首页 > 最新文献

International Journal of Computers Communications & Control最新文献

英文 中文
Neuro-inspired Framework for Cognitive Manufacturing Control 认知制造控制的神经启发框架
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2021-11-09 DOI: 10.15837/ijccc.2021.6.4519
Ioan Dumitrache, Simona Iuliana Caramihai, Dragos Constantin Popescu, Mihnea Alexandru Moisescu, Ioan Stefan Sacala
There are currently certain categories of manufacturing enterprises whose structure, organization and operating context have an extremely high degree of complexity, especially due to the way in which their various components interact and influence each other. For them, a series of paradigms have been developed, including intelligent manufacturing, smart manufacturing, cognitive manufacturing; which are based equally on information and knowledge management, management and interpretation of data flows and problem solving approaches. This work presents a new vision regarding the evolution of the future enterprise based on concepts and attributes acquired from the field of biology. Our approach addresses in a systemic manner the structural, functional, and behavioral aspects of the enterprise, seen as a complex dynamic system. In this article we are proposing an architecture and management methodology based on the human brain, where the problem solving is achieved by Perception – Memory – Learning and Behavior Generation mechanisms. In order to support the design of such an architecture and to allow a faster learning process, a software modeling and simulation platform was developed and is briefly presented.
目前有某些类型的制造企业,其结构、组织和经营环境具有极高的复杂性,特别是由于其各个组成部分相互作用和相互影响的方式。针对他们,发展了一系列的范式,包括智能制造、智能制造、认知制造;它们同样基于信息和知识管理、数据流的管理和解释以及解决问题的方法。这项工作提出了一个关于基于生物学领域获得的概念和属性的未来企业进化的新愿景。我们的方法以系统的方式处理企业的结构、功能和行为方面,将其视为一个复杂的动态系统。在本文中,我们提出了一种基于人脑的架构和管理方法,其中问题的解决是通过感知-记忆-学习和行为生成机制实现的。为了支持这种体系结构的设计,并允许更快的学习过程,开发了一个软件建模和仿真平台,并简要介绍了它。
{"title":"Neuro-inspired Framework for Cognitive Manufacturing Control","authors":"Ioan Dumitrache, Simona Iuliana Caramihai, Dragos Constantin Popescu, Mihnea Alexandru Moisescu, Ioan Stefan Sacala","doi":"10.15837/ijccc.2021.6.4519","DOIUrl":"https://doi.org/10.15837/ijccc.2021.6.4519","url":null,"abstract":"There are currently certain categories of manufacturing enterprises whose structure, organization and operating context have an extremely high degree of complexity, especially due to the way in which their various components interact and influence each other. For them, a series of paradigms have been developed, including intelligent manufacturing, smart manufacturing, cognitive manufacturing; which are based equally on information and knowledge management, management and interpretation of data flows and problem solving approaches. This work presents a new vision regarding the evolution of the future enterprise based on concepts and attributes acquired from the field of biology. Our approach addresses in a systemic manner the structural, functional, and behavioral aspects of the enterprise, seen as a complex dynamic system. In this article we are proposing an architecture and management methodology based on the human brain, where the problem solving is achieved by Perception – Memory – Learning and Behavior Generation mechanisms. In order to support the design of such an architecture and to allow a faster learning process, a software modeling and simulation platform was developed and is briefly presented.","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"33 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2021-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138536635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation 基于节点信誉的移动Ad Hoc网络入侵检测
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2019-11-17 DOI: 10.15837/IJCCC.2019.5.3629
Lin Tao, Wu Peng, Gao Fengmei, Wu Tianshu
The mobile ad hoc network (MANET) is more vulnerable to attacks than traditional networks, due to the high mobility of nodes, the weakness of transmission media and the absence of central node. To overcome the vulnerability, this paper mainly studies the way to detect selfish nodes in the MANET, and thus prevent network intrusion. Specifically, a data-driven reputation evaluation model was proposed to detect selfish nodes using a new reputation mechanism. The mechanism consists of a monitoring module, a reputation evaluation module, penalty module and a response module. The MANET integrated with our reputation mechanism was compared with the traditional MANET through simulation. The results show that the addition of reputation mechanism can suppress the selfish behavior of network nodes and enhance network security.
