloud computing. The new concepts that the cloud introduces, such as multi-tenancy, creates new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for other systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats. This paper also provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.
针对IT系统的威胁的速度与技术的发展速度成正比。新技术的出现需要研究人员和实践者的注意力去发现新的威胁,以使其可靠。云计算是一种新兴的技术范例,它将当前的技术和计算概念迁移到类似于电力和水系统的实用程序解决方案中。云计算中的安全问题已被证明是可能破坏云计算广泛好处的最大障碍。云引入的新概念(如多租户)给安全社区带来了新的挑战。要解决这些挑战,除了需要培养和调整为其他系统开发的安全措施的能力外,还需要提出新的安全策略、模型和协议,以应对独特的云安全挑战。在这项工作中,我们提供了云计算安全的全面研究,包括已知安全威胁的分类和校准这些威胁的最新实践。本文还提供了分类中的依赖级别,并提供了一种以预防行动而不是主动行动形式出现的解决方案。
{"title":"Security Concerns in Cloud Computing","authors":"Issa M. Khalil, Abdallah Khreishah, S. Bouktif, Azeem Ahmad","doi":"10.1109/ITNG.2013.127","DOIUrl":"https://doi.org/10.1109/ITNG.2013.127","url":null,"abstract":"The rate of threats against IT systems is directly proportional to the rate of growing technology. The emergence of new technology requires researchers and practitioner's attention to discover new threats in order to make it reliable. Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Security issues in cloud computing is shown to be the biggest obstacle that could subvert the wide benefits of cloud computing. The new concepts that the cloud introduces, such as multi-tenancy, creates new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for other systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide comprehensive study of cloud computing security that includes classification of known security threats and the state-of-the-art practices in the endeavor to calibrate these threats. This paper also provides the dependency level within classification and provides a solution in form of preventive actions rather than proactive actions.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Capability Analysis for Modulus of Elasticity and Modulus of Rupture 弹性模量和断裂模量的性能分析
M. Abdollahian
Sawn softwood timber is used as a structural component in house walls and roofs. Consequently, the consumption trends generally follow those of the housing industry. Therefore, Government imposes tough quality control and quality assurance on the timber industry to grantee product standard meets the specifications in building industry. Capability Analysis on the timber product plays an important role in assessing the capability of the timber in meeting the market functionality requirements. Two characteristics continuously monitored are the Modulus of Elasticity MOE and the Modulus of Rupture MOR. In this paper, we analyse the data collected from three different mills located in three different states based on both, the government recommended Specification Limits and the Natural Statistical Specification Limits. The analyses show that the government tough recommended Specification Limits results in many timbers to be downgraded.
锯过的软木被用作房屋墙壁和屋顶的结构部件。因此,消费趋势一般跟随房地产行业的趋势。因此,政府对木材行业实行严格的质量控制和质量保证,以确保产品标准符合建筑行业的规格。木材产品性能分析是评价木材满足市场功能要求能力的重要手段。连续监测的两个特征是弹性模量MOE和断裂模量MOR。在本文中,我们基于政府推荐规格限值和自然统计规格限值,分析了来自三个不同州的三个不同工厂收集的数据。分析表明,政府严格推荐的规格限制导致许多木材被降级。
{"title":"Capability Analysis for Modulus of Elasticity and Modulus of Rupture","authors":"M. Abdollahian","doi":"10.1109/ITNG.2013.73","DOIUrl":"https://doi.org/10.1109/ITNG.2013.73","url":null,"abstract":"Sawn softwood timber is used as a structural component in house walls and roofs. Consequently, the consumption trends generally follow those of the housing industry. Therefore, Government imposes tough quality control and quality assurance on the timber industry to grantee product standard meets the specifications in building industry. Capability Analysis on the timber product plays an important role in assessing the capability of the timber in meeting the market functionality requirements. Two characteristics continuously monitored are the Modulus of Elasticity MOE and the Modulus of Rupture MOR. In this paper, we analyse the data collected from three different mills located in three different states based on both, the government recommended Specification Limits and the Natural Statistical Specification Limits. The analyses show that the government tough recommended Specification Limits results in many timbers to be downgraded.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124302138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public-Key Based Efficient Key Distribution in Bluetooth 基于公钥的蓝牙高效密钥分配
S. Rahman, Yiruo He, Huapeng Wu
Bluetooth provides short range low power wireless communication popularly between laptops, cellular phones and media devices. The original security measurement for Bluetooth looks somewhat inadequate today to meet many important security requirements. In this paper a public key technology based key distribution for Bluetooth is proposed. Taking advantage of `RSA for paranoids', the proposed method makes it possible for low-power and low computational capability embedded microprocessor to compute public-key technology based key distribution in reasonably short time. It is showed that the proposed method clearly has speed advantage when compared to the recent work on Bluetooth key exchange using Diffie-Hellman technology. The security of the proposed scheme against various attacks, including Gilbert's side-channel attack, is also addressed.
