首页 > 最新文献

Global Transitions Proceedings最新文献

英文 中文
Design and development of machine learning based resume ranking system 基于机器学习的简历排名系统的设计与开发
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2021.10.002
Tejaswini K , Umadevi V , Shashank M Kadiwal , Sanjay Revanna

Finding acceptable applicants for a vacant job might be a difficult process, especially when there are many prospects. The manual process of screening resumes could stymie the team's efforts to locate the right individual at the right moment. The laborious screening may be greatly aided by an automated technique for screening and ranking applicants. In our work, the top applicants might be rated using content-based suggestion, which uses cosine similarity to find the curriculum vitae that are the most comparable to the job description supplied and KNN algorithm is used to pick and rank Curriculum Vitaes (CV) based on job descriptions in huge quantities. Experimental results indicate the performance of the proposed system as an average text parsing accuracy of 85% and a ranking accuracy of 92%.

为空缺职位找到合适的求职者可能是一个困难的过程,尤其是当有很多候选人的时候。手动筛选简历的过程可能会阻碍团队在合适的时间找到合适的人选。这种费力的筛选可以通过筛选和排序申请人的自动化技术得到极大的帮助。在我们的工作中,可能会使用基于内容的建议对排名靠前的申请人进行评级,该建议使用余弦相似性来找到与所提供的职位描述最具可比性的简历,并使用KNN算法根据大量的职位描述来挑选和排名简历(CV)。实验结果表明,该系统的平均文本解析准确率为85%,排序准确率为92%。
{"title":"Design and development of machine learning based resume ranking system","authors":"Tejaswini K ,&nbsp;Umadevi V ,&nbsp;Shashank M Kadiwal ,&nbsp;Sanjay Revanna","doi":"10.1016/j.gltp.2021.10.002","DOIUrl":"10.1016/j.gltp.2021.10.002","url":null,"abstract":"<div><p>Finding acceptable applicants for a vacant job might be a difficult process, especially when there are many prospects. The manual process of screening resumes could stymie the team's efforts to locate the right individual at the right moment. The laborious screening may be greatly aided by an automated technique for screening and ranking applicants. In our work, the top applicants might be rated using content-based suggestion, which uses cosine similarity to find the curriculum vitae that are the most comparable to the job description supplied and KNN algorithm is used to pick and rank Curriculum Vitaes (CV) based on job descriptions in huge quantities. Experimental results indicate the performance of the proposed system as an average text parsing accuracy of 85% and a ranking accuracy of 92%.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 371-375"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001011/pdfft?md5=278d731e46c28d0f1c87510c36fb1467&pid=1-s2.0-S2666285X21001011-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87999136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Intelligent slime mold algorithm for proficient jamming attack detection in wireless sensor network 无线传感器网络中高效干扰攻击检测的智能黏菌算法
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2022.06.001
Amirthasaravanan Arivunambi, Arjun Paramarthalingam

Wireless Sensor Networks (WSNs) depicts to the group of spatially distributed sensor nodes, each node is having individual battery for power consumption which senses the factors like Temperature, Pressure, Soil makeup, Vehicular movement, and checks the physical presence of objects, which are communicate through internet and passing messages between nearest neighbor nodes. WSN are extensively used in several applications like Environmental Monitoring, Area Monitoring, Engineering Monitoring, Health Care Monitoring, and Military Applications. Since WSN are highly susceptible for many attacks especially Jamming Attack. This causes high energy consumption, reduces the life time of nodes, affects the entire sensor networks and most significantly also the confidentiality and integrity of the data packets which are transmitted through dissimilar nodes in the network. In order to overcome these issues, a new bio-inspired algorithm called Intelligent Slime Mold (ISM) has been introduced for detection jamming node and to setting up of alternate optimal path form source node to destination node in WSN to avoid jammer affected nodes by applying Context Aware Decision Rule (CADR). This work ensures the confidentiality and integrity of both the network and data packets.