由于节点的高移动性、传输介质的薄弱和缺少中心节点,移动自组网(MANET)比传统网络更容易受到攻击。为了克服这一漏洞,本文主要研究了在MANET中检测自利节点的方法,从而防止网络入侵。具体而言,提出了一种数据驱动的声誉评估模型,利用一种新的声誉机制来检测自私节点。该机制由监测模块、信誉评价模块、处罚模块和响应模块组成。通过仿真,将集成了声誉机制的自组网与传统自组网进行了比较。结果表明,声誉机制的加入可以抑制网络节点的自私行为,增强网络的安全性。
{"title":"Intrusion Detection for Mobile Ad Hoc Networks Based on Node Reputation","authors":"Lin Tao, Wu Peng, Gao Fengmei, Wu Tianshu","doi":"10.15837/IJCCC.2019.5.3629","DOIUrl":"https://doi.org/10.15837/IJCCC.2019.5.3629","url":null,"abstract":"The mobile ad hoc network (MANET) is more vulnerable to attacks than traditional networks, due to the high mobility of nodes, the weakness of transmission media and the absence of central node. To overcome the vulnerability, this paper mainly studies the way to detect selfish nodes in the MANET, and thus prevent network intrusion. Specifically, a data-driven reputation evaluation model was proposed to detect selfish nodes using a new reputation mechanism. The mechanism consists of a monitoring module, a reputation evaluation module, penalty module and a response module. The MANET integrated with our reputation mechanism was compared with the traditional MANET through simulation. The results show that the addition of reputation mechanism can suppress the selfish behavior of network nodes and enhance network security.","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"14 1","pages":"660-671"},"PeriodicalIF":2.7,"publicationDate":"2019-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67604696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracing Public Opinion Propagation and Emotional Evolution Based on Public Emergencies in Social Networks 基于社会网络突发公共事件的民意传播与情绪演变
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2018-02-12 DOI: 10.15837/ijccc.2018.1.3176
Weidong Huang, Qian Wang, Jie Cao
Social network has become the main communication platform for public emergencies, and it has also made the public opinion influence spread more widely. How to effectively obtain public opinions from it to guide the healthy development of the society is an important issue that the government and other functional departments are concerned about. However, the interaction and evolution mechanism between the subject and the environment in the public opinion propagation is complicated, and the public and media attention and reaction to the incident are closely linked with the progress of the incident disposal. And public mining corpus has some shortcomings in the distribution of emotional classification. Only the timely update of artificial rules and emotional dictionary resources, it can handle new text data well. In fact, from the perspective of public opinion propagation, this paper built the network matrix between Internet users through the forwarding relationship, and used the social network analysis method and the emotion mining analysis technology to study the interaction and evolution mechanism between the subject and the environment in the public opinion propagation, and it studied the role of users in the emotional propagation of social networks. This paper proposed a sentiment analysis method on the micro-blog platform, which expanded the emotional dictionary and took sentence and emoticon and sentence patterns into account, which improved the accuracy of positive and negative classifications and emotional polarity analysis of the micro-blog.
{"title":"Tracing Public Opinion Propagation and Emotional Evolution Based on Public Emergencies in Social Networks","authors":"Weidong Huang, Qian Wang, Jie Cao","doi":"10.15837/ijccc.2018.1.3176","DOIUrl":"https://doi.org/10.15837/ijccc.2018.1.3176","url":null,"abstract":"Social network has become the main communication platform for public emergencies, and it has also made the public opinion influence spread more widely. How to effectively obtain public opinions from it to guide the healthy development of the society is an important issue that the government and other functional departments are concerned about. However, the interaction and evolution mechanism between the subject and the environment in the public opinion propagation is complicated, and the public and media attention and reaction to the incident are closely linked with the progress of the incident disposal. And public mining corpus has some shortcomings in the distribution of emotional classification. Only the timely update of artificial rules and emotional dictionary resources, it can handle new text data well. In fact, from the perspective of public opinion propagation, this paper built the network matrix between Internet users through the forwarding relationship, and used the social network analysis method and the emotion mining analysis technology to study the interaction and evolution mechanism between the subject and the environment in the public opinion propagation, and it studied the role of users in the emotional propagation of social networks. This paper proposed a sentiment analysis method on the micro-blog platform, which expanded the emotional dictionary and took sentence and emoticon and sentence patterns into account, which improved the accuracy of positive and negative classifications and emotional polarity analysis of the micro-blog.","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"13 1","pages":"129-142"},"PeriodicalIF":2.7,"publicationDate":"2018-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67604285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Knowledge Base Completion Model Based on Path Feature Learning. 基于路径特征学习的知识库补全模型。
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2018-02-01 DOI: 10.15837/ijccc.2018.1.3104
X Lin, Y Liang, L Wang, X Wang, M Yang, R Guan

Large-scale knowledge bases, as the foundations for promoting the development of artificial intelligence, have attracted increasing attention in recent years. These knowledge bases contain billions of facts in triple format; yet, they suffer from sparse relations between entities. Researchers proposed the path ranking algorithm (PRA) to solve this fatal problem. To improve the scalability of knowledge inference, PRA exploits random walks to find Horn clauses with chain structures to predict new relations given existing facts. This method can be regarded as a statistical classification issue for statistical relational learning (SRL). However, large-scale knowledge base completion demands superior accuracy and scalability. In this paper, we propose the path feature learning model (PFLM) to achieve this urgent task. More precisely, we define a two-stage model: the first stage aims to learn path features from the existing knowledge base and extra parsed corpus; the second stage uses these path features to predict new relations. The experimental results demonstrate that the PFLM can learn meaningful features and can achieve significant and consistent improvements compared with previous work.