蓝牙在笔记本电脑、手机和媒体设备之间提供短距离低功耗无线通信。蓝牙最初的安全度量在今天看来有些不足,无法满足许多重要的安全需求。本文提出了一种基于公钥的蓝牙密钥分发技术。利用“偏执狂RSA”的优势,该方法使低功耗、低计算能力的嵌入式微处理器在相当短的时间内计算基于公钥技术的密钥分发成为可能。实验结果表明,与目前使用Diffie-Hellman技术的蓝牙密钥交换相比,该方法具有明显的速度优势。本文还讨论了该方案对各种攻击(包括Gilbert的侧信道攻击)的安全性。
{"title":"Public-Key Based Efficient Key Distribution in Bluetooth","authors":"S. Rahman, Yiruo He, Huapeng Wu","doi":"10.1109/ITNG.2013.109","DOIUrl":"https://doi.org/10.1109/ITNG.2013.109","url":null,"abstract":"Bluetooth provides short range low power wireless communication popularly between laptops, cellular phones and media devices. The original security measurement for Bluetooth looks somewhat inadequate today to meet many important security requirements. In this paper a public key technology based key distribution for Bluetooth is proposed. Taking advantage of `RSA for paranoids', the proposed method makes it possible for low-power and low computational capability embedded microprocessor to compute public-key technology based key distribution in reasonably short time. It is showed that the proposed method clearly has speed advantage when compared to the recent work on Bluetooth key exchange using Diffie-Hellman technology. The security of the proposed scheme against various attacks, including Gilbert's side-channel attack, is also addressed.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116376290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Two-Step Approach for Mining Service Cooperation 矿业服务合作分两步走
Ling-Yao Huang, Wei-Lun Chang
This research investigates how to discover associated services based on the concept of service cooperation. The goal is to provide clues of marketing campaign among services to companies. This study is used to solve the problem by taking into account associated services simultaneously in the example of Las Vegas. The results show the feasibility of service cooperation from different domain in Las Vegas. In addition, our approach also help travel agency or backpacker organize the trip and service companies to work together to gain more profits.
本文研究了基于服务合作概念的关联服务发现方法。其目的是为企业提供服务营销活动的线索。本研究以拉斯维加斯为例,通过同时考虑相关服务来解决这一问题。结果表明,在拉斯维加斯开展不同领域的服务合作是可行的。此外,我们的方法也帮助旅行社或背包客组织旅行和服务公司一起工作,以获得更多的利润。
{"title":"A Two-Step Approach for Mining Service Cooperation","authors":"Ling-Yao Huang, Wei-Lun Chang","doi":"10.1109/ITNG.2013.116","DOIUrl":"https://doi.org/10.1109/ITNG.2013.116","url":null,"abstract":"This research investigates how to discover associated services based on the concept of service cooperation. The goal is to provide clues of marketing campaign among services to companies. This study is used to solve the problem by taking into account associated services simultaneously in the example of Las Vegas. The results show the feasibility of service cooperation from different domain in Las Vegas. In addition, our approach also help travel agency or backpacker organize the trip and service companies to work together to gain more profits.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121007712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gender Classification with Human Gait Based on Skeleton Model 基于骨骼模型的人体步态性别分类
K. Arai, Rosa Andrie
Human gait walking skeleton model is proposed together with its implementation for gender classifications. The proposed model is based on morphological operations and is similar to the conventional skeleton model which allows calculations of joint angles of human body. Also gender classification method based on the proposed human gait walking skeleton model is proposed. Through experiments with the Class B dataset of Chinese Academy of Sciences (CASIA) silhouettes, it is confirmed that the proposed gender classification method utilizing human gait walking skeleton model allows discrimination between left and right legs even if a single camera acquired image is used. It is also confirmed that the proposed method allows estimation of joint angles accurately together with gender classification with high percent correct classification of 85.33% (it is 11.8% better classification accuracy comparing to the existing method).
