Flexible Configuration Mechanism of Control and Data Management

Size: px
Start display at page:

Download "Flexible Configuration Mechanism of Control and Data Management"

Transcription

1 Flexible Configuration Mechanism of Control and Data Management In a Process Monitor System 1 LI Wei, 2 XU Qiang, 3 ZHANG Li 1, College of Information Science & Engineering Chongqing Jiaotong University, lwcqcn@sina.com.cn 2, College of Information Science & Engineering Chongqing Jiaotong University, xuqiang11821@163.com 3, College of Science Chongqing Jiaotong University, zl_lw@163.com Abstract Process automation has occupied an important position in the development of modern industry as encouraged by the national policy on energy conservation. A configured process monitor system is constructed for resolving real problems in modern production, based on a flexible configuration mechanism, and its control logic, group control configuration methods, and data knowledge patterns are designed and discussed, moreover a data knowledge decision flow is also designed for process monitor equipment by adopting data knowledge management logic, finally, the high performance and efficiency of this method have been tested and verified with improved and better services. 1. Introduction Keywords: Configuration, Data Knowledge, Process Monitor In recent years, the gradual complexity of large machinery and electric equipment in modern enterprise has resulted in an increasing collection of equipment and production processes. Process control has gradually broken through from bottom to top with more automated equipments. A close coordination within the production, not only among various devices but also among different industrial device s, results in increased capacity and the durability of production equipment. Coordinated and timely monitoring is required to adjust parameter disturbances, promote stable and continuous production, and optimize production to achieve the most efficient and economic operation in the process. Huge losses caused by downtimes are unacceptable. To better meet production demands, a configured process monitor system, mainly constructed by bus units, general configuration software, may use advanced equipment, modern management, and information technology. The configured and unified control, planning, and management of a production enterprise as a unit for managing optimal operation management and control will then be achieved. In addition, to reduce losses to a minimum and to provide timely and flexible management services for production equipments, manufacturers are required to use configured technical measures, build a configured service system based on special network technology and computer technology, and provide timely technical services. These requirements should lower time and costs. Configured monitoring is applied as a specific work pattern that considers actual production equipment characteristics and requirements. Configured monitoring utilizes an industrial control network and the Internet to connect mechanical and electrical equipment together. The equipments may be located in different geographical sites and may serve different functions. Configured management, collaborative work, and resource sharing help achieve decentralized control to provide users access to a variety of equipment state parameters, published real-time information, and historical information. 2. Nature-inspired Flexible Pattern The biological immune system is a productive natural system [1] that enables living beings to survive even when infected by new organic matter or external member. The process of virus recognition by the immune system is similar to the flexible process monitor. Figure.1 is a simple depiction of immune response. In this figure, A g, A b, M φ, B, B m, T h, T s, and T c represent antigen, antibody, phagocytosis cell, B cell, memory B cell, auxiliary T cell, suppressing T cell, and toxic T cell, respectively. Immune cell interactions allow the immune system to have a very strong compatibility Advances in information Sciences and Service Sciences(AISS) Volume5, Number5, March 2013 doi: /aiss.vol5.issue

2 with the environment: a new kind of antigen evolves and produces new B cells; antigens increase, and A b, B, and B m cells also increase; otherwise, they are reduced. Immune cells already possess general characteristics of agents in essence, and an immune system forms one distributional and autonomous multi-agent system. Figure.1 Process of immune response In ensuring the enhanced continuity, high speed, systematic flow, and automation of an industrial production and an enterprise network management, a process control system can be constructed using intelligent agents with a number of interactions for completing monitor tasks. In the monitor system, which has a few agent control groups (ACU), mutual cooperation can be obtained among different types, and some exclusion exists among similar types. This feature is very similar to the promotion and inhibition relationship among special immune antibodies. If a control task object is viewed as an antigen, according to the fitness evaluation program and through evolutions of existing ACU agents, new ACUs may be created to improve adaptabilities to complex tasks in a process control system. Each agent in the ACU works as a highly autonomous, real-time modular unit that is inspired by the immune response mechanism of transferring information. Each ACU can be constructed using agents of detection, control, management, memory, and evolution, the internal structure of which is shown in Figure.2. A detection agent is an integrated state agent identification system that is responsible for drawing present antigen characteristics from their own information to form characteristic modes about antigens. A management agent is an administrator in the ACU that coordinates the behavior of other agents in the same ACU and obtains an overall appraisal of the present state of the ACU. A control agent is responsible for combining all monitoring information, undertaking process control decisions, and sending diagnosis sub-solutions to a management agent for an overall appraisal. An evolution agent is responsible for optimizing and adjusting what an agent possesses, such as domain knowledge, its models, and so on, to obtain suitable antibodies for present antigens when an ACU cannot solve an admitted task. A memory agent is responsible for establishing an antibody-mode storehouse and upgrading this to strengthen the ability for the second response when an unknown antigen mode happens to achieve rapid control. Ab: Monitor Subtask Memory Detection Control Communiton Management ACU Evolution Other ACUs Figure.2 ACU structure 363

