首页 > 最新文献

2009 Ninth International Conference on Hybrid Intelligent Systems最新文献

英文 中文
Ontology-Supported Web Recommender for Scholar Information 本体支持的学者信息网络推荐
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.61
Sheng-Yuan Yang, Chun-Liang Hsu
In this quickly developed and shifting era of Internet, how to make use of webpage indexing structure or search engines which let information demanders fast and precisely search and extract out advantage information has become extremely important capability in users on the Web. This paper combined a data mining tool SPSS Clementine with the domain ontology to mine out usefully important information from huge datum, and then to employ Java to develop an information recommender for scholars--- Onto Recommender, in which can recommend suitably important information to scholars. The preliminary experiment outcomes proved the reliability and validation of the recommender achieving the regular-level outcomes of information recommendation, and accordingly proved the feasibility of the related techniques proposed in this paper.
在这个快速发展和变化的互联网时代,如何利用网页索引结构或搜索引擎,让信息需求者快速、准确地搜索和提取优势信息,已经成为网络用户极其重要的能力。本文将数据挖掘工具SPSS Clementine与领域本体相结合,从海量数据中挖掘出有用的重要信息,然后利用Java开发了一个面向学者的信息推荐器——Onto recommender,可以向学者推荐合适的重要信息。初步实验结果证明了推荐器实现信息推荐的规则级结果的可靠性和有效性,从而证明了本文提出的相关技术的可行性。
{"title":"Ontology-Supported Web Recommender for Scholar Information","authors":"Sheng-Yuan Yang, Chun-Liang Hsu","doi":"10.1109/HIS.2009.61","DOIUrl":"https://doi.org/10.1109/HIS.2009.61","url":null,"abstract":"In this quickly developed and shifting era of Internet, how to make use of webpage indexing structure or search engines which let information demanders fast and precisely search and extract out advantage information has become extremely important capability in users on the Web. This paper combined a data mining tool SPSS Clementine with the domain ontology to mine out usefully important information from huge datum, and then to employ Java to develop an information recommender for scholars--- Onto Recommender, in which can recommend suitably important information to scholars. The preliminary experiment outcomes proved the reliability and validation of the recommender achieving the regular-level outcomes of information recommendation, and accordingly proved the feasibility of the related techniques proposed in this paper.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Ultrasonic Testing Signal Processing of Weld Flaw Based on the Second Generation Wavelet 基于第二代小波的焊缝缺陷超声检测信号处理
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.111
Gaohua Liao, Junmei Xi
The de-noise result of traditional wavelet is related to the wavelet basis function. In the process of ultrasonic testing, flaw echo signal exited the characteristics of electrical noise, scattering noise in ultrasonic testing, which was sometimes very difficult to eliminate. Considering the distinctness of distribution between defects signals and noises, the second generation wavelet transform (SGWT) de-noising ultrasonic testing signal processing was proposed. Wavelet basis function with some special characteristic can be obtained by means of designing prediction and updating coefficient. Study mathematics properties of flaw echo signals and analyze the composition of noises and their characters in ultrasonic echo signals. The processed detail coefficient and the approximate coefficient are used to construct the signal. Wavelet transform coefficients of noise were filtered by changing threshold on the different scale and reconstructed the detection echo in order to enhance signal-to-noise ratio. The Experiments result shows that the method can improve the signal noise ratio and the distinguish ability of signals of different defects classes, and suppress energy attenuation as well as signal distortion efficiently. And flaw location accuracy and longitudinal resolution are advanced too.
