首页 > 最新文献

2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
The Research on Morpheme-Based Mongolian-Chinese Neural Machine Translation 基于语素的蒙汉神经机器翻译研究
Siriguleng Wang, Wuyuntana
In view of the rich morphology of Mongolian language and the limited vocabulary of neural machine translation, this paper firstly segmenting Mongolian words from different granularity, which are the segmentation of separates morphological suffixes and the segmentation of Ligatures morphological suffixes. For Chinese, we use word segmentation and word division. Then, we studied the morpheme-based Mongolian-Chinese end-to-end neural machine translation under the framework of bidirectional encoder and attention-based decoder. The experimental results show that the segmentation of Mongolian word effectively solves the data sparsity of Mongolian, and the morpheme-based Mongolian-Chinese neural machine translation model can improve the quality of machine translation. The best NIST and BLEU values of the morpheme-based Mongolian-Chinese Neural Machine Translation results were respectively reached 9.4216 and 0.6320.
针对蒙古语丰富的形态学和神经机器翻译有限的词汇量,本文首先对蒙古语进行了不同粒度的分词,分别是分离形态后缀的分词和结扎形态后缀的分词。对于汉语,我们使用分词和分词。然后,研究了双向编码器和注意解码器框架下基于语素的蒙汉端到端神经机器翻译。实验结果表明,蒙古语词切分有效地解决了蒙古语的数据稀疏性问题,基于语素的蒙汉神经机器翻译模型可以提高机器翻译的质量。基于语素的蒙汉神经机器翻译结果的最佳NIST值和BLEU值分别达到9.4216和0.6320。
{"title":"The Research on Morpheme-Based Mongolian-Chinese Neural Machine Translation","authors":"Siriguleng Wang, Wuyuntana","doi":"10.1109/INFOCT.2019.8710936","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710936","url":null,"abstract":"In view of the rich morphology of Mongolian language and the limited vocabulary of neural machine translation, this paper firstly segmenting Mongolian words from different granularity, which are the segmentation of separates morphological suffixes and the segmentation of Ligatures morphological suffixes. For Chinese, we use word segmentation and word division. Then, we studied the morpheme-based Mongolian-Chinese end-to-end neural machine translation under the framework of bidirectional encoder and attention-based decoder. The experimental results show that the segmentation of Mongolian word effectively solves the data sparsity of Mongolian, and the morpheme-based Mongolian-Chinese neural machine translation model can improve the quality of machine translation. The best NIST and BLEU values of the morpheme-based Mongolian-Chinese Neural Machine Translation results were respectively reached 9.4216 and 0.6320.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123894521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FENet: Roles Classification of IP Addresses Using Connection Patterns FENet:根据连接模式对IP地址进行角色分类
Fei Du, Yongzheng Zhang, Xiuguo Bao, Boyuan Liu
It is valuable to classify IP address roles based on network traffic behavior for network security analysis. Many previous studies have focused on coarse-grained classification (e.g., servers, clients and P2P, and so on.), these do not meet the increasingly diverse needs of applications. In this paper, we propose a novel approach for learning the continuous feature representation of connection patterns that we call FENet, which focuses on the low-dimensional embedding of IP address connection features. Thus, we trained two-tier neural networks that classified IP address roles in the given network dataset. Our approach can achieve more fine granularity representation and classification of IP address roles. Experimental results demonstrate the effectiveness of FENet over existing state-of-the-art techniques. In several real-world networks from active IP addresses, we have achieved very high classification accuracy and stability.
