首页 > 最新文献

Third International Conference on Information Technology and Applications (ICITA'05)最新文献

英文 中文
Real-time spoken affect classification and its application in call-centres 实时语音影响分类及其在呼叫中心中的应用
Donn Morrison, Ruili Wang, L. D. Silva, W. L. Xu
We propose a novel real-time affect classification system based on features extracted from the acoustic speech signal. The proposed system analyses the speech signal and provides a real-time classification of the speaker's perceived affective state. A neural network is trained and tested using a database of 391 authentic emotional utterances from 11 speakers. Two emotions, anger and neutral, are considered. The system is designed to be speaker and text-independent and is to be deployed in a call-centre environment to assist in the handling of customer inquiries. We achieve a success rate of 80.1% accuracy in our preliminary results.
提出了一种基于声学语音信号特征提取的实时影响分类系统。该系统对语音信号进行分析,并对说话人感知到的情感状态进行实时分类。一个神经网络通过11位说话者的391个真实情感话语的数据库进行训练和测试。这里考虑了两种情绪,愤怒和中性。该系统设计为独立于扬声器和文本的系统,将部署在呼叫中心环境中,以协助处理客户查询。在我们的初步结果中,我们达到了80.1%的准确率。
{"title":"Real-time spoken affect classification and its application in call-centres","authors":"Donn Morrison, Ruili Wang, L. D. Silva, W. L. Xu","doi":"10.1109/ICITA.2005.231","DOIUrl":"https://doi.org/10.1109/ICITA.2005.231","url":null,"abstract":"We propose a novel real-time affect classification system based on features extracted from the acoustic speech signal. The proposed system analyses the speech signal and provides a real-time classification of the speaker's perceived affective state. A neural network is trained and tested using a database of 391 authentic emotional utterances from 11 speakers. Two emotions, anger and neutral, are considered. The system is designed to be speaker and text-independent and is to be deployed in a call-centre environment to assist in the handling of customer inquiries. We achieve a success rate of 80.1% accuracy in our preliminary results.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129368588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Implementation of velocity filtering for sequential architectures 时序结构中速度滤波的实现
S. Searle
Velocity filtering is a means of detecting weak point targets in imagery sequences. Pixel intensity is accumulated under an assumed target velocity and detection is predicated upon this cumulative intensity. However the unknown target velocity necessitates implementation of an entire bank of velocity filters, which requires dedicated hardware in order to be feasible. This paper describes some heuristic search methods which may be used to facilitate implementation of velocity filtering on a sequential computer. Criteria for ordering a pixel-first search through the candidate space are described. A best-first paradigm is also suggested as an alternative to pixel-first search. Monte-Carlo simulations show that both approaches are more efficient and yield better results than an arbitrary-order search of the candidate space.
速度滤波是一种检测图像序列中弱点目标的方法。在假定的目标速度下累积像素强度,并根据该累积强度预测检测。然而,未知的目标速度需要实现一整组速度滤波器,这需要专用硬件才能实现。本文描述了一些启发式搜索方法,这些方法可用于在顺序计算机上方便地实现速度滤波。描述了在候选空间中排序像素优先搜索的标准。最佳优先范式也被建议作为像素优先搜索的替代方案。蒙特卡罗仿真表明,这两种方法都比任意顺序搜索候选空间更有效,结果更好。
{"title":"Implementation of velocity filtering for sequential architectures","authors":"S. Searle","doi":"10.1109/ICITA.2005.157","DOIUrl":"https://doi.org/10.1109/ICITA.2005.157","url":null,"abstract":"Velocity filtering is a means of detecting weak point targets in imagery sequences. Pixel intensity is accumulated under an assumed target velocity and detection is predicated upon this cumulative intensity. However the unknown target velocity necessitates implementation of an entire bank of velocity filters, which requires dedicated hardware in order to be feasible. This paper describes some heuristic search methods which may be used to facilitate implementation of velocity filtering on a sequential computer. Criteria for ordering a pixel-first search through the candidate space are described. A best-first paradigm is also suggested as an alternative to pixel-first search. Monte-Carlo simulations show that both approaches are more efficient and yield better results than an arbitrary-order search of the candidate space.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128500746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multivariate interdependent discretization for continuous attribute 连续属性的多元相互离散化
S. Chao, Yiping Li
Decision tree is one of the most widely used and practical methods in the data mining and machine learning discipline. However, many discretization algorithms developed in this field focus on univariate only, which is inadequate to handle the critical problems especially owned by medical domain. In this paper, we propose a new multivariate discretization method called multivariate interdependent discretization for continuous attributes - MIDCA. Our novel algorithm can minimize the uncertainty between the interdependent attribute and the continuous-valued attribute, and at the same time to maximize their correlation. The empirical results demonstrate a comparison of performance of various decision tree algorithms on twelve real-life datasets from UCI repository.