传统小波的去噪效果与小波基函数有关。超声检测过程中,缺陷回波信号存在电噪声、散射噪声等特征,有时难以消除。考虑缺陷信号与噪声分布的特殊性,提出了第二代小波变换降噪超声检测信号处理方法。通过设计预测和更新系数,可以得到具有特殊特征的小波基函数。研究了缺陷回波信号的数学性质,分析了超声回波信号中噪声的组成及其特征。利用处理后的细节系数和近似系数来构造信号。通过在不同尺度上改变阈值滤波噪声的小波变换系数,重构检测回波,提高信噪比。实验结果表明,该方法可以提高信号的信噪比和对不同缺陷类型信号的区分能力,有效地抑制能量衰减和信号失真。并提高了缺陷定位精度和纵向分辨率。
{"title":"Ultrasonic Testing Signal Processing of Weld Flaw Based on the Second Generation Wavelet","authors":"Gaohua Liao, Junmei Xi","doi":"10.1109/HIS.2009.111","DOIUrl":"https://doi.org/10.1109/HIS.2009.111","url":null,"abstract":"The de-noise result of traditional wavelet is related to the wavelet basis function. In the process of ultrasonic testing, flaw echo signal exited the characteristics of electrical noise, scattering noise in ultrasonic testing, which was sometimes very difficult to eliminate. Considering the distinctness of distribution between defects signals and noises, the second generation wavelet transform (SGWT) de-noising ultrasonic testing signal processing was proposed. Wavelet basis function with some special characteristic can be obtained by means of designing prediction and updating coefficient. Study mathematics properties of flaw echo signals and analyze the composition of noises and their characters in ultrasonic echo signals. The processed detail coefficient and the approximate coefficient are used to construct the signal. Wavelet transform coefficients of noise were filtered by changing threshold on the different scale and reconstructed the detection echo in order to enhance signal-to-noise ratio. The Experiments result shows that the method can improve the signal noise ratio and the distinguish ability of signals of different defects classes, and suppress energy attenuation as well as signal distortion efficiently. And flaw location accuracy and longitudinal resolution are advanced too.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126904423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A THz Image Edge Detection Method Based on Wavelet and Neural Network 基于小波和神经网络的太赫兹图像边缘检测方法
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.298
Rong Wang, Lihua Li, Weijun Hong, N. Yang
A THz Image edge detection approach based on wavelet and Neural Network is proposed in this paper. First, the source image is decomposed by wavelet, the edges in the low-frequency sub-image are detected using Neural Network method and the edges in the high-frequency sub-images are detected using wavelet transform method on the coarsest level of the wavelet decomposition, the two edge images are fused according to some fusion rules to obtain the edge image of this level, it then is projected to the next level. Afterwards the final edge image of L-1 level is got according to some fusion rule. This process is repeated until reaching the 0 level thus to get the final integrated and clear edge image. The experimental results show that our approach based on fusion technique is superior to Canny operator method and wavelet transform method alone.
提出了一种基于小波和神经网络的太赫兹图像边缘检测方法。首先对源图像进行小波分解,在小波分解的最粗层次上利用神经网络方法检测低频子图像的边缘,利用小波变换方法检测高频子图像的边缘,根据一定的融合规则将两幅边缘图像融合得到该层次的边缘图像,然后将其投影到下一层次。然后根据一定的融合规则得到最终的L-1级边缘图像。重复这个过程,直到达到0级,从而得到最终的完整和清晰的边缘图像。实验结果表明,该方法优于单独的Canny算子方法和小波变换方法。
{"title":"A THz Image Edge Detection Method Based on Wavelet and Neural Network","authors":"Rong Wang, Lihua Li, Weijun Hong, N. Yang","doi":"10.1109/HIS.2009.298","DOIUrl":"https://doi.org/10.1109/HIS.2009.298","url":null,"abstract":"A THz Image edge detection approach based on wavelet and Neural Network is proposed in this paper. First, the source image is decomposed by wavelet, the edges in the low-frequency sub-image are detected using Neural Network method and the edges in the high-frequency sub-images are detected using wavelet transform method on the coarsest level of the wavelet decomposition, the two edge images are fused according to some fusion rules to obtain the edge image of this level, it then is projected to the next level. Afterwards the final edge image of L-1 level is got according to some fusion rule. This process is repeated until reaching the 0 level thus to get the final integrated and clear edge image. The experimental results show that our approach based on fusion technique is superior to Canny operator method and wavelet transform method alone.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127894681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Soybean Image Noise Smoothing Method Using Multi-scale Morphology 基于多尺度形态学的大豆图像噪声平滑方法
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.302
Yuhua Chai, Danting Zhao, Rong Wang
A soybean image noise smoothing method using multi-scale morphology is presented in this paper. The method is based on manipulating the intensity of scale-specific features present in the noisy image. Features at various scales are extracted by means of morphological filtering. The proposed scheme has been implemented by using morphological towers to smooth noise in images. The algorithm has been tested on sample images corrupted with various kinds of noise. The results have been compared with those of other standard methods. It is found that the performance of the proposed method is satisfactory and superior to other methods referred in this paper.
