首页 > 最新文献

Int. J. Networked Distributed Comput.最新文献

英文 中文
Accelerating NTRU Encryption with Graphics Processing Units 加速NTRU加密与图形处理单元
Pub Date : 2014-11-01 DOI: 10.2991/ijndc.2014.2.4.6
Tianyu Bai, Spencer Davis, Juanjuan Li, Ying Gu, Hai Jiang
Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/decryption process. However, the Big Data issue has perplexed most lattice based cryptographic systems since the overall processing is slowed down too much. This paper intends to analyze one of the major lattice-based cryptographic systems, Nth-degree truncated polynomial ring (NTRU), and accelerate its execution with Graphic Processing Unit (GPU) for acceptable processing speed. Three strategies, including single GPU with zero copy, single GPU with data transfer, and multi-GPU versions are proposed for performance comparison. GPU computing techniques such as stream and zero copy are applied to overlap computations and communications for possible speedup. Experimental results have demonstrated the effectiveness of GPU acceleration of NTRU. As the number of involved devices increases, better NTRU performance will be achieved.
基于点阵的密码学以其抗量子计算能力和高效的加解密过程而备受关注。然而,大数据问题一直困扰着大多数基于点阵的密码系统,因为整体处理速度太慢了。本文旨在分析主要的基于格的密码系统之一,n度截断多项式环(NTRU),并利用图形处理单元(GPU)加速其执行,以获得可接受的处理速度。提出了单GPU零拷贝、单GPU带数据传输和多GPU版本三种策略进行性能比较。GPU计算技术,如流和零复制应用于重叠计算和通信,以可能的加速。实验结果证明了GPU加速NTRU的有效性。随着所涉及设备数量的增加,NTRU的性能将得到提高。
{"title":"Accelerating NTRU Encryption with Graphics Processing Units","authors":"Tianyu Bai, Spencer Davis, Juanjuan Li, Ying Gu, Hai Jiang","doi":"10.2991/ijndc.2014.2.4.6","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.4.6","url":null,"abstract":"Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/decryption process. However, the Big Data issue has perplexed most lattice based cryptographic systems since the overall processing is slowed down too much. This paper intends to analyze one of the major lattice-based cryptographic systems, Nth-degree truncated polynomial ring (NTRU), and accelerate its execution with Graphic Processing Unit (GPU) for acceptable processing speed. Three strategies, including single GPU with zero copy, single GPU with data transfer, and multi-GPU versions are proposed for performance comparison. GPU computing techniques such as stream and zero copy are applied to overlap computations and communications for possible speedup. Experimental results have demonstrated the effectiveness of GPU acceleration of NTRU. As the number of involved devices increases, better NTRU performance will be achieved.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Embedding GPU Computations in Hadoop 在Hadoop中嵌入GPU计算
Pub Date : 2014-11-01 DOI: 10.2991/ijndc.2014.2.4.2
Jie Zhu, Hai Jiang, Juanjuan Li, Erikson Hardesty, Kuan-Ching Li, Zhongwen Li
As the size of high performance applications increases, four major challenges including heterogeneity, programmability, fault resilience, and energy efficiency have arisen in the underlying distributed systems. To tackle with all of them without sacrificing performance, traditional approaches in resource utilization, task scheduling and programming paradigm should be reconsidered. While Hadoop has handled data-intensive applications well in Clouds, GPU has demonstrated its acceleration effectiveness for computation-intensive ones. This paper addresses the approaches for Hadoop to exploiting both CPU and GPU resources effectively to handle aforementioned challenges. Hadoop schedules MapReduce’s Map and Reduce functions across multiple different computing nodes through Java, whereas CUDA code helps accelerate local computations further on attached GPUs. All available heterogeneous computational power will be utilized. MapReduce in Hadoop eases the programming task by hiding communication and scheduling details. Hadoop Distributed File System will help achieve data-level fault resilience. GPU’s energy efficiency characteristics help reduce the power consumption of the whole system. To utilize GPU in Hadoop, four approaches including Jcuda, JNI, Hadoop Streaming, and Hadoop Pipes, have been accomplished and analyzed. Experimental results have demonstrated and compared their effectiveness.
