首页 > 最新文献

2009 International Conference on Future Computer and Communication最新文献

英文 中文
Neural Network Based MIMO-OFDM Channel Equalizer Using Comb-Type Pilot Arrangement 基于神经网络的梳式导频MIMO-OFDM信道均衡器
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.136
S. Nawaz, S. Mohsin, Ataul Aziz Ikaram
MIMO (Multiple Input Multiple Output) and OFDM (Orthogonal frequency division multiplexing) bringing along a number of pros; a combination of both stands a good possibility of being the next-generation (4th generation) of mobile wireless systems. The technology however imposes a challenge that is the increased complexity of channel equalization. Wireless channels are multipath fading channels, causing deformation in the signal. To remove the effect (imposed by channel) from received signal, the receiver needs to have knowledge of CIR (Channel impulse response) that is usually provided by a separate channel estimator. This paper is aimed at exploring the use of Neural Network (NN) as a tool for MIMO-OFDM channel estimation and compensation. The research attempts to gauges the usefulness of proposed system by analyzing different algorithms to train NN. Further to ascertain the performance of the proposed technique; length of the known training sequence has been varied over a reasonable range and observations are made. Finally, the results obtained by using different algorithms for training NN have been compared with each-other and against the traditional least squares channel estimator, which along with observations/comments form part of the paper.
MIMO(多输入多输出)和OFDM(正交频分复用)带来了许多优点;两者的结合很有可能成为下一代(第四代)移动无线系统。然而,该技术带来了一个挑战,即信道均衡的复杂性增加。无线信道是多径衰落信道,导致信号变形。为了从接收信号中消除(由信道施加的)影响,接收器需要了解通常由单独的信道估计器提供的CIR(信道脉冲响应)。本文旨在探索利用神经网络(NN)作为MIMO-OFDM信道估计和补偿的工具。本研究试图通过分析不同的神经网络训练算法来衡量所提出系统的有效性。进一步确定所建议技术的性能;已知训练序列的长度在一个合理的范围内变化,并进行了观察。最后,使用不同算法训练NN得到的结果相互比较,并与传统的最小二乘信道估计器进行比较,这些结果与观察/评论一起构成了本文的一部分。
{"title":"Neural Network Based MIMO-OFDM Channel Equalizer Using Comb-Type Pilot Arrangement","authors":"S. Nawaz, S. Mohsin, Ataul Aziz Ikaram","doi":"10.1109/ICFCC.2009.136","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.136","url":null,"abstract":"MIMO (Multiple Input Multiple Output) and OFDM (Orthogonal frequency division multiplexing) bringing along a number of pros; a combination of both stands a good possibility of being the next-generation (4th generation) of mobile wireless systems. The technology however imposes a challenge that is the increased complexity of channel equalization. Wireless channels are multipath fading channels, causing deformation in the signal. To remove the effect (imposed by channel) from received signal, the receiver needs to have knowledge of CIR (Channel impulse response) that is usually provided by a separate channel estimator. This paper is aimed at exploring the use of Neural Network (NN) as a tool for MIMO-OFDM channel estimation and compensation. The research attempts to gauges the usefulness of proposed system by analyzing different algorithms to train NN. Further to ascertain the performance of the proposed technique; length of the known training sequence has been varied over a reasonable range and observations are made. Finally, the results obtained by using different algorithms for training NN have been compared with each-other and against the traditional least squares channel estimator, which along with observations/comments form part of the paper.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117232035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Novel Framework for M-Government Implementation 一种新的移动政府实施框架
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.146
M. Fasanghari, Hossein Samimi
The advantages of Information Technologies (IT) is changed the service delivery in government. The last changes in service delivery of government to citizens are through mobile technologies. It is necessary to develop the mobile technology usage in government service delivery, but it is not useful unless a development (maturity) model, like e-government development model, a m-government model be used. Therefore, in this paper, a six stages (five phases) m-government model is presented. In this model, all of the required phases for implying mobile technologies in government service delivery to citizens are considered.
