首页 > 最新文献

Journal of Internet Technology最新文献

英文 中文
Quality Evaluation for Online Distance Education Based on Grey Relational Degree 基于灰色关联度的在线远程教育质量评价
4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.53106/160792642023092405012
Tao Du Tao Du, Weina Fu Tao Du

Aiming to address the problems of low accuracy and long time consuming of existing education quality evaluation models, a new online distance education quality evaluation model based on grey correlation algorithm is proposed. Firstly, calculate the membership of education quality data, and complete the data collection through cluster mining. Secondly, construct the evaluation index system according to the set evaluation principles. Finally, the grey correlation degree algorithm is used to mine the correlation degree relationship of education quality index data and complete the construction of the evaluation model. The comparison test results show that the evaluation accuracy of the built model is 0.98, the response time is only 0.7s, the CPU proportion is only 27%, and the satisfaction rate is more than 0.97. Therefore, the model has higher application value.

 

针对现有教育质量评价模型准确率低、耗时长的问题,提出了一种基于灰色关联算法的在线远程教育质量评价模型。首先,计算教育质量数据的隶属度,并通过聚类挖掘完成数据采集。其次,根据设定的评价原则构建评价指标体系。最后,利用灰色关联度算法挖掘教育质量指标数据的关联度关系,完成评价模型的构建。对比测试结果表明,所建模型的评价准确率为0.98,响应时间仅为0.7s, CPU占比仅为27%,满意率大于0.97。因此,该模型具有较高的应用价值。</p>& lt; p>,, & lt; / p>
{"title":"Quality Evaluation for Online Distance Education Based on Grey Relational Degree","authors":"Tao Du Tao Du, Weina Fu Tao Du","doi":"10.53106/160792642023092405012","DOIUrl":"https://doi.org/10.53106/160792642023092405012","url":null,"abstract":"<p>Aiming to address the problems of low accuracy and long time consuming of existing education quality evaluation models, a new online distance education quality evaluation model based on grey correlation algorithm is proposed. Firstly, calculate the membership of education quality data, and complete the data collection through cluster mining. Secondly, construct the evaluation index system according to the set evaluation principles. Finally, the grey correlation degree algorithm is used to mine the correlation degree relationship of education quality index data and complete the construction of the evaluation model. The comparison test results show that the evaluation accuracy of the built model is 0.98, the response time is only 0.7s, the CPU proportion is only 27%, and the satisfaction rate is more than 0.97. Therefore, the model has higher application value.</p> <p>&amp;nbsp;</p>","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135637974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abnormal Detection Method of Transship Based on Marine Target Spatio-Temporal Data 基于海洋目标时空数据的转运异常检测方法
4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.53106/160792642023092405010
Wen Ying Wen Ying, Mingwang Ou Wen Ying, Qichun Liang Mingwang Ou, Zhixia Yang Qichun Liang, Man Zhao Zhixia Yang

Marine target situational awareness is developing towards intelligence. The practical application of marine law enforcement, route control, fishery supervision and other fields makes marine ship track mining and anomaly analysis a hot direction of technology development. At present, most of the research focuses on the feature recognition of single target or single target signal, while the research on correlation anomaly detection based on multi target or multi target signal is relatively less. In this paper, based on the large spatio-temporal data of ocean targets such as radar and AIS track, the corresponding recognition algorithm is designed for the abnormal transport behavior. The real-time batch detection of illegal transshipment is realized, which verifies the effectiveness of the algorithm and shows good performance in practical application scenarios.

