首页 > 最新文献

17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.最新文献

英文 中文
Towards error-free and personalized Web-based courses 迈向无差错和个性化的网络课程
Hui-Huang Hsu, Chun-Jung Chen, Wen-Pin Tai
Providing appropriate learning content to each student is a key to the success of a Web-based distance learning system. Student test results can be an important feedback for the instructor to re-evaluate the course content. A test result feedback (TRF) model that analyzes the relationship between student learning time and corresponding test result is developed The model can give the instructor crucial information for course content refinement. It can also suggest the student with a personalized make-up course or appropriate advanced courses for further study. All these can be done automatically without interfering the student learning and/or increasing the instructor working load In our design, all Web courses are dynamically assembled with selected course units.
为每个学生提供合适的学习内容是基于网络的远程学习系统成功的关键。学生的测试结果可以作为教师重新评估课程内容的重要反馈。建立了一个测试结果反馈模型,分析了学生学习时间与相应测试结果之间的关系,该模型可以为教师改进课程内容提供重要信息。它还可以为学生提供个性化的补习课程或适当的高级课程以供进一步学习。所有这些都可以自动完成,而不会干扰学生的学习和/或增加教师的工作量。在我们的设计中,所有Web课程都与选定的课程单元动态地组合在一起。
{"title":"Towards error-free and personalized Web-based courses","authors":"Hui-Huang Hsu, Chun-Jung Chen, Wen-Pin Tai","doi":"10.1109/AINA.2003.1192850","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192850","url":null,"abstract":"Providing appropriate learning content to each student is a key to the success of a Web-based distance learning system. Student test results can be an important feedback for the instructor to re-evaluate the course content. A test result feedback (TRF) model that analyzes the relationship between student learning time and corresponding test result is developed The model can give the instructor crucial information for course content refinement. It can also suggest the student with a personalized make-up course or appropriate advanced courses for further study. All these can be done automatically without interfering the student learning and/or increasing the instructor working load In our design, all Web courses are dynamically assembled with selected course units.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121724870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Signature schemes based on two hard problems simultaneously 同时基于两个难题的签名方案
Ching-Te Wang, Chu-Hsing Lin, Chinchen Chang
Harn (1994) proposed a signature scheme based on the modified ElGamal scheme and claimed that the security relies on both the factorization and the discrete logarithm. That is, his scheme cannot be broken unless both of the above two problems can be solved simultaneously. Lee and Hwang (1996) showed that an attacker could generate a forged signature on the assumption when the discrete logarithm is solved. Recently, Shao (1998) proposed another two signature schemes, which the security rests on the two problems. In this paper, we propose two improved signature schemes that are really based on two hard problems simultaneously. In addition, the numbers of parameters and computations are reduced in comparison with those of Shao.
Harn(1994)在改进的ElGamal方案的基础上提出了一种签名方案,认为其安全性既依赖于因式分解,也依赖于离散对数。也就是说,除非上述两个问题同时得到解决,否则他的方案是不可能被打破的。Lee和Hwang(1996)表明,攻击者可以在求解离散对数的假设下生成伪造签名。最近,Shao(1998)提出了另外两种签名方案,其安全性建立在这两个问题之上。本文提出了两种改进的签名方案,这两种方案实际上是同时基于两个难题的。此外,与Shao的方法相比,该方法的参数和计算量都有所减少。
{"title":"Signature schemes based on two hard problems simultaneously","authors":"Ching-Te Wang, Chu-Hsing Lin, Chinchen Chang","doi":"10.1109/AINA.2003.1192943","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192943","url":null,"abstract":"Harn (1994) proposed a signature scheme based on the modified ElGamal scheme and claimed that the security relies on both the factorization and the discrete logarithm. That is, his scheme cannot be broken unless both of the above two problems can be solved simultaneously. Lee and Hwang (1996) showed that an attacker could generate a forged signature on the assumption when the discrete logarithm is solved. Recently, Shao (1998) proposed another two signature schemes, which the security rests on the two problems. In this paper, we propose two improved signature schemes that are really based on two hard problems simultaneously. In addition, the numbers of parameters and computations are reduced in comparison with those of Shao.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129290671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance evaluation of modified IEEE 802.11 MAC for multi-channel multi-hop ad hoc network 改进的IEEE 802.11 MAC在多通道多跳自组织网络中的性能评估
Jiandong Li, Z. Haas, Min Sheng, Yanhui Chen
The IEEE 802.11 multiple access control protocol was modified for use in multi-channel, multi-hop ad hoc network, through the use of a new channel-status indicator. In particular, we have evaluated the improvement due to the multi-channel use. We report in this paper on the results of the throughput per node and the end-to-end delay for the modified IEEE 802.11 protocol for different network sizes. Using these results, we were able to propose a number of throughput scaling laws. Our simulation results show that the throughputs per node with multiple channels for the line and the grid ad hoc network topologies will increase by 47.89%, and by 1.39-163%, respectively, for networks with 16 to 64 nodes, as compared with that of single channel.