大规模知识库作为推动人工智能发展的基础,近年来受到越来越多的关注。这些知识库以三重格式包含数十亿事实;然而,它们受到实体之间稀疏关系的影响。研究人员提出了路径排序算法(PRA)来解决这个致命的问题。为了提高知识推理的可扩展性,PRA利用随机行走来寻找具有链式结构的Horn子句,在给定现有事实的情况下预测新的关系。该方法可以看作是统计关系学习(SRL)的统计分类问题。然而,大规模知识库补全需要更高的准确性和可扩展性。在本文中,我们提出了路径特征学习模型(PFLM)来实现这一紧迫任务。更准确地说,我们定义了一个两阶段模型:第一阶段旨在从现有知识库和额外解析的语料库中学习路径特征;第二阶段使用这些路径特征来预测新的关系。实验结果表明,PFLM能够学习到有意义的特征,并取得了显著的一致性改进。
{"title":"A Knowledge Base Completion Model Based on Path Feature Learning.","authors":"X Lin,&nbsp;Y Liang,&nbsp;L Wang,&nbsp;X Wang,&nbsp;M Yang,&nbsp;R Guan","doi":"10.15837/ijccc.2018.1.3104","DOIUrl":"https://doi.org/10.15837/ijccc.2018.1.3104","url":null,"abstract":"<p><p>Large-scale knowledge bases, as the foundations for promoting the development of artificial intelligence, have attracted increasing attention in recent years. These knowledge bases contain billions of facts in triple format; yet, they suffer from sparse relations between entities. Researchers proposed the path ranking algorithm (PRA) to solve this fatal problem. To improve the scalability of knowledge inference, PRA exploits random walks to find Horn clauses with chain structures to predict new relations given existing facts. This method can be regarded as a statistical classification issue for statistical relational learning (SRL). However, large-scale knowledge base completion demands superior accuracy and scalability. In this paper, we propose the path feature learning model (PFLM) to achieve this urgent task. More precisely, we define a two-stage model: the first stage aims to learn path features from the existing knowledge base and extra parsed corpus; the second stage uses these path features to predict new relations. The experimental results demonstrate that the PFLM can learn meaningful features and can achieve significant and consistent improvements compared with previous work.</p>","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"13 1","pages":"71-82"},"PeriodicalIF":2.7,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9275121/pdf/nihms-1767576.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40591768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Latent Semantic Analysis using a Dennis Coefficient for English Sentiment Classification in a Parallel System 基于丹尼斯系数的潜在语义分析在并行系统英语情感分类中的应用
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2018-01-01 DOI: 10.15837/ijccc.2018.3.3044
V. Phu
{"title":"Latent Semantic Analysis using a Dennis Coefficient for English Sentiment Classification in a Parallel System","authors":"V. Phu","doi":"10.15837/ijccc.2018.3.3044","DOIUrl":"https://doi.org/10.15837/ijccc.2018.3.3044","url":null,"abstract":"","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"73 1","pages":"408-428"},"PeriodicalIF":2.7,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67604991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Walking Motion Generation and Neuro-Fuzzy Control with Push Recovery for Humanoid Robot 仿人机器人行走运动生成与推恢复神经模糊控制
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2017-01-01 DOI: 10.15837/ijccc.2017.3.2842
P. E. Mendez-Monroy
{"title":"Walking Motion Generation and Neuro-Fuzzy Control with Push Recovery for Humanoid Robot","authors":"P. E. Mendez-Monroy","doi":"10.15837/ijccc.2017.3.2842","DOIUrl":"https://doi.org/10.15837/ijccc.2017.3.2842","url":null,"abstract":"","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"12 1","pages":"330-346"},"PeriodicalIF":2.7,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67604671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Inverse Kinematics Solution for Robot Manipulator based on Neural Network under Joint Subspace 关节子空间下基于神经网络的机器人机械手运动学逆解
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2014-09-18 DOI: 10.15837/ijccc.2012.3.1387
Feng Yin, Yaonan Wang, Yi-min Yang
Neural networks with their inherent learning ability have been widely applied to solve the robot manipulator inverse kinematics problems. However, there are still two open problems: (1) without knowing inverse kinematic expressions, these solutions have the difficulty of how to collect training sets, and (2) the gradient-based learning algorithms can cause a very slow training process, especially for a complex configuration, or a large set of training data. Unlike these traditional implementations, the proposed metho trains neural network in joint subspace which can be easily calculated with electromagnetism-like method. The kinematics equation and its inverse are one-to-one mapping within the subspace. Thus the constrained training sets can be easily collected by forward kinematics relations. For issue 2, this paper uses a novel learning algorithm called extreme learning machine (ELM) which randomly choose the input weights and analytically determines the output weights of the single hidden layer feedforward neural networks (SLFNs). In theory, this algorithm tends to provide the best generalization performance at extremely fast learning speed. The results show that the proposed approach has not only greatly reduced the computation time but also improved the precision.
