HumanMachine Communication Journal最新文献

筛选
英文 中文
A Traffic Splitting Algorithm Based on Dual Hash Table for Multi-path Internet Routing 基于双哈希表的多路径互联网路由流量分割算法
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.20
Youjun Bu, Hong Guo, Hong-chao Hu, Binqiang Wang
{"title":"A Traffic Splitting Algorithm Based on Dual Hash Table for Multi-path Internet Routing","authors":"Youjun Bu, Hong Guo, Hong-chao Hu, Binqiang Wang","doi":"10.1109/MVHI.2010.20","DOIUrl":"https://doi.org/10.1109/MVHI.2010.20","url":null,"abstract":"This paper studies load balancing for multi-path Internet routing. We focus on traffic splitting algorithm based on dual hash table and counters called DHTC that work on the flow level to avoid packet reordering. The algorithm perform load balancing in the flow mapping manner at the variable length packet level. We show that the algorithm is practice and should be take into account for the application of load balancing in practice.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"52 1","pages":"397-400"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84957065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Communication Protocols Realization of the Prediction and Evaluation Light Environment Embedded Systems 光环境预测与评估嵌入式系统的通信协议实现
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.103
Haiwei Wu, Haiye Yu, Haoyu Yang, Lei Zhang, Keling Zhang, Huiyu Cui
{"title":"Communication Protocols Realization of the Prediction and Evaluation Light Environment Embedded Systems","authors":"Haiwei Wu, Haiye Yu, Haoyu Yang, Lei Zhang, Keling Zhang, Huiyu Cui","doi":"10.1109/MVHI.2010.103","DOIUrl":"https://doi.org/10.1109/MVHI.2010.103","url":null,"abstract":"A novel approach to achieve real-time protocol implementations is presented in this research. TWI, μC/OS-II, light sensor and our testing tools execute the protocol in the prediction and evaluation embedded systems of the light environment. The protocol is used by software simulation instead of TWI hardware. The method saves the hardware cost and brings the TWI protocol to a popular application. Furthermore this method is valid by validation test.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"36 1","pages":"109-112"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85864774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform 基于混沌系统和分数阶傅里叶变换的指纹加密新算法
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.38
Delong Cui
{"title":"A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform","authors":"Delong Cui","doi":"10.1109/MVHI.2010.38","DOIUrl":"https://doi.org/10.1109/MVHI.2010.38","url":null,"abstract":"To enhance present fingerprint encryption/ decryption algorithm security, a novel fingerprint encryption/ decryption algorithm based on chaotic system and fractional Fourier transform is proposed in this paper. The fingerprint encryption process includes two steps: first the fingerprint is encrypted by employing Fractional Fourier domain double random phase, then the confusion fingerprint is encrypted by using confusion matrix which is generated by chaotic system, and finally the cipher fingerprint is obtained. The security of the proposed algorithm depends on the sensitivity to the randomness of phase mask, the orders of FRFT and the initial conditions of chaotic system. Theoretical analysis and experimental results demonstrate that the algorithm is favorable.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"52 1","pages":"168-171"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85928234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Research of an Innovative P2P-Based Botnet 基于p2p的新型僵尸网络研究
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.135
Jian Gao, Yixian Yang, K. Zheng, Zhengming Hu
{"title":"Research of an Innovative P2P-Based Botnet","authors":"Jian Gao, Yixian Yang, K. Zheng, Zhengming Hu","doi":"10.1109/MVHI.2010.135","DOIUrl":"https://doi.org/10.1109/MVHI.2010.135","url":null,"abstract":"The research recently focuses on the integration of peer-to-peer frame as incremental improvements to botnet. In hybrid P2P botnet, it is important to find a mechanism to select neighbor list for every super node, in order to improve stability of communication when some super nodes lose. At the same time, it needs to select high performance and nearest node as a super node, to provide command request and file transport for other ordinary nodes. In this paper, we propose a neighbor list selecting method based on Strongly Connected Graph and analysis a super node selecting mechanism based on AHP. Evaluation shows that this mechanism can increase coverage probability of commands and decrease average connection time (ACT) between super node and ordinary node.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"11 1","pages":"214-218"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85995305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Principal Component Analysis Flow Pattern Identification Algorithm for Electrical Capacitance Tomography System 电容层析成像系统中一种新的主成分分析流型识别算法
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.141
Yu Chen, Yuchen Song, Jian Zhang
{"title":"A Novel Principal Component Analysis Flow Pattern Identification Algorithm for Electrical Capacitance Tomography System","authors":"Yu Chen, Yuchen Song, Jian Zhang","doi":"10.1109/MVHI.2010.141","DOIUrl":"https://doi.org/10.1109/MVHI.2010.141","url":null,"abstract":"To solve the flow pattern identification more difficult problem in electrical capacitance tomography (ECT)technology, a novel principal component analysis flow pattern identification algorithm for neural network is presented. Based on the introduction of the basic principles of feature selection and feature extraction for principal component analysis, Construction of Symmetric subspace model based on principal component analysis neural network, and the convergence of Symmetric subspace algorithm is analyzed. The feasibility of using this algorithm for ECT is also discussed. Algorithm to meet the convergence conditions and to simplify the complex pre-processing steps, greatly reducing the computational complexity, improve the speed of the identification. Experimental results indicate that the algorithm can obtain a higher recognition rate compared with BP neural network recognition algorithm and this new algorithm presents a feasible and effective way to research on flow pattern identification algorithm of electrical capacitance tomography.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"126 1","pages":"235-238"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76838936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Watershed Algorithm for Cellular Image Segmentation Based on Mathematical Morphology 基于数学形态学的细胞图像分割分水岭算法