通过使用新的通道状态指示器,IEEE 802.11多路访问控制协议被修改以用于多通道、多跳的自组织网络。特别是,我们已经评估了由于多渠道使用而带来的改善。在本文中,我们报告了改进后的IEEE 802.11协议在不同网络规模下的每个节点吞吐量和端到端延迟的结果。利用这些结果,我们能够提出许多吞吐量缩放定律。我们的仿真结果表明,与单通道网络相比,对于线路和网格自组织网络拓扑结构,具有多个通道的每个节点的吞吐量将分别增加47.89%和1.39-163%,对于16至64个节点的网络。
{"title":"Performance evaluation of modified IEEE 802.11 MAC for multi-channel multi-hop ad hoc network","authors":"Jiandong Li, Z. Haas, Min Sheng, Yanhui Chen","doi":"10.1109/AINA.2003.1192896","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192896","url":null,"abstract":"The IEEE 802.11 multiple access control protocol was modified for use in multi-channel, multi-hop ad hoc network, through the use of a new channel-status indicator. In particular, we have evaluated the improvement due to the multi-channel use. We report in this paper on the results of the throughput per node and the end-to-end delay for the modified IEEE 802.11 protocol for different network sizes. Using these results, we were able to propose a number of throughput scaling laws. Our simulation results show that the throughputs per node with multiple channels for the line and the grid ad hoc network topologies will increase by 47.89%, and by 1.39-163%, respectively, for networks with 16 to 64 nodes, as compared with that of single channel.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Hybrid peer-to-peer model in proximity applications 邻近应用中的混合点对点模型
Marie Thilliez, T. Delot, S. Lecomte, N. Bennani
The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new applications adapted to mobile environments. In this paper, we propose and describe a new class of distributed applications called the proximity applications. In such applications, two or more handheld devices, physically close to each other, can communicate and exchange data in a secure way. Proximity applications rely on the use of both different mobile devices and heterogeneous wireless networks. Thus, these applications need a high degree of flexibility, for an easy and rapid application development. In this context, our purpose is to study the interest of the Hybrid Peer-To-Peer (P2P) architecture model use specially for the extensibility, the fault-tolerance management and the scalability of proximity applications. Moreover, thanks to this model, proximity applications can easily face to the heterogeneity of devices and networks.
最近手持设备和无线网络的出现意味着终端用户呈指数级增长。因此,今天,服务提供商必须提出适应移动环境的新应用程序。在本文中,我们提出并描述了一类新的分布式应用,称为邻近应用。在这种应用中,物理上彼此靠近的两个或多个手持设备可以以安全的方式进行通信和交换数据。近距离应用程序依赖于使用不同的移动设备和异构无线网络。因此,这些应用程序需要高度的灵活性,以实现简单快速的应用程序开发。在这种情况下,我们的目的是研究混合点对点(P2P)体系结构模型的兴趣,特别是在邻近应用程序的可扩展性、容错管理和可扩展性方面。此外,由于这个模型,接近应用程序可以很容易地面对设备和网络的异质性。
{"title":"Hybrid peer-to-peer model in proximity applications","authors":"Marie Thilliez, T. Delot, S. Lecomte, N. Bennani","doi":"10.1109/AINA.2003.1192895","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192895","url":null,"abstract":"The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new applications adapted to mobile environments. In this paper, we propose and describe a new class of distributed applications called the proximity applications. In such applications, two or more handheld devices, physically close to each other, can communicate and exchange data in a secure way. Proximity applications rely on the use of both different mobile devices and heterogeneous wireless networks. Thus, these applications need a high degree of flexibility, for an easy and rapid application development. In this context, our purpose is to study the interest of the Hybrid Peer-To-Peer (P2P) architecture model use specially for the extensibility, the fault-tolerance management and the scalability of proximity applications. Moreover, thanks to this model, proximity applications can easily face to the heterogeneity of devices and networks.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127435077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Performance comparison of adaptation approaches for mobile information system 移动信息系统自适应方法的性能比较
Qingguo Shen, Li Wang
We analyze the access behavior and traffic characteristics of typical mobile services, study and compare the performance of different adaptation approaches. For a typical unified Web site, 10% of access requests are from mobile users, 90% from PC users. The heterogeneity in the communicating devices and networks QoS characteristics need to be handled through different forms of software-supported adaptation. The two main adaptation models are server-based model and proxy-based model. The processing load of server or proxy carrying out the adaptation may increase by about 10 times or more. In order to provide differential services and increase the scalability, the server-adaptation and proxy-adaptation should coexist. They are suitable for paid and free services respectively. Paid services account for about 80% of mobile traffic, and free services account for 20%. Server and proxy processing capability should be increased by more than 2 times. Thus traffic and processing load is divided rationally.