无线传感器网络(wsn)描述了一组空间分布的传感器节点,每个节点都有单独的电池用于功耗,它可以感知温度、压力、土壤组成、车辆运动等因素,并检查物体的物理存在,这些因素通过互联网进行通信,并在最近的邻居节点之间传递消息。无线传感器网络广泛应用于环境监测、区域监测、工程监测、卫生保健监测和军事应用等领域。由于无线传感器网络极易受到各种攻击,特别是干扰攻击。这会导致高能耗,减少节点的生命周期,影响整个传感器网络,最重要的是也影响了通过网络中不同节点传输的数据包的保密性和完整性。为了克服这些问题,本文提出了一种新的生物启发算法——智能黏液霉菌(ISM),用于检测干扰节点,并应用上下文感知决策规则(CADR)建立源节点到目标节点的备选最优路径,以避免干扰节点的影响。这项工作确保了网络和数据包的保密性和完整性。
{"title":"Intelligent slime mold algorithm for proficient jamming attack detection in wireless sensor network","authors":"Amirthasaravanan Arivunambi,&nbsp;Arjun Paramarthalingam","doi":"10.1016/j.gltp.2022.06.001","DOIUrl":"10.1016/j.gltp.2022.06.001","url":null,"abstract":"<div><p>Wireless Sensor Networks (WSNs) depicts to the group of spatially distributed sensor nodes, each node is having individual battery for power consumption which senses the factors like Temperature, Pressure, Soil makeup, Vehicular movement, and checks the physical presence of objects, which are communicate through internet and passing messages between nearest neighbor nodes. WSN are extensively used in several applications like Environmental Monitoring, Area Monitoring, Engineering Monitoring, Health Care Monitoring, and Military Applications. Since WSN are highly susceptible for many attacks especially Jamming Attack. This causes high energy consumption, reduces the life time of nodes, affects the entire sensor networks and most significantly also the confidentiality and integrity of the data packets which are transmitted through dissimilar nodes in the network. In order to overcome these issues, a new bio-inspired algorithm called Intelligent Slime Mold (ISM) has been introduced for detection jamming node and to setting up of alternate optimal path form source node to destination node in WSN to avoid jammer affected nodes by applying Context Aware Decision Rule (CADR). This work ensures the confidentiality and integrity of both the network and data packets.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 386-391"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000759/pdfft?md5=ad951a2e0159b09bf13123c4b064810a&pid=1-s2.0-S2666285X22000759-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86082495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power Generation Using Ocean Waves: A Review 利用海浪发电:综述
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2022.05.001
Kavadiki Veerabhadrappa , B.G. Suhas , Chidanand K. Mangrulkar , R. Suresh Kumar , V.S. Mudakappanavar , Narahari , K.N. Seetharamu

From decades, Earth is reminding humans to find better ways to produce power rather than burning fossil fuels which would result in the emission of harmful gases into the environment. The world energy consumption is expected to increase substantially in the next decade and if the same negligence towards the environment continues, there will be a day when no clean air would be available. Traditional practices of producing energy, regularly reminds us the serious threat they pose to the environment. Thus there is a need to produce independent and clean electricity. Wave energy can be observed as a possible clean energy resource which can be exploited for power generation purposes. While this method is relatively new and economically competitive, there is a growing trend towards it, which is gaining interest from government and industries. A vital feature of these waves is that they have the highest energy density when compared to other renewable energy resources.

