Proceedings of 2013 3rd International Conference on Computer Science and Network Technology最新文献

筛选
英文 中文
Relationship analysis of three parallel codes 三种并行码的关系分析
Yue Hu, W. Tong
{"title":"Relationship analysis of three parallel codes","authors":"Yue Hu, W. Tong","doi":"10.1109/ICCSNT.2013.6967123","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967123","url":null,"abstract":"The increasing demand for computing capability is driving the appearance of diverse parallel paradigms. Recently, MPI+OpenMP hybrid paradigm codes have been proved high performance efficiency in many applications and have been widely studied. But its relationship with MPI and OpenMP paradigm codes still need further study. In this paper, we focus on two aspects, the overhead and the number of processors definition methodology, to discuss the relationship between MPI, OpenMP and MPI+OpenMP paradigm codes. This paper provides a collection of experimental results of these three paradigm codes. The experimental results demonstrate that the parallel efficiency of MPI+OpenMP hybrid paradigm code can be more properly figured out but its performance would not always be the best on SMPs, which means the application situation should be pre-studied.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128968459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and implementation of virtools based on 3D virtual teaching laboratory 基于三维虚拟教学实验室的虚拟工具的研究与实施
Li Lihua, Cao Jing, Liao Xiaoqun, Zhao Anxin
{"title":"Research and implementation of virtools based on 3D virtual teaching laboratory","authors":"Li Lihua, Cao Jing, Liao Xiaoqun, Zhao Anxin","doi":"10.1109/ICCSNT.2013.6967096","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967096","url":null,"abstract":"In view of the existing virtual experimental teaching software is primarily demonstration, the lack of the people of the interactive system, the lack of authenticity in the process of simulation experiment teaching. In this paper, the development of 3 d virtual teaching laboratory based on virtools platform, in the process of chemistry teaching experiment, for example, and describes the development of the basic steps and key technology. Through the campus network, many people online at the same time condition test, has the feasibility to good effect.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Target tracking based on federated filter for mobile sensor networks 基于联邦滤波的移动传感器网络目标跟踪
Shanshan Jiang, L. Dou, H. Fang
{"title":"Target tracking based on federated filter for mobile sensor networks","authors":"Shanshan Jiang, L. Dou, H. Fang","doi":"10.1109/ICCSNT.2013.6967332","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967332","url":null,"abstract":"In this paper, we introduce a collaborative target tracking method which couples distributed estimation and motion control of mobile sensor networks. To estimate the target state, we develop a distributed federated filter (DFF) approach where only local communication between sensors is required. This DFF algorithm has superiority in tolerance of the target system noise and can acquire accurate estimation even if the model of the target is not accurate. We value information-distribution and information-fusion weights in the DFF according to the measurement situations of sensors. Then a flocking-based motion control method is proposed to track maneuvering targets. During the process of tracking, velocity matching and collision avoidance among mobile sensors are guaranteed. Finally, this coupled estimation and control algorithm is successfully simulated to track a linear-dynamics target with non-zero acceleration. Simulation results verify the performance and superiority of our method.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123939912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An arithmetic based on the shape of dots for halftone 一种基于网点形状的半色调算法
Liu Zhecan, Cao Peng
{"title":"An arithmetic based on the shape of dots for halftone","authors":"Liu Zhecan, Cao Peng","doi":"10.1109/ICCSNT.2013.6967092","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967092","url":null,"abstract":"To solve the defects which called interference fringes (in printing it is called moiré) in printed image that caused easily in halftoning to achieve information hiding. An arithmetic was given that based on the shape of halftone dots which use MQAM(Multiple Quadrature the Amplitude Modulation) to complete information hiding in halftoning. This method not only can solve the moiré problems effectively and optimize the printed image quality, but the information hiding capacity can also be greatly improved. The moiré can be eliminated by using a pseudo-random scrambling method to encrypt the plaintext information, that the ciphertext can be represented by different shape of dots.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A method of obtaining [S] matrix from a microstrip triangular network circuit 一种从微带三角形网络电路中获取[S]矩阵的方法
Y. Guan, Li-Bin Wan, Wei-Long Fu
{"title":"A method of obtaining [S] matrix from a microstrip triangular network circuit","authors":"Y. Guan, Li-Bin Wan, Wei-Long Fu","doi":"10.1109/ICCSNT.2013.6967190","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967190","url":null,"abstract":"With the help of [A] and [Y] matrices, we can quickly obtain the [S] matrix of a T or π type network and its serial or parallel circuit. For a complex circuit configuration, for example, it is a hybrid triangle network circuit that contains lumped components and distributed components, when analyzing the equivalent circuit of n-way n-section Wilkinson power divider. Rare reference presents idea for how to obtain the [S] matrix. This paper will introduce a method of obtaining [S] matrix from triangle network circuits. It is explicit and pragmatic. Furthermore, no matter how complex the circuit is, we can always obtain the correct [S] matrix based on the method.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121503171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HView: Multi-dimension view of massive data in Hadoop HView: Hadoop海量数据的多维视图
Fuhui Wu, Q. Wu, Yusong Tan