信息技术的优势改变了政府提供服务的方式。政府向公民提供服务的最后一个变化是通过移动技术。发展移动技术在政府服务提供中的应用是必要的,但除非采用一种发展(成熟)模式,如电子政务发展模式、移动政务模式,否则它是没有用的。因此,本文提出了一个六阶段(五个阶段)的移动政府模型。在该模型中,考虑了向公民提供政府服务时采用移动技术所需的所有阶段。
{"title":"A Novel Framework for M-Government Implementation","authors":"M. Fasanghari, Hossein Samimi","doi":"10.1109/ICFCC.2009.146","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.146","url":null,"abstract":"The advantages of Information Technologies (IT) is changed the service delivery in government. The last changes in service delivery of government to citizens are through mobile technologies. It is necessary to develop the mobile technology usage in government service delivery, but it is not useful unless a development (maturity) model, like e-government development model, a m-government model be used. Therefore, in this paper, a six stages (five phases) m-government model is presented. In this model, all of the required phases for implying mobile technologies in government service delivery to citizens are considered.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127461948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Capacity Enhancment and Iterference Reduction in Cooperative Cognitive Radio Networks 协同认知无线电网络的容量增强与干扰减少
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.80
Ayman A. El-Saleh, M. Ismail, M. Ali, I. Al-kebsi
Cognitive radio users are secondary users armed with sensing capability to observe any available spectrum holes which are temporarily and/or spatially unused by the primary users to use them for their own transmission. In this context, the demand for maximizing the secondary users’ network capacity while maintaining high protection level to primary users is very crucial. This research work presents two operational modes for the cognitive users’ network, namely, constant primary user protection (CPUP) and constant secondary user spectrum usability (CSUSU). The simulation results show that cooperating all secondary users in the network does not necessarily lead to attain the optimum performance, but instead, it is achieved by cooperating a certain number of users who possess the highest primary user’s signal-to-noise ratio values at their receivers.
认知无线电用户是具有感知能力的次要用户,可以观察到主要用户暂时和/或空间上未使用的可用频谱空洞,以便将其用于自己的传输。在这种情况下,如何在保证二级用户网络容量最大化的同时,对主用户保持较高的保护水平就显得尤为重要。本研究提出了认知用户网络的两种运行模式,即恒定主用户保护(CPUP)和恒定次用户频谱可用性(CSUSU)。仿真结果表明,协作网络中所有次要用户并不一定能获得最佳性能,而是通过协作一定数量的主用户在其接收机处信噪比值最高的用户来实现。
{"title":"Capacity Enhancment and Iterference Reduction in Cooperative Cognitive Radio Networks","authors":"Ayman A. El-Saleh, M. Ismail, M. Ali, I. Al-kebsi","doi":"10.1109/ICFCC.2009.80","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.80","url":null,"abstract":"Cognitive radio users are secondary users armed with sensing capability to observe any available spectrum holes which are temporarily and/or spatially unused by the primary users to use them for their own transmission. In this context, the demand for maximizing the secondary users’ network capacity while maintaining high protection level to primary users is very crucial. This research work presents two operational modes for the cognitive users’ network, namely, constant primary user protection (CPUP) and constant secondary user spectrum usability (CSUSU). The simulation results show that cooperating all secondary users in the network does not necessarily lead to attain the optimum performance, but instead, it is achieved by cooperating a certain number of users who possess the highest primary user’s signal-to-noise ratio values at their receivers.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Traffic Engineering in Ethernet Networks by Using Shortcut Switching Strategy 基于快捷交换策略的以太网流量工程
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.29
F. Faghani, G. Mirjalily
IEEE STP is a layer-2 protocol which provides a loop-free connectivity across various network nodes. STP does this task by reducing the topology of a switched network to a tree topology where redundant ports are blocked. This action ensures there is a unique path from any node to every other node. Blocked ports are then kept in a standby mode of operation until a network failure occurs. In STP, there isn’t any traffic engineering mechanism for load balancing. This results in uneven load distribution and bottlenecks especially close to the Root. In this paper, we propose a novel switching strategy that uses blocked ports to forward frames in some special and restricted cases. This decreases the average traffic volume on links and switches specially close to the Root, improves load balancing on links and switches and reduces the average number of switching hops.
