A lightpath route management system with parallel processing capabilities and a flexible upgradability, allowing new functions to be added to the system without any system program changes, has been designed and implem...
详细信息
ISBN:
(纸本)9781424464135
A lightpath route management system with parallel processing capabilities and a flexible upgradability, allowing new functions to be added to the system without any system program changes, has been designed and implemented for IP-over-CWDM networks with ROADMs. The system can process route management functions composed of some sub applications in parallel in multi machines for high speed performance. In addition, the system was designed to have a flexible upgradability which allows adding new functions to the system, i.e. no changes of the system programs are required when adding the new functions. The system functions are to search possible lightpath routes made by ROADMs with specified switch states, and to output the total optical losses of the routes. The system was implemented and the performance was evaluated. By the system with one management and 3 calculation machines for the parallel processing, the total time to obtain the results for a 5-node IP-over-CWDM network was reduced down to 65 % of the total time by the system with a single machine without parallel processing. The system enables the network administrators to manage the lightpath reconfigurations effectively without errors by avoiding making unlinked lightpaths through routes with higher losses to connect nodes, before the reconfiguration.
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. ...
详细信息
ISBN:
(纸本)9781424469925;9780769540436
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. One drawback to the Internet is spam, which are unsolicited or unwanted objects which often appear as unwanted messages in various email applications. For VoIP, spam refers to unsolicited and unwanted calls by the VoIP user. In this paper, we have purposed a solution to prevent the spam in VoIP. The CAPTCHA (Completely Automated Public Turing Test to Tell computers and Human Apart) method aims to determine whether the call is coming from a human or a machine. The key contribution of this paper is a proof-of-concept implementation of a CAPTCHA mechanism to prevent VoIP Spam.
This paper proposes validated control system design method based on verified numerical computation. The proposed method designs a controller and validates it using verified numerical computation. We also propose a met...
详细信息
ISBN:
(纸本)9781424476428
This paper proposes validated control system design method based on verified numerical computation. The proposed method designs a controller and validates it using verified numerical computation. We also propose a method to find the numerically most design-specification satisfied controller quickly by using multiple-precision arithmetic. And, this paper applies a proposed method to pole assignment problem.
Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Marketing and Information systems (IS).This paper is an overview on success factors that coul...
详细信息
Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Marketing and Information systems (IS).This paper is an overview on success factors that could facilitate successful implementation of CRM.
A large network delay is likely to obstruct human interaction in telecommunication systems such as telephony or video conferencing systems. In spite of the extensive investigations that have been carried out on networ...
详细信息
A large network delay is likely to obstruct human interaction in telecommunication systems such as telephony or video conferencing systems. In spite of the extensive investigations that have been carried out on network delays of voice and image data, there have been few studies regarding support for embodied communication under the conditions of network delay. To maintain smooth human interaction, it is important that the various ways in which delay is manifested are understood. We have already developed an embodied virtual communication system that uses an avatar called "VirtualActor," in which speakers who are remotely located from one another can share embodied interaction in the same virtual space. Responses to a questionnaire that was used in a communication experiment confirmed that a fixed 500-ms network delay has no effect on interactions via VirtualActors. In this paper, we propose a method of presenting a speaker's voice and an avatar's motion feedback in the case of a 1.5-s network delay using VirtualActors. We perform two communication experiments under different conditions of network delay. The aim of the first experiment is to examine the effect of a random time delay on the conversation. The second experiment is conducted under the conditions of a free-form conversation that takes place in 5 scenarios—1 realtime scenario without a network delay and 4 scenarios with network delay that involve a combination of a delay in the talker's voice and in his/her avatar's motion feedback. The subjects consisted of a total of 30 students who worked in 15 pairs and who were familiar with each other. A sensory evaluation shows the effects upon communication of delays in the avatar's motion feedback, from the viewpoint of supporting the interaction.
Predicting protein solubility has gained lots of intention in the recent years and several descriptors have been defined to describe proteins in these works. Therefore, different feature selection methods have been us...
详细信息
Predicting protein solubility has gained lots of intention in the recent years and several descriptors have been defined to describe proteins in these works. Therefore, different feature selection methods have been used for selecting the most important attributes. An empirical study, that aims to explain the relationship between the number of samples and stability of seven different feature selection techniques for protein datasets, is presented.
Sensor network terminals are installed in large numbers in the field and transmit data periodically by radio. Such terminals must be miniaturized, and save power so that each device can operate by battery for several ...
详细信息
Fuzzy Logic is used to derive the optimal inventory policies in the Supply Chain (SC) numbers. We examine the performance of the optimal inventory policies by cutting the costs and increasing the supply chain manageme...
详细信息
Fuzzy Logic is used to derive the optimal inventory policies in the Supply Chain (SC) numbers. We examine the performance of the optimal inventory policies by cutting the costs and increasing the supply chain management efficiency. The proposed inventory policy uses multi-agent and Fuzzy logic, and provides managerial insights on the impact of the decision making in all the SC numbers. In particular, we focus on the way in which our agent purchases components using a mixed procurement strategy (combining long and short term planning) and how it sets its prices according to the prevailing market conditions and its own inventory level (because this adaptivity and flexibility are key to its success). In modern global market, one of the most important issues of the supply chain (SC) management is to satisfy changing customer demands and enterprises should enhance the long-term advantage through the optimal inventory control. In this paper an intelligent multi-agent system to simulate supply chain management has been developed.
This paper is concerned with a simultaneous design problems of structural and reduced-order H ∞ control systems. The purpose of this paper is to propose an iterative approach to the simultaneous design problem, whic...
详细信息
ISBN:
(纸本)9781424476428
This paper is concerned with a simultaneous design problems of structural and reduced-order H ∞ control systems. The purpose of this paper is to propose an iterative approach to the simultaneous design problem, which constructs a sequence of infeasible controller variables The feature of our approach is that it is easy to choose an initial point which is needed to carry out the iterative approach. The efficiency of our approach is shown by a numerical example.
In this paper, a method for hand posture recognition, which is robust for hand posture changing in an actual environment, is proposed. Conventionally, a data glove device and a 3D scanner have been used for the featur...
详细信息
暂无评论