随着高性能应用程序规模的增加,底层分布式系统中出现了四个主要挑战,包括异构性、可编程性、故障恢复能力和能源效率。为了在不牺牲性能的情况下解决所有这些问题,应该重新考虑资源利用、任务调度和编程范式方面的传统方法。虽然Hadoop在云中处理数据密集型应用程序很好,但GPU已经证明了它对计算密集型应用程序的加速效率。本文讨论了Hadoop有效利用CPU和GPU资源来应对上述挑战的方法。Hadoop通过Java在多个不同的计算节点上调度MapReduce的Map和Reduce函数,而CUDA代码有助于在附加的gpu上进一步加速本地计算。将利用所有可用的异构计算能力。Hadoop中的MapReduce通过隐藏通信和调度细节来简化编程任务。Hadoop分布式文件系统将帮助实现数据级的故障恢复。GPU的能效特性有助于降低整个系统的功耗。为了在Hadoop中利用GPU,本文完成并分析了Jcuda、JNI、Hadoop Streaming和Hadoop Pipes四种方法。实验结果证明了该方法的有效性。
{"title":"Embedding GPU Computations in Hadoop","authors":"Jie Zhu, Hai Jiang, Juanjuan Li, Erikson Hardesty, Kuan-Ching Li, Zhongwen Li","doi":"10.2991/ijndc.2014.2.4.2","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.4.2","url":null,"abstract":"As the size of high performance applications increases, four major challenges including heterogeneity, programmability, fault resilience, and energy efficiency have arisen in the underlying distributed systems. To tackle with all of them without sacrificing performance, traditional approaches in resource utilization, task scheduling and programming paradigm should be reconsidered. While Hadoop has handled data-intensive applications well in Clouds, GPU has demonstrated its acceleration effectiveness for computation-intensive ones. This paper addresses the approaches for Hadoop to exploiting both CPU and GPU resources effectively to handle aforementioned challenges. Hadoop schedules MapReduce’s Map and Reduce functions across multiple different computing nodes through Java, whereas CUDA code helps accelerate local computations further on attached GPUs. All available heterogeneous computational power will be utilized. MapReduce in Hadoop eases the programming task by hiding communication and scheduling details. Hadoop Distributed File System will help achieve data-level fault resilience. GPU’s energy efficiency characteristics help reduce the power consumption of the whole system. To utilize GPU in Hadoop, four approaches including Jcuda, JNI, Hadoop Streaming, and Hadoop Pipes, have been accomplished and analyzed. Experimental results have demonstrated and compared their effectiveness.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Design-time Modelling and Verification of Safety-critical Component-based Systems 基于安全关键部件的系统设计时建模与验证研究
Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.7
N. Kajtazovic, C. Preschern, Andrea Höller, Christian Kreiner
Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One of the main challenges of introducing CBSE in this area is to ensure the integrity of the overall system after building it from individual components, since safety-critical systems require a rigorous development and qualification process to be released for the operation. Although the topic of compositional modelling and verification in the context of component-based systems has been studied intensively in the last decade, there is currently still a lack of tools and methods that can be applied practically and that consider major related systems quality attributes such as usability and scalability. In this paper, we present a novel approach for design-time modelling and verification of safety-critical systems, based on data semantics of components. We describe the composition, i.e., the systems design, and the underlying properties of components as a Constraint Satisfaction Problem (CSP) and perform the verification by solving that problem. We show that CSP can be successfully applied for the verification of compositions for many types of properties. In our experimental setup we also show how the proposed verification scales with regard to the complexity of different system configurations.