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.55
Wei-bin Chen, Xin Zhang
{"title":"A New Watershed Algorithm for Cellular Image Segmentation Based on Mathematical Morphology","authors":"Wei-bin Chen, Xin Zhang","doi":"10.1109/MVHI.2010.55","DOIUrl":"https://doi.org/10.1109/MVHI.2010.55","url":null,"abstract":"A new watershed algorithm based on mathematical morphology is proposed and applied to cellular image segmentation. The improvement segmentation method of the watershed algorithm based on the marker introduce the idea of morphological reconstruction during the pretreatment, at the same time, use a relatively new method of coercing calibration of the minimum in the watershed transform. With the original method of simulation experiments, the method can be more accurate segmentation results. Compared with other tradition methods, requires fewer computations and simpler parameters and can more efficiently reduce the over-segmentation of the watershed algorithm.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"1 1","pages":"653-656"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77971825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Prediction of Coal Mine Safety Level Based on LSSVM 基于LSSVM的煤矿安全等级预测
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.71
Desheng Liu, Zhiru Xu, Wei Wang, Lei Wang
{"title":"Prediction of Coal Mine Safety Level Based on LSSVM","authors":"Desheng Liu, Zhiru Xu, Wei Wang, Lei Wang","doi":"10.1109/MVHI.2010.71","DOIUrl":"https://doi.org/10.1109/MVHI.2010.71","url":null,"abstract":"Coal mine disaster has a serious threat to production and safety, mine safety prediction is an extremely challenging problem from many perspectives. This paper describes a generic fusion model for coal mine safety combining information from several physically different sensors aiming to the detection, monitoring and crisis management of such natural hazards. A conduct model base on least squares support vector machine (LSSVM) is proposed. Experimental results from the coal mine sensors are presented","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"47 1","pages":"600-603"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79910466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Benefits Distribution Model of High-Risk Projects Based on Deferral Options for Supply Chain Finance 基于延期期权的供应链金融高风险项目收益分配模型
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.93
Duan Weichang
{"title":"Benefits Distribution Model of High-Risk Projects Based on Deferral Options for Supply Chain Finance","authors":"Duan Weichang","doi":"10.1109/MVHI.2010.93","DOIUrl":"https://doi.org/10.1109/MVHI.2010.93","url":null,"abstract":"DCF method has its unique problem when dealing in the risk evaluation circulated for cash-flow issues, and it also neglects the accurate assessment and value in changing different investment. In order to solve the high-risk evaluation for deferred allocation with supply chain finance, a binomial trees model of deferral option for pricing is uses to the valuation problem and solve to an uncertain environment. It is analyses the three key problems for VC investment on supply chain finance, when set up a binomial trees model of deferral option for pricing. The Results is that was tested in a real options and approach to the decision-making when investment to a maximize benefits for a high-risk evaluation, and this method is a practical analysis which provided a new solution for support to decision-makers.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"34 1","pages":"84-87"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76795520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Monitoring System of Circuit Breakers Based on Neural Networks 基于神经网络的断路器监测系统研究
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.194
Yimin Hou, Tao Liu, Xiangmin Lun, Jianjun Lan, Yang Cui
{"title":"Research on Monitoring System of Circuit Breakers Based on Neural Networks","authors":"Yimin Hou, Tao Liu, Xiangmin Lun, Jianjun Lan, Yang Cui","doi":"10.1109/MVHI.2010.194","DOIUrl":"https://doi.org/10.1109/MVHI.2010.194","url":null,"abstract":"The paper proposed a monitoring system for the circuit breakers in the substation based on the Back Propagation Neural Networks(BPNN). The novel temperature and humidity sensor was used in the system to get temperature and humidity value in the breakers. The carbon resistor displacement sensor was employed to get the displacement data of the contact in the closing or breaking procedure. All the data was transferred into the BPNN to obtain the remainder service life of the breakers set and give an alarm for the malfunction. In the experiments, the parameters were measured and the results showed that the system in this paper was efficient.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"1 1","pages":"436-439"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87129354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research and Design of General Report Form System 通用报表系统的研究与设计
HumanMachine Communication Journal Pub Date : 2010-04-24 DOI: 10.1109/MVHI.2010.51
Hongkui Yu, Yanping Yang, Yuxiang Li, Jianfeng Wang
{"title":"Research and Design of General Report Form System","authors":"Hongkui Yu, Yanping Yang, Yuxiang Li, Jianfeng Wang","doi":"10.1109/MVHI.2010.51","DOIUrl":"https://doi.org/10.1109/MVHI.2010.51","url":null,"abstract":"The paper has analyzed to the current situation of the domestic and international report form tool, have pointed out systematic existing problem and deficiency of the report form now at first. Then to the relevant knowledge of the report form, the key technology that the report form tool involves, XML technology, dynamic SQL technology, database technology, etc. have been analyzed and introduced. Finally, how this text has recommended using the technology and report form technology to combine together and make the system be realized synthetically.","PeriodicalId":34860,"journal":{"name":"HumanMachine Communication Journal","volume":"44 1","pages":"25-28"},"PeriodicalIF":0.0,"publicationDate":"2010-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80654253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信