{"title":"Remote sensing image data fusion based on local deviation of wavelet packet transform","authors":"Jin Wu, Honglin Huang, J. Tian, Jian Liu","doi":"10.1109/ISADS.2005.1452090","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452090","url":null,"abstract":"The goal of image fusion is to create new images that are more suitable for human visual perception, machine vision, object detection and target recognition. In order to adequately make use of all kinds of remote sensing image information, a new image fusion method based on local deviation of the wavelet packet transform is proposed. In fusion processing, the fused approximate coefficients are obtained by the weighted average method. For larger local deviation of each decomposed approximate coefficient, we choose a big power gene. The other approximate coefficient chooses a small one. The fused detailed coefficients are obtained by making each coefficient equal to the corresponding input image wavelet packet coefficient that has the greatest local deviation. Both the image information entropy and image clarity are employed to evaluate the performance of the remote sensing fusion algorithm. The experimental results show that the proposed method is more effective than the other methods.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance enhancement via two-layer support for peer-to-peer systems using active networking","authors":"Linlin Xie, D. Hutchison, Paul Smith","doi":"10.1109/ISADS.2005.1452172","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452172","url":null,"abstract":"The stratification of Internet protocols segregates network functionality into two broad layers: the overlay layer (application level) and the underlay layer (network level). Overlay networks are typically not aware of the operation of underlay networks, and conversely underlay networks are blind of the services executing at the overlay layer. Even though there is a prolific deployment of overlay networking based services, this architectural design is proving to have a number of deficiencies. Typically, such services make poor use of underlying networking resources, leading to degraded user-perceived quality of service. We propose a two-layer coordination and control framework aimed at optimizing network performance and enhancing user-perceived service. The framework and corresponding middleware structure make use of active networking technology. We choose peer-to-peer systems as our overlay study case, and discuss the problems associated with providing two-layer optimization and application support for such systems. Finally, we draw conclusions about the potential benefits of this approach and point towards possible directions of future work.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125772277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new multicast routing protocol based on autonomous clustering in ad hoc networks","authors":"T. Ohta, Toshifumi Kawaguchi, Y. Kakuda","doi":"10.1109/ISADS.2005.1452072","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452072","url":null,"abstract":"This paper discusses multicast routing in ad hoc networks. The multicast routing is defined as routing such that the same message is delivered from a node to a set of more than one node called multicast group. Since nodes move around in the ad hoc networks and members join and leaves from the multicast group, it is difficult to manage the multicast group and to maintain routes along which the same message is delivered to the multicast group. We have proposed an autonomous and adaptive clustering scheme to keep sets of connected nodes as clusters. In order to cope with the difficulties mentioned above, this paper proposes a new hierarchical multicast routing protocol to which the autonomous and adaptive clustering is applied in ad hoc networks. Simulation results show that the proposed protocol is effective from the viewpoint of the numbers of control packets and delivered data packets in comparison with a typical core-based multicast routing protocol MAODV.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126598614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blending Web services and agents for mobile users","authors":"Wassam Zahreddine, Q. Mahmoud","doi":"10.1109/ISADS.2005.1452141","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452141","url":null,"abstract":"This paper investigates Web services and mobile agents as two individually powerful technologies and when combined together, provides ease of use and reliability for any user. Web services have their shortfalls but with the help of mobile agents these weaknesses can be overcome. A single Web service may not be enough to satisfy a user's requirements. It might be necessary to combine multiple Web services together (a composite service) to satisfy a requirement; that is where agents can be used to compose Web services on behalf of their users. On the other hand, when agents move around to perform a task on behalf of a user, they will need to execute a service and such a service might be a Web service itself. In this paper, we discuss why agents and Web services should not be viewed as competing technologies and we present methods for integrating them together to deliver reliable services to the end user.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126264320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of preventive rejuvenation in communication network system with burst arrival","authors":"H. Okamura, Satoshi Miyahara, T. Dohi","doi":"10.1109/ISADS.2005.1452041","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452041","url":null,"abstract":"Long running software systems are known to experience an aging phenomenon called software aging, one in which the accumulation of errors during the execution of software leads to performance degradation and eventually results in failure. To counteract this phenomenon a proactive fault management approach, called software rejuvenation, is particularly useful. It essentially involves gracefully terminating an application or a system and restarting it in a clean internal state. In this paper, we perform the dependability analysis of a client/server software system with rejuvenation under the assumption that the requests arrive according to the Markov modulated Poisson process. Three dependability measures, steady-state availability, loss probability of requests and mean response time on tasks, are derived through the hidden Markovian analysis based on the time-based software rejuvenation scheme. In numerical examples, we investigate the sensitivity of some model parameters to the dependability measures.