决策树是数据挖掘和机器学习领域中应用最广泛和最实用的方法之一。然而,该领域发展的许多离散化算法只关注单变量,不足以处理医学领域的关键问题。在本文中,我们提出了一种新的多元离散化方法,称为连续属性的多元相互依赖离散化- MIDCA。该算法可以最小化相互依赖属性与连续值属性之间的不确定性,同时最大化它们之间的相关性。实证结果比较了不同决策树算法在UCI数据库12个实际数据集上的性能。
{"title":"Multivariate interdependent discretization for continuous attribute","authors":"S. Chao, Yiping Li","doi":"10.1109/ICITA.2005.188","DOIUrl":"https://doi.org/10.1109/ICITA.2005.188","url":null,"abstract":"Decision tree is one of the most widely used and practical methods in the data mining and machine learning discipline. However, many discretization algorithms developed in this field focus on univariate only, which is inadequate to handle the critical problems especially owned by medical domain. In this paper, we propose a new multivariate discretization method called multivariate interdependent discretization for continuous attributes - MIDCA. Our novel algorithm can minimize the uncertainty between the interdependent attribute and the continuous-valued attribute, and at the same time to maximize their correlation. The empirical results demonstrate a comparison of performance of various decision tree algorithms on twelve real-life datasets from UCI repository.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128751164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Agent-based network intrusion detection system using data mining approaches 基于agent的网络入侵检测系统采用数据挖掘方法
Cheung-Leung Lui, Tak-Chung Fu, Ting-Yee Cheung
Most of the existing commercial NIDS products are signature-based but not adaptive. In this paper, an adaptive NIDS using data mining technology is developed. Data mining approaches are used to accurately capture the actual behavior of network traffic, and portfolio mined is useful for differentiating "normal" and "attack" traffics. On the other hand, most of the current researches are using only one engine for detection of various attacks; the proposed system is constructed by a number of agents, which are totally different in both training and detecting processes. Each of the agents has its own strength on capturing a kind of network behavior and hence the system has strength on detecting different types of attack. In addition, its ability on detecting new types of attack as well as a higher tolerant to fluctuations were shown. The experimental results showed that the frequent patterns mined from the audit data could be used as reliable agents, which outperformed from traditional signature-based NIDS.
现有的商业入侵检测产品大多是基于签名的,但不具备自适应能力。本文提出了一种基于数据挖掘技术的自适应网络入侵检测系统。数据挖掘方法用于准确捕获网络流量的实际行为,并且组合挖掘有助于区分“正常”和“攻击”流量。另一方面,目前大多数的研究都是使用一个引擎来检测各种攻击;该系统由多个智能体组成,这些智能体在训练和检测过程中都是完全不同的。每个代理在捕获一种网络行为方面都有自己的强度,因此系统在检测不同类型的攻击方面也有自己的强度。此外,还显示了该方法对新型攻击的检测能力以及对波动的较高容忍度。实验结果表明,从审计数据中挖掘的频繁模式可以作为可靠代理,优于传统的基于签名的网络入侵防御。
{"title":"Agent-based network intrusion detection system using data mining approaches","authors":"Cheung-Leung Lui, Tak-Chung Fu, Ting-Yee Cheung","doi":"10.1109/ICITA.2005.57","DOIUrl":"https://doi.org/10.1109/ICITA.2005.57","url":null,"abstract":"Most of the existing commercial NIDS products are signature-based but not adaptive. In this paper, an adaptive NIDS using data mining technology is developed. Data mining approaches are used to accurately capture the actual behavior of network traffic, and portfolio mined is useful for differentiating \"normal\" and \"attack\" traffics. On the other hand, most of the current researches are using only one engine for detection of various attacks; the proposed system is constructed by a number of agents, which are totally different in both training and detecting processes. Each of the agents has its own strength on capturing a kind of network behavior and hence the system has strength on detecting different types of attack. In addition, its ability on detecting new types of attack as well as a higher tolerant to fluctuations were shown. The experimental results showed that the frequent patterns mined from the audit data could be used as reliable agents, which outperformed from traditional signature-based NIDS.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
The Ant Algorithm for Solving Robot Path Planning Problem 求解机器人路径规划问题的蚁群算法
Gengqian Liu, Tiejun Li, Yuqing Peng, Xiangdan Hou
