Proceedings of 2013 3rd International Conference on Computer Science and Network Technology最新文献

筛选
英文 中文
REL: A structural query language for processing massive line-based records REL:用于处理大量基于行的记录的结构化查询语言
Li Cheng, Alei Liang
{"title":"REL: A structural query language for processing massive line-based records","authors":"Li Cheng, Alei Liang","doi":"10.1109/ICCSNT.2013.6967089","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967089","url":null,"abstract":"Many modern programs still use flat files to store application data because of their simplicity and portability. These files contain massive line-based records, on which common actions performed involve filtering, mapping and basic set operations. Rather than having each program to implement them on its own, we present REL, a structural query language that handles all these complexity behind and provides an elegant query interface. We also implement REL as a UNIX utility to translate query expressions into UNIX shell scripts that do the actual record processing. Finally we evaluate its performance through experiments.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-stage replication strategy in P2P VoD systems P2P点播系统中的两阶段复制策略
Guimin Huang, Yukai Zhang, Ya Zhou, Pingshan Liu, Tian Yu
{"title":"Two-stage replication strategy in P2P VoD systems","authors":"Guimin Huang, Yukai Zhang, Ya Zhou, Pingshan Liu, Tian Yu","doi":"10.1109/ICCSNT.2013.6967068","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967068","url":null,"abstract":"In P2P (Peer-to-Peer) VoD (Video-on-Demand) systems, one of the key problems is cache replication. However, with the large scale P2P VoD systems deployed, people study on the log of these systems and gradually realize that the strategy which caches videos proportionally to their popularities is not optimal, especially for cold resources. In simulation, we show that cold videos produce the majority of server workload. In our work, we propose a two-stage cache replication strategy, which increases the distribution of cold resources in the system and reduces the redundant cache of popular resources. Through simulation, we find that the cache proportion of popular videos and cold videos has been readjusted. Owing to more proportion of cache capacity used to cache cold videos, the server workload produced by cold videos is reduced sharply while the server workload produced by popular videos stays low.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128716592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on architecture of smart home management system and key devices 智能家居管理系统体系结构及关键设备的研究
Chunlai Zhou, Wenhui Huang, Xiaoyun Zhao
{"title":"Study on architecture of smart home management system and key devices","authors":"Chunlai Zhou, Wenhui Huang, Xiaoyun Zhao","doi":"10.1109/ICCSNT.2013.6967330","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967330","url":null,"abstract":"The architecture of smart home management system and key devices are studied according to the specifications on smart home gateway, socket and terminal issued by State power grid corp. in Nov. 30th, 2011, and smart home gateway, smart jack and smart terminal software are developed. Several communication technologies are used, including Zigbee, used to acquire data of wireless sensor network; TCP, used for video monitor; DALI, used to control lamps; Modbus, used to operate actuators, Wi-Fi, used between the terminal device and the gateway; as well as SOAP used for web services. The architecture and devices developed in this paper work well, and satisfy the needs of smart home management.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128728531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The optimized scheme of WSN with low power consumption based on program analysis 基于程序分析的低功耗无线传感器网络优化方案
Run Chen
{"title":"The optimized scheme of WSN with low power consumption based on program analysis","authors":"Run Chen","doi":"10.1109/ICCSNT.2013.6967244","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967244","url":null,"abstract":"Wireless sensors need to be designed saving power consumption to extend working time. This paper mainly focuses on power optimization based on the function level in the wireless communication block. We use program analysis tools to extract the most frequent-called functions and reframe these functions to pursue less energy consumed. Following the function change, most of the scenarios installed with different protocols achieve a relatively obvious power saving and make the WSN alive for a longer time.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LDA-based model for traditional Chinese medicine diagnosis 基于lda的中医诊断模型
Qian Tan, Bin Zhang, Yi Jiang, Fan Lin, Zhuxiang Xu
{"title":"LDA-based model for traditional Chinese medicine diagnosis","authors":"Qian Tan, Bin Zhang, Yi Jiang, Fan Lin, Zhuxiang Xu","doi":"10.1109/ICCSNT.2013.6967145","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967145","url":null,"abstract":"Based on Lejeune Dirichlet allocation (LDA) model and multi-relationship topic model in Diagnosis and treatment of traditional Chinese medicine (TCM), the Symptom TCM Treatment Diagnosis (STTD) model is purposed to extract topic structure of symptom, TCM, treatment and diagnosis from TCM clinical datum. This paper uses Gibbs sampling to do parameters reasoning and confirms the optimal number of topics according to the average similarity among topics. From the experimental results, given the symptoms of patient, STTD model can predicts treatment, result of diagnosis, TCM and the distribution of topic. And it is available for clinical doctors and researchers.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116008198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol 基于DSR协议的移动自组网协同网络入侵检测系统
