首页 > 最新文献

2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)最新文献

英文 中文
A Method of Surface Defect Detection of Bluetooth Headset Based on Machine Vision* 基于机器视觉的蓝牙耳机表面缺陷检测方法*
Xin Lu, Junying Jia, Zhiwei Pei, Daolin Wang, Jialin Wang, Bo Sun
The surface defect detection technology of irregular object based on machine vision has been widely used in various industrial scenarios in recent years. In this paper, we take Bluetooth headsets as an example, propose a Bluetooth headset surface defect detection method. Based on the analysis of the surface characteristics and defects types of Bluetooth headset, the scratch and glue-overflowed problem on the surface of the headset are accurately detected. The experimental results shows that the detection algorithm can quickly and effectively detect the surface defects of Bluetooth headset, and the accuracy of defect recognition reaches 98%. Therefore, the detection algorithm has a certain practical application value in industry.
近年来,基于机器视觉的不规则物体表面缺陷检测技术在各种工业场景中得到了广泛的应用。本文以蓝牙耳机为例,提出了一种蓝牙耳机表面缺陷检测方法。通过对蓝牙耳机表面特征和缺陷类型的分析,准确检测出蓝牙耳机表面的划痕和溢胶问题。实验结果表明,该检测算法能够快速有效地检测出蓝牙耳机表面缺陷,缺陷识别准确率达到98%。因此,该检测算法在工业上具有一定的实际应用价值。
{"title":"A Method of Surface Defect Detection of Bluetooth Headset Based on Machine Vision*","authors":"Xin Lu, Junying Jia, Zhiwei Pei, Daolin Wang, Jialin Wang, Bo Sun","doi":"10.1109/CSE53436.2021.00010","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00010","url":null,"abstract":"The surface defect detection technology of irregular object based on machine vision has been widely used in various industrial scenarios in recent years. In this paper, we take Bluetooth headsets as an example, propose a Bluetooth headset surface defect detection method. Based on the analysis of the surface characteristics and defects types of Bluetooth headset, the scratch and glue-overflowed problem on the surface of the headset are accurately detected. The experimental results shows that the detection algorithm can quickly and effectively detect the surface defects of Bluetooth headset, and the accuracy of defect recognition reaches 98%. Therefore, the detection algorithm has a certain practical application value in industry.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"13 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88755959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A real-time intrusion detection system based on OC-SVM for containerized applications 基于OC-SVM的容器化实时入侵检测系统
Lu Zhang, R. Cushing, C. D. Laat, P. Grosso
A Digital Data Marketplace (DDM) is a digital infrastructure to facilitate policy-governed data sharing in a secure and trustworthy manner with container-based virtualization technologies. An intrusion detection systems (IDS) is essential to enforce the policies. We propose a real-time intrusion detection system that monitors and analyzes the Linux-kernel system calls of a running container. We adopt the One-Class Support Vector Machine (OC-SVM) to detect anomalies. The training data of the OC-SVM algorithm is collected and sanitized in a secure environment. We evaluate the detection capability of our proposed system against modern attacks, e.g. Machine Learning (ML) adversarial attacks, with a customized attack dataset. In addition, we investigate the influence of various feature extraction methods, kernel functions and segmentation length with four metrics. Our experimental results show that we can achieve a low FPR, with a worst case of 0.12, and a TPR of 1 for most attacks, when we adopt the term-frequency feature extraction method and we choose segmentation length of 30000. Furthermore, the optimal kernel functions depend on the concrete application being examined.