基于组件的软件工程(CBSE)是目前用于开发安全关键系统的关键范例。它提供了一种控制系统复杂性的基本方法,允许设计系统部件(即组件)以供重用,并允许独立开发这些部件。在该领域引入CBSE的主要挑战之一是,在从单个组件构建系统后,确保整个系统的完整性,因为安全关键系统需要严格的开发和认证过程才能投入使用。尽管在过去十年中,基于组件的系统背景下的组合建模和验证的主题已经得到了深入的研究,但目前仍然缺乏可以实际应用的工具和方法,并且考虑到主要相关的系统质量属性,如可用性和可扩展性。在本文中,我们提出了一种基于组件数据语义的安全关键系统设计时建模和验证的新方法。我们将组合,即系统设计,以及组件的底层属性描述为约束满足问题(CSP),并通过解决该问题来执行验证。我们证明了CSP可以成功地应用于许多类型性质的组合物的验证。在我们的实验设置中,我们还展示了所提出的验证如何考虑到不同系统配置的复杂性。
{"title":"On Design-time Modelling and Verification of Safety-critical Component-based Systems","authors":"N. Kajtazovic, C. Preschern, Andrea Höller, Christian Kreiner","doi":"10.2991/ijndc.2014.2.3.7","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.7","url":null,"abstract":"Component-based Software Engineering (CBSE) is currently a key paradigm used for developing safetycritical systems. It provides a fundamental means to master systems complexity, by allowing to design systems parts (i.e., components) for reuse and by allowing to develop those parts independently. One of the main challenges of introducing CBSE in this area is to ensure the integrity of the overall system after building it from individual components, since safety-critical systems require a rigorous development and qualification process to be released for the operation. Although the topic of compositional modelling and verification in the context of component-based systems has been studied intensively in the last decade, there is currently still a lack of tools and methods that can be applied practically and that consider major related systems quality attributes such as usability and scalability. In this paper, we present a novel approach for design-time modelling and verification of safety-critical systems, based on data semantics of components. We describe the composition, i.e., the systems design, and the underlying properties of components as a Constraint Satisfaction Problem (CSP) and perform the verification by solving that problem. We show that CSP can be successfully applied for the verification of compositions for many types of properties. In our experimental setup we also show how the proposed verification scales with regard to the complexity of different system configurations.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124317252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree) 简单加权生成树(SWST)与能量感知生成树(EAST)的比较研究
Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.4
L. McLauchlan, Soumya Saha, R. Challoo
Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed, WSNs need to be able to arrange and self-organize. Nodes in WSNs generally possess low or limited power resources such as batteries. Energy utilization thus is an important design consideration for WSN deployment. There have been many energy aware protocols proposed in the literature to increase the longevity of the network. Recently, two novel Connected Dominating Set (CDS) based topology construction (TC) protocols- SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree), have been proposed which aim to balance the load among the nodes of the network and thus to reduce the probability of dying for a particular node. The SWST and EAST protocols aim to reduce the number of broken links that may have been caused by a single node becoming dead or comatose in the communication backbone of the network. In this paper, a comparative study of the SWST and EAST algorithms is conducted to evaluate the performance of the two algorithms. From the MATLAB simulations it was observed that the EAST protocol generally performs better than the SWST algorithms in delivering messages to the sink node.
无线传感器网络(wsn)用于许多不同的应用,包括安全,环境监测,滑坡检测,患者监测,侦察操作,结构健康监测和智能建筑。由于在许多应用中,无线传感器网络节点是随机部署的,因此无线传感器网络需要能够安排和自组织。无线传感器网络中的节点通常具有低或有限的电源资源,如电池。因此,能源利用是无线传感器网络部署的重要设计考虑因素。文献中已经提出了许多能量感知协议来增加网络的寿命。近年来,人们提出了两种新的基于连接支配集(CDS)的拓扑构造(TC)协议——简单加权生成树(SWST)和能量感知生成树(EAST),旨在平衡网络节点之间的负载,从而降低特定节点的死亡概率。SWST和EAST协议旨在减少由于网络通信骨干中单个节点死亡或昏迷而导致的断开链路的数量。本文对SWST和EAST算法进行了比较研究,对两种算法的性能进行了评价。从MATLAB仿真中可以观察到,EAST协议在向汇聚节点发送消息方面通常优于SWST算法。
{"title":"Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)","authors":"L. McLauchlan, Soumya Saha, R. Challoo","doi":"10.2991/ijndc.2014.2.3.4","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.4","url":null,"abstract":"Wireless Sensors Networks (WSNs) are utilized in many diverse applications ranging from security, environmental monitoring, landslide detection, patient monitoring, reconnaissance operations, structural health monitoring and smart buildings. Since in many applications the WSN nodes are randomly deployed, WSNs need to be able to arrange and self-organize. Nodes in WSNs generally possess low or limited power resources such as batteries. Energy utilization thus is an important design consideration for WSN deployment. There have been many energy aware protocols proposed in the literature to increase the longevity of the network. Recently, two novel Connected Dominating Set (CDS) based topology construction (TC) protocols- SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree), have been proposed which aim to balance the load among the nodes of the network and thus to reduce the probability of dying for a particular node. The SWST and EAST protocols aim to reduce the number of broken links that may have been caused by a single node becoming dead or comatose in the communication backbone of the network. In this paper, a comparative study of the SWST and EAST algorithms is conducted to evaluate the performance of the two algorithms. From the MATLAB simulations it was observed that the EAST protocol generally performs better than the SWST algorithms in delivering messages to the sink node.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Security and Privacy Protection for Emerging Smart RFID Communications 新兴智能RFID通信的高效安全和隐私保护
Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.5
M. Sadikin, M. Kyas
Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges in the constrained nature of RFID applications by applying a light-weight cryptographic method with advanced-level 128 bit security protection. Thus, IMAKA-Tate protects the RFID system from various security and privacy threats (e.g. unauthorized tracking, cloning attack, etc.).