分析了典型移动业务的接入行为和流量特征,研究并比较了不同自适应方法的性能。对于一个典型的统一Web站点,10%的访问请求来自移动用户,90%来自PC用户。通信设备和网络QoS特性的异构性需要通过不同形式的软件支持适应来处理。两种主要的适配模型是基于服务器的适配模型和基于代理的适配模型。执行适配的服务器或代理的处理负载可能增加约10倍或更多。为了提供不同的服务并增加可伸缩性,服务器适应和代理适应应该共存。它们分别适用于付费和免费服务。付费服务约占移动流量的80%,免费服务约占20%。服务器和代理处理能力应提高2倍以上。从而合理划分流量和处理负荷。
{"title":"Performance comparison of adaptation approaches for mobile information system","authors":"Qingguo Shen, Li Wang","doi":"10.1109/AINA.2003.1192874","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192874","url":null,"abstract":"We analyze the access behavior and traffic characteristics of typical mobile services, study and compare the performance of different adaptation approaches. For a typical unified Web site, 10% of access requests are from mobile users, 90% from PC users. The heterogeneity in the communicating devices and networks QoS characteristics need to be handled through different forms of software-supported adaptation. The two main adaptation models are server-based model and proxy-based model. The processing load of server or proxy carrying out the adaptation may increase by about 10 times or more. In order to provide differential services and increase the scalability, the server-adaptation and proxy-adaptation should coexist. They are suitable for paid and free services respectively. Paid services account for about 80% of mobile traffic, and free services account for 20%. Server and proxy processing capability should be increased by more than 2 times. Thus traffic and processing load is divided rationally.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128997945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Active dispatching schemes for Web caches in mobile networks 移动网络中Web缓存的主动调度方案
Jui-Ming Chen, Li-Der Chou
The caching technology is now commonly used to reduce the response time and save the bandwidth for hot Web accesses. The performance can be further improved by clustering several caches together, where a dispatcher is adopted to select a suitable cache from the cache cluster for each request. Therefore, ways to appropriately configure the cache cluster and design the dispatching scheme become important issues. The architecture of distributed dispatchers using the active networking technology is proposed to adaptively dispatch each request to an appropriate cache, according to network conditions and cache loads. The concept of virtual clusters, that distant caches can belong to the same cluster and a cache can belong to more than one cluster, is also proposed to balance the loads of caches globally.
缓存技术现在通常用于减少响应时间和节省热Web访问的带宽。通过将几个缓存聚在一起,可以进一步提高性能,其中采用调度程序从缓存集群中为每个请求选择合适的缓存。因此,如何合理配置缓存集群和设计调度方案就成为重要的问题。提出了采用主动网络技术的分布式调度程序体系结构,根据网络条件和缓存负载自适应地将每个请求分配到合适的缓存中。为了实现全局缓存负载均衡,还提出了虚拟集群的概念,即远程缓存可以属于同一个集群,一个缓存可以属于多个集群。
{"title":"Active dispatching schemes for Web caches in mobile networks","authors":"Jui-Ming Chen, Li-Der Chou","doi":"10.1109/AINA.2003.1192905","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192905","url":null,"abstract":"The caching technology is now commonly used to reduce the response time and save the bandwidth for hot Web accesses. The performance can be further improved by clustering several caches together, where a dispatcher is adopted to select a suitable cache from the cache cluster for each request. Therefore, ways to appropriately configure the cache cluster and design the dispatching scheme become important issues. The architecture of distributed dispatchers using the active networking technology is proposed to adaptively dispatch each request to an appropriate cache, according to network conditions and cache loads. The concept of virtual clusters, that distant caches can belong to the same cluster and a cache can belong to more than one cluster, is also proposed to balance the loads of caches globally.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132320115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic TDMA slot assignment in ad hoc networks 自组织网络中动态TDMA时隙分配
A. Kanzaki, T. Uemukai, T. Hara, S. Nishio
In this paper we propose a TDMA slot assignment protocol to improve the channel utilization, which controls the excessive increase of unassigned slots by changing the frame length dynamically. Our proposed protocol assigns one of the unassigned slots to a node which joins the network. If there are no unassigned slots available, our proposed protocol generates unassigned slots by depriving one of the multiple slots assigned to a node, or enlarging frame length of nodes which can cause collision with each other. Moreover, by setting frame length as a power of 2 slots, our proposed protocol provides the collision-free packet transmission among nodes with different frame length. The simulation results show that our proposed protocol improves the channel utilization dramatically as compared with the conventional protocols.
