International Journal of Computer Theory and Engineering最新文献

筛选
英文 中文
Deformation Analysis and Simulation of the Cup-Shaped Flexspline for Harmonic Drive Using in Aerocrafts 航空谐波传动用杯形柔轮的变形分析与仿真
International Journal of Computer Theory and Engineering Pub Date : 2016-12-01 DOI: 10.7763/IJCTE.2016.V8.1098
Li Zu, A. Yin, Yanyang Sun, Yulin Wang, Y. Ou, Yi Liang
{"title":"Deformation Analysis and Simulation of the Cup-Shaped Flexspline for Harmonic Drive Using in Aerocrafts","authors":"Li Zu, A. Yin, Yanyang Sun, Yulin Wang, Y. Ou, Yi Liang","doi":"10.7763/IJCTE.2016.V8.1098","DOIUrl":"https://doi.org/10.7763/IJCTE.2016.V8.1098","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Parameters Optimization of SVM Based on Improved Fruit Fly Optimization Algorithm 基于改进果蝇优化算法的SVM参数优化研究
International Journal of Computer Theory and Engineering Pub Date : 2016-12-01 DOI: 10.7763/IJCTE.2016.V8.1096
Qiantu Zhang, Liqing Fang, Leilei Ma, Yulong Zhao
{"title":"Research on Parameters Optimization of SVM Based on Improved Fruit Fly Optimization Algorithm","authors":"Qiantu Zhang, Liqing Fang, Leilei Ma, Yulong Zhao","doi":"10.7763/IJCTE.2016.V8.1096","DOIUrl":"https://doi.org/10.7763/IJCTE.2016.V8.1096","url":null,"abstract":"—The performance of the support vector machine (SVM) is determined to a great extent by the parameter selection. In order to improve the learning and generalization ability of SVM, in this paper, an improved fruit fly optimization algorithm (IFOA) was proposed to optimize kernel parameter and penalty factor of SVM. In IFOA, the fruit fly group is dynamically divided into advanced subgroup and drawback subgroup according to its own evolutionary level. A global search is made for the drawback subgroup under the guidance of the best individual and a finely local search is made for the advanced subgroup in which the fruit flies do Levy flight around the best individual. Two subgroups exchange information by updating the overall optimum and recombining the subgroups. Getting rid of local optimum and improve search ability are ensured by making those changes in basic FOA. The performance of the IFOA and classification accuracy of optimized SVM based on IFOA are respectively examined through several typical benchmark functions and classical data sets from UCI benchmark. The experiment results show that the performance of the new algorithm is obviously more successful than FOA and it is also an effective SVM parameter optimization method which has better performance than some other methods.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128661209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
E-Government Project Obstacles in Pakistan 巴基斯坦电子政务项目的障碍
International Journal of Computer Theory and Engineering Pub Date : 2016-10-01 DOI: 10.7763/ijcte.2016.v8.1072
Zulfiqar Haider, Shuwen Chen, Muhammad Bux Burdey
{"title":"E-Government Project Obstacles in Pakistan","authors":"Zulfiqar Haider, Shuwen Chen, Muhammad Bux Burdey","doi":"10.7763/ijcte.2016.v8.1072","DOIUrl":"https://doi.org/10.7763/ijcte.2016.v8.1072","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using Arbiter and Combiner Tree to Classify Contexts of Data 用仲裁者和组合树对数据上下文进行分类
International Journal of Computer Theory and Engineering Pub Date : 2016-10-01 DOI: 10.7763/IJCTE.2016.V8.1085
Tawunrat Chalothorn, J. Ellman
{"title":"Using Arbiter and Combiner Tree to Classify Contexts of Data","authors":"Tawunrat Chalothorn, J. Ellman","doi":"10.7763/IJCTE.2016.V8.1085","DOIUrl":"https://doi.org/10.7763/IJCTE.2016.V8.1085","url":null,"abstract":"This paper reports on the use of ensemble learning to classify as either positive or negative the sentiment of Tweets. Tweets were chosen as Twitter is a popular tool and a public, human annotated dataset was made available as part of the SemEval 2013 competition. We report on a classification approach that contrasts single machine learning algorithms with a combination of algorithms in an ensemble learning approach. The single machine learning algorithms used were support vector machine (SVM) and Naive Bayes (NB), while the methods of ensemble learning include the arbiter tree and the combiner tree. Our system achieved an F-score using Tweets and SMS with the arbiter tree at 83.57% and 93.55%, respectively, which was better than base classifiers; meanwhile, the results from the combiner tree achieved lower scores than base classifiers.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121645943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