提出了用于性别分类的人体步态行走骨架模型及其实现方法。该模型基于形态学运算,与传统的骨骼模型相似,可以计算人体关节角度。提出了基于所提出的人体步态行走骨架模型的性别分类方法。通过中国科学院轮廓B类数据集的实验,证实了所提出的基于人体步态行走骨骼模型的性别分类方法,即使使用单幅相机采集的图像,也可以区分左右腿。同时验证了本文方法可以准确估计关节角并进行性别分类,分类正确率高达85.33%(比现有方法提高了11.8%)。
{"title":"Gender Classification with Human Gait Based on Skeleton Model","authors":"K. Arai, Rosa Andrie","doi":"10.1109/ITNG.2013.134","DOIUrl":"https://doi.org/10.1109/ITNG.2013.134","url":null,"abstract":"Human gait walking skeleton model is proposed together with its implementation for gender classifications. The proposed model is based on morphological operations and is similar to the conventional skeleton model which allows calculations of joint angles of human body. Also gender classification method based on the proposed human gait walking skeleton model is proposed. Through experiments with the Class B dataset of Chinese Academy of Sciences (CASIA) silhouettes, it is confirmed that the proposed gender classification method utilizing human gait walking skeleton model allows discrimination between left and right legs even if a single camera acquired image is used. It is also confirmed that the proposed method allows estimation of joint angles accurately together with gender classification with high percent correct classification of 85.33% (it is 11.8% better classification accuracy comparing to the existing method).","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121064000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Similarity Search Problem Research on Multi-dimensional Data Sets 多维数据集的相似搜索问题研究
Yong Shi, Brian Graham
In this paper, we present our continuous work on designing an algorithm to find nearest neighbors to given queries. In our previous work, we analyze the situation that there are multiple queries with different level of importance, and define a weight for each query point. We also propose an algorithm to find nearest neighbors to multiple queries with weights and enhanced our algorithm based on query point distribution. In this paper we analyze the data distribution on various dimensions, and apply the shrinking concept for the improvement and enhancement of our multi-query search approach.
在本文中,我们展示了我们在设计一种算法来找到给定查询的最近邻居方面的持续工作。在之前的工作中,我们分析了存在多个重要程度不同的查询的情况,并为每个查询点定义了权重。我们还提出了一种带权重的多查询最近邻算法,并基于查询点分布对算法进行了改进。本文分析了数据在各个维度上的分布,并应用收缩的概念来改进和增强我们的多查询搜索方法。
{"title":"Similarity Search Problem Research on Multi-dimensional Data Sets","authors":"Yong Shi, Brian Graham","doi":"10.1109/ITNG.2013.72","DOIUrl":"https://doi.org/10.1109/ITNG.2013.72","url":null,"abstract":"In this paper, we present our continuous work on designing an algorithm to find nearest neighbors to given queries. In our previous work, we analyze the situation that there are multiple queries with different level of importance, and define a weight for each query point. We also propose an algorithm to find nearest neighbors to multiple queries with weights and enhanced our algorithm based on query point distribution. In this paper we analyze the data distribution on various dimensions, and apply the shrinking concept for the improvement and enhancement of our multi-query search approach.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Evolutionary Approaches 基于耦合的面向对象程序集成测试的自动化测试数据生成
Shaukat Ali, A. Nadeem
Software testing is one of the most important phases in development of software. Software testing detects faults in software and ensures quality. Software testing can be performed at unit, integration, or system level. Integration testing tests the interactions of different components, when they are integrated together in specific application, for the smooth functionality of software system. Coupling based testing is an integration testing approach that is based upon coupling relationships that exist among different variables across different call sites in functions. Different types of coupling exist between variables across different call sites. Up until now, test data generation approaches deal only unit level testing. There is no work for test data generation for coupling based integration testing. In this paper, we have proposed a novel approach for automated test data generation for coupling based integration testing of object oriented programs using genetic algorithm. Our approach takes the coupling path as input, containing different sub paths, and generates the test data using genetic algorithm. We have implemented a prototype tool E-Coup in Java and successfully performed different experiments for the generation of test data. In experiments with this tool, our approach has much better results as compared to random testing.