3 3. Key Flexible Configuration Pattern Design 3.1. Immune group control methods In the current ACU group, some ACUs are randomly selected to form a candidate collection based on their affinity and proportion. When the new process model appears, special immune evolutionary operators are applied on this candidate collection, which includes a cloning operator, a mutation operator, an inhibition operator, and so on. Finally, after calculating the density and then evaluating the affinity of each ACU individual that is different from its mother ACU, N-ACUs are selected to form a new group for complex monitoring tasks. A functional structure of an evolution agent is shown in Figure.3 Data Parameters Models Knowledge Database Knowledge Learning Evolution Machine Initial Abs Task Management & Plan Immune Selection Affinity Computation Cooperation Control Clone Restrain Clone Selection Information (Data Inquiry) Environment Detect & Interaction Other s Affinity Mutation Cell Clone Obtained Results Evolution Figure.3 Evolution agent structure The immune group control method can be analyzed as follows: i The ACU groups are initialized, and each memory agent establishes its own ACU pattern library of TCM={tcm 1, tcm 2,..., tcm n }. ii T=k, this monitor system copes with all monitored information, analyzes the current monitor task sets that are divided into different subtasks, and then assigns various sub-tasks to appropriate ACUs. iii A management agent determines whether the current ACU is asked for a new evolution. If necessary, an evolution agent undergoes required optimization and reconstruction for monitoring the information and models inside each agent from this ACU to seek the best antibody mode for the current antigen. iv A detection agent receives antigen information (sub-tasks) and then extracts special antigen characteristic collections of PCX (t)={pcx 1 (t), pcx 2 (t),..., pcx m (t) t = k}. If pcxi (t) TCM, then a solution exists (antibodies), and step vi applies. v A control agent concentrates all monitored information and monitoring models, completes these sub-tasks, and makes final sub-conclusions for this ACU. vi This system synthesizes all sub-conclusions from different ACUs and then evaluates the integrated conclusions to determine whether the requirements are met. Otherwise, some requirements are sent to special ACUs, and step iii applies. vii This system delivers completion information to all management agents in different ACUs. A memory agent may update the antibody pattern library in its own ACU. viii K=k+1; the system moves to the next moment, then proceeds to ii. 364

4 3.2. Configuration of flexible agent construction An ACU is designed based on hierarchical structure. COM s are classified into different function groups according to certain rules. An ACU can be formed using these hierarchical organization of COM s, and some interaction modes can be determined to provide communication through a data support layer, a common object layer, a business layer, and the public and different s. Different layers in an ACU reflect different abstractions of this system, except the data supporting layer. Each layer is built on COM s. Components offer services to others through their interfaces, and different layers can separate changeable parts from stable parts, which can effectively support an ACU evolutionary behavior. In a monitor system configuration, required integrated applications can be built as a function module in the agent. To meet a monitor configuration requirement, s in every agent should be classified using four different level types: monitor parameter, monitor state, monitor symptom, and monitor operation [2], Figure.4 shows the relationships and includes roles and mutual effects in the monitor. Figure.4 Component group configuration relation The type of monitor parameter is used to represent different fundamental parameters of basic data in the monitor object, such as temperature, amplitude, and so on. The monitor type state is used to represent different parameter groups of the monitored object. The type of monitor symptom is a basic unit in monitor operations, which is used to describe a condition or conclusion in monitor operation. The type of monitor operation includes operation name, premise, conclusion, confidence, and so on. The type of monitor parameter, monitor symptom, and monitor operation are not independent. Upon arrival of new monitor symptoms, some corresponding ACUs can evolve to gain a new ACU for achieving monitor state effectively. A monitor system analyzes and resolves the evolution need from the individuals in this system. A new and adaptable individual monitor can be constructed to effectively adapt to dynamic changes in monitored objects, thereby constituting or cutting some fundamental objects in existing monitor individuals. By adopting some objects, some adjustments on the different s in the agents enable ACUs to reconfigure themselves. The applicable main configuration mechanism is shown in Table Flexible data knowledge configuration Data knowledge refers to the accumulated cognition and experience from long-term social practices in the objective world. Data knowledge may be described in the form of production knowledge and be 365