提出了一种基于多尺度形态学的大豆图像噪声平滑方法。该方法是基于操纵存在于噪声图像中的比例特定特征的强度。采用形态滤波的方法提取不同尺度的特征。该方法利用形态塔对图像中的噪声进行平滑处理。该算法已在被各种噪声破坏的样本图像上进行了测试。结果与其他标准方法进行了比较。结果表明,该方法的性能令人满意,且优于其他方法。
{"title":"A Soybean Image Noise Smoothing Method Using Multi-scale Morphology","authors":"Yuhua Chai, Danting Zhao, Rong Wang","doi":"10.1109/HIS.2009.302","DOIUrl":"https://doi.org/10.1109/HIS.2009.302","url":null,"abstract":"A soybean image noise smoothing method using multi-scale morphology is presented in this paper. The method is based on manipulating the intensity of scale-specific features present in the noisy image. Features at various scales are extracted by means of morphological filtering. The proposed scheme has been implemented by using morphological towers to smooth noise in images. The algorithm has been tested on sample images corrupted with various kinds of noise. The results have been compared with those of other standard methods. It is found that the performance of the proposed method is satisfactory and superior to other methods referred in this paper.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Personalized Services for Users of Education Resources Net 教育资源网用户个性化服务研究
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.253
Yongjun Jing, Xin Li, S. Zhong
In order to users be able to find their own favorite resources quickly and accurately, this paper presents a personalized service which recommends resources for users at massive education resources net. On the basis of analyzing the characteristics of users and resources, this paper discusses the model of resource’s description and user’s interest, and the treatment of user’s interest drift, then designs and describes the personalized service model and implementation. The service is applied to Basic Education Resources Net of Liaoning Province. The effectiveness of such service is proved.
为了使用户能够快速、准确地找到自己喜欢的资源,本文提出了在海量教育资源网上为用户推荐资源的个性化服务。在分析用户和资源特征的基础上,讨论了资源描述和用户兴趣模型,以及用户兴趣漂移的处理,设计并描述了个性化服务的模型和实现。该服务应用于辽宁省基础教育资源网。验证了该服务的有效性。
{"title":"Research on Personalized Services for Users of Education Resources Net","authors":"Yongjun Jing, Xin Li, S. Zhong","doi":"10.1109/HIS.2009.253","DOIUrl":"https://doi.org/10.1109/HIS.2009.253","url":null,"abstract":"In order to users be able to find their own favorite resources quickly and accurately, this paper presents a personalized service which recommends resources for users at massive education resources net. On the basis of analyzing the characteristics of users and resources, this paper discusses the model of resource’s description and user’s interest, and the treatment of user’s interest drift, then designs and describes the personalized service model and implementation. The service is applied to Basic Education Resources Net of Liaoning Province. The effectiveness of such service is proved.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131087519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Solution to Resource-Constrained Project Scheduling Problem: Based on Ant Colony Optimization Algorithm 基于蚁群优化算法的资源约束项目调度问题求解
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.92
Yongbo Yuan, Kai Wang, Le Ding
Ant Colony Optimization (ACO) is a popular-based, artificial agent, general-search technique for the solution of difficult combinatorial problems. This paper presents a solution to the Resource-Constraint Project Scheduling Problem based on ACO algorithm. The method considers the quantified duration and resource as the heuristic information to calculate the accurate state transition probability and finally reaches the scheduling optimization. The described ACO algorithm is tested on a sample case taken from the literature and the parameters in ACO are determined by tests. The computational results validate the effectiveness of the proposed algorithm.