{"title":"HView: Multi-dimension view of massive data in Hadoop","authors":"Fuhui Wu, Q. Wu, Yusong Tan","doi":"10.1109/ICCSNT.2013.6967146","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967146","url":null,"abstract":"Hadoop has become an attractive platform to store large-scale data in HDFS and perform analytics using MapReduce framework. However, dataset of multi-field in HDFS is usually stored in just one-dimension. Analytics in Hadoop usually need to process the whole dataset in a brute way. In this paper, we introduce HView, an extension of data layout in HDFS, to store data according to multiple fields. HView provides people with different dimension views of the same dataset in HDFS. HView does not need to modify Hadoop, increase DataNode storage occupy or bring Namenode pressure. We exploit a use case of Map-side join for HView. Experiment result shows that HView can improve the efficiency of Map-side join and solve the problem of size limit in Map-side join.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121769152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
M2M security threat and security mechanism research M2M安全威胁及安全机制研究
Xiao Nie, Xiaobing Zhai
{"title":"M2M security threat and security mechanism research","authors":"Xiao Nie, Xiaobing Zhai","doi":"10.1109/ICCSNT.2013.6967252","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967252","url":null,"abstract":"M2M is the core technology to implement the internet of things, and it is applied to collect, transmit and manage the business information in power industry, mining industry and transportation industry. This article firstly introduces the concept of the M2M and gives the network architecture of the M2M technology. Then it analyzes the security threats of M2M including false trigger indication, stealing the M2M devices, moving the M2M devices to unauthorized location and node compromise attack in the M2M terminal layer, and stealing or tampering the information or DOS attack in the M2M network layer, the threat of system reliability in the M2M application system. On the basis of these, the current security mechanisms are given including node location identifiers, detecting the node compromise attack, Two-Way Authentication and dual system.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115883101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research for human action recognition based on depth information 基于深度信息的人体动作识别研究
Jing Liu, Lei Wang, Xubo Yang
{"title":"Research for human action recognition based on depth information","authors":"Jing Liu, Lei Wang, Xubo Yang","doi":"10.1109/ICCSNT.2013.6967335","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967335","url":null,"abstract":"Action recognition is always a very active and challenging research topic in the field of computer vision. Kinect, as a motion sensing input device which can capture both color and depth images, open up new possibilities of dealing with this task. In this paper, we build a system to track and classify the human action based on the Microsoft Kinect technology. During the feature extraction step, we use the depth camera to capture depth information of human and propose a method to generate a skeleton model as our main features. Then, a multi-class Support Vector Machine (SVM) is adopted to recognize actions. Our method simplifies and systematizes the task of human action recognition meanwhile the experimental results show promising performance.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"892 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity analysis of cooperative cellular uplink network with incremental-relaying 增量中继协同蜂窝上行网络容量分析
K. Guo, Jin Chen, Guoxin Li, Y. Chen
{"title":"Capacity analysis of cooperative cellular uplink network with incremental-relaying","authors":"K. Guo, Jin Chen, Guoxin Li, Y. Chen","doi":"10.1109/ICCSNT.2013.6967256","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967256","url":null,"abstract":"This paper analyses an incremental relaying uplink model with partial relay selection. It describes the transmission between the base station (BS) and the mobile station (MS). The BS is a multi-antenna destination. The performance measured of the system are derived which include ergodic capacity and outage probability over Rayleigh fading channel. Combined with the other papers, this paper mainly uses the partial relaying selection and incremental relaying. In this paper, we analyze the end-to-end performance of incremental relaying cooperative diversity networks which uses amplify-and-forward relay stations (RS) over independent non-identical Rayleigh fading channels. Closed-form expressions for the signal-to-noise ratio (SNR) outage probability and ergodic capacity are determined. We prove out our analysis by showing that simulation results which is coinciding with our analytical results in Rayleigh fading channels.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IIR filter design and implementation for 2D active absorbing wavemaker system 二维主动吸收制波系统的IIR滤波器设计与实现
Hong-qi Yang, Muguo Li
{"title":"IIR filter design and implementation for 2D active absorbing wavemaker system","authors":"Hong-qi Yang, Muguo Li","doi":"10.1109/ICCSNT.2013.6967334","DOIUrl":"https://doi.org/10.1109/ICCSNT.2013.6967334","url":null,"abstract":"Wavemakers are essential facilities for physical model tests in coastal engineering field. The working principle of a wavemaker system is generating desired waves by controlling the mechanical motion of wave paddle. The absorbing control system is realized by an infinite impulse response (IIR) digital filter that approximates the transfer function in frequency domain. This paper presents the design and implementation of the IIR filer for a piston-type absorbing wavemaker system in a 2D wave flume. Based on first-order wavemaker theory, a frequency domain absorption transfer function is modeled. Then an IIR filter is obtained by approximating the transfer function with non-linear least square optimization. In practical systems, time delay exists in the control loop. Therefore, a delay compensation term to the transfer function is proposed. Experimental results on a real system show that the system performs well for both regular and irregular waves.","PeriodicalId":163318,"journal":{"name":"Proceedings of 2013 3rd International Conference on Computer Science and Network Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130279416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信