基于网络流量行为对IP地址角色进行分类,对网络安全分析具有重要意义。以前的许多研究都集中在粗粒度分类(如服务器、客户端和P2P等)上,这已经不能满足日益多样化的应用需求。在本文中,我们提出了一种新的方法来学习连接模式的连续特征表示,我们称之为FENet,它侧重于IP地址连接特征的低维嵌入。因此,我们训练了两层神经网络,在给定的网络数据集中对IP地址角色进行分类。我们的方法可以实现更细粒度的IP地址角色表示和分类。实验结果表明,FENet的有效性优于现有的最先进的技术。在几个来自活跃IP地址的真实网络中,我们取得了非常高的分类精度和稳定性。
{"title":"FENet: Roles Classification of IP Addresses Using Connection Patterns","authors":"Fei Du, Yongzheng Zhang, Xiuguo Bao, Boyuan Liu","doi":"10.1109/INFOCT.2019.8711412","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711412","url":null,"abstract":"It is valuable to classify IP address roles based on network traffic behavior for network security analysis. Many previous studies have focused on coarse-grained classification (e.g., servers, clients and P2P, and so on.), these do not meet the increasingly diverse needs of applications. In this paper, we propose a novel approach for learning the continuous feature representation of connection patterns that we call FENet, which focuses on the low-dimensional embedding of IP address connection features. Thus, we trained two-tier neural networks that classified IP address roles in the given network dataset. Our approach can achieve more fine granularity representation and classification of IP address roles. Experimental results demonstrate the effectiveness of FENet over existing state-of-the-art techniques. In several real-world networks from active IP addresses, we have achieved very high classification accuracy and stability.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114978983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparison of Information Retrieval Techniques for Traceability Link Recovery 溯源链路恢复信息检索技术比较
Danissa V. Rodriguez, D. Carver
Requirements traceability supports many software engineering activities such as change impact analysis and requirements validation, providing benefits to the overall quality of software systems. Factors such as lack of communication, time pressure problems, and unsuccessfully implemented traceability practices result in developers losing track of requirements. Requirements traceability is a primary means to address completeness and accuracy of requirements. It is an active research topic for software engineers. Textual analysis and information retrieval techniques have been applied to the requirements traceability recovery problem for many years, due to the textual components of requirements and source code. Information retrieval techniques are semiautomatic techniques for recovering traceability links and on occasion, they have become the baseline for automatic methods applied to requirements traceability recovery. We evaluate the performance of IR techniques applied to the requirement traceability recovery process. The most popular information retrieval techniques applied to the requirements traceability recovery problem are the IR Probabilistic, Vector Space Model, and Latent Semantic Index approach. All three approaches rank documents by using one of the documents for extracting queries and the other as the documents being search using those extracted queries; however, they apply different internal logics for establishing similarities. We compared IR Probabilistic, Vector Space Model, and Latent Semantic Index approaches to evaluate their performance for requirement traceability recovery using the metrics of precision and recall. Experimental results indicate a low precision and recall for the LSI technique and high precision and low recall for both the IR probabilistic and the VSM techniques.
需求可追溯性支持许多软件工程活动,例如变更影响分析和需求验证,为软件系统的整体质量提供了好处。诸如缺乏沟通、时间压力问题和未成功实现的可追溯性实践等因素导致开发人员失去对需求的跟踪。需求可追溯性是处理需求完整性和准确性的主要手段。对于软件工程师来说,这是一个活跃的研究课题。由于需求和源代码的文本组件,文本分析和信息检索技术已经应用于需求可追溯性恢复问题多年。信息检索技术是用于恢复可追溯性链接的半自动技术,有时,它们已经成为应用于需求可追溯性恢复的自动方法的基线。我们评估了应用于需求可追溯性恢复过程的IR技术的性能。应用于需求可追溯性恢复问题的最流行的信息检索技术是IR概率、向量空间模型和潜在语义索引方法。这三种方法对文档进行排序,方法是使用一个文档提取查询,另一个文档作为使用提取的查询进行搜索的文档;然而,它们采用不同的内部逻辑来建立相似性。我们比较了IR概率、向量空间模型和潜在语义索引方法,以使用精度和召回率的度量来评估它们在需求可追溯性恢复方面的性能。实验结果表明,大规模集成电路技术具有较低的准确率和召回率,而红外概率和VSM技术具有较高的准确率和较低的召回率。
{"title":"Comparison of Information Retrieval Techniques for Traceability Link Recovery","authors":"Danissa V. Rodriguez, D. Carver","doi":"10.1109/INFOCT.2019.8710919","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710919","url":null,"abstract":"Requirements traceability supports many software engineering activities such as change impact analysis and requirements validation, providing benefits to the overall quality of software systems. Factors such as lack of communication, time pressure problems, and unsuccessfully implemented traceability practices result in developers losing track of requirements. Requirements traceability is a primary means to address completeness and accuracy of requirements. It is an active research topic for software engineers. Textual analysis and information retrieval techniques have been applied to the requirements traceability recovery problem for many years, due to the textual components of requirements and source code. Information retrieval techniques are semiautomatic techniques for recovering traceability links and on occasion, they have become the baseline for automatic methods applied to requirements traceability recovery. We evaluate the performance of