{"title":"Inverse Kinematics Solution for Robot Manipulator based on Neural Network under Joint Subspace","authors":"Feng Yin, Yaonan Wang, Yi-min Yang","doi":"10.15837/ijccc.2012.3.1387","DOIUrl":"https://doi.org/10.15837/ijccc.2012.3.1387","url":null,"abstract":"Neural networks with their inherent learning ability have been widely applied to solve the robot manipulator inverse kinematics problems. However, there are still two open problems: (1) without knowing inverse kinematic expressions, these solutions have the difficulty of how to collect training sets, and (2) the gradient-based learning algorithms can cause a very slow training process, especially for a complex configuration, or a large set of training data. Unlike these traditional implementations, the proposed metho trains neural network in joint subspace which can be easily calculated with electromagnetism-like method. The kinematics equation and its inverse are one-to-one mapping within the subspace. Thus the constrained training sets can be easily collected by forward kinematics relations. For issue 2, this paper uses a novel learning algorithm called extreme learning machine (ELM) which randomly choose the input weights and analytically determines the output weights of the single hidden layer feedforward neural networks (SLFNs). In theory, this algorithm tends to provide the best generalization performance at extremely fast learning speed. The results show that the proposed approach has not only greatly reduced the computation time but also improved the precision.","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"7 1","pages":"459-472"},"PeriodicalIF":2.7,"publicationDate":"2014-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67604463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Evolutionary Algorithm based on the Automata Theory for the Multi-objective Optimization of Combinatorial Problems 基于自动机理论的组合问题多目标优化进化算法
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2014-09-14 DOI: 10.5772/36101
Elias D. Niño
This paper states a novel, Evolutionary Metaheuristic Based on the Automata Theory (EMODS) for the multiobjective optimization of combinatorial problems. The proposed algorithm uses the natural selection theory in order to explore the feasible solutions space of a combinatorial problem. Due to this, local optimums are often avoided. Also, EMODS exploits the optimization process from the Metaheuristic of Deterministic Swapping to avoid finding unfeasible solutions. The proposed algorithm was tested using well known multi-objective TSP instances from the TSPLIB. Its results were compared against others Automata Theory inspired Algorithms using metrics from the specialized literature. In every case, the EMODS results on the metrics were always better and in some of those cases, the distance from the true solutions was 0.89%.