&nbsp;

海洋目标态势感知正朝着智能化方向发展。海洋执法、航路控制、渔业监管等领域的实际应用,使得海洋船舶航迹挖掘与异常分析成为技术发展的热点方向。目前的研究大多集中在单目标或单目标信号的特征识别上,而基于多目标或多目标信号的相关异常检测研究相对较少。本文基于雷达、AIS航迹等海洋目标的大量时空数据,设计了相应的异常运输行为识别算法。实现了对非法转运货物的实时批量检测,验证了算法的有效性,在实际应用场景中表现出良好的性能。& lt; p>,, & lt; / p>
{"title":"Abnormal Detection Method of Transship Based on Marine Target Spatio-Temporal Data","authors":"Wen Ying Wen Ying, Mingwang Ou Wen Ying, Qichun Liang Mingwang Ou, Zhixia Yang Qichun Liang, Man Zhao Zhixia Yang","doi":"10.53106/160792642023092405010","DOIUrl":"https://doi.org/10.53106/160792642023092405010","url":null,"abstract":"<p>Marine target situational awareness is developing towards intelligence. The practical application of marine law enforcement, route control, fishery supervision and other fields makes marine ship track mining and anomaly analysis a hot direction of technology development. At present, most of the research focuses on the feature recognition of single target or single target signal, while the research on correlation anomaly detection based on multi target or multi target signal is relatively less. In this paper, based on the large spatio-temporal data of ocean targets such as radar and AIS track, the corresponding recognition algorithm is designed for the abnormal transport behavior. The real-time batch detection of illegal transshipment is realized, which verifies the effectiveness of the algorithm and shows good performance in practical application scenarios.</p> <p>&amp;nbsp;</p>","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135637966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Maximum Semantic Reservation Mapping Method Based on Ontology-to-graph Database 基于本体-图数据库的最大语义保留映射方法
4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.53106/160792642023092405008
Hongyan Wan Hongyan Wan, Huan Jin Hongyan Wan, Qin Zheng Huan Jin, Weibo Li Qin Zheng, Junwei Fang Weibo Li
Ontology is a core concept model in a knowledge graph which describes knowledge in the form of a graph. With the increase in knowledge graphs, the semantic relationships between concepts become more and more complex, which increases the difficulty of reserving its semantic integrity when storing it in a database. In this paper, we propose an ontology-to-graph database mapping method, which can reserve maximum semantic integrity and reduce redundant information simultaneously with high storage efficiency and query efficiency. In detail, the mapping method uses an anonymous class storage strategy to handle indefinite long nested structures, a multivariate functional relation storage strategy for multivariate semantic analysis, and an SWRL (Semantic Web Rule Language) storage strategy for disassembling inference structures. We develop an ontology-to-graph database prototype Neo4J4Onto to implement the mapping method. Experimental results show that our method achieves the maximum semantic integrity with the lowest complexity compared to the 6 baseline methods. Besides, compared to graphDB, Neo4J4Onto has better storage and query efficiency, and the concept models retrieved by Neo4J4Onto are more complete.
本体是以图的形式描述知识的知识图谱中的核心概念模型。随着知识图谱的增加,概念之间的语义关系变得越来越复杂,这增加了在数据库中存储概念时保持其语义完整性的难度。本文提出了一种本体到图的数据库映射方法,该方法可以最大限度地保留语义完整性,同时减少冗余信息,具有较高的存储效率和查询效率。具体来说,映射方法使用匿名类存储策略处理不确定的长嵌套结构,使用多变量功能关系存储策略进行多变量语义分析,使用SWRL(语义Web规则语言)存储策略对推理结构进行分解。我们开发了一个本体到图的数据库原型Neo4J4Onto来实现映射方法。实验结果表明,与6种基线方法相比,我们的方法以最低的复杂度实现了最大的语义完整性。此外,与graphDB相比,Neo4J4Onto具有更好的存储和查询效率,Neo4J4Onto检索的概念模型更完整。</p>& lt; p>,, & lt; / p>
{"title":"A Maximum Semantic Reservation Mapping Method Based on Ontology-to-graph Database","authors":"Hongyan Wan Hongyan Wan, Huan Jin Hongyan Wan, Qin Zheng Huan Jin, Weibo Li Qin Zheng, Junwei Fang Weibo Li","doi":"10.53106/160792642023092405008","DOIUrl":"https://doi.org/10.53106/160792642023092405008","url":null,"abstract":"Ontology is a core concept model in a knowledge graph which describes knowledge in the form of a graph. With the increase in knowledge graphs, the semantic relationships between concepts become more and more complex, which increases the difficulty of reserving its semantic integrity when storing it in a database. In this paper, we propose an ontology-to-graph database mapping method, which can reserve maximum semantic integrity and reduce redundant information simultaneously with high storage efficiency and query efficiency. In detail, the mapping method uses an anonymous class storage strategy to handle indefinite long nested structures, a multivariate functional relation storage strategy for multivariate semantic analysis, and an SWRL (Semantic Web Rule Language) storage strategy for disassembling inference structures. We develop an ontology-to-graph database prototype Neo4J4Onto to implement the mapping method. Experimental results show that our method achieves the maximum semantic integrity with the lowest complexity compared to the 6 baseline methods. Besides, compared to graphDB, Neo4J4Onto has better storage and query efficiency, and the concept models retrieved by Neo4J4Onto are more complete.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135637975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Singular Points Location Pattern Analysis based on Modes Interference 基于模态干扰的奇异点定位模式分析