数字数据市场(Digital Data Marketplace, DDM)是一种数字基础设施,它使用基于容器的虚拟化技术,以安全可靠的方式促进策略管理的数据共享。入侵检测系统(IDS)对于执行策略至关重要。提出了一种实时入侵检测系统,用于监控和分析运行容器的linux内核系统调用。我们采用一类支持向量机(OC-SVM)来检测异常。OC-SVM算法的训练数据是在安全的环境中收集和消毒的。我们使用定制的攻击数据集评估了我们提出的系统对现代攻击的检测能力,例如机器学习(ML)对抗性攻击。此外,我们还研究了各种特征提取方法、核函数和分割长度对四个度量的影响。我们的实验结果表明,当我们采用频项特征提取方法,选择分割长度为30000时,我们可以获得较低的FPR,最坏情况为0.12,对大多数攻击的TPR为1。此外,最优核函数取决于所检查的具体应用程序。
{"title":"A real-time intrusion detection system based on OC-SVM for containerized applications","authors":"Lu Zhang, R. Cushing, C. D. Laat, P. Grosso","doi":"10.1109/CSE53436.2021.00029","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00029","url":null,"abstract":"A Digital Data Marketplace (DDM) is a digital infrastructure to facilitate policy-governed data sharing in a secure and trustworthy manner with container-based virtualization technologies. An intrusion detection systems (IDS) is essential to enforce the policies. We propose a real-time intrusion detection system that monitors and analyzes the Linux-kernel system calls of a running container. We adopt the One-Class Support Vector Machine (OC-SVM) to detect anomalies. The training data of the OC-SVM algorithm is collected and sanitized in a secure environment. We evaluate the detection capability of our proposed system against modern attacks, e.g. Machine Learning (ML) adversarial attacks, with a customized attack dataset. In addition, we investigate the influence of various feature extraction methods, kernel functions and segmentation length with four metrics. Our experimental results show that we can achieve a low FPR, with a worst case of 0.12, and a TPR of 1 for most attacks, when we adopt the term-frequency feature extraction method and we choose segmentation length of 30000. Furthermore, the optimal kernel functions depend on the concrete application being examined.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"122 1","pages":"138-145"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89392232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Large-scale Detection Algorithm and Application Based on YOLOv4 基于YOLOv4的大规模检测算法及应用
Xiangbin Shi, Jinwen Peng
In this paper, we addressed the problems of occlusion and crowding in large-scale object detection. First, large-scale detection is more complex and diverse than traditional object detection. The number of targets to be detected is larger and often clustered together. This will produce occlusion and dense detection problems, which brings a serious challenge to object detection. Secondly, current dominant object detection is rarely trained and inferred on large-scale labeled dataset, so it is unable to evaluate the performance of these detection models on large dataset. To solve the above problems, we propose L-YOLO large-scale object detection algorithm. We modified the structure of feature pyramid network, then the receptive field was increased by using four-scale detection. Next, we propose a new loss function designed specifically for large-scale scenarios, which keeps the prediction box that is not the target as far away from the target as possible. It prevents the fusion of adjacent boundary boxes in the inference process and improves the detection performance in the case of occlusion effectively. At last, we use a new non-maximum suppression rule to prevent suppression of the correct detection box during infer. We annotated new dataset for large-scale detection, retrained and evaluated our model. Experiments on our dataset show the superiority of our model. Compared to the original YOLOv4, our improved model increases 1.8% mAP.