Using ant algorithm, robot path planning in two-dimension environment is studied. It introduces the intelligent finding optimum mechanism of ant colony. It solves the drawback of local optimization and expedites searching speed. The mathematical model is established and the algorithm is achieved with VB language, the result shows it is valid with the capability of robust and extensibility
利用蚁群算法研究了二维环境下机器人的路径规划问题。介绍了蚁群智能寻优机制。它解决了局部优化的缺点,加快了搜索速度。建立了数学模型,并用VB语言实现了算法,结果表明该算法是有效的,具有较强的鲁棒性和可扩展性
{"title":"The Ant Algorithm for Solving Robot Path Planning Problem","authors":"Gengqian Liu, Tiejun Li, Yuqing Peng, Xiangdan Hou","doi":"10.1109/ICITA.2005.268","DOIUrl":"https://doi.org/10.1109/ICITA.2005.268","url":null,"abstract":"Using ant algorithm, robot path planning in two-dimension environment is studied. It introduces the intelligent finding optimum mechanism of ant colony. It solves the drawback of local optimization and expedites searching speed. The mathematical model is established and the algorithm is achieved with VB language, the result shows it is valid with the capability of robust and extensibility","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"463 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Partition-Based Parallel PageRank Algorithm 基于分区的并行PageRank算法
A. Rungsawang, Bundit Manaskasemsak
A re-ranking technique, called "PageRank", brings a successful story behind the Googletrade search engine. Many studies focus on finding an efficient way to compute the PageRank scores of a large web graph. Researchers propose to compute them sequentially by reducing the I/O cost of disk access, improving the convergence rate, or even employing peer-2-peer architecture, etc. However, only a few concentrate on computation using parallel processing techniques. In this paper, we propose a partition-based parallel PageRank algorithm that can efficiently be run on a low-cost parallel environment like PC cluster. For comparison, we also study other two well-known PageRank techniques, and provide an analytical discussion of their performance in terms of I/O and synchronization cost, as well as memory usage. Experimental results show a promising improvement on a large artificial web graph synthesized from the TH domain
一种名为“PageRank”的重新排名技术,为谷歌贸易搜索引擎背后带来了一个成功的故事。许多研究都集中在寻找一种有效的方法来计算大型网页图的PageRank分数。研究人员建议通过降低磁盘访问的I/O成本、提高收敛速度、甚至采用点对点架构等方法来顺序计算它们。然而,只有少数人关注使用并行处理技术的计算。本文提出了一种基于分区的并行PageRank算法,该算法可以在PC集群等低成本的并行环境下高效运行。为了进行比较,我们还研究了其他两种著名的PageRank技术,并从I/O和同步成本以及内存使用方面对它们的性能进行了分析讨论。实验结果表明,从TH域合成的大型人工网络图有了很好的改进
{"title":"Partition-Based Parallel PageRank Algorithm","authors":"A. Rungsawang, Bundit Manaskasemsak","doi":"10.1109/ICITA.2005.207","DOIUrl":"https://doi.org/10.1109/ICITA.2005.207","url":null,"abstract":"A re-ranking technique, called \"PageRank\", brings a successful story behind the Googletrade search engine. Many studies focus on finding an efficient way to compute the PageRank scores of a large web graph. Researchers propose to compute them sequentially by reducing the I/O cost of disk access, improving the convergence rate, or even employing peer-2-peer architecture, etc. However, only a few concentrate on computation using parallel processing techniques. In this paper, we propose a partition-based parallel PageRank algorithm that can efficiently be run on a low-cost parallel environment like PC cluster. For comparison, we also study other two well-known PageRank techniques, and provide an analytical discussion of their performance in terms of I/O and synchronization cost, as well as memory usage. Experimental results show a promising improvement on a large artificial web graph synthesized from the TH domain","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"791 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Uncovering attacks on security protocols 揭露对安全协议的攻击
Wuu Yang
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we can uncover attacks on a security protocol that are possible with no more than a given number of rounds. Though our approach is exhaustive testing, the majority of fruitless search is cut off by selecting a small number of representative values that could be sent by an attacker. Hence, the number of scenarios is relatively small and our method is quite practical. Furthermore, our method not only reports possible attacks but also describes the attacks in great detail. This description would be very helpful to protocol designers and analyzers.