HPC (High-Performance the Computing) for Big Data on Cloud: Opportunities and Challenges 云上大数据的高性能计算:机遇与挑战
International Journal of Computer Theory and Engineering Pub Date : 2016-10-01 DOI: 10.7763/ijcte.2016.v8.1083
M. Abid
{"title":"HPC (High-Performance the Computing) for Big Data on Cloud: Opportunities and Challenges","authors":"M. Abid","doi":"10.7763/ijcte.2016.v8.1083","DOIUrl":"https://doi.org/10.7763/ijcte.2016.v8.1083","url":null,"abstract":"Big data and Cloud computing are emerging as new promising technologies, gaining noticeable momentum in nowadays IT. Nowadays, and unprecedentedly, the amount of produced data exceeds all what has been generated since the dawn of computing; a fact which is mainly due to the pervasiveness of IT usage and to the ubiquity of Internet access. Nevertheless, this generated big data is only valuable if processed and mined. To process and mine big data, substantial HPC (high-performance computing) power is needed; a faculty which is not that affordable for most, unless we adopt for a convenient venue, e.g., cloud computing. In this paper, we propose a blue print for deploying a real-world HPC testbed. This will help simulating and evaluating HPC relevant concerns with minimum cost. Indeed, cloud computing provides the unique opportunity for circumventing the initial cost of owning private HPC platforms for big data processing, and this by providing HPC as a service (HPCaaS). In this paper, we present the subtleties of a synergetic “fitting” between big data and cloud computing. We delineate opportunities and address relevant challenges. To concretize, we advocate using private clouds instead of public ones, and propose using Hadoop along with MapReduce, on top of Openstack, as a promising venue for scientific communities to own research-oriented private clouds meant to provide HPCaaS for Big data mining.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PET Image Segmentation Based on Gabor Annulus Filtering and Region Growing 基于Gabor环滤波和区域生长的PET图像分割
International Journal of Computer Theory and Engineering Pub Date : 2016-10-01 DOI: 10.7763/ijcte.2016.v8.1080
P. S. A. Devi, M. G. Mini
{"title":"PET Image Segmentation Based on Gabor Annulus Filtering and Region Growing","authors":"P. S. A. Devi, M. G. Mini","doi":"10.7763/ijcte.2016.v8.1080","DOIUrl":"https://doi.org/10.7763/ijcte.2016.v8.1080","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123692315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
GEMINI: A Hybrid Byzantine Fault Tolerant Protocol for Reliable Composite Web Services Orchestrated Delivery 双子座:用于可靠组合Web服务编排交付的混合拜占庭容错协议
International Journal of Computer Theory and Engineering Pub Date : 2016-10-01 DOI: 10.7763/IJCTE.2016.V8.1071
Islam Elgedawy
{"title":"GEMINI: A Hybrid Byzantine Fault Tolerant Protocol for Reliable Composite Web Services Orchestrated Delivery","authors":"Islam Elgedawy","doi":"10.7763/IJCTE.2016.V8.1071","DOIUrl":"https://doi.org/10.7763/IJCTE.2016.V8.1071","url":null,"abstract":"—To ensure reliable delivery for composite web services, we argue that Byzantine fault tolerance (BFT) must be guaranteed for the service delivery modules (such as BPEL execution engines and dispatchers) as well as for the realizing components of the composite web service. Existing BFT service delivery approaches are mainly focused on atomic web services. However, there are few approaches discussed BFT for composite web services delivery. Unfortunately, such approaches either ensured BFT for the service delivery modules alone or for the service realizing components alone; but not for both. To overcome such limitation, this paper proposes GEMINI; a hybrid BFT protocol for reliable composite web services orchestrated delivery. GEMINI uses a lightweight replication-based BFT protocol to ensure the BFT for service delivery modules, and uses a speculative quorum-based BFT protocol to ensure components BFT. Unlike existing quorum-based BFT approaches that ensure components redundancy via component replication; GEMINI ensures components redundancy via components parallel provisioning. Experimental results show that GEMINI increases the reliability and throughput of composite web service delivery when compared with existing composite web services delivery approaches.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129438627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation Model of the Visual Fatigue on the 3D Stereoscopic Video 三维立体视频视觉疲劳评价模型