在本文中,我们解决了大规模目标检测中的遮挡和拥挤问题。首先,与传统的目标检测相比,大规模检测更加复杂和多样。需要检测的目标数量较大,并且经常聚集在一起。这会产生遮挡和密集检测问题,给目标检测带来严峻的挑战。其次,目前的主导目标检测很少在大规模标记数据集上进行训练和推断,因此无法评估这些检测模型在大型数据集上的性能。为了解决上述问题,我们提出了L-YOLO大规模目标检测算法。首先对特征金字塔网络结构进行修正,然后采用四尺度检测增加接收野。接下来,我们提出了一种专门为大规模场景设计的新的损失函数,使非目标的预测框尽可能远离目标。在推理过程中防止了相邻边界框的融合,有效提高了遮挡情况下的检测性能。最后,我们采用了一种新的非最大抑制规则来防止正确检测框在推断过程中被抑制。我们为大规模检测标注了新的数据集,重新训练和评估了我们的模型。在我们的数据集上的实验表明了我们模型的优越性。与原来的YOLOv4相比,我们改进的模型增加了1.8%的mAP。
{"title":"A Large-scale Detection Algorithm and Application Based on YOLOv4","authors":"Xiangbin Shi, Jinwen Peng","doi":"10.1109/CSE53436.2021.00026","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00026","url":null,"abstract":"In this paper, we addressed the problems of occlusion and crowding in large-scale object detection. First, large-scale detection is more complex and diverse than traditional object detection. The number of targets to be detected is larger and often clustered together. This will produce occlusion and dense detection problems, which brings a serious challenge to object detection. Secondly, current dominant object detection is rarely trained and inferred on large-scale labeled dataset, so it is unable to evaluate the performance of these detection models on large dataset. To solve the above problems, we propose L-YOLO large-scale object detection algorithm. We modified the structure of feature pyramid network, then the receptive field was increased by using four-scale detection. Next, we propose a new loss function designed specifically for large-scale scenarios, which keeps the prediction box that is not the target as far away from the target as possible. It prevents the fusion of adjacent boundary boxes in the inference process and improves the detection performance in the case of occlusion effectively. At last, we use a new non-maximum suppression rule to prevent suppression of the correct detection box during infer. We annotated new dataset for large-scale detection, retrained and evaluated our model. Experiments on our dataset show the superiority of our model. Compared to the original YOLOv4, our improved model increases 1.8% mAP.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"54 1","pages":"116-122"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86950742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Crowdsourcing Task Management and Solution Verification Method 基于区块链的众包任务管理及方案验证方法
Shasha Li, Xiaodong Bai, Songjie Wei
Crowdsourcing relies on Internet-wide capability to solve the complicated or large-scale tasks that are difficult to accomplish separately by individuals. However, traditional centralized crowdsourcing systems highly depend on the centralized coordination server to operate, making it extremely vulnerable to the single-point bottleneck and failure. And the whole system lacks verifiable trustworthiness among the participants. This paper proposes a blockchain-based framework for the distributed crowdsourcing without relying solely on any single trusted entity. The solutions for the outsourced tasks are verified with consensus among the participants with a reputation mechanism. We prove by theoretical security analysis that the proposed scheme resists malicious attacks better comparing to other typical crowdsourcing schemes. A prototype system is implemented based on Ethereum to demonstrate the overhead performance in various aspects. Theoretical and experimental evaluations show that the proposed scheme possesses reliability, security, quality, and feasibility.
众包依靠全互联网的能力来解决个人难以单独完成的复杂或大规模的任务。然而,传统的集中式众包系统高度依赖集中式协调服务器运行,极易出现单点瓶颈和故障。整个系统在参与者之间缺乏可验证的可信度。本文提出了一种基于区块链的分布式众包框架,而不依赖于任何单一的可信实体。外包任务的解决方案通过信誉机制在参与者之间达成共识来验证。通过理论安全分析证明,与其他典型的众包方案相比,该方案具有更好的抗恶意攻击能力。基于以太坊实现了一个原型系统,以演示各方面的开销性能。理论和实验结果表明,该方案具有可靠性、安全性、质量和可行性。
{"title":"Blockchain-based Crowdsourcing Task Management and Solution Verification Method","authors":"Shasha Li, Xiaodong Bai, Songjie Wei","doi":"10.1109/CSE53436.2021.00025","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00025","url":null,"abstract":"Crowdsourcing relies on Internet-wide capability to solve the complicated or large-scale tasks that are difficult to accomplish separately by individuals. However, traditional centralized crowdsourcing systems highly depend on the centralized coordination server to operate, making it extremely vulnerable to the single-point bottleneck and failure. And the whole system lacks verifiable trustworthiness among the participants. This paper proposes a blockchain-based framework for the distributed crowdsourcing without relying solely on any single trusted entity. The solutions for the outsourced tasks are verified with consensus among the participants with a reputation mechanism. We prove by theoretical security analysis that the proposed scheme resists malicious attacks better comparing to other typical crowdsourcing schemes. A prototype system is implemented based on Ethereum to demonstrate the overhead performance in various aspects. Theoretical and experimental evaluations show that the proposed scheme possesses reliability, security, quality, and feasibility.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"1 1","pages":"108-115"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83449270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-Efficient D2D Communications Based on Centralised Reinforcement Learning Techniques 基于集中强化学习技术的高效D2D通信
Sami Alenezi, Chunbo Luo, G. Min
Device-to-Device (D2D) communication has emerged as an evolving communication technology in 5G networks, enabling a pair of user equipment units to communicate without passing through the base station. However, the introduction of a D2D link can cause interference with other cellular user links, which highlights the difficulty of guaranteeing the communication quality of the whole system. In addition, when a large number of cellular users are connected to the network through D2D devices at the same time, the circuit consumption of the mobile devices will greatly increase and affect the user experience. In this paper, we focus on improving the energy efficiency of D2D devices in a cellular network served by one base station, through the adjustment of D2D link transmission power. We propose a centralised power control algorithm based on reinforcement learning to optimise the energy utilisation, while minimising the interference on cellular users, to maintain the quality of service (QoS). Simulation results show that the proposed approach can significantly increase the system energy efficiency and maintain the cellular user QoS, compared with the benchmark algorithm.