在安全通信中,安全协议是不可缺少的。我们用类似prolog的语言给出了安全协议的操作语义。有了这个语义,我们就可以发现在不超过给定回合数的情况下可能发生的对安全协议的攻击。虽然我们的方法是详尽的测试,但是通过选择少数可能由攻击者发送的代表性值来切断大多数无果搜索。因此,场景的数量相对较少,我们的方法非常实用。此外,我们的方法不仅可以报告可能的攻击,而且可以非常详细地描述攻击。这种描述对协议设计者和分析人员非常有帮助。
{"title":"Uncovering attacks on security protocols","authors":"Wuu Yang","doi":"10.1109/ICITA.2005.292","DOIUrl":"https://doi.org/10.1109/ICITA.2005.292","url":null,"abstract":"Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we can uncover attacks on a security protocol that are possible with no more than a given number of rounds. Though our approach is exhaustive testing, the majority of fruitless search is cut off by selecting a small number of representative values that could be sent by an attacker. Hence, the number of scenarios is relatively small and our method is quite practical. Furthermore, our method not only reports possible attacks but also describes the attacks in great detail. This description would be very helpful to protocol designers and analyzers.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115231031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Web digital archive ontological unification 迈向网络数字档案本体统一
Juan P. Palacios, J. Cremades, Carmen Costilla
The Web is a universal space where a huge amount of information is daily published. Digital archives (DA) constitute a valuable documentary domain to be propagated through the Web. But the virtual integration of Web heterogeneous data sources is a difficult task nowadays. This paper deals with the semantic integration of many specific DA ontologies. Beforehand, we have proposed a virtual and dynamic Web integrated architecture, based on mediator and wrapper layers. This paper is focused on a unified DA ontological proposal allocated at the mediator layer. Coming from the ISAD(G) and ISAAR(CPF) International Archival standards, two specific archival ontologies: ISAD-0 and ISAAR-0 are introduced. Besides, we have built the integrated parliamentary management system, SIAPI (successfully running at the Asamblea of Madrid since 1999) that contains a powerful parliamentary archive system. From it, we have built the SIAP-0 specific parliamentary archive ontology. Above all these ontologies, a global ontological kernel (GOK) is here introduced. The GOK, as a unifying umbrella, provides the attachment of many pre-existing specific DA ontologies. In the future, this GOK will make possible that the user query will be firstly pre-processed against to a personalized ontology, inferred from the GOK and tailored to each Web user preference's profile.
网络是一个通用的空间,每天都有大量的信息被发布。数字档案(DA)构成了一个通过网络传播的有价值的文献领域。但是Web异构数据源的虚拟集成是当前的一个难题。本文研究了许多特定数据处理本体的语义集成。在此之前,我们提出了一个基于中介层和包装层的虚拟动态Web集成体系结构。本文主要研究在中介层分配统一的数据处理本体建议。从ISAD(G)和ISAAR(CPF)国际档案标准出发,介绍了两个具体的档案本体:ISAD-0和ISAAR-0。此外,我们还建立了综合议会管理系统SIAPI(自1999年起在马德里Asamblea成功运行),其中包含强大的议会档案系统。在此基础上,我们构建了SIAP-0特定的议会存档本体。在所有这些本体之上,这里介绍一个全局本体内核(GOK)。GOK作为一个统一的保护伞,提供了许多预先存在的特定数据处理本体的附件。将来,这个GOK将使用户查询首先针对个性化本体进行预处理,从GOK中推断并根据每个Web用户偏好的配置文件进行定制。
{"title":"Towards a Web digital archive ontological unification","authors":"Juan P. Palacios, J. Cremades, Carmen Costilla","doi":"10.1109/ICITA.2005.289","DOIUrl":"https://doi.org/10.1109/ICITA.2005.289","url":null,"abstract":"The Web is a universal space where a huge amount of information is daily published. Digital archives (DA) constitute a valuable documentary domain to be propagated through the Web. But the virtual integration of Web heterogeneous data sources is a difficult task nowadays. This paper deals with the semantic integration of many specific DA ontologies. Beforehand, we have proposed a virtual and dynamic Web integrated architecture, based on mediator and wrapper layers. This paper is focused on a unified DA ontological proposal allocated at the mediator layer. Coming from the ISAD(G) and ISAAR(CPF) International Archival standards, two specific archival ontologies: ISAD-0 and ISAAR-0 are introduced. Besides, we have built the integrated parliamentary management system, SIAPI (successfully running at the Asamblea of Madrid since 1999) that contains a powerful parliamentary archive system. From it, we have built the SIAP-0 specific parliamentary archive ontology. Above all these ontologies, a global ontological kernel (GOK) is here introduced. The GOK, as a unifying umbrella, provides the attachment of many pre-existing specific DA ontologies. In the future, this GOK will make possible that the user query will be firstly pre-processed against to a personalized ontology, inferred from the GOK and tailored to each Web user preference's profile.