5 logically organized into four different forms: monitored parameter knowledge class, monitored state knowledge class, monitored symptom knowledge class, and monitored operation knowledge class. The monitored parameter class is used to store basic parameters that directly reflect how a system or equipment is operating. The monitored state class is an instruction, a judge, or an expression that contains concrete parameter information and describes a specific state entity that can be drawn and created with an actual valued parameter. The monitored symptom knowledge class is a basic unit in monitor operation knowledge, which is a condition of a monitored knowledge class or its conclusion. Monitored knowledge class is used to determine the existence of a given state or a conclusion in premises or conclusions of some diagnosis knowledge, which includes operation name, premise, conclusion, confidence, and so on. Table 1. Main configuration mechanism Num Component 1 Replace NULL Replace s and change their interface Add new operation Delete some operation Update operation Add new monitor Delete a monitor Update monitor Revise structure Enlarge operation Delete operations Update operation Add new Delete an Update application The data knowledge can be constructed as a mode of web-based browser/server (B/S) and then combined with a client layer, middle layer, and service database layer. An SQL2005 database software is used to create special data maintenance tables [3, 4], which can be accessed and displayed to provide users with a clear and an intuitive understanding of the current production. All relevant relation patterns are available by analyzing the data flow in the monitor process, and logical relations among different relation tables may be obtained using the SSMS, which is listed in Figure.5. Monitor operation table Operation num Operation mark Operation name Operation note Operation premise 1 Premise 1 note Operation premise 2 Premise 2 note Conclusion mark Conclusion description Monitor symptom table Symptom num Symptom mark Symptom name Symptom note Sy Symptom factor 1 Factor 1 note Symptom factor 2 Factor 2 note Symptom factor 3 Factor 3 note Monitor state table State num State mark State name State note Sy State type State parameter State source Figure.5 Data knowledge configuration relation Monitor parameter table Parameter num Parameter mark Parameter name Parameter note Sy Parameter source For accuracy, a concept of credibility [5,6] may be used to indicate and address the uncertainty of evidence and maintenance decision-making. A numerical decision in the form of a reliable knowledge transmission can be achieved using credibility calculations of activated data knowledge. Figure.6 shows the decision-making mechanism. 366

6 4. Configuration of Monitor Decision Application Due to the representation in the production form of maintenance knowledge, each maintenance knowledge may be contracted as follows: first, a piece of maintenance knowledge has up to two premises; second, a combinative relationship between premises is only allowed using the AND logic for representation; and lastly, only one conclusion exists in knowledge diagnosis. After these, the decision tree concept may be introduced to establish a related maintenance decision-making network [7-9]. Figure.6 Data Knowledge decision flow The press action alert model with related data knowledge is shown in Table