几十年来,地球一直在提醒人类寻找更好的发电方式,而不是燃烧化石燃料,因为化石燃料会导致有害气体排放到环境中。预计未来十年世界能源消耗将大幅增加,如果对环境的忽视继续下去,总有一天我们将无法获得清洁的空气。生产能源的传统做法,经常提醒我们它们对环境构成的严重威胁。因此,有必要生产独立和清洁的电力。波浪能是一种潜在的清洁能源,可用于发电。虽然这种方法相对较新,在经济上具有竞争力,但它的发展趋势越来越大,正引起政府和工业界的兴趣。这些波浪的一个重要特征是,与其他可再生能源相比,它们具有最高的能量密度。
{"title":"Power Generation Using Ocean Waves: A Review","authors":"Kavadiki Veerabhadrappa ,&nbsp;B.G. Suhas ,&nbsp;Chidanand K. Mangrulkar ,&nbsp;R. Suresh Kumar ,&nbsp;V.S. Mudakappanavar ,&nbsp;Narahari ,&nbsp;K.N. Seetharamu","doi":"10.1016/j.gltp.2022.05.001","DOIUrl":"10.1016/j.gltp.2022.05.001","url":null,"abstract":"<div><p>From decades, Earth is reminding humans to find better ways to produce power rather than burning fossil fuels which would result in the emission of harmful gases into the environment. The world energy consumption is expected to increase substantially in the next decade and if the same negligence towards the environment continues, there will be a day when no clean air would be available. Traditional practices of producing energy, regularly reminds us the serious threat they pose to the environment. Thus there is a need to produce independent and clean electricity. Wave energy can be observed as a possible clean energy resource which can be exploited for power generation purposes. While this method is relatively new and economically competitive, there is a growing trend towards it, which is gaining interest from government and industries. A vital feature of these waves is that they have the highest energy density when compared to other renewable energy resources.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 359-370"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000632/pdfft?md5=ecaf6bf4cef4f5ae1883923ef70b3188&pid=1-s2.0-S2666285X22000632-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76274836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure intrusion detection system routing protocol for mobile ad‐hoc network 移动自组网安全入侵检测系统路由协议
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2021.10.003
Rajendra Prasad P , Shiva shankar

With the recent advancements in the field of wireless networks or Mobile Ad-hoc networks (MANETs), mobile computing is the most powerful use for network communication and connectivity. Effective networks come across with numerous difficulties. Networks need to be able to transmit data with acceptable precision from one system to another. A framework must ensure that the retrieved data is consistent with the transmitted data for most applications. If the frame between the two nodes is distorted in the data-link layer, it must be corrected before having driven to other nodes. However, most protocols with the link-layer simply dismiss the frame and allow the high-layer protocols to pass down the frame. In other words, information is a valuable commodity, since asset information must be protected from threats. Some applications require a network mechanism for detecting and preventing these attacks in MANETs. An important challenge in MANET is building the secure intrusion detection system in network providing security to the nodes and route paths in network. The attacks in network can threaten the security issues which have been identified in the intrusion detection system engine, later it is prevented by intrusion prevention engine in the network. A henceforth new technique to implement the security goals and prevent attacks is implemented by introducing the Secure-Intrusion Detection System (S-IDS) in the network. The research work introduced the Secure Energy Routing (SER) protocol for the MANETs. The protocol solves the issue of security in network by detecting the attacks and preventing them in the network. The simulation results show the higher packet delivery ratio and low end-to-end delay with and without attacks. The protocol performance is good in terms of its packet delivery ratio and low end-to-end delay respectively.