STP是一种二层协议,它提供了跨各种网络节点的无环路连接。STP通过将交换网络的拓扑结构简化为阻塞冗余端口的树状拓扑来完成这项任务。此操作确保从任何节点到其他每个节点都有唯一的路径。然后,阻塞的端口保持在备用操作模式,直到发生网络故障。在STP中,没有任何流量工程机制来实现负载均衡。这导致负载分布不均匀和瓶颈,特别是在靠近根的地方。在本文中,我们提出了一种新的交换策略,在一些特殊和受限的情况下,使用阻塞端口转发帧。这样可以减少靠近根节点的链路和交换机的平均流量,提高链路和交换机的负载分担能力,减少平均交换跳数。
{"title":"Traffic Engineering in Ethernet Networks by Using Shortcut Switching Strategy","authors":"F. Faghani, G. Mirjalily","doi":"10.1109/ICFCC.2009.29","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.29","url":null,"abstract":"IEEE STP is a layer-2 protocol which provides a loop-free connectivity across various network nodes. STP does this task by reducing the topology of a switched network to a tree topology where redundant ports are blocked. This action ensures there is a unique path from any node to every other node. Blocked ports are then kept in a standby mode of operation until a network failure occurs. In STP, there isn’t any traffic engineering mechanism for load balancing. This results in uneven load distribution and bottlenecks especially close to the Root. In this paper, we propose a novel switching strategy that uses blocked ports to forward frames in some special and restricted cases. This decreases the average traffic volume on links and switches specially close to the Root, improves load balancing on links and switches and reduces the average number of switching hops.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"411 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance Evaluation of Shape Adaptive Discrete Wavelet Transform Based Magnetic Resonance Images Coding 基于形状自适应离散小波变换的磁共振图像编码性能评价
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.117
G. Suresh, S. Sudha, R. Sukanesh
Region based coding is an important feature in today’s image coding techniques as it follows different regions of the image will be encoded at different bit rates and hence at different qualities rather than encoding the entire image with a single quality constraints. This paper evaluates the features of using Shape Adaptive Wavelet Transform for the region based coding of the brain magnetic resonance images, in which the brain part will be encoded with more importance than the background. Shape Adaptive Discrete Wavelet Transform (SA-DWT) can transform the regions of interest and the background on the images independently and the coefficients can be encoded by using the SPIHT coding at different levels. This algorithm was compared with the existing wavelet based coding techniques and a better PSNR was achieved for the same bit rate by reconstructing the region of interest with high quality than the background.
基于区域的编码是当今图像编码技术的一个重要特征,因为它遵循图像的不同区域将以不同的比特率编码,因此具有不同的质量,而不是用单一的质量约束编码整个图像。本文评价了形状自适应小波变换在脑磁共振图像区域编码中的特点,在脑区域编码中,大脑部分比背景更重要。形状自适应离散小波变换(SA-DWT)可以对图像上感兴趣的区域和背景进行独立变换,并且可以通过不同层次的SPIHT编码对系数进行编码。将该算法与现有的基于小波的编码技术进行了比较,在相同比特率下,通过重建比背景质量更高的感兴趣区域,获得了更好的PSNR。
{"title":"Performance Evaluation of Shape Adaptive Discrete Wavelet Transform Based Magnetic Resonance Images Coding","authors":"G. Suresh, S. Sudha, R. Sukanesh","doi":"10.1109/ICFCC.2009.117","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.117","url":null,"abstract":"Region based coding is an important feature in today’s image coding techniques as it follows different regions of the image will be encoded at different bit rates and hence at different qualities rather than encoding the entire image with a single quality constraints. This paper evaluates the features of using Shape Adaptive Wavelet Transform for the region based coding of the brain magnetic resonance images, in which the brain part will be encoded with more importance than the background. Shape Adaptive Discrete Wavelet Transform (SA-DWT) can transform the regions of interest and the background on the images independently and the coefficients can be encoded by using the SPIHT coding at different levels. This algorithm was compared with the existing wavelet based coding techniques and a better PSNR was achieved for the same bit rate by reconstructing the region of interest with high quality than the background.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126908053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach 车载自组织网络中的消息认证:基于ECDSA的方法
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.120
S. Manvi, M. Kakkasageri, D. G. Adiga
Vehicular Ad hoc Networks (VANETs) are promising approach for facilitating road safety, traffic management,and infotainment dissemination for drivers and passengers.However, it is subject to various malicious abuses and security attacks which hinder it from practical implementation.Effective and robust solutions for addressing security and privacy issues are critical for the wide-spread adoption of VANETs. In this paper, we propose an Elliptic Curve Digital Signature Algorithm (ECDSA) based message authentication in a VANET. The operation sequence of the proposed scheme is as follows: 1) Source vehicle generates private key and public key. 2) Public key is made available to all the vehicles in the VANET. 3) Source vehicle creates a hash of the message using secured hash algorithm. 4) Secured has his encrypted using private key in the source vehicle ands ends it to the destination vehicle. 5) At the destination vehicle, the received encrypted message is decrypted using the public key. The result of the decryption will be the hash of the message. 6) Destination vehicle can then hash the message in the same way as source vehicle did and compare the two hashes. Using this proposed scheme, strong authentication policy is provided for the destination vehicle.Because hashing is relatively unique, any changes in the message would change the message hash.
