Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work ...
详细信息
Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work on service composition mainly focuses on the algorithms about how to compose services according to assumed QoS, without considering where the required QoS comes from and the selection of user preferred composition algorithm among those with different computational cost and different selection results. In this paper, we propose to strengthen current service composition mechanism by generation of QoS requirement and its algorithm selection based on the QoS reference vectors which are calculated optimally from the existing individual services' QoS by registry to represent QoS overview about the best QoS, the worst (or most economical) QoS, or the average QoS of all composite services. To implement QoS requirement, which is determined according to QoS overview, this paper introduces two selection algorithms as two kinds of experiment examples, one aiming at the most accurate service selection and the other chasing for trade-off between selection cost and result. Experimental results show our mechanism can help the requester achieve his expected composite service with appropriate QoS requirement and customized selection algorithm.
This paper discusses the input-dependent stability observed during torque control experiments using the first joint of the Darmstadt-HAND. Friction and compliance existing in tendon-sheath drive systems introduce a hy...
详细信息
This paper discusses the input-dependent stability observed during torque control experiments using the first joint of the Darmstadt-HAND. Friction and compliance existing in tendon-sheath drive systems introduce a hysteresis nonlinearity between the joint torque output and the actuator displacement. Although this transmission characteristic is close to the well-known backlash behavior of the gears situated between a motor and a load shaft, this hysteresis loop exhibits input-dependent characteristics in the backlash region of the transmission system. The observed input-dependent characteristic shows springlike behavior within a portion of the backlash region. Through precise experiments, we confirmed that there is a close relationships between the input-dependent backlash characteristics and the input-dependent stability. Based on these experiments, we describe the transmission characteristic using a simple model and explore the system stability by using the technique of the sinusoidal-input-describing-functions (SIDF). Finally, we show a nondimensional stability-criterion-map that successfully predicts the experimental results.
Studies show that encoding technologies in H.264/AVC,including prediction and conversion,are essential ***,these technologies are more complicated than the MPEG-4,which is a standard method and widely adopted ***,the ...
详细信息
Studies show that encoding technologies in H.264/AVC,including prediction and conversion,are essential ***,these technologies are more complicated than the MPEG-4,which is a standard method and widely adopted ***,the amount of calculation in H.264/AVC is significantly up-regulated compared to that of the *** the present study,it is intended to simplify the computational expenses in the international standard compression coding system H.264/AVC for moving *** prediction refers to the most feasible compression technology,taking up to 60%of the entire *** this regard,prediction error and motion vector information are proposed to simplify the computation of inter predictive coding *** the initial frame,motion compensation is performed in all target modes and then basic information is collected and *** the initial frame,motion compensation is performed only in the middle 8×8 modes,and the basic information amount *** order to evaluate the effectiveness of the proposed method and assess the motion image compression coding,four types of motion images,defined by the international telecommunication union(ITU),are *** on the obtained results,it is concluded that the developed method is capable of simplifying the calculation,while it is slightly affected by the inferior image quality and the amount of information.
Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,***,all the existing applications gather users' geographical data and transf...
详细信息
Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,***,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and *** this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional *** is no privacy concern in this solution because end users will not collect and send any sensitive information to the *** solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are *** also prove the feasibility with the prototype of "Circle Your Friends" system(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.
Many approaches for converting keyword queries to formal query languages are presented for natural language interfaces to ontologies. Some approaches present fixed formal query templates, so they lack in providing sup...
详细信息
Home and building automation systems (HBAS) today are categorized by plethora of data formats, communication platforms and software services accessible via heterogeneous embedded devices. These heterogeneous embedded ...
详细信息
Photonic quantum emulator utilizes photons to emulate the quantum physical behavior of a complex quantum system. Recent study in spatiotemporal optics has enriched the toolbox for designing and manipulating complex sp...
详细信息
The number of Wireless sensor network (WSN) deployments have been growing so exponentially over the recent years. Due to their small size and cost-effective, WSN are attracting many industries to use them in various a...
详细信息
The number of Wireless sensor network (WSN) deployments have been growing so exponentially over the recent years. Due to their small size and cost-effective, WSN are attracting many industries to use them in various applications. Environmental monitoring, security of buildings and precision agriculture are few example among several other fields. However, WSN faces high security threats considering most of them are deployed in unattended nature and hostile environment. In the aim of providing secure data processing in the WSN, many techniques are proposed to protect the data privacy while being transferred from the sensors to the base station. This work is focusing on attack detection which is an essential task to secure the network and the data. Anomaly detection is a key challenge in order to ensure the security and prevent malicious attacks in wireless sensor networks. Various machine learning techniques have been used by researchers these days to detect anomalies using offline learning algorithms. On the other hand online learning classifiers have not been thoroughly addressed in the literature. Our aim is to provide an intrusion detection model compatible with the characteristics of WSN. This model is built based on information gain ratio and the online Passive aggressive classifier. Firstly, the information gain ratio is used to select the relevant features of the sensor data. Secondly, the online Passive aggressive algorithm is trained to detect and classify different type of Deny of Service attacks. The experiment was conducted on a wireless sensor network-detection system (WSN-DS) dataset. The proposed model ID-GOPA results detection rate of 96% determining whether the network is in its normal mode or exposed to any type of attack. The detection accuracy is 86%, 68%, 63%, and 46% for scheduling, grayhole, flooding and blackhole attacks, respectively, in addition to 99% for normal traffic. These results shows that our model based on offline learning can be pr
Ad-hoc network consists of a set of identical nodes that move freely and independently and communicate via wireless links. The most interesting feature of this network is that it does not require any predefined infras...
详细信息
Ad-hoc network consists of a set of identical nodes that move freely and independently and communicate via wireless links. The most interesting feature of this network is that it does not require any predefined infrastructure or central administration and hence it is very suitable for establishing temporary communication links in emergency situations. This flexibility however is achieved at the price of communication link uncertainties due to frequent topology changes. In this article we describe the system dynamics using the proven concept of time series modeling. Specifically, we analyze variations of the number of neighbor nodes of a particular node over a geographical area and for given total number of nodes assuming different values of (i) the speeds of nodes, (ii) the transmission powers, (iii) sampling periods and (iv) different mobility patterns. We consider three different mobility models: (i) Gaussian mobility model, (ii) randomwalk mobility model and (iii) random way point mobility model. The number of neighbor nodes of a particular node behaves as a random variable for any mobility pattern. Through our analysis we find that the variation of the number of neighbor nodes can be well modeled by an autoregressive AR(p) model. The values of p evaluated for different scenarios are found to be in the range between 1 and 5. Moreover, we also investigate the relationship between the speed and the time of measurements, and the transmission range of a specific node under various mobility patterns.
Ion trap system is a leading candidate for quantum network privileged by its long coherence time, high-fidelity gate operations, and the ion-photon entanglement that generates an ideal pair of a stationary memory qubi...
详细信息
暂无评论