4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.53106/160792642023092405007
Jian Li Jian Li, Ze-Xi Wang Jian Li, Rong Li Ze-Xi Wang, Guang-Jie Han Rong Li, Jun-Hao Li Guang-Jie Han

Given the lack of research on the regularity of distribution of singular points, the singular points under different influence factors are analyzed. The location of singular points for adjacent modes group (AMG) generated by the interference modes is derived using normal modes theory in the far field of the ideal shallow waveguide. The singular points are verified by simulation, which compares the distribution of the acoustic field and singular points. Moreover, it is concluded that the number and distribution of singular points in the period of the interference structure of the field (PISF) has a relationship with order (lower order of AMG) and adjacent order (difference between two orders of AMG). The arrangement of upper-lower-two-points increases by 2 with each increase of order and is distributed at both ends of PISF. The arrangement of rhombic-four-points increases by 1 with each increase of adjacent order and increases alternately at both ends of PISF. Meanwhile, there is a periodic relationship between the depth of the source and the location of singular points.

&nbsp;

考虑到对奇异点分布的规律性研究不足,对不同影响因素下的奇异点进行了分析。利用正交模理论推导了理想浅波导远场中由干涉模产生的相邻模群奇点的位置。通过仿真验证了奇异点的存在,比较了奇异点与声场的分布。此外,还得出了场干涉结构周期内奇点的数量和分布与阶数(AMG的低阶)和相邻阶数(AMG的两阶之差)有关。上下两点的排列随阶数的增加而增加2,分布在PISF的两端。菱形四点的排列随相邻阶数的增加而增加1,并在PISF两端交替增加。同时,震源深度与奇异点位置之间存在周期性关系。</p>& lt; p>,, & lt; / p>
{"title":"Singular Points Location Pattern Analysis based on Modes Interference","authors":"Jian Li Jian Li, Ze-Xi Wang Jian Li, Rong Li Ze-Xi Wang, Guang-Jie Han Rong Li, Jun-Hao Li Guang-Jie Han","doi":"10.53106/160792642023092405007","DOIUrl":"https://doi.org/10.53106/160792642023092405007","url":null,"abstract":"<p>Given the lack of research on the regularity of distribution of singular points, the singular points under different influence factors are analyzed. The location of singular points for adjacent modes group (AMG) generated by the interference modes is derived using normal modes theory in the far field of the ideal shallow waveguide. The singular points are verified by simulation, which compares the distribution of the acoustic field and singular points. Moreover, it is concluded that the number and distribution of singular points in the period of the interference structure of the field (PISF) has a relationship with order (lower order of AMG) and adjacent order (difference between two orders of AMG). The arrangement of upper-lower-two-points increases by 2 with each increase of order and is distributed at both ends of PISF. The arrangement of rhombic-four-points increases by 1 with each increase of adjacent order and increases alternately at both ends of PISF. Meanwhile, there is a periodic relationship between the depth of the source and the location of singular points.</p> <p>&amp;nbsp;</p>","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135638100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight and Anonymous Group Authentication Scheme Based on PUF in the Smart Grid 智能电网中基于PUF的轻量级匿名组认证方案
4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.53106/160792642023092405004
Yang Zhou Yang Zhou, Bing Yang Yang Zhou, Dengzhi Liu Bing Yang

As a new generation of electricity system, smart grid significantly improves electricity services&rsquo; efficiency, reliability, and sustainability. The smart meters, which are the essential terminals, help establish two-way communication between users and electricity providers. While enjoying the convenience of smart meters, users face many challenges. On the one hand, malicious adversaries could attack the smart meters and thus steal the users&rsquo; privacy. On the other hand, the computational overhead of electricity data verification is high for lightweight smart meters. To address above issues, a lightweight authentication and group key management scheme is proposed. In the proposed scheme, the physical properties of the Physical Unclonable Function (PUF) are exploited to defend against external attacks from adversaries. Moreover, the Chinese Remainder Theorem (CRT) is used to broadcast the updated group keys for the legitimate smart meters in the community. In addition, the aggregated signature is utilized to reduce the overhead of the data verification. Finally, the Random Oracle Model (ROM) is used to demonstrate that the proposed scheme meets many security requirements. Performance analysis shows that the proposed scheme is more suitable for smart grid compared to previous schemes.