随着无线网络或移动自组织网络(manet)领域的最新进展,移动计算是网络通信和连接的最强大用途。有效的网络会遇到许多困难。网络需要能够以可接受的精度将数据从一个系统传输到另一个系统。对于大多数应用程序,框架必须确保检索到的数据与传输的数据一致。如果两个节点之间的帧在数据链路层中失真,则必须在驱动到其他节点之前进行校正。然而,大多数带有链路层的协议只是简单地丢弃帧,并允许高层协议向下传递该帧。换句话说,信息是一种有价值的商品,因为必须保护资产信息免受威胁。一些应用需要一种网络机制来检测和防止这些攻击。在网络中建立安全的入侵检测系统,为网络中的节点和路由路径提供安全保障是MANET面临的一个重要挑战。网络中的攻击会威胁到入侵检测系统引擎识别出的安全问题,然后由网络中的入侵防御引擎进行防御。在网络中引入安全入侵检测系统(S-IDS, security - intrusion Detection System)是一种实现安全目标和防止攻击的新技术。研究工作介绍了面向manet的安全能量路由(SER)协议。该协议通过检测和阻止网络中的攻击,解决了网络中的安全问题。仿真结果表明,在有攻击和无攻击的情况下,该算法具有较高的数据包传输率和较低的端到端时延。该协议具有较好的分组传输率和较低的端到端时延。
{"title":"Secure intrusion detection system routing protocol for mobile ad‐hoc network","authors":"Rajendra Prasad P ,&nbsp;Shiva shankar","doi":"10.1016/j.gltp.2021.10.003","DOIUrl":"10.1016/j.gltp.2021.10.003","url":null,"abstract":"<div><p>With the recent advancements in the field of wireless networks or Mobile Ad-hoc networks (MANETs), mobile computing is the most powerful use for network communication and connectivity. Effective networks come across with numerous difficulties. Networks need to be able to transmit data with acceptable precision from one system to another. A framework must ensure that the retrieved data is consistent with the transmitted data for most applications. If the frame between the two nodes is distorted in the data-link layer, it must be corrected before having driven to other nodes. However, most protocols with the link-layer simply dismiss the frame and allow the high-layer protocols to pass down the frame. In other words, information is a valuable commodity, since asset information must be protected from threats. Some applications require a network mechanism for detecting and preventing these attacks in MANETs. An important challenge in MANET is building the secure intrusion detection system in network providing security to the nodes and route paths in network. The attacks in network can threaten the security issues which have been identified in the intrusion detection system engine, later it is prevented by intrusion prevention engine in the network. A henceforth new technique to implement the security goals and prevent attacks is implemented by introducing the Secure-Intrusion Detection System (S-IDS) in the network. The research work introduced the Secure Energy Routing (SER) protocol for the MANETs. The protocol solves the issue of security in network by detecting the attacks and preventing them in the network. The simulation results show the higher packet delivery ratio and low end-to-end delay with and without attacks. The protocol performance is good in terms of its packet delivery ratio and low end-to-end delay respectively.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 399-411"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001023/pdfft?md5=2e47f9310aad19d4a1bbef62cee40e4b&pid=1-s2.0-S2666285X21001023-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91062900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Smartphone assist deep neural network to detect the citrus diseases in Agri-informatics 智能手机辅助深度神经网络检测柑橘病害的农业信息学研究
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2021.10.004
Utpal Barman , Ridip Dev Choudhury

The citrus family provides healthy fruits to humans. The quality and quantity of the citrus fruits depend on the quality of the citrus leaves. Due to the diseases of citrus leaves, the quality and productivity of citrus fruit are degraded. This paper provides a computer automation system to detect the diseases of the citrus leaves using machine learning and deep learning techniques. In this paper, images of citrus leaves are captured using an Android Smartphone in natural environmental light. Three different classes of citrus leaves are collected using the Smartphone and destructive method. These are citrus healthy, citrus greening, and citrus CTV (Citrus Tristeza virus). Citrus images are processed for image resizing, image noise removal, image enhancement, and feature extraction. Features of the images are calculated using Gray Level Co-occurrence Matrix in the color and gray domain of the images. Finally, the detection and classification are done using K- Nearest Neighbor (KNN) and Deep Neural Network (DNN) classifier. The accuracy of the KNN classifier is 89.9% for the K value 3 whereas the accuracy of DNN is 99.89% with an error of 0.0219. The proposed system helps the farmer to detect diseases at an early stage.