软件测试是软件开发中最重要的阶段之一。软件测试检测软件的缺陷,保证软件的质量。软件测试可以在单元、集成或系统级别执行。集成测试是对不同组件在特定应用中集成在一起时的相互作用进行测试,以保证软件系统功能的流畅性。基于耦合的测试是一种集成测试方法,它基于存在于函数中不同调用位置的不同变量之间的耦合关系。跨不同调用站点的变量之间存在不同类型的耦合。到目前为止,测试数据生成方法只处理单元级测试。不需要为基于耦合的集成测试生成测试数据。本文提出了一种利用遗传算法自动生成基于耦合的面向对象程序集成测试数据的新方法。我们的方法以耦合路径作为输入,包含不同的子路径,并使用遗传算法生成测试数据。我们在Java中实现了一个原型工具E-Coup,并成功地进行了不同的实验来生成测试数据。在使用该工具的实验中,与随机测试相比,我们的方法具有更好的结果。
{"title":"Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Evolutionary Approaches","authors":"Shaukat Ali, A. Nadeem","doi":"10.1109/ITNG.2013.59","DOIUrl":"https://doi.org/10.1109/ITNG.2013.59","url":null,"abstract":"Software testing is one of the most important phases in development of software. Software testing detects faults in software and ensures quality. Software testing can be performed at unit, integration, or system level. Integration testing tests the interactions of different components, when they are integrated together in specific application, for the smooth functionality of software system. Coupling based testing is an integration testing approach that is based upon coupling relationships that exist among different variables across different call sites in functions. Different types of coupling exist between variables across different call sites. Up until now, test data generation approaches deal only unit level testing. There is no work for test data generation for coupling based integration testing. In this paper, we have proposed a novel approach for automated test data generation for coupling based integration testing of object oriented programs using genetic algorithm. Our approach takes the coupling path as input, containing different sub paths, and generates the test data using genetic algorithm. We have implemented a prototype tool E-Coup in Java and successfully performed different experiments for the generation of test data. In experiments with this tool, our approach has much better results as compared to random testing.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Parent Selection via Reinforcement Learning in Mesh-Based P2P Video Streaming 基于网格的P2P视频流中强化学习的父母选择
Muge Fesci-Sayit, Yagiz Kaymak, Kemal Deniz Teket, C. Çetinkaya, Sercan Demirci, G. Kardas
There are several successful deployments of peer to peer (P2P) video streaming systems which provide acceptable QoS. Researches on these systems continue to improve the experienced quality by system users. Since received video quality mostly depends on the parent selection, an efficient parent selection algorithm can increase the received video bitrate by peers and provide seamless streaming. In this paper, we propose a novel parent selection method based on reinforcement learning. By the proposed system model, the newly joined peer explores the peers in the system first, and uses this information for its further parent selection actions. We implemented our model on a Cool Streaming-like P2P video streaming system in ns3. Our results indicate that, selected parents by using reinforcement learning approach improve the playback continuity, with respect to parent selection method used by Cool Streaming. Furthermore, reinforcement learning approach helps peers to find more stable parents in case of peer churn.