由于其受约束的性质,智能RFID技术的使用引入了巨大的安全和隐私问题。本文提出了基于身份的加密方法中使用Tate对的IMAKA-Tate:身份保护、相互认证和密钥协议。它旨在通过应用具有高级128位安全保护的轻量级加密方法来解决RFID应用受约束性质中的各种挑战。因此,IMAKA-Tate保护RFID系统免受各种安全和隐私威胁(例如,未经授权的跟踪,克隆攻击等)。
{"title":"Efficient Security and Privacy Protection for Emerging Smart RFID Communications","authors":"M. Sadikin, M. Kyas","doi":"10.2991/ijndc.2014.2.3.5","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.5","url":null,"abstract":"Due to its constrained nature, the use of smart RFID technology introduces tremendous security and privacy issues. This paper presents IMAKA-Tate: Identity protection, Mutual Authentication and Key Agreement using Tate pairing of Identity-based Encryption method. It is designed to tackle various challenges in the constrained nature of RFID applications by applying a light-weight cryptographic method with advanced-level 128 bit security protection. Thus, IMAKA-Tate protects the RFID system from various security and privacy threats (e.g. unauthorized tracking, cloning attack, etc.).","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133839609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Test Image Generation using Segmental Symbolic Evaluation 使用分段符号求值的测试图像生成
Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.3
Tahir Jameel, Mengxiang Lin
Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented technique is first of its type to generate test images based on symbolic evaluation of program under test. The idea is based on the fact that, neighboring image operations are applied by selecting a segment of image pixels called a window, and iterated by sliding window over entire image. We imitate neighboring operations using symbolic values for the pixels rather than concrete values. The path constraint is extracted for each path in the program under test and solved for concrete solutions. Test images are generated based on solution of path constraints for each identified path. We have tested the proposed scheme on different programs and the results show that test images are successfully generated for each path to ensure the path coverage of the program under test and identifying infeasible paths.