International Journal of Computer Theory and Engineering Pub Date : 2016-08-01 DOI: 10.7763/IJCTE.2016.V8.1068
Gil-Ja So, S. H. Kim, Jeong-Yeop Kim
{"title":"Evaluation Model of the Visual Fatigue on the 3D Stereoscopic Video","authors":"Gil-Ja So, S. H. Kim, Jeong-Yeop Kim","doi":"10.7763/IJCTE.2016.V8.1068","DOIUrl":"https://doi.org/10.7763/IJCTE.2016.V8.1068","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125819497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Markov-Based Anomaly Correction in Embedded Systems 基于马尔可夫的嵌入式系统异常校正
International Journal of Computer Theory and Engineering Pub Date : 2016-08-01 DOI: 10.7763/IJCTE.2016.V8.1057
Roghayeh Mojarad, H. Zarandi
{"title":"Markov-Based Anomaly Correction in Embedded Systems","authors":"Roghayeh Mojarad, H. Zarandi","doi":"10.7763/IJCTE.2016.V8.1057","DOIUrl":"https://doi.org/10.7763/IJCTE.2016.V8.1057","url":null,"abstract":"In this paper, an anomaly correction method is proposed which is based on Markov anomaly detection method. The proposed method employs the probability of transitions between events to evaluate the behavior of a system. This method consists of three steps: 1) Construction of transition matrix by probability of transitions between events and list of known events are generated in training phase; 2) Detection of anomaly based on Markov detection method will be done. In test data when the probability of transition previous event to current event does not reach a predefined threshold, an anomaly is detected. Threshold is determined based on constructed transition matrix in step 1; 3) Check the defined constraints for each anomalous event to find source of anomaly and the suitable way to correct the anomalous event. Next, an event with the highest compliance with the constraints is selected. Evaluation of the proposed method is done using a total of 7000 data sets. The operational scope of corrector and the number of injected anomalies varied between 3 and 5, 1 and 7, respectively. The simulation experiments have been done to measure the correction coverage rate which is between 53.5% and 97.2% with average of 77.66%. For evaluation of hardware consumptions of the proposed method, this method is implemented by VHDL. Power, area and time consumptions are on average 87.43 w, 415.48 m, and 4.12ns, respectively.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
In Search of Software Engineering Foundations: A Theoretical and Trans-disciplinary Perspective 寻找软件工程基础:一个理论和跨学科的视角
International Journal of Computer Theory and Engineering Pub Date : 2016-08-01 DOI: 10.7763/ijcte.2016.v8.1066
M. Uysal
{"title":"In Search of Software Engineering Foundations: A Theoretical and Trans-disciplinary Perspective","authors":"M. Uysal","doi":"10.7763/ijcte.2016.v8.1066","DOIUrl":"https://doi.org/10.7763/ijcte.2016.v8.1066","url":null,"abstract":"Technical innovations and trends have been changing from time to time as a major driving force for Software Engineering (SE). Although it can be regarded as a relatively young discipline usually driven by industrial needs or practices, fundamental problems of SE still continue to exist. It is thought that the problem may be not only in adopting a domain specific technology or method, but also in understanding the foundations and use of theories in SE. Therefore, investigating the trans-disciplinary aspects of SE may pave the way of some solutions while it may shed light on building the theoretical background of possible empirical studies. However, the review of SE literature shows the little effort given to this research gap, and thus, this paper attempts to offer a conceptual framework and brings a different perspective for understanding the theoretical and trans-disciplinary foundations of SE as a discipline.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115919542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信