有几个成功的点对点(P2P)视频流系统的部署提供了可接受的QoS。对这些系统的研究不断提高系统用户的体验质量。由于接收到的视频质量主要取决于父选择,有效的父选择算法可以提高对等体接收到的视频比特率,并提供无缝流。在本文中,我们提出了一种新的基于强化学习的亲本选择方法。根据提出的系统模型,新加入的对等体首先探索系统中的对等体,并使用该信息进行进一步的父节点选择操作。我们在ns3的一个类似Cool streaming的P2P视频流系统上实现了我们的模型。我们的研究结果表明,与Cool Streaming使用的父母选择方法相比,使用强化学习方法选择父母可以提高播放连续性。此外,强化学习方法可以帮助同伴在同伴流失的情况下找到更稳定的父母。
{"title":"Parent Selection via Reinforcement Learning in Mesh-Based P2P Video Streaming","authors":"Muge Fesci-Sayit, Yagiz Kaymak, Kemal Deniz Teket, C. Çetinkaya, Sercan Demirci, G. Kardas","doi":"10.1109/ITNG.2013.89","DOIUrl":"https://doi.org/10.1109/ITNG.2013.89","url":null,"abstract":"There are several successful deployments of peer to peer (P2P) video streaming systems which provide acceptable QoS. Researches on these systems continue to improve the experienced quality by system users. Since received video quality mostly depends on the parent selection, an efficient parent selection algorithm can increase the received video bitrate by peers and provide seamless streaming. In this paper, we propose a novel parent selection method based on reinforcement learning. By the proposed system model, the newly joined peer explores the peers in the system first, and uses this information for its further parent selection actions. We implemented our model on a Cool Streaming-like P2P video streaming system in ns3. Our results indicate that, selected parents by using reinforcement learning approach improve the playback continuity, with respect to parent selection method used by Cool Streaming. Furthermore, reinforcement learning approach helps peers to find more stable parents in case of peer churn.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116863519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped Domain 关于l形域上有限元法最优误差估计的若干问题
T. Kinoshita, M. Nakao
In the a priori L2 error analysis of the finite element method (FEM), the Aubin-Nitsche trick is often used. Usually, the convergence order of the L2 error estimates by the Aubin-Nitsche trick is one order higher than the H01 error estimates. As is well known, the convergence order obtained by this technique depends on the shape of the domain because it is dependent on the regularity of solutions for the associated dual problem on the same domain. In this paper, we introduce a technique for getting the optimal order L2 error estimates on the L-shaped domain without Aubin-Nitsche trick. From the numerical evidence based on the guaranteed computations, we could still expect that such a domain dependency is not essential.
在有限元法(FEM)的先验L2误差分析中,经常使用Aubin-Nitsche技巧。通常,通过Aubin-Nitsche技巧估计的L2误差的收敛阶比H01误差估计高一个阶。众所周知,该方法的收敛阶取决于区域的形状,因为它依赖于同一区域上相关对偶问题解的正则性。本文介绍了一种在l形域上不使用Aubin-Nitsche技巧获得最优阶L2误差估计的方法。从基于保证计算的数值证据来看,我们仍然可以期望这样的领域依赖不是必需的。
{"title":"Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped Domain","authors":"T. Kinoshita, M. Nakao","doi":"10.1109/ITNG.2013.30","DOIUrl":"https://doi.org/10.1109/ITNG.2013.30","url":null,"abstract":"In the a priori L2 error analysis of the finite element method (FEM), the Aubin-Nitsche trick is often used. Usually, the convergence order of the L2 error estimates by the Aubin-Nitsche trick is one order higher than the H01 error estimates. As is well known, the convergence order obtained by this technique depends on the shape of the domain because it is dependent on the regularity of solutions for the associated dual problem on the same domain. In this paper, we introduce a technique for getting the optimal order L2 error estimates on the L-shaped domain without Aubin-Nitsche trick. From the numerical evidence based on the guaranteed computations, we could still expect that such a domain dependency is not essential.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130649059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Science and Interdisciplinarity: A Case Study on an Undergraduate Program 计算机科学与跨学科:一个本科项目的案例研究
A. Jacinto, Tatiana Martins Almeri, Etiene Lamas, L. Dias, A. Cunha
In recent years, interdisciplinarity has represented one of the most widely used and encouraged teaching practices among educators. This practice has generated a promising expectation of success when applied to undergraduate programs. However, its implementation requires dedication and effort from both students and professors. Through a case study, this paper promotes an analysis about this issue and describes some social games as final product from an interdisciplinary case study, named Project Differences.
近年来,跨学科是教育工作者最广泛使用和鼓励的教学实践之一。这种做法在应用于本科课程时产生了成功的希望。然而,它的实施需要学生和教授的奉献和努力。通过案例研究,本文对这一问题进行了分析,并将一些社交游戏描述为跨学科案例研究项目差异的最终产品。
{"title":"Computer Science and Interdisciplinarity: A Case Study on an Undergraduate Program","authors":"A. Jacinto, Tatiana Martins Almeri, Etiene Lamas, L. Dias, A. Cunha","doi":"10.1109/ITNG.2013.46","DOIUrl":"https://doi.org/10.1109/ITNG.2013.46","url":null,"abstract":"In recent years, interdisciplinarity has represented one of the most widely used and encouraged teaching practices among educators. This practice has generated a promising expectation of success when applied to undergraduate programs. However, its implementation requires dedication and effort from both students and professors. Through a case study, this paper promotes an analysis about this issue and describes some social games as final product from an interdisciplinary case study, named Project Differences.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 10th International Conference on Information Technology: New Generations
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1