&nbsp;

< >作为新一代电力系统,智能电网显著改善了电力服务&效率、可靠性和可持续性。智能电表是必不可少的终端,有助于在用户和电力供应商之间建立双向通信。用户在享受智能电表带来的便利的同时,也面临着诸多挑战。一方面,恶意的攻击者可以攻击智能电表,从而窃取用户的数据;隐私。另一方面,对于轻型智能电表来说,电力数据验证的计算开销很高。为了解决上述问题,提出了一种轻量级身份验证和组密钥管理方案。在该方案中,利用物理不可克隆函数(PUF)的物理特性来防御来自对手的外部攻击。此外,利用中国剩余定理(CRT)在社区中广播合法智能电表的更新组密钥。此外,还利用聚合签名减少了数据验证的开销。最后,利用随机Oracle模型(ROM)验证了该方案能够满足多种安全要求。性能分析表明,与以往方案相比,该方案更适合智能电网。</p>& lt; p>,, & lt; / p>
{"title":"Lightweight and Anonymous Group Authentication Scheme Based on PUF in the Smart Grid","authors":"Yang Zhou Yang Zhou, Bing Yang Yang Zhou, Dengzhi Liu Bing Yang","doi":"10.53106/160792642023092405004","DOIUrl":"https://doi.org/10.53106/160792642023092405004","url":null,"abstract":"<p>As a new generation of electricity system, smart grid significantly improves electricity services&amp;rsquo; efficiency, reliability, and sustainability. The smart meters, which are the essential terminals, help establish two-way communication between users and electricity providers. While enjoying the convenience of smart meters, users face many challenges. On the one hand, malicious adversaries could attack the smart meters and thus steal the users&amp;rsquo; privacy. On the other hand, the computational overhead of electricity data verification is high for lightweight smart meters. To address above issues, a lightweight authentication and group key management scheme is proposed. In the proposed scheme, the physical properties of the Physical Unclonable Function (PUF) are exploited to defend against external attacks from adversaries. Moreover, the Chinese Remainder Theorem (CRT) is used to broadcast the updated group keys for the legitimate smart meters in the community. In addition, the aggregated signature is utilized to reduce the overhead of the data verification. Finally, the Random Oracle Model (ROM) is used to demonstrate that the proposed scheme meets many security requirements. Performance analysis shows that the proposed scheme is more suitable for smart grid compared to previous schemes.</p> <p>&amp;nbsp;</p>","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135637971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Weighted Fair Queue Management on DOCSIS Multi-downstream Channels DOCSIS多下游信道的加权公平队列管理
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-09-01 DOI: 10.53106/160792642021092205009
Yao-Chiang Yang, Wei-Tsong Lee, Chih-Hsing Chen
In the home media network, Cable Modem is a useful device that most people have well-known. People expected network access as much less delayed as possible as what they can obtain. Therefore, the objective of effective bandwidth control becomes more and more important recently. In this paper, we are going to propose a methodology of Multi-downstream Service Algorithm (MDSA) to monitor the variation of input arrival rate to manage the bandwidth by Weighted Fair Queue (WFQ) based on a service workload. Applying this way, it is useful to refer to this paper of the bandwidth management method, assessing the input arrival rate that matches how the relative bandwidth is. Furthermore, the delayed time is effectively reduced accordingly.