本文提出了一种新的基于自动机理论(EMODS)的组合问题多目标优化的进化元启发式算法。该算法利用自然选择理论探索组合问题的可行解空间。因此,通常会避免局部最优。此外,EMODS利用确定性交换的元启发式优化过程来避免发现不可行的解决方案。使用TSPLIB中众所周知的多目标TSP实例对所提出的算法进行了测试。将其结果与其他自动机理论启发的算法进行比较,使用来自专业文献的度量。在每种情况下,EMODS在指标上的结果总是更好,在某些情况下,与真实解决方案的距离为0.89%。
{"title":"Evolutionary Algorithm based on the Automata Theory for the Multi-objective Optimization of Combinatorial Problems","authors":"Elias D. Niño","doi":"10.5772/36101","DOIUrl":"https://doi.org/10.5772/36101","url":null,"abstract":"This paper states a novel, Evolutionary Metaheuristic Based on the Automata Theory (EMODS) for the multiobjective optimization of combinatorial problems. The proposed algorithm uses the natural selection theory in order to explore the feasible solutions space of a combinatorial problem. Due to this, local optimums are often avoided. Also, EMODS exploits the optimization process from the Metaheuristic of Deterministic Swapping to avoid finding unfeasible solutions. The proposed algorithm was tested using well known multi-objective TSP instances from the TSPLIB. Its results were compared against others Automata Theory inspired Algorithms using metrics from the specialized literature. In every case, the EMODS results on the metrics were always better and in some of those cases, the distance from the true solutions was 0.89%.","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"7 1","pages":"916-923"},"PeriodicalIF":2.7,"publicationDate":"2014-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70923077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Approach to Fuzzy Modeling of Electromagnetic Actuated Clutch Systems 电磁驱动离合器系统的模糊建模方法
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2013-01-01 DOI: 10.15837/ijccc.2013.3.218
C. Dragos, R. Precup, Marius-Lucian Tomescu, S. Preitl, E. Petriu, M. Radac
{"title":"An Approach to Fuzzy Modeling of Electromagnetic Actuated Clutch Systems","authors":"C. Dragos, R. Precup, Marius-Lucian Tomescu, S. Preitl, E. Petriu, M. Radac","doi":"10.15837/ijccc.2013.3.218","DOIUrl":"https://doi.org/10.15837/ijccc.2013.3.218","url":null,"abstract":"","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"8 1","pages":"395-406"},"PeriodicalIF":2.7,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67604554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Parallel Transmission Strategy for Data Grid 一种新的数据网格并行传输策略
IF 2.7 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Pub Date : 2011-12-01 DOI: 10.15837/ijccc.2011.4.2095
M. Qu, Xianghu Wu, Xiao-Zong Yang
Creation of multi-copies accelerates data transmission and reduces network traffic, but it causes overhead storage and additional network traffic. A variety of parallel transmission algorithms based on GridFTP and multi-copy can be used to accelerate data transmission further, but they can not adapt to a wide range of network, and they can not be used to solve the problems of storage space and network traffic waste. GridTorrent combined with BitTorrent and GridFTP has compatibility with grid and has flexible scalability, but the speed is very slow when there are few peers, to solve this problem multicopy is needed also. To achieve multiple optimization objectives of storage space saving, suitable for two kinds of application modes(i.e. parallel transfer based on GridFTP and BitTorrent), adaptability for wide range of network and higher performance when there are fewer peers, based on the idea of GridTorrent, a distributed storage model, parallel transfer algorithm and virtual peer strategy are proposed. In experiments the performance is compared among the verification system VPG-Torrent and original parallel transfer algorithm (DCDA) only based on GridfTP & multi-copy and GridTorrent. When the same amount of data is deployed VPG-Torrent has better performance than DCDA, and when there are fewer peers VPG-Torrent also exceed GridTorrent, which prove the effectiveness of VPG-Torrent.
{"title":"A Novel Parallel Transmission Strategy for Data Grid","authors":"M. Qu, Xianghu Wu, Xiao-Zong Yang","doi":"10.15837/ijccc.2011.4.2095","DOIUrl":"https://doi.org/10.15837/ijccc.2011.4.2095","url":null,"abstract":"Creation of multi-copies accelerates data transmission and reduces network traffic, but it causes overhead storage and additional network traffic. A variety of parallel transmission algorithms based on GridFTP and multi-copy can be used to accelerate data transmission further, but they can not adapt to a wide range of network, and they can not be used to solve the problems of storage space and network traffic waste. GridTorrent combined with BitTorrent and GridFTP has compatibility with grid and has flexible scalability, but the speed is very slow when there are few peers, to solve this problem multicopy is needed also. To achieve multiple optimization objectives of storage space saving, suitable for two kinds of application modes(i.e. parallel transfer based on GridFTP and BitTorrent), adaptability for wide range of network and higher performance when there are fewer peers, based on the idea of GridTorrent, a distributed storage model, parallel transfer algorithm and virtual peer strategy are proposed. In experiments the performance is compared among the verification system VPG-Torrent and original parallel transfer algorithm (DCDA) only based on GridfTP & multi-copy and GridTorrent. When the same amount of data is deployed VPG-Torrent has better performance than DCDA, and when there are fewer peers VPG-Torrent also exceed GridTorrent, which prove the effectiveness of VPG-Torrent.","PeriodicalId":54970,"journal":{"name":"International Journal of Computers Communications & Control","volume":"6 1","pages":"681-700"},"PeriodicalIF":2.7,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67604255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computers Communications & Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1