柑橘家族为人类提供健康的水果。柑橘果实的质量和数量取决于柑橘叶的质量。柑桔叶片病害是柑桔果实品质和产量下降的主要原因。本文提出了一种利用机器学习和深度学习技术进行柑橘叶片病害检测的计算机自动化系统。在本文中,使用Android智能手机在自然环境光下拍摄柑橘叶子的图像。使用智能手机和破坏性方法收集了三种不同类型的柑橘叶子。这些是柑橘健康,柑橘绿化和柑橘CTV(柑橘Tristeza病毒)。柑橘图像处理图像大小调整,图像去噪,图像增强和特征提取。利用灰度共生矩阵在图像的彩色域和灰色域计算图像的特征。最后,使用K近邻(KNN)和深度神经网络(DNN)分类器进行检测和分类。K值为3时,KNN分类器的准确率为89.9%,而DNN分类器的准确率为99.89%,误差为0.0219。该系统可以帮助农民在早期阶段发现疾病。
{"title":"Smartphone assist deep neural network to detect the citrus diseases in Agri-informatics","authors":"Utpal Barman ,&nbsp;Ridip Dev Choudhury","doi":"10.1016/j.gltp.2021.10.004","DOIUrl":"10.1016/j.gltp.2021.10.004","url":null,"abstract":"<div><p>The citrus family provides healthy fruits to humans. The quality and quantity of the citrus fruits depend on the quality of the citrus leaves. Due to the diseases of citrus leaves, the quality and productivity of citrus fruit are degraded. This paper provides a computer automation system to detect the diseases of the citrus leaves using machine learning and deep learning techniques. In this paper, images of citrus leaves are captured using an Android Smartphone in natural environmental light. Three different classes of citrus leaves are collected using the Smartphone and destructive method. These are citrus healthy, citrus greening, and citrus CTV (Citrus Tristeza virus). Citrus images are processed for image resizing, image noise removal, image enhancement, and feature extraction. Features of the images are calculated using Gray Level Co-occurrence Matrix in the color and gray domain of the images. Finally, the detection and classification are done using K- Nearest Neighbor (KNN) and Deep Neural Network (DNN) classifier. The accuracy of the KNN classifier is 89.9% for the <em>K</em> value 3 whereas the accuracy of DNN is 99.89% with an error of 0.0219. The proposed system helps the farmer to detect diseases at an early stage.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 392-398"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001035/pdfft?md5=27aa1987f01ab1c8bb3c415cf1f1fe5a&pid=1-s2.0-S2666285X21001035-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83776500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Grid interconnected H-bridge multilevel inverter for renewable power applications using repeating units and level boosting network 使用重复单元和电平升压网络的可再生能源应用的电网互联h桥多电平逆变器
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2021.10.005
Sumit Trimukhe, Sanjeevkumar R A

In today's world, development in technology need good converters, among which multilevel inverter is the area to be focused as it minimizes the losses and reduces power quality issues. This research article proposes a grid connected H-bridge multilevel inverter for renewable applications. Which is interconnected to repeating units and level boosting network. The proposed system is developed to reduces the power losses as it is integrated with repeating units, which enhance the output voltage. Further reduction in power losses and increase in efficiency is achieved by generating intermediate levels with the help of level boosting network. The bidirectional flow of power is achieved with the help of grid interconnected H-bridge. The proposed multilevel inverter generates 4n + 3 number of output levels. The work is carried out using two repeating units and one level boosting network with grid integrated H-bridge for 11 levels. The main objective of the proposed method, to reduce number of switches and sources is achieved. Which influences the additional saving of generating power apart from renewable source. The analysis is carried out for different modes of operation and compared with other topologies using MATLAB Simulink.

当今世界,技术的发展需要好的变换器,其中多电平逆变器是一个备受关注的领域,因为它可以最大限度地减少损耗,减少电能质量问题。本文提出了一种可再生能源并网h桥多电平逆变器。它与重复单元和升压网络相连。所提出的系统是为了减少功率损耗而开发的,因为它与重复单元集成在一起,提高了输出电压。在升压电网的帮助下产生中间电平,进一步降低了功率损耗,提高了效率。并网h桥实现了电力的双向流动。提出的多电平逆变器产生4n + 3个输出电平。该工作采用两个重复单元和一个带网格集成h桥的11级升压网络进行。该方法的主要目标是减少开关和源的数量。这影响了可再生能源发电的额外节省。利用MATLAB Simulink对不同的工作模式进行了分析,并与其他拓扑结构进行了比较。
{"title":"Grid interconnected H-bridge multilevel inverter for renewable power applications using repeating units and level boosting network","authors":"Sumit Trimukhe,&nbsp;Sanjeevkumar R A","doi":"10.1016/j.gltp.2021.10.005","DOIUrl":"10.1016/j.gltp.2021.10.005","url":null,"abstract":"<div><p>In today's world, development in technology need good converters, among which multilevel inverter is the area to be focused as it minimizes the losses and reduces power quality issues. This research article proposes a grid connected H-bridge multilevel inverter for renewable applications. Which is interconnected to repeating units and level boosting network. The proposed system is developed to reduces the power losses as it is integrated with repeating units, which enhance the output voltage. Further reduction in power losses and increase in efficiency is achieved by generating intermediate levels with the help of level boosting network. The bidirectional flow of power is achieved with the help of grid interconnected H-bridge. The proposed multilevel inverter generates 4n + 3 number of output levels. The work is carried out using two repeating units and one level boosting network with grid integrated H-bridge for 11 levels. The main objective of the proposed method, to reduce number of switches and sources is achieved. Which influences the additional saving of generating power apart from renewable source. The analysis is carried out for different modes of operation and compared with other topologies using MATLAB Simulink.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 424-431"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001114/pdfft?md5=89c259d8497058447835a2a8787221f9&pid=1-s2.0-S2666285X21001114-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76251088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of an Arabic HQAS-based ASAG to consider an ignored knowledge in misspelled multiple words short answers 基于阿拉伯语hqas的考虑拼错多词简答中被忽略知识的ASAG的开发
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2022.06.002
Samah Ali Al-azani , C. Namrata Mahender , Mohammed Hasan