在家庭媒体网络中,Cable Modem是一种大家都熟悉的有用设备。人们期望网络访问尽可能少地延迟。因此,对带宽进行有效的控制变得越来越重要。在本文中,我们将提出一种多下游服务算法(MDSA)的方法来监控输入到达率的变化,并根据服务工作负载通过加权公平队列(WFQ)来管理带宽。应用这种方法,有助于参考本文的带宽管理方法,评估与相对带宽如何匹配的输入到达率。从而有效地减少了延迟时间。
{"title":"A Weighted Fair Queue Management on DOCSIS Multi-downstream Channels","authors":"Yao-Chiang Yang, Wei-Tsong Lee, Chih-Hsing Chen","doi":"10.53106/160792642021092205009","DOIUrl":"https://doi.org/10.53106/160792642021092205009","url":null,"abstract":"In the home media network, Cable Modem is a useful device that most people have well-known. People expected network access as much less delayed as possible as what they can obtain. Therefore, the objective of effective bandwidth control becomes more and more important recently. In this paper, we are going to propose a methodology of Multi-downstream Service Algorithm (MDSA) to monitor the variation of input arrival rate to manage the bandwidth by Weighted Fair Queue (WFQ) based on a service workload. Applying this way, it is useful to refer to this paper of the bandwidth management method, assessing the input arrival rate that matches how the relative bandwidth is. Furthermore, the delayed time is effectively reduced accordingly.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"22 1","pages":"1031-1052"},"PeriodicalIF":1.6,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46813025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Method of Heuristic Algorithm and Constraint Programming for No-wait Integrated Scheduling Problem 无等待综合调度问题的启发式算法与约束规划混合方法
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-09-01 DOI: 10.53106/160792642021092205012
Zhiqiang Xie, Xiaowei Zhang, Yingchun Xia, Jing Yang, Y. Xin
No-wait Integrated Scheduling Problem (NISP) describes a real-life process of the non-standard products where the consideration is given to the great structure differences, processing parameter differences, no-wait constraint, and the need for further deep processing after assembly of jobs. To deal with the dynamic orders of non-standard products, the scheduling algorithm to be design should be a dynamic algorithm with the ability to deal with the above conditions. At first, the dynamic scheduling problem is transformed to a series of continuous static scheduling problem by adoption of window-based event-driven strategy, thus establishing constraint programming model targeted at minimal total tardiness and thereby proposing a hybrid method of Heuristic Algorithm and Constraint Programming (HA-CP) for the problem. In order to enhance the ability to response the dynamic orders of non-standard products, HA-CP adopts heuristic algorithm to generate a pre-scheduling solution at each dynamic event moment, so that jobs that fall into the window period are labelled as dispatched jobs, while the remaining jobs are labelled as jobs to be dispatched. To improve solution quality, the jobs to be dispatched are mapped into an operation-based constraint programming model, then, during the execution interval of dispatched jobs, constraint programming solver starts to solve the jobs to be dispatched and update the current solution if the solver gets a better solution within the execution interval. The above procedures are repeated until all jobs are scheduled. Finally, the results of simulation experiment show that the proposed algorithm is effective and feasible.