7 Table 2. Press action alert knowledge Num Premise 1 Combine Premise 2 Conclusion 1 Low Pressure of S 1 Main Motor Failure of S J1 2 High Pressure of S 2 AND Thermal Relay Action of S 3 Main Motor Failure of S J1 3 Skip Retreat of S 3 AND Limit Error Signal of S 4 Moving Beam Failure of S J2 4 Security Bar of S 5 Moving Beam Failure of S J2 5 S J1 Malfunction of S YJ 6 S J2 Malfunction of S YJ In data knowledge decision-making, the solving process of a maintenance problem can be mostly shown in the form of an AND/OR tree. Using the knowledge expression form and extending the intermediate variable nodes of S23 and S45, a maintenance decision-making network of press action alert can be established, as shown in Figure.7. The data knowledge decision tree shown in Fig.9 is wide and not deep, thus, it is suitable for using a method named by a width-first hunt, which indicates the hunt of others layer by layer from the bottom to the top of this tree after comparing all nodes in the bottom layer [10-12]. If there are some data knowledge as following: K1: IF the round grind current is too high (0.5) AND it lasts more than the threshold (0.5), THEN the round grind current is in an exception (0.8, 0.6). K2: IF the analog signals are in the range of 20 ma to 40 ma (0.4) AND the A/D conversion error is accurate (0.6), THEN the normal analog channel is normal (0.9, 0.7). K3: IF the round grind current is in an exception (0.7) AND the normal analog channel is normal (0.3), THEN the materials in the wheel grinding machine exceed the load limit (0.9, 0.5). In the monitoring state of the materials in the wheel grinding machine exceed the load limit, known initial conditions should be keyed into the two software interfaces of the faulty equipment information input and the performance of the on-site fault information, which are the round grind current is too high with an initial credibility of 0.80, and it lasts more than the threshold with an initial confidence of 0.6, the analog signals is in the range of 20 ma to 40 ma with an initial credibility of 0.9, the A/D conversion error is accurate with an initial credibility of 0.8, respectively. Figure.7 Data knowledge decision network Through the data knowledge decision module, the reliability of an operation state is derived to be by using previous data knowledge in the decision-making mechanism [13], which indicates that "the materials in the wheel grinding machine exceeds the load limit, occurs with a reliability. 368

8 5. Conclusions Labor costs have been steadily rising in recent years, for configurable monitor and manage the requirements of production equipments satisfactorily, a configured process monitor system is constructed by utilizing an industrial control network and the Internet, and a detailed study has presented on the configured monitor and data knowledge management measures, which includes: (1) The control logic and configured group control methods are discussed, and some adjustments mechanism on the different s in the agents enables ACUs to reconfigure themselves are analyzed. (2) A data knowledge decision flow is designed for process monitor equipment based on configurable data knowledge management patterns. The study aims to provide an effective method for meeting the demands of modern production, The configured process monitor system described here may be helpful for improving the automation, intelligence, and production efficiency of production equipments, production investment costs will be reduced, and the healthy development of enterprises will be promoted. 6. Acknowledgements This work is supported by Natural Science Foundation Project of CQ CSTC(cstc2012jjA40019). The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation. 7. References [1] P.J.Costa Branco, J. A. Dente, R. Vilela Mendes, "Using Immunology Principles for Fault Detection", IEEE Transaction on Industrial Electronics, vol.50, no.2, pp , [2] Mingdong Ren, Weidong Zhu, Shanglin Yang, "Component Based Architecture of Information System", Mini-Micro System, vol. 25, no.23, pp , [3] Wei Ma, Wenzhe Lv, Rui Cao, "Information System Development Tutorial - Using C # and SQL Server 2005", Beijing: Tsinghua University Press, China, [4] Jie Yong, Shunlin Song, "Remote Maintenance of Web Project Based on B/S ", Computer Engineering and Design, vol.29, no.21, pp , [5] Yinchun Yang, Zhu Jin, "The Application of Ternary Logic in Uncertain Knowledge Representation and Reasoning ", Microelectronics and Computer, vol.21, no. 2, pp.13-17, [6] Zhiqiang Xie, Xu Yu, Jing Yang, "Research and Improvement of Multi-relational Decision Tree Learning Algorithm ", Computer Engineering, vol.35, no.8, pp.50-53, [7] Qingsong Xing, Yu Yang,, Aijun Liu, Hao Yao, "Research on Knowledge Sharing for Customer Collaborative Product Innovation Based on Knowledge Grid", Journal of Convergence Information Technology, vol.7, no.1, pp , [8] Qinghua Zhang, Guoyin Wang, Xianquan Liu, "Rule Acquisition Algorithm Based on Maximal Granule", Pattern Recognition and Artificial Intelligence,vol.25, no.3, pp , [9] Jianfang Zhou, Chunyan Tang, Zhiyong Xu etc., " Event Tree, Fault Tree, Decision-making Tree and Bayesian Network ", Journal of Hohai University ( Natural Sciences ),vol.37, no.3, pp , [10] Min Wang, Niaoqing Hu, Guojun Qin, "Method of Rule Extraction for Fault Diagnosis of a Helicopter Power Train Based on Incomplete Information", Journal of Vibration and Shock, vol.30, no.12, pp , [11] Xiao Xu, Jingmei Zhai, Haitao Liu, "A Knowledge-based Rough Set Model for Manufacturing Decision", Journal of South China University of Technology ( Natural Science Edition ), vol.39, no.8, pp.36-40, [12] Hanyan Huang, "An Approach to the Performance Evaluation of Enterprise Knowledge Management with Fuzzy Linguistic Information", Journal of Convergence Information Technology, vol. 7, no. 5, pp , [13] Yueyang Zhang, Yu Su, Weihong Guan, "ASP.NET Program Development Sample Collection (C#) ", Beijing: Posts & Telecom Press, China,