Many traditional question answering systems depend on an Automatic Short Answer Grading (ASAG) to evaluate misspelled multiple words short answers in an Arabic Language using common edit-based algorithms such as Hamming, Levenshtein, and Jaro_Winkler, but they ignore and hide a big amount of a significant knowledge of the student answer. In this paper, we have implemented a proposed edit-based Hierarchical question answering system (HQAS) using a traversing by Breadth-First Search (BFS) within an m-ary tree to consider the ignored significant knowledge due to the misspelling at the middle of the dual-ordered incomplete answer, the misspelling at middle and the end of the intra-ordered incomplete answer, and the misspelling due to switching in words of the intra-ordered complete answer. It can differentiate among the students based on their significant hidden knowledge and show a distribution of knowledge content on different depths of the topic to determine which of the topic depths the student has the most significant knowledge.

许多传统的问答系统依赖于自动简答评分(ASAG),使用常见的基于编辑的算法(如Hamming, Levenshtein和Jaro_Winkler)来评估阿拉伯语中拼写错误的多词简答,但它们忽略并隐藏了学生答案的大量重要知识。在本文中,我们提出了一种基于编辑的分层问答系统(HQAS),该系统采用广度优先搜索(BFS)在m树内进行遍历,以考虑由于双有序不完整答案中间的拼写错误而忽略的重要知识,内部有序不完整答案的中间和结尾的拼写错误,以及由于内部有序完整答案的单词交换而导致的拼写错误。它可以根据学生的重要隐藏知识来区分学生,并显示知识内容在主题的不同深度上的分布,以确定学生在主题的哪个深度拥有最重要的知识。
{"title":"Development of an Arabic HQAS-based ASAG to consider an ignored knowledge in misspelled multiple words short answers","authors":"Samah Ali Al-azani ,&nbsp;C. Namrata Mahender ,&nbsp;Mohammed Hasan","doi":"10.1016/j.gltp.2022.06.002","DOIUrl":"10.1016/j.gltp.2022.06.002","url":null,"abstract":"<div><p>Many traditional question answering systems depend on an Automatic Short Answer Grading (ASAG) to evaluate misspelled multiple words short answers in an Arabic Language using common edit-based algorithms such as Hamming, Levenshtein, and Jaro_Winkler, but they ignore and hide a big amount of a significant knowledge of the student answer. In this paper, we have implemented a proposed edit-based Hierarchical question answering system (HQAS) using a traversing by Breadth-First Search (BFS) within an m-ary tree to consider the ignored significant knowledge due to the misspelling at the middle of the dual-ordered incomplete answer, the misspelling at middle and the end of the intra-ordered incomplete answer, and the misspelling due to switching in words of the intra-ordered complete answer. It can differentiate among the students based on their significant hidden knowledge and show a distribution of knowledge content on different depths of the topic to determine which of the topic depths the student has the most significant knowledge.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 376-385"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000760/pdfft?md5=cd0780493798a30cd1cdc69eb33b2635&pid=1-s2.0-S2666285X22000760-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79638726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Energy Efficient Secure Routing Protocol for Mobile Ad-Hoc Network 增强节能安全路由协议的移动自组织网络
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2021.10.001
Rajendra Prasad P, Shivashankar