IR techniques applied to the requirement traceability recovery process. The most popular information retrieval techniques applied to the requirements traceability recovery problem are the IR Probabilistic, Vector Space Model, and Latent Semantic Index approach. All three approaches rank documents by using one of the documents for extracting queries and the other as the documents being search using those extracted queries; however, they apply different internal logics for establishing similarities. We compared IR Probabilistic, Vector Space Model, and Latent Semantic Index approaches to evaluate their performance for requirement traceability recovery using the metrics of precision and recall. Experimental results indicate a low precision and recall for the LSI technique and high precision and low recall for both the IR probabilistic and the VSM techniques.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129112911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ICICT 2019 Title Page ICICT 2019标题页
{"title":"ICICT 2019 Title Page","authors":"","doi":"10.1109/infoct.2019.8711401","DOIUrl":"https://doi.org/10.1109/infoct.2019.8711401","url":null,"abstract":"","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125343148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Critical Success Factors for e-Government Implementation in South Africa’s Local government: Factoring in Apartheid Digital Divide 南非地方政府实施电子政务的关键成功因素:考虑种族隔离的数字鸿沟
M. Masinde, M. Mkhonto
Local government institutions present the ideal place for majority of the interactions between the government and the citizens. Despite this, most e-government implementation strategies tend to be national outfits that fail to consider the unique contexts of the local government. South Africa’s local government takes the form and shape of the national socio-political system that is characterized by alarming levels of inequalities. This has resulted in sharp apartheid digital divide for which local e-government implementers cannot afford to ignore. Using data from three municipalities, drawn from each of the three categories of South Africa’s local government institutions, this paper presents the critical success factors for guiding e-government implementation initiatives at local government level. Results from principal component analysis and arithmetic mean of data from 243 respondents was used to determine the significance of the factors relating to the priority e-services, e-skills and e-infrastructures.
地方政府机构是大多数政府与公民互动的理想场所。尽管如此,大多数电子政务的实施策略往往是全国性的,而没有考虑到地方政府的独特背景。南非的地方政府采取了国家社会政治制度的形式和形态,其特点是不平等程度令人震惊。这导致了严重的种族隔离数字鸿沟,地方电子政务执行者不能忽视这一点。本文利用来自三个城市的数据,分别从南非地方政府机构的三个类别中抽取数据,提出了指导地方政府层面实施电子政务举措的关键成功因素。采用主成分分析和算术平均数对243名受访者的数据进行分析,以确定优先电子服务、电子技能和电子基础设施相关因素的重要性。
{"title":"The Critical Success Factors for e-Government Implementation in South Africa’s Local government: Factoring in Apartheid Digital Divide","authors":"M. Masinde, M. Mkhonto","doi":"10.1109/INFOCT.2019.8710930","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710930","url":null,"abstract":"Local government institutions present the ideal place for majority of the interactions between the government and the citizens. Despite this, most e-government implementation strategies tend to be national outfits that fail to consider the unique contexts of the local government. South Africa’s local government takes the form and shape of the national socio-political system that is characterized by alarming levels of inequalities. This has resulted in sharp apartheid digital divide for which local e-government implementers cannot afford to ignore. Using data from three municipalities, drawn from each of the three categories of South Africa’s local government institutions, this paper presents the critical success factors for guiding e-government implementation initiatives at local government level. Results from principal component analysis and arithmetic mean of data from 243 respondents was used to determine the significance of the factors relating to the priority e-services, e-skills and e-infrastructures.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131222592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Movement Primitives for Movement Generation Using GMM-GMR Analytical Method 基于GMM-GMR分析方法的动态运动基元生成
Boyang Ti, Yongsheng Gao, Qiang Li, Jie Zhao
Motion generalization is an effective way for robot leaner to learn from demonstration, especially they are set within a novel situation. However, as for learned skills, to generate humanoid and natural behaviour for robot is the key challenge in robot skill learning. In this paper, we proposed a method using the statistical method Gaussian mixture model and Gaussian mixture regression (GMM-GMR) to analyze the data from human demonstration. For accurate learning, the raw data is pretreated by dynamic time warping (DTW). Dynamic movement primitives (DMP) aim to generate a human-like motion to a new goal, employing the data processed by GMM-GMR. Including induction, summarizing demonstration data and generalizing skill, the results, in comparison with Average method pretreating data, show that our method can achieve task-specific generalization with more smooth and human-like trajectory.