图像处理应用在现代生活中发挥了至关重要的作用,由于其重要性和人类对其的依赖性,需要对其进行充分的测试。由于图像在生成和评估方面的复杂性,对图像处理应用程序进行测试是困难的。该技术首次实现了基于被测程序的符号求值生成测试图像的方法。这个想法是基于这样一个事实,即通过选择一段称为窗口的图像像素来应用相邻图像操作,并通过在整个图像上滑动窗口进行迭代。我们使用象素的符号值而不是具体值来模拟相邻的操作。对待测程序中的每条路径提取路径约束并求解具体解。测试图像的生成是基于对每条识别路径的路径约束的求解。我们在不同的程序上对所提出的方案进行了测试,结果表明,对每条路径都成功地生成了测试图像,保证了被测程序的路径覆盖率,并识别出了不可行的路径。
{"title":"Test Image Generation using Segmental Symbolic Evaluation","authors":"Tahir Jameel, Mengxiang Lin","doi":"10.2991/ijndc.2014.2.3.3","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.3","url":null,"abstract":"Image processing applications have played a vital role in modern life and they are required to be well tested due to their significance and human dependence on them. Testing of image processing application is difficult due to complex nature of images in terms of their generation and evaluation. The presented technique is first of its type to generate test images based on symbolic evaluation of program under test. The idea is based on the fact that, neighboring image operations are applied by selecting a segment of image pixels called a window, and iterated by sliding window over entire image. We imitate neighboring operations using symbolic values for the pixels rather than concrete values. The path constraint is extracted for each path in the program under test and solved for concrete solutions. Test images are generated based on solution of path constraints for each identified path. We have tested the proposed scheme on different programs and the results show that test images are successfully generated for each path to ensure the path coverage of the program under test and identifying infeasible paths.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System One-D-R-A-G-SOM及其在手部造型教学系统中的应用
Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.6
T. Kuremoto, T. Otani, S. Mabu, M. Obayashi, Kunikazu Kobayashi
In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and the disorder of the map is available to be solved by the asymmetric neighborhood function, the proposed model gives priority of learning performance to the conventional two dimensional growing SOM. Additionally, One-D-R-A-G-SOM is introduced to a hand shape recognition and instruction learning system. Experiment results showed the effectiveness of the novel system comparing with systems using the conventional SOMs.
本文提出了一种新的自组织映射(SOM)“One-D-R-A-G-SOM”。它是一种利用不对称邻域函数的一维环型生长SOM。由于一维环状特征映射的拓扑结构更适合增加或减少单元数,且映射的无序性可以通过不对称邻域函数来解决,因此该模型将学习性能优先于传统的二维生长SOM。此外,将One-D-R-A-G-SOM引入手部形状识别和指导学习系统。实验结果表明,与传统的SOMs系统相比,该系统是有效的。
{"title":"One-D-R-A-G-SOM and its Application to a Hand Shape Instruction Learning System","authors":"T. Kuremoto, T. Otani, S. Mabu, M. Obayashi, Kunikazu Kobayashi","doi":"10.2991/ijndc.2014.2.3.6","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.6","url":null,"abstract":"In this paper, a novel self-organizing map (SOM) named “One-D-R-A-G-SOM” is proposed. It is a kind of one dimensional ring type growing SOM using asymmetric neighborhood function. As the topology of one dimensional ring type feature map is more suitable to increase or decrease the number of units, and the disorder of the map is available to be solved by the asymmetric neighborhood function, the proposed model gives priority of learning performance to the conventional two dimensional growing SOM. Additionally, One-D-R-A-G-SOM is introduced to a hand shape recognition and instruction learning system. Experiment results showed the effectiveness of the novel system comparing with systems using the conventional SOMs.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Issues in Efficiency for Distributed and Networking Systems 分布式和网络系统的效率问题
Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.1
Jung-Yeon Jo
{"title":"Issues in Efficiency for Distributed and Networking Systems","authors":"Jung-Yeon Jo","doi":"10.2991/ijndc.2014.2.3.1","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.1","url":null,"abstract":"","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols 各种无线传感器网络(WSN)拓扑构建协议的比较研究
Pub Date : 2014-08-01 DOI: 10.2991/ijndc.2014.2.3.8
L. McLauchlan, Soumya Saha, C. Montiel, R. Challoo
As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to provide sensor coverage. The choice of the Topology Construction (TC) and Topology Maintenance (TM) protocols will affect WSN lifetime. In this paper, two new load balancing TC protocols, SWST (Simple Weighted Spanning Tree), EAST (Energy Aware Spanning Tree) as well as three well known TC protocols, Simple Tree, Random Nearest Neighbor Tree (Random NNT) and Euclidean Minimum Spanning Tree (Euclidian MST), are studied using MATLAB and TC protocols such as A3 (A tree), A3 Coverage, Connected Dominating Set under Rule K (CDS Rule K), Energy Efficient Connected Dominating Set (EECDS), Simple Tree and K Neighbor (KNeigh) Tree, are simulated using Atarraya. Comparisons are performed between many of the TC protocols.