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Zhong Wei 1, a, Wang Jianming 2, b and Zhang Yang 3, c 1 Beijing University of Posts and Telecommunications,

More information

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety , pp. 381-388 http://dx.doi.org/10.14257/ijunesst.2014.7.6.33 Knowledge Acquisition Approach Based on Rough Set in Online Aided ecision System for Food Processing Quality and Safety Liu Peng, Liu Wen,

More information

Development of a Web-based Information Service Platform for Protected Crop Pests

Development of a Web-based Information Service Platform for Protected Crop Pests Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193

More information

http://www.paper.edu.cn

http://www.paper.edu.cn 5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

Design of Electronic Medical Record System Based on Cloud Computing Technology

Design of Electronic Medical Record System Based on Cloud Computing Technology TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based

More information

The Design of B2B E-commerce System Based on MVC Model and J2EE

The Design of B2B E-commerce System Based on MVC Model and J2EE MANAGEMENT SCIENCE AND ENGINEERING Vol. 4, No. 4, 2010, pp. 113-119 www.cscanada.org ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net The Design of B2B E-commerce System Based on MVC Model

More information

The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a

The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015) The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a 1 College of Electrical

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

An Artificial Immune Model for Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm

A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm Journal of Information & Computational Science 9: 16 (2012) 4801 4809 Available at http://www.joics.com A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

The Research of Data Management in the University Human Resource Systems

The Research of Data Management in the University Human Resource Systems , pp.61-65 http://dx.doi.org/10.14257/astl.2014.53.15 The Research of Data in the University Human Resource Systems Ye FAN, Shaoyun GUAN, Honglue LV Harbin University of Commerce gsyj91@163.com Abstract.

More information

Research of Smart Space based on Business Intelligence

Research of Smart Space based on Business Intelligence Research of Smart Space based on Business Intelligence 1 Jia-yi YAO, 2 Tian-tian MA 1 School of Economics and Management, Beijing Jiaotong University, jyyao@bjtu.edu.cn 2 School of Economics and Management,

More information

Design of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network

Design of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network Design of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network Xinjian Xiang College of Automation & Electrical Engineering, Zhejiang University of Science and Technology, Zhejiang,

More information

Big Data with Rough Set Using Map- Reduce

Big Data with Rough Set Using Map- Reduce Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian

More information

Discussion on Personnel Training Mode of Applied Undergraduates Majoring in International Economic and Trade in Independent Institute*

Discussion on Personnel Training Mode of Applied Undergraduates Majoring in International Economic and Trade in Independent Institute* 1802 Discussion on Personnel Training Mode of Applied Undergraduates Majoring in International Economic and Trade in Independent Institute* Zhu Jinsheng, Lv Du, Zhu Chang, Wang Hongguo Huaxia collage,