设备对设备(Device-to-Device, D2D)通信在5G网络中成为一种不断发展的通信技术,使一对用户设备单元无需通过基站即可进行通信。然而,D2D链路的引入会对其他蜂窝用户链路造成干扰,这凸显了整个系统通信质量的难以保证。此外,当大量蜂窝用户同时通过D2D设备接入网络时,移动设备的电路消耗将大大增加,影响用户体验。本文主要研究通过调整D2D链路传输功率来提高单基站蜂窝网络中D2D设备的能效。我们提出了一种基于强化学习的集中功率控制算法,以优化能量利用,同时最大限度地减少对蜂窝用户的干扰,以保持服务质量(QoS)。仿真结果表明,与基准算法相比,该方法能显著提高系统能量效率,保持蜂窝用户QoS。
{"title":"Energy-Efficient D2D Communications Based on Centralised Reinforcement Learning Techniques","authors":"Sami Alenezi, Chunbo Luo, G. Min","doi":"10.1109/CSE53436.2021.00018","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00018","url":null,"abstract":"Device-to-Device (D2D) communication has emerged as an evolving communication technology in 5G networks, enabling a pair of user equipment units to communicate without passing through the base station. However, the introduction of a D2D link can cause interference with other cellular user links, which highlights the difficulty of guaranteeing the communication quality of the whole system. In addition, when a large number of cellular users are connected to the network through D2D devices at the same time, the circuit consumption of the mobile devices will greatly increase and affect the user experience. In this paper, we focus on improving the energy efficiency of D2D devices in a cellular network served by one base station, through the adjustment of D2D link transmission power. We propose a centralised power control algorithm based on reinforcement learning to optimise the energy utilisation, while minimising the interference on cellular users, to maintain the quality of service (QoS). Simulation results show that the proposed approach can significantly increase the system energy efficiency and maintain the cellular user QoS, compared with the benchmark algorithm.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"90 1","pages":"57-63"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80668861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CFP- A New Approach to Predicting Fantasy Points of NFL Quarterbacks CFP-预测NFL四分卫幻想得分的新方法
Dienul Paramarta, Juan Li
Subjective expert projections have been traditionally used to predict points in fantasy football, while machine prediction applications are limited. Memory-based collaborative filtering has been widely used in the recommender system domain to predict ratings and recommend items. In this study, user-based and item-based collaborative filtering were explored and implemented to predict the weekly statistics and fantasy points of NFL quarterbacks. The predictions from multiple seasons were compared against expert projections. On both weekly statistics and total fantasy points, the implementations could not make significantly better predictions than experts. However, the prediction from the implementation improved the accuracy of other regression models when used as additional features.