蚁群优化是一种基于人工智能的通用搜索技术,用于求解复杂的组合问题。提出了一种基于蚁群算法的资源约束型项目调度问题的求解方法。该方法将量化的时间和资源作为启发式信息,计算出准确的状态转移概率,最终达到调度优化。本文通过一个实例对蚁群算法进行了测试,并通过测试确定了蚁群算法中的参数。计算结果验证了该算法的有效性。
{"title":"A Solution to Resource-Constrained Project Scheduling Problem: Based on Ant Colony Optimization Algorithm","authors":"Yongbo Yuan, Kai Wang, Le Ding","doi":"10.1109/HIS.2009.92","DOIUrl":"https://doi.org/10.1109/HIS.2009.92","url":null,"abstract":"Ant Colony Optimization (ACO) is a popular-based, artificial agent, general-search technique for the solution of difficult combinatorial problems. This paper presents a solution to the Resource-Constraint Project Scheduling Problem based on ACO algorithm. The method considers the quantified duration and resource as the heuristic information to calculate the accurate state transition probability and finally reaches the scheduling optimization. The described ACO algorithm is tested on a sample case taken from the literature and the parameters in ACO are determined by tests. The computational results validate the effectiveness of the proposed algorithm.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131449471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A SNMPv3 Replay Protection Scheme Used in Space Network Based on Random Number 基于随机数的空间网络SNMPv3重放保护方案
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.189
Yueqiu Jiang, Kun Sun, Wenbo Zhang, Daozhu Zhang
The User-based Security Model and its replay protection principium are firstly introduced and then a replay protection scheme based on random number is proposed to avoid baleful replay attack because of the inefficacy of the USM. A random number is used as the authentication between manager and agent in this scheme, and the number is changed on each message exchange to ensure the agent can identify the response message. The scheme is tested in the simulation platform by using snmp4j and Jpcap. Test result shows that the performance of the network management system based on this scheme is affected a little under replay attack.
首先介绍了基于用户的安全模型及其重放保护原理,然后提出了一种基于随机数的重放保护方案,以避免由于USM无效而造成的恶意重放攻击。该方案使用随机数作为管理器和代理之间的身份验证,并在每次消息交换时更改随机数,以确保代理能够识别响应消息。利用snmp4j和Jpcap在仿真平台上对该方案进行了测试。测试结果表明,在重放攻击下,该方案对网管系统的性能影响不大。
{"title":"A SNMPv3 Replay Protection Scheme Used in Space Network Based on Random Number","authors":"Yueqiu Jiang, Kun Sun, Wenbo Zhang, Daozhu Zhang","doi":"10.1109/HIS.2009.189","DOIUrl":"https://doi.org/10.1109/HIS.2009.189","url":null,"abstract":"The User-based Security Model and its replay protection principium are firstly introduced and then a replay protection scheme based on random number is proposed to avoid baleful replay attack because of the inefficacy of the USM. A random number is used as the authentication between manager and agent in this scheme, and the number is changed on each message exchange to ensure the agent can identify the response message. The scheme is tested in the simulation platform by using snmp4j and Jpcap. Test result shows that the performance of the network management system based on this scheme is affected a little under replay attack.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSTS: A Prototype Tool for Testing COM Component Security CSTS:测试COM组件安全性的原型工具
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.229
Jinfu Chen, Yansheng Lu, Xiaodong Xie
The automatic testing tools of component security bring great effect on component-based software engineering, and they can effectively ensure the security of component-based software. A prototype tool named CSTS (component security testing system) is designed and implemented to test the security of the widely-used COTS (Commercial-off-the-Shelf) Microsoft COM (component object model) component. CSTS, a GUI (graphical user interface) software, adopts both static and dynamic testing based on fault injection and dynamic monitoring. Firstly, CSTS analyzes component type information and statically injects parameter faults into interface methods. Secondly, environment faults such as memory fault, file fault and process fault are injected into the tested component when the component is driven. Dynamic monitoring mechanism can monitor the running process of component and analyze the component security exceptions. Some commercial components were tested in the CSTS. The experimental results show that CSTS is effective and operable.