车辆自组织网络(VANETs)是一种很有前途的方法,可以促进道路安全、交通管理以及为驾驶员和乘客提供信息娱乐传播。然而,它受到各种恶意滥用和安全攻击,阻碍了它的实际实施。解决安全和隐私问题的有效和强大的解决方案对于vanet的广泛采用至关重要。本文提出了一种基于椭圆曲线数字签名算法(ECDSA)的VANET消息认证方法。该方案的操作顺序如下:1)源车辆生成私钥和公钥。2) VANET中的所有车辆都可以使用公钥。3)源车辆使用安全哈希算法创建消息的哈希。4) Secured在源车辆中使用私钥进行加密,并将其发送到目的车辆。5)在目的车辆上,使用公钥对接收到的加密消息进行解密。解密的结果将是消息的哈希值。6)然后目标车辆可以用与源车辆相同的方式对消息进行哈希,并比较两个哈希值。该方案为目标车辆提供了强认证策略。由于哈希是相对唯一的,因此消息中的任何更改都会更改消息哈希。
{"title":"Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach","authors":"S. Manvi, M. Kakkasageri, D. G. Adiga","doi":"10.1109/ICFCC.2009.120","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.120","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) are promising approach for facilitating road safety, traffic management,and infotainment dissemination for drivers and passengers.However, it is subject to various malicious abuses and security attacks which hinder it from practical implementation.Effective and robust solutions for addressing security and privacy issues are critical for the wide-spread adoption of VANETs. In this paper, we propose an Elliptic Curve Digital Signature Algorithm (ECDSA) based message authentication in a VANET. The operation sequence of the proposed scheme is as follows: 1) Source vehicle generates private key and public key. 2) Public key is made available to all the vehicles in the VANET. 3) Source vehicle creates a hash of the message using secured hash algorithm. 4) Secured has his encrypted using private key in the source vehicle ands ends it to the destination vehicle. 5) At the destination vehicle, the received encrypted message is decrypted using the public key. The result of the decryption will be the hash of the message. 6) Destination vehicle can then hash the message in the same way as source vehicle did and compare the two hashes. Using this proposed scheme, strong authentication policy is provided for the destination vehicle.Because hashing is relatively unique, any changes in the message would change the message hash.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
P2P Traffic Identification Based on NetFlow TCP Flag 基于NetFlow TCP标志的P2P流量识别
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.151
Wang Jinsong, L. Weiwei, Zhang Yan, L. Tao, Wang Zilong
P2P flow identification is the precondition of flow control in large-scale network. For the limited practicality existing in P2P flow identification method based on flow characteristic, a novel P2P traffic identification method based on NetFlow TCP Flag is proposed which classified traffic as P2P flow or non-P2P flow. Experiments prove that the method can detect P2P flow very effectively in large-scale network.