S. Adhikari, S. Setua
{"title":"Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol","authors":"S. Adhikari, S. Setua","doi":"10.1109/ICCSNT.2013.6967257","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967257","url":null,"abstract":"Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open medium, node mobility, lack of centralized monitoring and lack of a clear line of defense. In this paper, we propose a design of a cooperative network intrusion detection system based on Dynamic source Routing (DSR) protocol with 5 components: a context analyzer, watchdog system (monitor), rating system, alert message verifier and intruder node punishment system. This system is able to identify different types of behaviors of a misbehaving node like suspicious, malicious but not intrusive and both malicious & intrusive. Simulation result shows the effectiveness of our proposal.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116818832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Segmentation algorithms of chromosome images 染色体图像的分割算法
Wenzhong Yan, Dongming Li
{"title":"Segmentation algorithms of chromosome images","authors":"Wenzhong Yan, Dongming Li","doi":"10.1109/ICCSNT.2013.6967278","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967278","url":null,"abstract":"The chromosome segmentation is the most important step in the automatic chromosome analysis system. In this paper, a few basic chromosome segmentation algorithms are investigated firstly. As a common phenomenon, the partial touching and overlapping chromosomes occur in almost every metaphase images. So, as a difficult yet vital problem, the algorithms for overlapping chromosomes are discussed in detail. The principle and the realization of these algorithms are analyzed. Results of these algorithms are compared and discussed.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mesh segmentation based on face-face similarity probability 基于人脸相似概率的网格分割
Yang Lei, Jingqi Yan
{"title":"Mesh segmentation based on face-face similarity probability","authors":"Yang Lei, Jingqi Yan","doi":"10.1109/ICCSNT.2013.6967065","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967065","url":null,"abstract":"Many methods have been developed for mesh segmentation with different advantages and disadvantages. How to integrate the virtues of different segmentations is an attractive problem. This paper proposes a Face-Face Similarity Probability (FFSP) matrix for fusing the results from different segmentation algorithms. Each element of the matrix represents the probability that two faces belong to the same part. So it is a highly-condensed information package extracted from all the other algorithms' understanding of the mesh model. After getting the FFSP matrix, we can combine it with the Random Walks (RW) algorithm for final segmentation. Compared with classical algorithms, our proposed FFSP-RW method is more competitive in both quantitative evaluation and the visualized results.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115618172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of medical images in the shearlet domain shearlet域医学图像的增强
Qin Xue
{"title":"Enhancement of medical images in the shearlet domain","authors":"Qin Xue","doi":"10.1109/ICCSNT.2013.6967103","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967103","url":null,"abstract":"In this paper, a new contrast enhancement method is implemented to medical images by applying local range modification on shearlet coefficients. The proposed method is evaluated by the contrast improvement index (CII) and results show that the method is superior to other methods. Moreover, resulting images show that the proposed method can enhance useful features in medical images and improve the visualization of medical images.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new dynamic credit scoring model based on clustering ensemble 一种新的基于聚类集成的动态信用评分模型
Gao Wei, Chen Mingshu
{"title":"A new dynamic credit scoring model based on clustering ensemble","authors":"Gao Wei, Chen Mingshu","doi":"10.1109/ICCSNT.2013.6967144","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967144","url":null,"abstract":"With the rapid development of credit industry, customer credit scoring issue is particularly important. In this paper, a new dynamic credit scoring model based on clustering ensemble is proposed to solve the problem that cannot predict customer credit dynamically as well as population drift in customer credit scoring. Firstly, the training set samples are clustered into multiple subareas using OCA clustering ensemble algorithm to weaken the differences among different subareas samples. Then, the entire observation period is fractionized into several fractional periods. Finally customer credit scoring sub-classifiers are established using cost-sensitive support vector machine. The empirical results show that the dynamic model we proposed not only has lower misclassification rate than static model, but also can predict the bad customers as early as possible.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115341974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信