为了提高信道利用率,本文提出了一种TDMA时隙分配协议,该协议通过动态改变帧长来控制未分配时隙的过度增加。我们提出的协议将一个未分配的插槽分配给加入网络的节点。如果没有未分配的插槽可用,我们提出的协议通过剥夺分配给节点的多个插槽中的一个来生成未分配的插槽,或者增加节点的帧长度,从而导致节点之间的冲突。此外,通过将帧长度设置为2个插槽的幂,我们提出的协议可以在不同帧长度的节点之间实现无冲突的分组传输。仿真结果表明,与传统协议相比,该协议显著提高了信道利用率。
{"title":"Dynamic TDMA slot assignment in ad hoc networks","authors":"A. Kanzaki, T. Uemukai, T. Hara, S. Nishio","doi":"10.1109/AINA.2003.1192899","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192899","url":null,"abstract":"In this paper we propose a TDMA slot assignment protocol to improve the channel utilization, which controls the excessive increase of unassigned slots by changing the frame length dynamically. Our proposed protocol assigns one of the unassigned slots to a node which joins the network. If there are no unassigned slots available, our proposed protocol generates unassigned slots by depriving one of the multiple slots assigned to a node, or enlarging frame length of nodes which can cause collision with each other. Moreover, by setting frame length as a power of 2 slots, our proposed protocol provides the collision-free packet transmission among nodes with different frame length. The simulation results show that our proposed protocol improves the channel utilization dramatically as compared with the conventional protocols.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128653673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
A study on a spatio-temporal data structure for managing video data from monitoring cameras 用于监控摄像机视频数据管理的时空数据结构研究
Yiqun Wang, Y. Hijikata, S. Nishida
In case of emergency, we need to grasp the situation and make correct assessment quickly. The video data taken from the monitoring camera is important information in the emergent situation. In our research, we attempt to build a support system for identifying the video data of the monitoring camera by dealing with video data as spatio-temporal data. We proposed a method, which displays those video data on one virtual large wall. For this presentation, the search key in our system is the location and the size of this large screen and from which direction to look. First we developed a general algorithm to index spatio-temporal data to get an idea for developing the algorithm for this search key.
在紧急情况下,我们需要迅速掌握形势并做出正确的评估。监控摄像机采集的视频数据是紧急情况下的重要信息。在我们的研究中,我们试图通过将视频数据作为时空数据来处理,构建一个监控摄像机视频数据识别的支持系统。我们提出了一种将这些视频数据显示在一面虚拟大墙上的方法。对于这个演示,我们系统中的搜索键是这个大屏幕的位置和大小,以及从哪个方向看。首先,我们开发了一种用于索引时空数据的通用算法,以获得针对该搜索关键字开发算法的思路。
{"title":"A study on a spatio-temporal data structure for managing video data from monitoring cameras","authors":"Yiqun Wang, Y. Hijikata, S. Nishida","doi":"10.1109/AINA.2003.1192920","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192920","url":null,"abstract":"In case of emergency, we need to grasp the situation and make correct assessment quickly. The video data taken from the monitoring camera is important information in the emergent situation. In our research, we attempt to build a support system for identifying the video data of the monitoring camera by dealing with video data as spatio-temporal data. We proposed a method, which displays those video data on one virtual large wall. For this presentation, the search key in our system is the location and the size of this large screen and from which direction to look. First we developed a general algorithm to index spatio-temporal data to get an idea for developing the algorithm for this search key.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing transmission cost for distributed database design based on ontology schema 基于本体模式的分布式数据库设计传输成本最小化
Jau-Ji Shen, Tzung-Liang Hung
Along with the development of networking technology, distributed databases exist in most companies. It is important to place data in the most appropriate locations so that the efficiency of data processing can be increased and the cost of data processing can be reduced. Most recent research programs study the data allocation problems of existing distributed databases by analyzing the system operation history, such as frequency of query and data affinity. For a new distributed database system construction, a requirements analysis method based on ontology is discussed and applied to data allocation in distributed databases.