运动泛化是机器人学习者从演示中学习的一种有效方法,特别是在一个新的环境中。然而,对于学习到的技能,如何生成机器人的类人行为和自然行为是机器人技能学习的关键挑战。本文提出了一种利用统计方法高斯混合模型和高斯混合回归(GMM-GMR)对人体演示数据进行分析的方法。为了准确学习,对原始数据进行动态时间规整(DTW)预处理。动态运动原语(Dynamic movement primitives, DMP)的目的是利用GMM-GMR处理的数据,生成一个类似人的运动到一个新的目标。包括归纳、汇总演示数据和泛化技巧,结果表明,与Average方法预处理数据相比,我们的方法可以实现特定任务的泛化,并且具有更平滑、更人性化的轨迹。
{"title":"Dynamic Movement Primitives for Movement Generation Using GMM-GMR Analytical Method","authors":"Boyang Ti, Yongsheng Gao, Qiang Li, Jie Zhao","doi":"10.1109/INFOCT.2019.8711390","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711390","url":null,"abstract":"Motion generalization is an effective way for robot leaner to learn from demonstration, especially they are set within a novel situation. However, as for learned skills, to generate humanoid and natural behaviour for robot is the key challenge in robot skill learning. In this paper, we proposed a method using the statistical method Gaussian mixture model and Gaussian mixture regression (GMM-GMR) to analyze the data from human demonstration. For accurate learning, the raw data is pretreated by dynamic time warping (DTW). Dynamic movement primitives (DMP) aim to generate a human-like motion to a new goal, employing the data processed by GMM-GMR. Including induction, summarizing demonstration data and generalizing skill, the results, in comparison with Average method pretreating data, show that our method can achieve task-specific generalization with more smooth and human-like trajectory.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research and Design of Parking Detector Based on NB-IoT and Geomagnetism 基于NB-IoT和地磁的停车探测器研究与设计
Yilan Xing, Jian-yi Li, Xing-hui Wang
In view of the difficulty of parking, it is urgent to build an intelligent parking system. In this paper, a wireless parking detector based on geomagnetic detection and NB-IoT technology is proposed. The parking detector consists of three parts: the STM32 microcontroller, the geomagnetic sensor and the NB wireless module. Geomagnetic sensor collects the intensity of the magnetic field around, and then the magnetic field intensity is sent to the microcontroller. The microcontroller determines whether the parking space is occupied by the algorithm, and then transfers the occupancy of the parking space to the background management system in real time through NB.
针对停车难的现状,构建智能停车系统刻不容缓。本文提出了一种基于地磁探测和NB-IoT技术的无线停车探测器。该停车探测器由三部分组成:STM32单片机、地磁传感器和NB无线模块。地磁传感器采集周围的磁场强度,然后将磁场强度发送给单片机。单片机通过算法判断车位是否被占用,然后通过NB将车位占用情况实时传输到后台管理系统。
{"title":"Research and Design of Parking Detector Based on NB-IoT and Geomagnetism","authors":"Yilan Xing, Jian-yi Li, Xing-hui Wang","doi":"10.1109/infoct.2019.8711174","DOIUrl":"https://doi.org/10.1109/infoct.2019.8711174","url":null,"abstract":"In view of the difficulty of parking, it is urgent to build an intelligent parking system. In this paper, a wireless parking detector based on geomagnetic detection and NB-IoT technology is proposed. The parking detector consists of three parts: the STM32 microcontroller, the geomagnetic sensor and the NB wireless module. Geomagnetic sensor collects the intensity of the magnetic field around, and then the magnetic field intensity is sent to the microcontroller. The microcontroller determines whether the parking space is occupied by the algorithm, and then transfers the occupancy of the parking space to the background management system in real time through NB.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"185 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120977916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel Approach for Test Case Prioritization Using ACO Algorithm 基于蚁群算法的测试用例优先排序新方法
Riza Dhiman, Vinay Chopra
Regression testing is used to retest the component of a system that verifies that after modifications defects are removed from the in effected software. Automation tools are required for these types of testing. This work is based on manual slicing and automated slicing for test case prioritization to detect maximum number of faults from the project in which some changes are done for the new version release. The slicing is the technique which will divide the whole project function wise and detect associated functions. To test the performance of proposed and existing algorithm MATLAB is being used by considering the dataset of ten projects. Each project has seven functions and four numbers of changes are defined for the regression testing. In the simulation it is being analyzed that fault detection rate is increased and execution time is reduced with the implementation of automated test case prioritization as compared to manual test case prioritization in regression testing.