主观专家预测传统上用于预测梦幻足球的分数,而机器预测的应用是有限的。基于记忆的协同过滤已广泛应用于推荐系统领域,用于预测评分和推荐商品。本研究探索并实现了基于用户和基于项目的协同过滤来预测NFL四分卫的每周统计数据和幻想积分。来自多个季节的预测与专家预测进行了比较。在每周的统计数据和总幻想点上,实现并不比专家做出更好的预测。然而,当作为附加特征使用时,来自实现的预测提高了其他回归模型的准确性。
{"title":"CFP- A New Approach to Predicting Fantasy Points of NFL Quarterbacks","authors":"Dienul Paramarta, Juan Li","doi":"10.1109/CSE53436.2021.00012","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00012","url":null,"abstract":"Subjective expert projections have been traditionally used to predict points in fantasy football, while machine prediction applications are limited. Memory-based collaborative filtering has been widely used in the recommender system domain to predict ratings and recommend items. In this study, user-based and item-based collaborative filtering were explored and implemented to predict the weekly statistics and fantasy points of NFL quarterbacks. The predictions from multiple seasons were compared against expert projections. On both weekly statistics and total fantasy points, the implementations could not make significantly better predictions than experts. However, the prediction from the implementation improved the accuracy of other regression models when used as additional features.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"53 1","pages":"12-19"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74679144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical Modelling of Content Transfer in Information Centric Networks 信息中心网络中内容转移的分析建模
Han Xu, Haozhe Wang, Jia Hu, G. Min
The proliferation of advanced information technology applications such as Virtual/Augmented Reality and ultra-high-definition (UHD) multimedia services that demand high bandwidth and ultra-low latency put tremendous pressure on the current communication networks. To meet these pressing requirements, Information-Centric Networks (ICN), a promising future Internet paradigm has been attracting much research attention. ICN deploy ubiquitous in-network caching that could not only handle large content dissemination and retrieval but also expedite the content delivery. To investigate the performance of ICN, it is important to have an analytical model that can accurately characterize the content transfer in ICN under different network and traffic conditions. In this paper, we exploit the queueing network theory to develop a new analytical model for content transfer in ICN. We derive the mathematical expressions for calculating cache miss rate and content delivery time. The accuracy of our analytical model is validated by comparing the analytical results with those obtained from simulation experiments. We also use the model to investigate the content delivery time under various network and traffic conditions.
随着虚拟/增强现实(vr)和超高清(UHD)多媒体等先进信息技术应用的激增,需要高带宽和超低延迟,给当前的通信网络带来了巨大的压力。为了满足这些迫切的需求,信息中心网络(ICN)作为一种很有前途的未来互联网模式已经引起了人们的广泛关注。ICN部署了无处不在的网络缓存,不仅可以处理大量内容的传播和检索,还可以加快内容的传递。为了研究ICN的性能,重要的是要有一个分析模型,可以准确地表征不同网络和流量条件下ICN中的内容传输。本文利用排队网络理论建立了一个新的ICN内容迁移分析模型。导出了计算缓存缺失率和内容传递时间的数学表达式。通过与仿真实验结果的比较,验证了分析模型的准确性。我们还使用该模型研究了不同网络和流量条件下的内容交付时间。
{"title":"Analytical Modelling of Content Transfer in Information Centric Networks","authors":"Han Xu, Haozhe Wang, Jia Hu, G. Min","doi":"10.1109/CSE53436.2021.00019","DOIUrl":"https://doi.org/10.1109/CSE53436.2021.00019","url":null,"abstract":"The proliferation of advanced information technology applications such as Virtual/Augmented Reality and ultra-high-definition (UHD) multimedia services that demand high bandwidth and ultra-low latency put tremendous pressure on the current communication networks. To meet these pressing requirements, Information-Centric Networks (ICN), a promising future Internet paradigm has been attracting much research attention. ICN deploy ubiquitous in-network caching that could not only handle large content dissemination and retrieval but also expedite the content delivery. To investigate the performance of ICN, it is important to have an analytical model that can accurately characterize the content transfer in ICN under different network and traffic conditions. In this paper, we exploit the queueing network theory to develop a new analytical model for content transfer in ICN. We derive the mathematical expressions for calculating cache miss rate and content delivery time. The accuracy of our analytical model is validated by comparing the analytical results with those obtained from simulation experiments. We also use the model to investigate the content delivery time under various network and traffic conditions.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"7 1","pages":"64-71"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82695724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Inquiry into labor from a Feminist Theological Perspective: Regarding the Issue of Basic Income 女性主义神学视角下的劳动问题探究:关于基本收入问题