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stochastic fluid model for P2P content distribution networks","authors":"Ying Lu, An Zhang, Haifeng He, Z. Deng","doi":"10.1109/ISADS.2005.1452174","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452174","url":null,"abstract":"Traditional content distributions such as Web cache and content distribution networks need to reconfigure the networks or purchase additional servers to support these services. While P2P content distribution networks do not change the underlying infrastructure. We propose to build the multi-P2P networks based on the current unstructured and structured P2P networks. And the contents are distributed between multi-P2P networks. We explore the stochastic fluid analytical models for the purpose of multi-P2P networks performance. And we get the results of the relation between the content get probability and the number of multi-P2P networks, number of nodes, users' request rate, content expiration rate through this analytical model. The number of multi-P2P networks has a more impact on the content get probability than that of the universal P2P network. It has been proved that the scheme of constructing multi-P2P networks is effective.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130908120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"v-SVM for transient stability assessment in power systems","authors":"Xiaohong Wang, Sitao Wu, Qunzhan Li, Xiaoru Wang","doi":"10.1109/ISADS.2005.1452085","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452085","url":null,"abstract":"In this paper, support vector machines (SVMs) are studied in the application of transient stability assessment in power systems. SVMs have the following advantages: automatic determination of the number of hidden neurons, fast convergence rate, good generalization capability, etc. SVMs use the principle of structural risk minimization, and thus reduce the dependency of experience unlike neural networks and have better generalization and classification precision. Furthermore, SVMs are solved by the 2nd order convex programming and the final solution of SVMs is sole and optimal. The performance of SVMs depends on the type of kernel functions and the parameters of kernel functions, which are determined by experience or experiments. So the effects of kernel functions and the parameters of kernel functions are analyzed by experiments in the paper. In addition, Experiments corroborate the superiority of v-SVM applied in TSA in power systems by comparing with BP and RBE.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"11 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116824946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reputation management: experiments on the robustness of ROCQ","authors":"Anurag Garg, R. Battiti, Roberto G. Cascella","doi":"10.1109/ISADS.2005.1452182","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452182","url":null,"abstract":"In order for autonomic systems to function, the individual components must co-operate and not indulge in malicious behavior. However, it is almost certain that autonomous systems in. Next generation networks will inadvertently include less than trustworthy components. Identifying such entities is critical to the smooth and effective functioning. We present new experiments conducted with the ROCQ scheme, a reputation-based trust management system that computes the trustworthiness of peers on the basis of transaction-based feedback. The ROCQ model combines four parameters: reputation (R) or a peer's global trust rating, opinion (O) formed by a peer's first-hand interactions, credibility (C) of a reporting peer and quality (Q) or the confidence a reporting peer puts on the feedback it provides. In this paper, we demonstrate that ROCQ is robust against churn and also examine the effect of credibility and quality on the performance of the scheme.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133641345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Considerations on transaction response time and configuration checking in autonomous decentralized DB (ADDS)","authors":"I. Kaji, K. Kano","doi":"10.1109/ISADS.2005.1452013","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452013","url":null,"abstract":"In a distributed computing environment, the autonomous decentralized database system (ADDS) has been proposed to avoid the single point of failure. In ADDS, the update operations at each node are autonomously performed without communicating with other nodes if the amount of update requests are within the allowance volume (AV), thus the short response time of the transactions can be realized. Each node starts the AV adjustments when given AV amounts reach the threshold value, and gets the AV from relatively surplus nodes. To communicate with other nodes, there are two types of communications, one is a point to point (P2P) communication and the other is a mobile agent (MA) circulation. This paper discusses the relationship among the message amount, the configuration check frequency and the transaction response time in the P2P communication. We have defined the configuration checking frequency (f) that expresses how frequently a node confirms the configuration per AV request. It is expected that the value f which gives the minimum transaction response may exist. The simulator has been developed to evaluate the relationship and simulations have been performed in various parameters.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124815527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The simulation research for the ATO model based on fuzzy predictive control","authors":"Jinling Zhu, Xiaoyun Feng, Qing He, Jian Xiao","doi":"10.1109/ISADS.2005.1452060","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452060","url":null,"abstract":"The train control system is non-linear with large time-delay. It is difficult to get its accurate mathematic model and optimized control solution. Based on the characteristics of train operation control system, a predictive control algorithm is studied in this paper. A satisfactory optimization model and associate algorithm for the maximal operation ability of locomotive are established. The strategies of train maximal capability manipulating control are also proposed. The simulation of train running process based on the proposed model and algorithm is carried on, and the test results show the validity of the model and the algorithm.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"415 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124168950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}