回归测试用于重新测试系统的组件,以验证修改后的缺陷已从受影响的软件中移除。这些类型的测试需要自动化工具。这项工作是基于手动切片和自动切片的测试用例优先级,以检测项目中最大数量的错误,其中为新版本发布做了一些更改。切片是一种将整个项目功能明智地划分并检测相关功能的技术。为了测试所提出的算法和现有算法的性能,考虑了十个项目的数据集,并使用MATLAB进行了测试。每个项目有七个功能,并且为回归测试定义了四个更改数。在模拟中分析了与回归测试中的手动测试用例优先级相比,自动化测试用例优先级的实现提高了故障检测率,减少了执行时间。
{"title":"Novel Approach for Test Case Prioritization Using ACO Algorithm","authors":"Riza Dhiman, Vinay Chopra","doi":"10.1109/INFOCT.2019.8711039","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8711039","url":null,"abstract":"Regression testing is used to retest the component of a system that verifies that after modifications defects are removed from the in effected software. Automation tools are required for these types of testing. This work is based on manual slicing and automated slicing for test case prioritization to detect maximum number of faults from the project in which some changes are done for the new version release. The slicing is the technique which will divide the whole project function wise and detect associated functions. To test the performance of proposed and existing algorithm MATLAB is being used by considering the dataset of ten projects. Each project has seven functions and four numbers of changes are defined for the regression testing. In the simulation it is being analyzed that fault detection rate is increased and execution time is reduced with the implementation of automated test case prioritization as compared to manual test case prioritization in regression testing.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Queuing Network Approximation Method for Evaluating Performance of Computer Systems with Finite Input Source 有限输入源计算机系统性能评价的排队网络逼近方法
I. Koike, Kano Suzuki, T. Kinoshita
Queuing network techniques are effective for evaluating the performance of computer systems. We discuss a queuing network technique for computer systems in finite input source. The finite number of terminals exist in the network and a job in the network moves to the server that includes CPU, I/O equipment and memory after think-time at the terminal. When the job arrives at the server, it acquires a part of memory and executes CPU and I/O processing in the server. After the job completes CPU and I/O processing, it releases the memory and goes back to its original terminal. However, when the computer system has the memory resource, the queuing network model has no product form solution and cannot be calculated the exact solutions. We proposed here an approximation queuing network technique for calculating the performance measures of computer systems with finite input source on which multiple types of jobs exist. This technique involves dividing the queuing network into two levels; one is „inner level„ in which a job executes CPU and I/O processing, and the other is „outer level„ that includes terminals and communication lines. By dividing the network into two levels, we can prevent the number of states of the network from increasing and approximately calculate the performance measures of the network. We evaluated the proposed approximation technique by using numerical experiments and clarified the characteristics of the system response time and the mean number of jobs in the inner level.