ChungMeehyun
{"title":"An Inquiry into labor from a Feminist Theological Perspective: Regarding the Issue of Basic Income","authors":"ChungMeehyun","doi":"10.21050/cse.2018.42.09","DOIUrl":"https://doi.org/10.21050/cse.2018.42.09","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"7 1","pages":"241-264"},"PeriodicalIF":0.0,"publicationDate":"2018-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72934157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Design of DOORS, in the Context of Consistency, Availability, Partitioning and Latency 在一致性、可用性、分区和延迟的背景下,门的分析与设计
Dorin Mihai Palanciuc Mawas
DOORS is a distributed system proposal that provides execution and storage services in the form of "objects", which encapsulate both state and behaviour. We start by briefly describing the current state of the DOORS solution, as detailed in previous work. We then outline the class of problems that we aim to solve with DOORS, and provide brief motivations for the architectural choices. As direct consequences of the chosen architecture (distributed message passing in favour of shared memory) we analyse the following critical aspects: concurrency control, replication and the choice between consistency and availability. With the support of this analysis, we identify and present 3 different "kinds" of inter-node communication. In spite of their apparent similarity, these scenarios are addressed differently into the design, such that the implementation of DOORS remains correct, consistent and useful.
DOORS是一个分布式系统方案,它以“对象”的形式提供执行和存储服务,它封装了状态和行为。我们首先简要地描述DOORS解决方案的当前状态,正如前面工作中详细介绍的那样。然后,我们概述了我们要用DOORS解决的问题类别,并提供了架构选择的简要动机。作为所选架构的直接结果(支持共享内存的分布式消息传递),我们分析了以下关键方面:并发控制、复制以及一致性和可用性之间的选择。在此分析的支持下,我们识别并提出了3种不同的节点间通信“类型”。尽管它们明显相似,但这些场景在设计中被处理得不同,这样DOORS的实现仍然是正确的、一致的和有用的。
{"title":"Analysis and Design of DOORS, in the Context of Consistency, Availability, Partitioning and Latency","authors":"Dorin Mihai Palanciuc Mawas","doi":"10.1109/CSE.2018.00009","DOIUrl":"https://doi.org/10.1109/CSE.2018.00009","url":null,"abstract":"DOORS is a distributed system proposal that provides execution and storage services in the form of \"objects\", which encapsulate both state and behaviour. We start by briefly describing the current state of the DOORS solution, as detailed in previous work. We then outline the class of problems that we aim to solve with DOORS, and provide brief motivations for the architectural choices. As direct consequences of the chosen architecture (distributed message passing in favour of shared memory) we analyse the following critical aspects: concurrency control, replication and the choice between consistency and availability. With the support of this analysis, we identify and present 3 different \"kinds\" of inter-node communication. In spite of their apparent similarity, these scenarios are addressed differently into the design, such that the implementation of DOORS remains correct, consistent and useful.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"55 1","pages":"12-18"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78010575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parameter Estimation of Phase Code and Linear Frequency Modulation Combined Signal Based on Fractional Autocorrelation and Haar Wavelet Transform 基于分数阶自相关和Haar小波变换的相位编码和线性调频组合信号参数估计
Zhaoyang Qiu, Jun Zhu, Pei Wang, B. Tang
{"title":"Parameter Estimation of Phase Code and Linear Frequency Modulation Combined Signal Based on Fractional Autocorrelation and Haar Wavelet Transform","authors":"Zhaoyang Qiu, Jun Zhu, Pei Wang, B. Tang","doi":"10.1109/CSE.2014.188","DOIUrl":"https://doi.org/10.1109/CSE.2014.188","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"43 1","pages":"936-939"},"PeriodicalIF":0.0,"publicationDate":"2014-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73872245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1