P2P流量识别是大规模网络中流量控制的前提。针对基于流量特征的P2P流量识别方法实用性有限的问题,提出了一种基于NetFlow TCP标志的P2P流量识别方法,将流量划分为P2P流和非P2P流。实验证明,该方法可以非常有效地检测大规模网络中的P2P流量。
{"title":"P2P Traffic Identification Based on NetFlow TCP Flag","authors":"Wang Jinsong, L. Weiwei, Zhang Yan, L. Tao, Wang Zilong","doi":"10.1109/ICFCC.2009.151","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.151","url":null,"abstract":"P2P flow identification is the precondition of flow control in large-scale network. For the limited practicality existing in P2P flow identification method based on flow characteristic, a novel P2P traffic identification method based on NetFlow TCP Flag is proposed which classified traffic as P2P flow or non-P2P flow. Experiments prove that the method can detect P2P flow very effectively in large-scale network.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121525634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dual-Band Coplanar-Waveguide-Fed Slot-Coupled Rectangular Dielectric Resonator Antenna 双频共面波导馈电狭缝耦合矩形介质谐振器天线
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.103
A. Omar, M. Al-Hasan
Dual band antennas are important in communication systems which operate in more than one frequency band. This paper presents a new dual band coplanar waveguide- fed- slot coupled rectangular dielectric resonator antenna operating at the two frequency bands centered at 5.4 and 6.8 GHz. The use of DR allows for unidirectional radiation with a front to back ratio of more than 10 dB. The designed antenna is linearly polarized with a cross polarization level more than 26 dB lower than the co-polarization level.
双频天线在工作在多个频带的通信系统中是很重要的。本文提出了一种工作在5.4 GHz和6.8 GHz两个频段的新型双频共面波导馈电槽耦合矩形介质谐振器天线。DR的使用允许单向辐射,前后比超过10db。所设计的天线为线极化,交叉极化电平比共极化电平低26 dB以上。
{"title":"Dual-Band Coplanar-Waveguide-Fed Slot-Coupled Rectangular Dielectric Resonator Antenna","authors":"A. Omar, M. Al-Hasan","doi":"10.1109/ICFCC.2009.103","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.103","url":null,"abstract":"Dual band antennas are important in communication systems which operate in more than one frequency band. This paper presents a new dual band coplanar waveguide- fed- slot coupled rectangular dielectric resonator antenna operating at the two frequency bands centered at 5.4 and 6.8 GHz. The use of DR allows for unidirectional radiation with a front to back ratio of more than 10 dB. The designed antenna is linearly polarized with a cross polarization level more than 26 dB lower than the co-polarization level.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Electromagnetism Metaheuristic Applied to the Problem of Scheduling in FSHs 电磁元启发式算法在FSHs调度问题中的应用
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.12
K. Zerrouki, K. Belkadi, M. Benyettou
The métaheuristic are approximate methods which deal with difficult optimization problems. Work that we present in this paper has primarily as an objective of presented the adaptation and the implementation of one of advanced metaheuristic which is the Electromagnetism Metaheuristic (EM) applied to the systems of production of the type Hybrid Flow Shop (FSHs) for the scheduling and the assignment problem. Electromagnetism Metaheuristic is a recent method of optimization which takes its inspiration in the electromagnetic law (attraction and repulsion) of Coulomb on the charged particles. For this metaheuristic, we will start by presenting his general principle, its principle algorithm, its most important main features and parameters like its scopes of application. We will propose then an adaptation of this method to the discrete case on the scheduling problems of the production systems of the type Hybrid Flow Shop (FSHs). We present then the comparison between the metaheuristics (Genetic Algorithms (GA) and Particle Swarm Optimization method (PSO)), and the hybrid metaheuristic (Electromagnetism Metaheuristic EM) applied to the same FSHs problem. Finally we will present the results obtained by this method (EM) applied to FSHs for the two problems: scheduling and assignment.