More information

Study on the Patterns of Library Resource Construction and Services in MOOC

Study on the Patterns of Library Resource Construction and Services in MOOC , pp. 85-90 http://dx.doi.org/10.14257/ijunesst.2014.7.6.08 Study on the Patterns of Library Resource Construction and Services in MOOC Sun Ji-zhou, Liao Sheng-feng (Library of Nanchang Hangkong University,

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China Zhongqiang Liu 1, Kaiyi Wang 1*, Shufeng Wang 1, Feng Yang 1 and Xiandi Zhang 1, 1 Beijing Research Center for

More information

Cloud Security - Characteristics, Advantages and Disadvantages

Cloud Security - Characteristics, Advantages and Disadvantages The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,

More information

Design of Enterprise Knowledge Management System

Design of Enterprise Knowledge Management System Design of Enterprise Management System LING Chuanfan School of Information Technology,Jiangxi University of Finance and Economics, P.R.China, 330013 Abstract management is the key factor in deciding the

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software

More information

Design of UPS Battery Remote Monitoring System

Design of UPS Battery Remote Monitoring System , pp.26-268 http://dx.doi.org/.4257/ijmue.24.9.9.28 esign of UPS Battery Remote Monitoring System Jiabin Wang, Haiying Wang 2,*,Tianjun Sun 2,Yuran Wang 2 and Ruilin Wang 2 aqing Oil Field Chemical Co.,LT,

More information

Customer Relationship Management using Adaptive Resonance Theory

Customer Relationship Management using Adaptive Resonance Theory Customer Relationship Management using Adaptive Resonance Theory Manjari Anand M.Tech.Scholar Zubair Khan Associate Professor Ravi S. Shukla Associate Professor ABSTRACT CRM is a kind of implemented model

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

More information

Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain

Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain Send Orders for Reprints to reprints@benthamscience.ae 384 The Open Cybernetics & Systemics Journal, 2015, 9, 384-389 Open Access Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge

More information

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability Yuan Chunyang National Computer network

More information

Internet of Things for Smart Crime Detection

Internet of Things for Smart Crime Detection Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 749-754 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4685 Internet of Things for Smart Crime Detection Jeong-Yong Byun, Aziz

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

The Power Marketing Information System Model Based on Cloud Computing

The Power Marketing Information System Model Based on Cloud Computing 2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.96 The Power Marketing Information

More information

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Open Access Research and Design for Mobile Terminal-Based on Smart Home System Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System

More information

Bitemporal Extensions to Non-temporal RDBMS in Distributed Environment

Bitemporal Extensions to Non-temporal RDBMS in Distributed Environment The 8 th International Conference on Computer Supported Cooperative Work in Design Procceedings Bitemporal Extensions to Non-temporal RDBMS in Distributed Environment Yong Tang, Lu Liang, Rushou Huang,

More information

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

An Agent-Based Concept for Problem Management Systems to Enhance Reliability An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub

More information

Modeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics

Modeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics , pp.377-388 http://dx.doi.org/10.14257/ijunesst.2015.8.12.38 Modeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics Yang Bo School of Information Management Jiangxi University

More information

Design of Data Archive in Virtual Test Architecture

Design of Data Archive in Virtual Test Architecture Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Design of Data Archive in Virtual Test Architecture Lian-Lei

More information

Research of Smart Distribution Network Big Data Model

Research of Smart Distribution Network Big Data Model Research of Smart Distribution Network Big Data Model Guangyi LIU Yang YU Feng GAO Wendong ZHU China Electric Power Stanford Smart Grid Research Institute Smart Grid Research Institute Research Institute

More information

The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry

The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry , pp.93-97 http://dx.doi.org/10.14257/astl.2015.84.19 The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry Dae-Hyun Jung 1, Lee-Sang Jung 2 {San 30, Jangjeon-dong, Geumjeonggu,

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between

More information

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology

More information

Research on the Course of Network Performance Testing and Analysis

Research on the Course of Network Performance Testing and Analysis 2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research on the Course of Network Performance Testing and Analysis Xiurong

More information

Study on Cloud Service Mode of Agricultural Information Institutions

Study on Cloud Service Mode of Agricultural Information Institutions Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud

More information

Modern Accounting Information System Security (AISS) Research Based on IT Technology