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114899704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
"RoboPress" — An Automated Mobile Press for Manufacturing Concrete Products “RoboPress”& # 8212;一种用于制造混凝土制品的自动移动压机
G. Adam, E. Grant, Gordon K. Lee
This paper presents innovative manufacturing and control procedures applied in the design, construction and operation, of a mobile hydraulic press machine (RoboPress). The research demonstrates how the design of an automated mobile manufacturing system can be optimized through using qualitative modeling and simulation from artificial intelligence
本文介绍了应用于移动液压机(RoboPress)设计、施工和运行的创新制造和控制程序。该研究展示了如何通过使用人工智能的定性建模和仿真来优化自动化移动制造系统的设计
{"title":"\"RoboPress\" — An Automated Mobile Press for Manufacturing Concrete Products","authors":"G. Adam, E. Grant, Gordon K. Lee","doi":"10.1109/ICITA.2005.2","DOIUrl":"https://doi.org/10.1109/ICITA.2005.2","url":null,"abstract":"This paper presents innovative manufacturing and control procedures applied in the design, construction and operation, of a mobile hydraulic press machine (RoboPress). The research demonstrates how the design of an automated mobile manufacturing system can be optimized through using qualitative modeling and simulation from artificial intelligence","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125379532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment E-DM:共享存储环境下支持qos的存储服务调度系统
Yong Feng, Yan-yuan Zhang
This paper introduces E-DM, a QoS-enabled storage service schedule system, which provides performance virtualization in shared storage environment. It uses EPYFQ scheduling algorithm to schedule requests from virtual disks according to their shares, and can satisfy the following three requirements demanded by performance virtualization, performance isolation, fairness and throughput. We also evaluate E-DM from the above three aspects. Our results show that E-DM has good ability of performance isolation and fairness. Besides, we can adjust the tradeoff between tight resource control and throughput of storage system through the parameter epsiv
本文介绍了一种基于qos的存储服务调度系统E-DM,它在共享存储环境中提供了性能虚拟化。它采用EPYFQ调度算法,根据虚拟磁盘的份额调度请求,可以满足性能虚拟化、性能隔离、公平性和吞吐量的三个要求。我们也从以上三个方面对E-DM进行评价。结果表明,E-DM具有良好的性能隔离能力和公平性。此外,我们可以通过参数epsiv来调整严格的资源控制和存储系统吞吐量之间的权衡
{"title":"E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment","authors":"Yong Feng, Yan-yuan Zhang","doi":"10.1109/ICITA.2005.121","DOIUrl":"https://doi.org/10.1109/ICITA.2005.121","url":null,"abstract":"This paper introduces E-DM, a QoS-enabled storage service schedule system, which provides performance virtualization in shared storage environment. It uses EPYFQ scheduling algorithm to schedule requests from virtual disks according to their shares, and can satisfy the following three requirements demanded by performance virtualization, performance isolation, fairness and throughput. We also evaluate E-DM from the above three aspects. Our results show that E-DM has good ability of performance isolation and fairness. Besides, we can adjust the tradeoff between tight resource control and throughput of storage system through the parameter epsiv","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126110663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Third International Conference on Information Technology and Applications (ICITA'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1