Wireless networks are considered the best utilized network and in particular Mobile Ad-hoc NETworks (MANETs) have found many applications for its data transmission in real time applications. The accompanying challenges restrict the current protocols for the routing being specifically used in MANETs. The design issues in this network are to restrict the usage of energy while transmitting information and provide security to the nodes. In the existing routing protocols, route comes from a source where the source node seeks a way to the target node, by transmitting messages to its adjacent nodes, and the nodes use energy to do this. Mobile Ad-hoc network faces challenges in improving the energy efficiency and providing security for the routing protocol. This research work proposes the Enhanced Energy Efficient-Secure Routing (EEE-SR) protocol as a novel security algorithm to access secure data in hostile environment. In the proposed work, to secure data transmission in the network, the nodes associates with security policy. Under this policy, both the nodes have a common enforcing policy, and then they communicate with each other. The selection of the nodes for the transmission has to prove its authentication and then selection of the routing path built on the available energy threshold at the nodes in the set-up for forwarding packets in the network. The routing protocol implements the best shortest path in network and also checks for the nodes trustworthiness by evaluating the trust policies enforcement on it. The protocol enables a node to autonomously decide whether to select the neighboring node or based on the available energy threshold and security policy enforced. The algorithm evaluates increase network lifetime and low in the energy consumption, packet loss and end-to-end delay.

无线网络被认为是利用最好的网络,特别是移动自组织网络(manet)在实时数据传输方面已经找到了许多应用。伴随而来的挑战限制了当前用于manet的路由协议。该网络的设计问题是在传输信息的同时限制能源的使用,并为节点提供安全保障。在现有的路由协议中,路由来自源节点,源节点通过向相邻节点发送消息来寻找到达目标节点的方法,节点使用能量来实现这一目标。移动自组织网络在提高能效和保证路由协议的安全性方面面临着挑战。本研究提出了增强型节能安全路由(EEE-SR)协议,作为一种新的安全算法,在敌对环境中访问安全数据。在本文中,为了保证网络中数据传输的安全,节点与安全策略相关联。在这个策略下,两个节点有一个共同的强制策略,然后它们彼此通信。传输节点的选择必须证明其身份验证,然后根据设置中节点的可用能量阈值选择路由路径,以便在网络中转发数据包。路由协议实现了网络中的最佳最短路径,并通过评估在其上执行的信任策略来检查节点的可信度。该协议使节点能够自主决定是否选择相邻节点,或者根据可用的能量阈值和执行的安全策略来选择。该算法可提高网络生存时间,降低网络能耗、丢包率和端到端时延。
{"title":"Enhanced Energy Efficient Secure Routing Protocol for Mobile Ad-Hoc Network","authors":"Rajendra Prasad P,&nbsp;Shivashankar","doi":"10.1016/j.gltp.2021.10.001","DOIUrl":"10.1016/j.gltp.2021.10.001","url":null,"abstract":"<div><p>Wireless networks are considered the best utilized network and in particular Mobile Ad-hoc NETworks (MANETs) have found many applications for its data transmission in real time applications. The accompanying challenges restrict the current protocols for the routing being specifically used in MANETs. The design issues in this network are to restrict the usage of energy while transmitting information and provide security to the nodes. In the existing routing protocols, route comes from a source where the source node seeks a way to the target node, by transmitting messages to its adjacent nodes, and the nodes use energy to do this. Mobile Ad-hoc network faces challenges in improving the energy efficiency and providing security for the routing protocol. This research work proposes the Enhanced Energy Efficient-Secure Routing (EEE-SR) protocol as a novel security algorithm to access secure data in hostile environment. In the proposed work, to secure data transmission in the network, the nodes associates with security policy. Under this policy, both the nodes have a common enforcing policy, and then they communicate with each other. The selection of the nodes for the transmission has to prove its authentication and then selection of the routing path built on the available energy threshold at the nodes in the set-up for forwarding packets in the network. The routing protocol implements the best shortest path in network and also checks for the nodes trustworthiness by evaluating the trust policies enforcement on it. The protocol enables a node to autonomously decide whether to select the neighboring node or based on the available energy threshold and security policy enforced. The algorithm evaluates increase network lifetime and low in the energy consumption, packet loss and end-to-end delay.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 412-423"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2100100X/pdfft?md5=191212d0060908554c3abffa6aa90306&pid=1-s2.0-S2666285X2100100X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73940728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Thermal analysis on Ti-6AL-4V tool architecture using Johnson–Cook material model 基于Johnson-Cook材料模型的Ti-6AL-4V刀具结构热分析
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2022.05.002
N. Mohan, Kavadiki Veerabhadrappa, J. Sharana Basavaraja, B.G. Suhas, R. Suresh Kumar