启发式算法是一种处理复杂优化问题的近似方法。本文研究的主要目的是将一种先进的元启发式算法——电磁元启发式算法应用于混合流车间(FSHs)生产系统的调度和分配问题的改进和实现。电磁元启发式算法是一种新的优化方法,它的灵感来自于带电粒子上的库仑电磁定律(吸引和排斥)。对于这个元启发式,我们将首先介绍它的一般原理,它的主要算法,它最重要的主要特征和参数,比如它的应用范围。然后,我们将该方法应用于混合流车间(FSHs)生产系统的离散调度问题。在此基础上,比较了应用于同一FSHs问题的元启发式算法(遗传算法和粒子群优化方法)和混合元启发式算法(电磁元启发式EM)。最后给出了将该方法应用于FSHs的调度和分配两个问题的结果。
{"title":"Electromagnetism Metaheuristic Applied to the Problem of Scheduling in FSHs","authors":"K. Zerrouki, K. Belkadi, M. Benyettou","doi":"10.1109/ICFCC.2009.12","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.12","url":null,"abstract":"The métaheuristic are approximate methods which deal with difficult optimization problems. Work that we present in this paper has primarily as an objective of presented the adaptation and the implementation of one of advanced metaheuristic which is the Electromagnetism Metaheuristic (EM) applied to the systems of production of the type Hybrid Flow Shop (FSHs) for the scheduling and the assignment problem. Electromagnetism Metaheuristic is a recent method of optimization which takes its inspiration in the electromagnetic law (attraction and repulsion) of Coulomb on the charged particles. For this metaheuristic, we will start by presenting his general principle, its principle algorithm, its most important main features and parameters like its scopes of application. We will propose then an adaptation of this method to the discrete case on the scheduling problems of the production systems of the type Hybrid Flow Shop (FSHs). We present then the comparison between the metaheuristics (Genetic Algorithms (GA) and Particle Swarm Optimization method (PSO)), and the hybrid metaheuristic (Electromagnetism Metaheuristic EM) applied to the same FSHs problem. Finally we will present the results obtained by this method (EM) applied to FSHs for the two problems: scheduling and assignment.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing of IPv6 Protocol Environment at University of Kuala Lumpur: Measurement of IPv6 and IPv4 Performance 吉隆坡大学IPv6协议环境的实现:IPv6和IPv4性能的测量
Pub Date : 2009-04-03 DOI: 10.1109/ICFCC.2009.145
M. Ismail, Z. Abidin
IPv6 provides a platform for new Internet functionality. It includes support for real-time flows, provider selection, and host mobility, end-to-end security, auto-configuration, and auto-reconfiguration. It solves the Internet scaling problem, provides a flexible transition mechanism for the current Internet, and was designed to meet the needs of new markets such as nomadic personal computing devices, networked entertainment, and device control. The significant of this study is to describe on development of a video conferencing system with multimedia capabilities (Video + Audio) over IPv6 environment at University of Kuala Lumpur (campus environment). The beneficial and apparent of this research is to introduce a new service of the Internet Protocol (IPv6) at the campus environment. The concept of multicasting is be explored as this was used in the development of the video conferencing (Video + Audio). By comparing IPv6 and IPv4 video conferencing performance, we focus on problems that are only present in the IPv6 environments.
IPv6为新的互联网功能提供了一个平台。它包括对实时流、提供者选择和主机移动性、端到端安全性、自动配置和自动重新配置的支持。它解决了互联网的可扩展性问题,为当前的互联网提供了一种灵活的过渡机制,并旨在满足新市场的需求,如游牧式个人计算设备、网络化娱乐和设备控制。本研究的意义在于描述吉隆坡大学(校园环境)在IPv6环境下具有多媒体功能(视频+音频)的视频会议系统的开发。本研究的有益和显著之处是在校园环境中引入一种新的互联网协议(IPv6)服务。在视频会议(视频+音频)的开发中使用了多播的概念,因此对该概念进行了探索。通过比较IPv6和IPv4的视频会议性能,我们将重点放在只存在于IPv6环境中的问题上。
{"title":"Implementing of IPv6 Protocol Environment at University of Kuala Lumpur: Measurement of IPv6 and IPv4 Performance","authors":"M. Ismail, Z. Abidin","doi":"10.1109/ICFCC.2009.145","DOIUrl":"https://doi.org/10.1109/ICFCC.2009.145","url":null,"abstract":"IPv6 provides a platform for new Internet functionality. It includes support for real-time flows, provider selection, and host mobility, end-to-end security, auto-configuration, and auto-reconfiguration. It solves the Internet scaling problem, provides a flexible transition mechanism for the current Internet, and was designed to meet the needs of new markets such as nomadic personal computing devices, networked entertainment, and device control. The significant of this study is to describe on development of a video conferencing system with multimedia capabilities (Video + Audio) over IPv6 environment at University of Kuala Lumpur (campus environment). The beneficial and apparent of this research is to introduce a new service of the Internet Protocol (IPv6) at the campus environment. The concept of multicasting is be explored as this was used in the development of the video conferencing (Video + Audio). By comparing IPv6 and IPv4 video conferencing performance, we focus on problems that are only present in the IPv6 environments.","PeriodicalId":338489,"journal":{"name":"2009 International Conference on Future Computer and Communication","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2009 International Conference on Future Computer and Communication
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1