Modern Accounting Information System Security (AISS) Research Based on IT Technology , pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

Modeling on Energy Consumption of Cloud Computing Based on Data Center Yu Yang 1, a Jiang Wei 2, a Guan Wei 1, a Li Ping 1, a Zhou Yongmin 1, a

Modeling on Energy Consumption of Cloud Computing Based on Data Center Yu Yang 1, a Jiang Wei 2, a Guan Wei 1, a Li Ping 1, a Zhou Yongmin 1, a International Conference on Applied Science and Engineering Innovation (ASEI 2015) Modeling on Energy Consumption of Cloud Computing Based on Data Center Yu Yang 1, a Jiang Wei 2, a Guan Wei 1, a Li Ping

More information

CHURN PREDICTION IN MOBILE TELECOM SYSTEM USING DATA MINING TECHNIQUES

CHURN PREDICTION IN MOBILE TELECOM SYSTEM USING DATA MINING TECHNIQUES International Journal of Scientific and Research Publications, Volume 4, Issue 4, April 2014 1 CHURN PREDICTION IN MOBILE TELECOM SYSTEM USING DATA MINING TECHNIQUES DR. M.BALASUBRAMANIAN *, M.SELVARANI

More information

Research of the Combination of Distributed Business Processes Based on Dynamic Planning

Research of the Combination of Distributed Business Processes Based on Dynamic Planning , pp.257-266 http://dx.doi.org/10.14257/ijunesst.2015.8.6.25 Research of the Combination of Distributed Business Processes Based on Dynamic Planning Yuan Gang, Sun Rui-zhi and Shi Yin-xue Key laboratory

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute

More information

Construction of Library Management Information System

Construction of Library Management Information System Construction of Library Management Information System Lian-feng Zhang, Rui-jin Zhou, Li-ping Sui, and Guo-qing Wu Henan Institute of Science and Technology Xin-xiang, China zlfmail@126.com Abstract. Library

More information

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn

More information

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines , 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing

More information

Design and Implementation of the Self-Management Travel System

Design and Implementation of the Self-Management Travel System Design and Implementation of the Self-Management Travel System Dongbei University of Finance and Economics School of Tourism and Hotel Management,Dalian, China 116025 Abstract Through skeleton system,

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing

More information

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan , pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak

More information

Towards Heuristic Web Services Composition Using Immune Algorithm

Towards Heuristic Web Services Composition Using Immune Algorithm Towards Heuristic Web Services Composition Using Immune Algorithm Jiuyun Xu School of Computer & Communication Engineering China University of Petroleum xujiuyun@ieee.org Stephan Reiff-Marganiec Department

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 , pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and

More information

Transmitter Station Remote Monitor System Based on Browser/Server Structure

Transmitter Station Remote Monitor System Based on Browser/Server Structure TELKOMNIKA, Vol.11, No.3, March 2013, pp. 1594 ~ 1599 ISSN: 2087-278X 1594 Transmitter Station Remote Monitor System d on Browser/Server Structure Shanshan Li*, Jian Zhou Communication University of China

More information

Coal Mine Security System

Coal Mine Security System Coal Mine Security System Warsha M.Choudhari Professor, Information Technology Datta Meghe Institute of Engineering, Technology & Research Wardha, India ABSTRACT Coal Mine Security System uses sensor,

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

Self-organized Multi-agent System for Service Management in the Next Generation Networks

Self-organized Multi-agent System for Service Management in the Next Generation Networks PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Web-based Automobile Sales Management System. Huabo Xiao

Web-based Automobile Sales Management System. Huabo Xiao 3rd International Conference on Management, Education, Information and Control (MEICI 2015) Web-based Automobile Sales Management System Huabo Xiao College of Information Engineering, Jiangxi University

More information

Research on Distributed Knowledge Base System Architecture for Knowledge Sharing of Virtual Organization

Research on Distributed Knowledge Base System Architecture for Knowledge Sharing of Virtual Organization Research on Distributed Knowledge Base System Architecture for Knowledge Sharing of Virtual Organization Ruzhi Xu 1,2 Peiguang Lin 1 Cheng Liu 1 1 School of Computer & Information Engineering, Shandong