排队网络技术是评估计算机系统性能的有效方法。讨论了有限输入源下计算机系统的排队网络技术。网络中存在有限数量的终端,网络中的作业在终端的思考时间之后转移到包含CPU、I/O设备和内存的服务器。当作业到达服务器时,它获取一部分内存并在服务器上执行CPU和I/O处理。在作业完成CPU和I/O处理后,它释放内存并返回其原始终端。然而,当计算机系统有内存资源时,排队网络模型没有乘积形式解,无法计算出精确解。本文提出了一种近似排队网络技术,用于计算存在多种类型作业的有限输入源计算机系统的性能度量。这种技术包括将排队网络划分为两个级别;一个是“内部层”,其中作业执行CPU和I/O处理,另一个是“外部层”,包括终端和通信线路。通过将网络划分为两层,我们可以防止网络状态数量的增加,并近似计算网络的性能度量。我们通过数值实验对所提出的近似技术进行了评估,并阐明了系统响应时间和内部层平均作业数的特征。
{"title":"Queuing Network Approximation Method for Evaluating Performance of Computer Systems with Finite Input Source","authors":"I. Koike, Kano Suzuki, T. Kinoshita","doi":"10.1109/INFOCT.2019.8710860","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710860","url":null,"abstract":"Queuing network techniques are effective for evaluating the performance of computer systems. We discuss a queuing network technique for computer systems in finite input source. The finite number of terminals exist in the network and a job in the network moves to the server that includes CPU, I/O equipment and memory after think-time at the terminal. When the job arrives at the server, it acquires a part of memory and executes CPU and I/O processing in the server. After the job completes CPU and I/O processing, it releases the memory and goes back to its original terminal. However, when the computer system has the memory resource, the queuing network model has no product form solution and cannot be calculated the exact solutions. We proposed here an approximation queuing network technique for calculating the performance measures of computer systems with finite input source on which multiple types of jobs exist. This technique involves dividing the queuing network into two levels; one is „inner level„ in which a job executes CPU and I/O processing, and the other is „outer level„ that includes terminals and communication lines. By dividing the network into two levels, we can prevent the number of states of the network from increasing and approximately calculate the performance measures of the network. We evaluated the proposed approximation technique by using numerical experiments and clarified the characteristics of the system response time and the mean number of jobs in the inner level.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128995059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model-Error-Observer-Based Control of Robotic Manipulator with Uncertain Dynamics 基于模型误差观测器的不确定动力学机械臂控制
Qiang Li, Yongsheng Gao, Boyang Ti, Jie Zhao
In this paper, a nonlinear controller for robotic manipulator with unknown model parameters is proposed to reach high accurate trajectory tracking. The unknown parameters such as uncertain moment of inertia, uncertain geometry of manipulator, unknown friction torque, unknown gravitational torque and payload variation are addressed. Model-based control methods require accurate model parameters, while it is difficult to get these parameters. To solve this problem, a model-error observer is proposed, and it observes the parameter error effectively. In the proposed control law, the model-error observer is adopted to handle unknown model parameters, and this controller solves the problem of model-based control methods effectively. The robust performance of the control law is confirmed in simulations, and the results show accurate path tracking in spite of the existing friction and unknown model parameters.
为了实现高精度的轨迹跟踪,提出了一种模型参数未知的机械臂非线性控制器。解决了不确定惯性矩、不确定机械臂几何形状、未知摩擦力矩、未知重力力矩和载荷变化等未知参数。基于模型的控制方法需要精确的模型参数,而这些参数很难得到。为了解决这一问题,提出了模型误差观测器,该观测器能有效地观测参数误差。该控制律采用模型误差观测器处理未知的模型参数,有效地解决了基于模型的控制方法存在的问题。仿真结果表明,该控制律具有良好的鲁棒性,在存在摩擦和模型参数未知的情况下仍能实现精确的路径跟踪。
{"title":"Model-Error-Observer-Based Control of Robotic Manipulator with Uncertain Dynamics","authors":"Qiang Li, Yongsheng Gao, Boyang Ti, Jie Zhao","doi":"10.1109/INFOCT.2019.8710865","DOIUrl":"https://doi.org/10.1109/INFOCT.2019.8710865","url":null,"abstract":"In this paper, a nonlinear controller for robotic manipulator with unknown model parameters is proposed to reach high accurate trajectory tracking. The unknown parameters such as uncertain moment of inertia, uncertain geometry of manipulator, unknown friction torque, unknown gravitational torque and payload variation are addressed. Model-based control methods require accurate model parameters, while it is difficult to get these parameters. To solve this problem, a model-error observer is proposed, and it observes the parameter error effectively. In the proposed control law, the model-error observer is adopted to handle unknown model parameters, and this controller solves the problem of model-based control methods effectively. The robust performance of the control law is confirmed in simulations, and the results show accurate path tracking in spite of the existing friction and unknown model parameters.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124591330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1