无等待集成调度问题(NISP)描述了非标准产品的真实过程,其中考虑了巨大的结构差异、加工参数差异、无等待约束以及在组装作业后需要进一步的深加工。为了处理非标准产品的动态订单,要设计的调度算法应该是能够处理上述条件的动态算法。首先,采用基于窗口的事件驱动策略,将动态调度问题转化为一系列连续静态调度问题,从而建立了以最小总延迟为目标的约束规划模型,并提出了启发式算法和约束规划的混合方法。为了增强对非标准产品动态订单的响应能力,HA-CP采用启发式算法在每个动态事件时刻生成预调度解决方案,将落入窗口期的作业标记为已调度作业,将剩余作业标记为待调度作业。为了提高解决方案质量,将要调度的作业映射到基于操作的约束编程模型中,然后,在调度作业的执行间隔期间,约束编程求解器开始求解要调度的任务,如果求解器在执行间隔内获得更好的解决方案,则更新当前解决方案。重复上述过程,直到安排好所有作业。最后,仿真实验结果表明,该算法是有效可行的。
{"title":"A Hybrid Method of Heuristic Algorithm and Constraint Programming for No-wait Integrated Scheduling Problem","authors":"Zhiqiang Xie, Xiaowei Zhang, Yingchun Xia, Jing Yang, Y. Xin","doi":"10.53106/160792642021092205012","DOIUrl":"https://doi.org/10.53106/160792642021092205012","url":null,"abstract":"No-wait Integrated Scheduling Problem (NISP) describes a real-life process of the non-standard products where the consideration is given to the great structure differences, processing parameter differences, no-wait constraint, and the need for further deep processing after assembly of jobs. To deal with the dynamic orders of non-standard products, the scheduling algorithm to be design should be a dynamic algorithm with the ability to deal with the above conditions. At first, the dynamic scheduling problem is transformed to a series of continuous static scheduling problem by adoption of window-based event-driven strategy, thus establishing constraint programming model targeted at minimal total tardiness and thereby proposing a hybrid method of Heuristic Algorithm and Constraint Programming (HA-CP) for the problem. In order to enhance the ability to response the dynamic orders of non-standard products, HA-CP adopts heuristic algorithm to generate a pre-scheduling solution at each dynamic event moment, so that jobs that fall into the window period are labelled as dispatched jobs, while the remaining jobs are labelled as jobs to be dispatched. To improve solution quality, the jobs to be dispatched are mapped into an operation-based constraint programming model, then, during the execution interval of dispatched jobs, constraint programming solver starts to solve the jobs to be dispatched and update the current solution if the solver gets a better solution within the execution interval. The above procedures are repeated until all jobs are scheduled. Finally, the results of simulation experiment show that the proposed algorithm is effective and feasible.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"22 1","pages":"1083-1090"},"PeriodicalIF":1.6,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49266173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
KFPA Monocular Ranging Algorithm Design and Application in Mobile edge Computing KFPA单目测距算法设计及在移动边缘计算中的应用
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-09-01 DOI: 10.53106/160792642021092205016
Shuo Chen, Songzhu Mei, Gangyong Jia, Youhuizi Li, Weihua Zhao
Distance perception is the basis and necessary prerequisite of environment perception, attitude perception and obstacle avoidance for both intelligent vehicle and unmanned vehicle. Passive ranging is a critical part of machine vision measurement. Most passive ranging methods based on machine vision apply binocular technology that needs strict hardware conditions and lacks universality. Therefore, the monocular vision ranging method is one of the mainstream distance sensing methods at present. In order to improve the accuracy of monocular vision ranging, a monocular vision ranging method based on pixel area and aspect ratio is proposed. Subsequently, this method improves the stability of real-time target detection by introducing Kalman filter processing. Experimental results display that that ranging used by this method has higher accuracy. The mean relative error of the depth measurement is 5% when it is 3-10 m. After introducing Kalman filter, the stability of real-time ranging processing is improved by 25.21%. In this paper, the ROS smart car with real-time target tracking is also realized by the method based on the combination of SIFT-KCF target detection and tracking and monocular ranging.