Precision machine accuracy is harmed by a variety of error sources, including vibration, self-weight deformation, and measurement error. Thermal deformation of the machine structure is a major source of error that reduces the accuracy of precision machines. Thermo-elastic deformations of machine tools are caused by both internal and external heat sources, resulting in geometric inaccuracies in the work piece. Thermal effects can account for up to 75% of the total inaccuracy. Precision machines must meet higher precision and productivity standards. As a result, the Johnson-Cook dynamic failure model is used in this work to reduce. The Johnson–Cook material constitutive equation, which is employed in this work, takes into account the effects of strain, strain rate, and temperature on material properties. The results obtained from the present methodology are validated with the results available from the Literature. From the present study the thermal error could be kept within 16µm. Further the same methodology can be extended to HMC's and VMC's for special purpose machines in order to control the thermal deformations.

精密机械的精度受到各种误差来源的影响,包括振动、自重变形和测量误差。机器结构的热变形是降低精密机械精度的主要误差来源。机床的热弹性变形是由内部和外部热源引起的,导致工件的几何不精确。热效应可占总误差的75%。精密机械必须满足更高的精度和生产率标准。因此,本文采用了Johnson-Cook动态失效模型来减小故障。本研究采用的Johnson-Cook材料本构方程考虑了应变、应变速率和温度对材料性能的影响。用本方法得到的结果与文献中的结果进行了验证。从目前的研究来看,热误差可以控制在16µm以内。此外,同样的方法可以扩展到HMC和VMC的特殊用途的机器,以控制热变形。
{"title":"Thermal analysis on Ti-6AL-4V tool architecture using Johnson–Cook material model","authors":"N. Mohan,&nbsp;Kavadiki Veerabhadrappa,&nbsp;J. Sharana Basavaraja,&nbsp;B.G. Suhas,&nbsp;R. Suresh Kumar","doi":"10.1016/j.gltp.2022.05.002","DOIUrl":"https://doi.org/10.1016/j.gltp.2022.05.002","url":null,"abstract":"<div><p>Precision machine accuracy is harmed by a variety of error sources, including vibration, self-weight deformation, and measurement error. Thermal deformation of the machine structure is a major source of error that reduces the accuracy of precision machines. Thermo-elastic deformations of machine tools are caused by both internal and external heat sources, resulting in geometric inaccuracies in the work piece. Thermal effects can account for up to 75% of the total inaccuracy. Precision machines must meet higher precision and productivity standards. As a result, the Johnson-Cook dynamic failure model is used in this work to reduce. The Johnson–Cook material constitutive equation, which is employed in this work, takes into account the effects of strain, strain rate, and temperature on material properties. The results obtained from the present methodology are validated with the results available from the Literature. From the present study the thermal error could be kept within 16µm. Further the same methodology can be extended to HMC's and VMC's for special purpose machines in order to control the thermal deformations.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 432-437"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000747/pdfft?md5=8acdc13cc05e4cfb819886bc45cf782c&pid=1-s2.0-S2666285X22000747-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138367542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Erratum for Previously Published Articles 先前发表文章的勘误
Pub Date : 2022-11-01 DOI: 10.1016/j.gltp.2020.10.001
{"title":"Erratum for Previously Published Articles","authors":"","doi":"10.1016/j.gltp.2020.10.001","DOIUrl":"https://doi.org/10.1016/j.gltp.2020.10.001","url":null,"abstract":"","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Page 438"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X20300108/pdfft?md5=f43cf965505769da8bcd52378fa4cc6b&pid=1-s2.0-S2666285X20300108-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138367543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Global Transitions Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1