随着无线传感器和无线传感器网络(WSNs)成本的降低,它们变得越来越普遍;它们越来越多地用于安全、结构监测和环境监测等许多应用中。许多WSN应用采用随机传感器部署来提供传感器覆盖。拓扑构建(TC)协议和拓扑维护(TM)协议的选择将影响WSN的生命周期。本文利用MATLAB对两种新的负载均衡TC协议——简单加权生成树(SWST)、能量感知生成树(EAST)以及简单树、随机近邻树(Random NNT)和欧氏最小生成树(Euclidian MST)三种常见的负载均衡TC协议以及A3 (A树)、A3覆盖、规则K下的连通支配集(CDS规则K)、节能连通支配集(EECDS)、简单树和K邻居(KNeigh)树、使用Atarraya进行模拟。在许多TC协议之间进行了比较。
{"title":"Comparative Study of Various Wireless Sensor Network (WSN) Topology Construction Protocols","authors":"L. McLauchlan, Soumya Saha, C. Montiel, R. Challoo","doi":"10.2991/ijndc.2014.2.3.8","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.3.8","url":null,"abstract":"As the cost for wireless sensors and wireless sensor networks (WSNs) have decreased, they have become more ubiquitous; they are increasingly being used in many applications such as security, structural monitoring and environmental monitoring. Many WSN applications employ a random sensor deployment to provide sensor coverage. The choice of the Topology Construction (TC) and Topology Maintenance (TM) protocols will affect WSN lifetime. In this paper, two new load balancing TC protocols, SWST (Simple Weighted Spanning Tree), EAST (Energy Aware Spanning Tree) as well as three well known TC protocols, Simple Tree, Random Nearest Neighbor Tree (Random NNT) and Euclidean Minimum Spanning Tree (Euclidian MST), are studied using MATLAB and TC protocols such as A3 (A tree), A3 Coverage, Connected Dominating Set under Rule K (CDS Rule K), Energy Efficient Connected Dominating Set (EECDS), Simple Tree and K Neighbor (KNeigh) Tree, are simulated using Atarraya. Comparisons are performed between many of the TC protocols.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129220944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints 基于遗传算法的多种约束条件下铣削作业多目标优化
Pub Date : 2014-04-01 DOI: 10.2991/ijndc.2014.2.2.5
Li-Bao An, Peiqing Yang, Hong Zhang, Ming-Ying Chen
In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing pass and at least one roughing passes depending on the total depth of cut. Maximum and minimum allowable cutting speeds, feed rates and depths of cut, as well as tool life, surface roughness, cutting force and cutting power consumption are constraints of the model. Optimal values of objective function and corresponding machining parameters are found by Genetic Algorithms. An example is presented to illustrate the model and solution method.
本文研究了面铣削加工的参数优化问题。建立了以单位生产成本和总加工时间最小、利润率最大化为目标的多目标数学模型。根据切割的总深度,通过一次精加工和至少一次粗加工来去除不需要的材料。最大和最小允许切削速度,进给量和切削深度,以及刀具寿命,表面粗糙度,切削力和切削功耗是模型的约束条件。利用遗传算法求出目标函数的最优值和相应的加工参数。给出了一个算例来说明模型和求解方法。
{"title":"Multi-Objective Optimization for Milling Operations using Genetic Algorithms under Various Constraints","authors":"Li-Bao An, Peiqing Yang, Hong Zhang, Ming-Ying Chen","doi":"10.2991/ijndc.2014.2.2.5","DOIUrl":"https://doi.org/10.2991/ijndc.2014.2.2.5","url":null,"abstract":"In this paper, the parameter optimization problem for face-milling operations is studied. A multi-objective mathematical model is developed with the purpose to minimize the unit production cost and total machining time while maximize the profit rate. The unwanted material is removed by one finishing pass and at least one roughing passes depending on the total depth of cut. Maximum and minimum allowable cutting speeds, feed rates and depths of cut, as well as tool life, surface roughness, cutting force and cutting power consumption are constraints of the model. Optimal values of objective function and corresponding machining parameters are found by Genetic Algorithms. An example is presented to illustrate the model and solution method.","PeriodicalId":318936,"journal":{"name":"Int. J. Networked Distributed Comput.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116493979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Int. J. Networked Distributed Comput.
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1