无论是智能车还是无人车,距离感知都是环境感知、姿态感知和避障的基础和必要前提。被动测距是机器视觉测量的重要组成部分。基于机器视觉的被动测距方法大多采用双目技术,对硬件条件要求严格,缺乏通用性。因此,单目视觉测距方法是目前主流的测距方法之一。为了提高单目视觉测距的精度,提出了一种基于像素面积和纵横比的单目视觉定位方法。随后,该方法通过引入卡尔曼滤波处理来提高实时目标检测的稳定性。实验结果表明,该方法测距精度较高。深度测量在3-10m时的平均相对误差为5%。引入卡尔曼滤波器后,实时测距处理的稳定性提高了25.21%。本文还采用了基于SIFT-KCF目标检测跟踪和单目测距相结合的方法,实现了具有实时目标跟踪的ROS智能车。
{"title":"KFPA Monocular Ranging Algorithm Design and Application in Mobile edge Computing","authors":"Shuo Chen, Songzhu Mei, Gangyong Jia, Youhuizi Li, Weihua Zhao","doi":"10.53106/160792642021092205016","DOIUrl":"https://doi.org/10.53106/160792642021092205016","url":null,"abstract":"Distance perception is the basis and necessary prerequisite of environment perception, attitude perception and obstacle avoidance for both intelligent vehicle and unmanned vehicle. Passive ranging is a critical part of machine vision measurement. Most passive ranging methods based on machine vision apply binocular technology that needs strict hardware conditions and lacks universality. Therefore, the monocular vision ranging method is one of the mainstream distance sensing methods at present. In order to improve the accuracy of monocular vision ranging, a monocular vision ranging method based on pixel area and aspect ratio is proposed. Subsequently, this method improves the stability of real-time target detection by introducing Kalman filter processing. Experimental results display that that ranging used by this method has higher accuracy. The mean relative error of the depth measurement is 5% when it is 3-10 m. After introducing Kalman filter, the stability of real-time ranging processing is improved by 25.21%. In this paper, the ROS smart car with real-time target tracking is also realized by the method based on the combination of SIFT-KCF target detection and tracking and monocular ranging.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"22 1","pages":"1129-1140"},"PeriodicalIF":1.6,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43673585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service Process Improvement Based on Business Process Management 基于业务流程管理的服务流程改进
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-09-01 DOI: 10.53106/160792642021092205015
Jiaxing Wang, Si-Cheng Gao, Cong-Er Yuan, Da-peng Tan, Jing Fan
The service vendors desire to improve their service processes to retain consumers and increase profits. Most existing methods require a mass of domain knowledge to improve their service processes, which are time-consuming and error-prone. This paper proposes a method named Diff-BPI to automatically improve a service process, reducing execution cost while guaranteeing consumers’ waiting/process time. Given the existing two versions of a service process, Diff-BPI first detects their differences and all possible candidate improved service processes are constructed by connecting their same parts and combinations of different parts. After that, Diff-BPI calculates three metrics for each candidate: “quality of improvement (QoI)”, “longest execution time (LET)” and “stability of time (SoT)”, and filters the candidates with LETs higher than the given time limit and QoIs/SoTs less than the given one. Finally, Diff-BPI picks the best candidate with the lowest cost less than the costs of two existing versions. A case study shows that Diff-BPI can construct an improved service process with a lower cost than the existing two versions. The efficiency evaluation reveals that Diff-BPI can save more than 20% of the running time for improving a service process using the filter strategy when the number of differences between the two versions is more than 3.