随着网络技术的发展,分布式数据库在大多数企业中都存在。将数据放置在最合适的位置非常重要,这样可以提高数据处理的效率并降低数据处理的成本。最近的研究项目大多是通过分析系统的运行历史,如查询频率和数据关联等,来研究现有分布式数据库的数据分配问题。针对一种新型分布式数据库系统的构建,讨论了一种基于本体的需求分析方法,并将其应用于分布式数据库的数据分配。
{"title":"Minimizing transmission cost for distributed database design based on ontology schema","authors":"Jau-Ji Shen, Tzung-Liang Hung","doi":"10.1109/AINA.2003.1192961","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192961","url":null,"abstract":"Along with the development of networking technology, distributed databases exist in most companies. It is important to place data in the most appropriate locations so that the efficiency of data processing can be increased and the cost of data processing can be reduced. Most recent research programs study the data allocation problems of existing distributed databases by analyzing the system operation history, such as frequency of query and data affinity. For a new distributed database system construction, a requirements analysis method based on ontology is discussed and applied to data allocation in distributed databases.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129239359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using agent-based approach to tracking moving objects 使用基于智能体的方法跟踪运动物体
E. Shakshuki, Yingge Wang
This paper presents a multi-agent system architecture developed to track moving objects. This architecture consists of several software agents with similar architecture and functions. An object can move freely within a predefined area, which is divided into several sub-areas based on the number of agents used in the system. Each agent is responsible for a specified sub-area. Agents are able to communicate with each other and to coordinate their activities by sharing their knowledge about the position of the moving object. Global Positioning Systems (GPS) are utilized to locate the exact position of the moving object. A GPS receiver is placed inside the moving object and serves as a signal platform that provides the desired information about its location to each agent. The main purpose of this work is to develop agents that are able to interact with the users, who are interesting in tracking some objects, and to provide them with the exact position of a moving object. This paper provides the agents' architecture, design and implementations that enable them to cooperate and communicate with each other to track a moving object. A prototype is implemented, using the ZEUS toolkit.
本文提出了一种用于跟踪运动物体的多智能体系统体系结构。该体系结构由几个具有相似体系结构和功能的软件代理组成。对象可以在预定义的区域内自由移动,该区域根据系统中使用的代理数量划分为若干子区域。每个代理负责一个指定的子区域。代理能够相互通信,并通过分享他们关于移动物体位置的知识来协调他们的活动。全球定位系统(GPS)被用来定位运动物体的确切位置。GPS接收器放置在移动物体内部,作为信号平台,向每个代理提供有关其位置的所需信息。这项工作的主要目的是开发能够与对跟踪某些物体感兴趣的用户进行交互的代理,并为他们提供移动物体的确切位置。本文给出了智能体的体系结构、设计和实现,使智能体之间能够相互协作和通信以跟踪运动物体。使用ZEUS工具包实现了一个原型。
{"title":"Using agent-based approach to tracking moving objects","authors":"E. Shakshuki, Yingge Wang","doi":"10.1109/AINA.2003.1192948","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192948","url":null,"abstract":"This paper presents a multi-agent system architecture developed to track moving objects. This architecture consists of several software agents with similar architecture and functions. An object can move freely within a predefined area, which is divided into several sub-areas based on the number of agents used in the system. Each agent is responsible for a specified sub-area. Agents are able to communicate with each other and to coordinate their activities by sharing their knowledge about the position of the moving object. Global Positioning Systems (GPS) are utilized to locate the exact position of the moving object. A GPS receiver is placed inside the moving object and serves as a signal platform that provides the desired information about its location to each agent. The main purpose of this work is to develop agents that are able to interact with the users, who are interesting in tracking some objects, and to provide them with the exact position of a moving object. This paper provides the agents' architecture, design and implementations that enable them to cooperate and communicate with each other to track a moving object. A prototype is implemented, using the ZEUS toolkit.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124355680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1