More information

The Research in Remote and Real-time Monitoring System of Digitized Earthquake Omen Instrument

The Research in Remote and Real-time Monitoring System of Digitized Earthquake Omen Instrument 2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) IPCSIT vol. 53 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V53.No.1.13 The Research in Remote and

More information

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network 1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Qu Zheng Beijing University of Posts and Telecommunications, buptquzheng@gmail.com Abstract

More information

Research and Application of Redundant Data Deleting Algorithm Based on the Cloud Storage Platform

Research and Application of Redundant Data Deleting Algorithm Based on the Cloud Storage Platform Send Orders for Reprints to reprints@benthamscience.ae 50 The Open Cybernetics & Systemics Journal, 2015, 9, 50-54 Open Access Research and Application of Redundant Data Deleting Algorithm Based on the

More information

Investigation on Remote Monitoring System for Heat-Supply Thermal Characters Based GPRS

Investigation on Remote Monitoring System for Heat-Supply Thermal Characters Based GPRS Available online at www.sciencedirect.com Procedia Environmental Sciences 12 (2012 ) 843 850 2011 International Conference on Environmental Science and Engineering (ICESE 2011) Investigation on Remote

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA. Hong-lv Wang, Yong Cen

Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA. Hong-lv Wang, Yong Cen Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA Hong-lv Wang, Yong Cen Information Center, China Tobacco Zhejiang Industrial Co., Ltd Hangzhou, China,

More information

A Storage Architecture for High Speed Signal Processing: Embedding RAID 0 on FPGA

A Storage Architecture for High Speed Signal Processing: Embedding RAID 0 on FPGA Journal of Signal and Information Processing, 12, 3, 382-386 http://dx.doi.org/1.4236/jsip.12.335 Published Online August 12 (http://www.scirp.org/journal/jsip) A Storage Architecture for High Speed Signal

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Figure 1: Architecture of a cloud services model for a digital education resource management system.

Figure 1: Architecture of a cloud services model for a digital education resource management system. World Transactions on Engineering and Technology Education Vol.13, No.3, 2015 2015 WIETE Cloud service model for the management and sharing of massive amounts of digital education resources Binwen Huang

More information

The Construction of SME Accounting Information System

The Construction of SME Accounting Information System The Construction of SME Accounting Information System LIU Zhihua School of Business Administration, Jiangxi University of Finance and Economics, P.R. China, 330013 jethro@163.com Abstract: SMEs have become

More information

Framework model on enterprise information system based on Internet of things

Framework model on enterprise information system based on Internet of things International Journal of Intelligent Information Systems 2014; 3(6): 55-59 Published online December 22, 2014 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20140306.11 ISSN: 2328-7675

More information

Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine

Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine Monitoring and Controlling System Based on Configuration Software of Microwave Vacuum Drying Machine Qinghua Han, Shujun Li*, ifan Li, Jin Wang, Jiwei Ma, Donglin Zhao Chinese Academy of Agricultural Mechanization

More information

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia As of today, the issue of Big Data processing is still of high importance. Data flow is increasingly growing. Processing methods

More information

A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN

A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN A WEB-BASED KNOWLEDGE AIDED TUTORING SYSTEM FOR VEGETABLE SUPPLY CHAIN Hui Li 2,1, Zetian Fu 1,2,*, Yan Li 3, Jian Zhang 2,1 1 College of Engineering, China Agricultural University, Beijing, China, 100083;

More information

CHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN

CHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN CHAPTER 8 THE METHOD-DRIVEN idesign FOR COLLABORATIVE SERVICE SYSTEM DESIGN Central to this research is how the service industry or service providers use idesign as a new methodology to analyze, design,

More information

APPLICATIONS AND RESEARCH ON GIS FOR THE REAL ESTATE

APPLICATIONS AND RESEARCH ON GIS FOR THE REAL ESTATE APPLICATIONS AND RESEARCH ON GIS FOR THE REAL ESTATE Chengda Lin, Lingkui Meng, Heping Pan School of Remote Sensing Information Engineering Wuhan University, 129 Luoyu Road, Wuhan 430079, China Tel: (86-27)-8740-4336

More information