服务供应商希望改进他们的服务流程以留住消费者并增加利润。大多数现有方法需要大量的领域知识来改进其服务流程,这既耗时又容易出错。本文提出了一种自动改进服务流程的方法,在保证消费者等待/处理时间的同时,降低了执行成本。给定现有的两个版本的服务流程,Diff-BPI首先检测它们的差异,并通过连接它们的相同部分和不同部分的组合来构建所有可能的候选改进服务流程。之后,Diff-BPI为每个候选计算三个指标:“改进质量(QoI)”,“最长执行时间(LET)”和“时间稳定性(SoT)”,并过滤LET高于给定时间限制且qos /SoTs小于给定时间限制的候选。最后,Diff-BPI选择成本最低(低于两个现有版本的成本)的最佳候选版本。实例研究表明,该方法能够以较低的成本构建一个改进的服务流程。效率评估表明,当两个版本之间的差异大于3时,使用过滤器策略改进服务流程时,Diff-BPI可以节省20%以上的运行时间。
{"title":"Service Process Improvement Based on Business Process Management","authors":"Jiaxing Wang, Si-Cheng Gao, Cong-Er Yuan, Da-peng Tan, Jing Fan","doi":"10.53106/160792642021092205015","DOIUrl":"https://doi.org/10.53106/160792642021092205015","url":null,"abstract":"The service vendors desire to improve their service processes to retain consumers and increase profits. Most existing methods require a mass of domain knowledge to improve their service processes, which are time-consuming and error-prone. This paper proposes a method named Diff-BPI to automatically improve a service process, reducing execution cost while guaranteeing consumers’ waiting/process time. Given the existing two versions of a service process, Diff-BPI first detects their differences and all possible candidate improved service processes are constructed by connecting their same parts and combinations of different parts. After that, Diff-BPI calculates three metrics for each candidate: “quality of improvement (QoI)”, “longest execution time (LET)” and “stability of time (SoT)”, and filters the candidates with LETs higher than the given time limit and QoIs/SoTs less than the given one. Finally, Diff-BPI picks the best candidate with the lowest cost less than the costs of two existing versions. A case study shows that Diff-BPI can construct an improved service process with a lower cost than the existing two versions. The efficiency evaluation reveals that Diff-BPI can save more than 20% of the running time for improving a service process using the filter strategy when the number of differences between the two versions is more than 3.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"22 1","pages":"1117-1128"},"PeriodicalIF":1.6,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43915723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PoSI: A New Consensus Protocol Based on Storage Age and Data Integrity Verification PoSI:一种基于存储年龄和数据完整性验证的新共识协议
IF 1.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-09-01 DOI: 10.53106/160792642021092205004
C. Wang, Jun Shen, Shichong Tan
The blockchain is getting increasingly popular nowadays because of its decentralization and distributed consistency. The backbone protocol of blockchain is the consensus protocol, making it execute stably. The commonly used consensus protocols in blockchain, such as Proof of Work (PoW), Proof of Stake (PoS) and Proof of Space (PoSpace), have the problem of massive waste of resources. As far as we know, the existing consensus protocols fail to deal with such an issue well. In order to make full use of these resources, we propose a new consensus protocol named Proof of Storage Age and Integrity Verification (PoSI) in this paper. We introduce the definition of storage age and combine it with pairing-free data integrity verification in the proposed protocol. Numerous analyses and implementation results demonstrate the security and high efficiency of the proposed protocol.
区块链由于其去中心化和分布式一致性,如今越来越受欢迎。区块链的骨干协议是共识协议,使其能够稳定执行。区块链中常用的共识协议,如工作证明(PoW)、权益证明(PoS)和空间证明(PoSpace),都存在大量资源浪费的问题。据我们所知,现有的协商一致协议未能很好地处理这一问题。为了充分利用这些资源,我们在本文中提出了一个新的共识协议,名为存储年龄和完整性验证(PoSI)。我们引入了存储年龄的定义,并将其与所提出的协议中的无配对数据完整性验证相结合。大量的分析和实现结果证明了该协议的安全性和高效性。
{"title":"PoSI: A New Consensus Protocol Based on Storage Age and Data Integrity Verification","authors":"C. Wang, Jun Shen, Shichong Tan","doi":"10.53106/160792642021092205004","DOIUrl":"https://doi.org/10.53106/160792642021092205004","url":null,"abstract":"The blockchain is getting increasingly popular nowadays because of its decentralization and distributed consistency. The backbone protocol of blockchain is the consensus protocol, making it execute stably. The commonly used consensus protocols in blockchain, such as Proof of Work (PoW), Proof of Stake (PoS) and Proof of Space (PoSpace), have the problem of massive waste of resources. As far as we know, the existing consensus protocols fail to deal with such an issue well. In order to make full use of these resources, we propose a new consensus protocol named Proof of Storage Age and Integrity Verification (PoSI) in this paper. We introduce the definition of storage age and combine it with pairing-free data integrity verification in the proposed protocol. Numerous analyses and implementation results demonstrate the security and high efficiency of the proposed protocol.","PeriodicalId":50172,"journal":{"name":"Journal of Internet Technology","volume":"22 1","pages":"977-987"},"PeriodicalIF":1.6,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49660535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Internet Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1