组件安全自动化测试工具对基于组件的软件工程产生了巨大的影响,它们可以有效地保证基于组件的软件的安全性。设计并实现了一个原型工具CSTS(组件安全性测试系统),用于测试广泛使用的COTS (commercial -off- shelf) Microsoft COM(组件对象模型)组件的安全性。CSTS是一个GUI(图形用户界面)软件,采用基于故障注入和动态监控的静态和动态测试。CSTS首先对组件类型信息进行分析,并在接口方法中静态注入参数故障。其次,在驱动被测组件时,将内存故障、文件故障和进程故障等环境故障注入被测组件;动态监控机制可以监控组件的运行过程,分析组件的安全异常。一些商业部件在CSTS中进行了测试。实验结果表明,CSTS是有效的、可操作的。
{"title":"CSTS: A Prototype Tool for Testing COM Component Security","authors":"Jinfu Chen, Yansheng Lu, Xiaodong Xie","doi":"10.1109/HIS.2009.229","DOIUrl":"https://doi.org/10.1109/HIS.2009.229","url":null,"abstract":"The automatic testing tools of component security bring great effect on component-based software engineering, and they can effectively ensure the security of component-based software. A prototype tool named CSTS (component security testing system) is designed and implemented to test the security of the widely-used COTS (Commercial-off-the-Shelf) Microsoft COM (component object model) component. CSTS, a GUI (graphical user interface) software, adopts both static and dynamic testing based on fault injection and dynamic monitoring. Firstly, CSTS analyzes component type information and statically injects parameter faults into interface methods. Secondly, environment faults such as memory fault, file fault and process fault are injected into the tested component when the component is driven. Dynamic monitoring mechanism can monitor the running process of component and analyze the component security exceptions. Some commercial components were tested in the CSTS. The experimental results show that CSTS is effective and operable.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131731098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing the QoS Performance of Fast Rerouting 优化快速路由的QoS性能
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.277
X. Li, Zhen Qin, Tao Yu
A fast rerouting scheme is proposed to guarantee the QoS performance of rerouted path when handling link and node failures. The new scheme is based on deflection routing mechanism and improves on two aspects: first, it can promptly handle single node failure as well as single link failure, second, QoS metric is taken into accounted when calculating recovery routes. Simulation results show that the proposed scheme could achieve as optimal performance as constrained Bellman-Ford algorithm.
为了保证重路由路径在处理链路和节点故障时的QoS性能,提出了一种快速重路由方案。新方案基于偏转路由机制,在两个方面进行了改进:一是能够及时处理单节点故障和单链路故障;二是在计算恢复路由时考虑了QoS度量。仿真结果表明,该方法可以达到约束Bellman-Ford算法的最优性能。
{"title":"Optimizing the QoS Performance of Fast Rerouting","authors":"X. Li, Zhen Qin, Tao Yu","doi":"10.1109/HIS.2009.277","DOIUrl":"https://doi.org/10.1109/HIS.2009.277","url":null,"abstract":"A fast rerouting scheme is proposed to guarantee the QoS performance of rerouted path when handling link and node failures. The new scheme is based on deflection routing mechanism and improves on two aspects: first, it can promptly handle single node failure as well as single link failure, second, QoS metric is taken into accounted when calculating recovery routes. Simulation results show that the proposed scheme could achieve as optimal performance as constrained Bellman-Ford algorithm.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Improved Anti-collision Algorithm in RFID System 一种改进的RFID系统防碰撞算法
Pub Date : 2009-08-12 DOI: 10.1109/HIS.2009.241
Jia-lin Ma, Xu Wei
Based on the analysis of the EPC Binary-tree algorithm, an improved algorithm is proposed. Compared with EPC Binary-tree algorithm the proposed algorithm will get more efficiency, higher utilization, and much more precision with fewer slots.
在分析EPC二叉树算法的基础上,提出了一种改进算法。与EPC二叉树算法相比,该算法以更少的槽数获得更高的效率、更高的利用率和更高的精度。
{"title":"An Improved Anti-collision Algorithm in RFID System","authors":"Jia-lin Ma, Xu Wei","doi":"10.1109/HIS.2009.241","DOIUrl":"https://doi.org/10.1109/HIS.2009.241","url":null,"abstract":"Based on the analysis of the EPC Binary-tree algorithm, an improved algorithm is proposed. Compared with EPC Binary-tree algorithm the proposed algorithm will get more efficiency, higher utilization, and much more precision with fewer slots.","PeriodicalId":414085,"journal":{"name":"2009 Ninth International Conference on Hybrid Intelligent Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128543397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2009 Ninth International Conference on Hybrid Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1