首页 > 最新文献

2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)最新文献

英文 中文
Learning needs for special needs learners: A graph based adaptive approach for content sequencing 特殊需求学习者的学习需求:基于图的内容排序自适应方法
J. Roman, Devarshi Mehta, P. Sajja
This paper considers a graph based adaptive approach for sequencing of learning objects for Special Needs Learners (SNL) in customized manner. The proposed algorithm traverses the nodes of the graph containing learning content topics in effective manner. This approach ensures not only customized learning for special needs learners, but also imparts some level of intelligence in the process of learning. The SNL goes through the necessary nodes on the graph form the first node of the learning module (priority based) to the last learning module considering the priorities and needs of the learners and obtains the optimal solution for the SNL. The algorithm is designed in such a way that the learning process and outcome are inline with the predefined curriculum. The curriculum is a tailor made collaboration of various independent and reusable learning modules as per the personalized requirements and the learning ability of the SNL. The paper also proposes the parameters that would contribute for the personalized learning of the SNL.
本文研究了一种基于图的自适应方法,用于特殊需要学习者(SNL)学习对象的自定义排序。该算法有效地遍历包含学习内容主题的图的节点。这种方法不仅确保了为特殊需要的学习者定制学习,而且在学习过程中赋予了一定程度的智能。SNL考虑学习者的优先级和需求,从学习模块的第一个节点(基于优先级)到最后一个学习模块,遍历图上的必要节点,得到SNL的最优解。该算法的设计方式使学习过程和结果与预定义的课程一致。课程是根据SNL的个性化需求和学习能力,由多个独立的、可重复使用的学习模块协同而成。本文还提出了有助于SNL个性化学习的参数。
{"title":"Learning needs for special needs learners: A graph based adaptive approach for content sequencing","authors":"J. Roman, Devarshi Mehta, P. Sajja","doi":"10.1109/ICSOFTCOMP.2017.8280090","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280090","url":null,"abstract":"This paper considers a graph based adaptive approach for sequencing of learning objects for Special Needs Learners (SNL) in customized manner. The proposed algorithm traverses the nodes of the graph containing learning content topics in effective manner. This approach ensures not only customized learning for special needs learners, but also imparts some level of intelligence in the process of learning. The SNL goes through the necessary nodes on the graph form the first node of the learning module (priority based) to the last learning module considering the priorities and needs of the learners and obtains the optimal solution for the SNL. The algorithm is designed in such a way that the learning process and outcome are inline with the predefined curriculum. The curriculum is a tailor made collaboration of various independent and reusable learning modules as per the personalized requirements and the learning ability of the SNL. The paper also proposes the parameters that would contribute for the personalized learning of the SNL.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132911248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure and efficient group based data retrieval from cloud storage using obfuscation and data mining techniques 使用混淆和数据挖掘技术从云存储中安全高效的基于组的数据检索
K. Suthar, Hiral B. Patel
In current era of Computer world everyone wants a quick access of data from anywhere and on anytime. Cloud computing provides lots of benefits to user at cheaper cost and whenever required. On one side thousand number of users information become available on central premises and able to achieve location independency where as on other side this generate issues related to data security as well as quick retrieval of information by analyzing user documents. These issues are not directly under the control of user. If we don't take proper care while retrieving of relevant information from the document of thousands of users then it becomes very tedious process. It is also crucial to secure user information on cloud storage from unauthorized access. When user needs to search something, it will be searched in every available document which takes large amount of time making user job wearisome. Hence to accost revealed important issues, here we proposed an efficient secure searching mechanism in which user can get require details quickly without getting any type of burden. Our proposed scheme deals with efficient searching and securing user information in Cloud environment which increase trust level as well as adoption of Cloud.
在当今计算机世界的时代,每个人都希望能够随时随地快速访问数据。云计算以更低的成本为用户提供了许多好处。一方面,成千上万的用户信息可以在中央场所获得,并能够实现位置独立性,另一方面,这产生了与数据安全性相关的问题,以及通过分析用户文档快速检索信息。这些问题并不是用户可以直接控制的。如果我们在从成千上万用户的文档中检索相关信息时不小心,那么这将成为一个非常繁琐的过程。确保云存储上的用户信息不被未经授权的访问也至关重要。当用户需要搜索某项内容时,需要在所有可用的文档中进行搜索,这需要花费大量的时间,使用户感到厌烦。为此,我们提出了一种高效的安全搜索机制,使用户可以在不增加任何负担的情况下快速获得所需的详细信息。该方案解决了云环境下用户信息的高效搜索和安全保护问题,提高了用户对云的信任度和采用率。
{"title":"Secure and efficient group based data retrieval from cloud storage using obfuscation and data mining techniques","authors":"K. Suthar, Hiral B. Patel","doi":"10.1109/ICSOFTCOMP.2017.8280087","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280087","url":null,"abstract":"In current era of Computer world everyone wants a quick access of data from anywhere and on anytime. Cloud computing provides lots of benefits to user at cheaper cost and whenever required. On one side thousand number of users information become available on central premises and able to achieve location independency where as on other side this generate issues related to data security as well as quick retrieval of information by analyzing user documents. These issues are not directly under the control of user. If we don't take proper care while retrieving of relevant information from the document of thousands of users then it becomes very tedious process. It is also crucial to secure user information on cloud storage from unauthorized access. When user needs to search something, it will be searched in every available document which takes large amount of time making user job wearisome. Hence to accost revealed important issues, here we proposed an efficient secure searching mechanism in which user can get require details quickly without getting any type of burden. Our proposed scheme deals with efficient searching and securing user information in Cloud environment which increase trust level as well as adoption of Cloud.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117324898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image segmentation improvement by reversible segment merging 基于可逆段合并的图像分割改进
I. Khanykov, M. Kharinov, Chirag Patel
The paper focuses on image segmentation by means of approaching by piecewise-constant approximations. The objective is the improvement of the segmented image, expressed in the noticeable drop of image approximation error (total squared error). The proposed method involves segment dividing into two in some image part and merge of a pair of adjacent segments in another image part, keeping a total segment number constant. For further enhancement of the segmentation, the proposed method is used in combination with advanced K-means method. The steep decline of the approximation error is provided along with obvious increase of perceptual quality of image segmentation. The effect is achieved owing to binary adaptive hierarchy of nested segments, generated for each segment. The segmentation improvement method is usable for the advancement of the computer vision systems using conventional segmentation by partitioning image into connected segments.
本文主要研究了一种基于分段常数近似的图像分割方法。目标是改进分割后的图像,表现为图像近似误差(总平方误差)的显著下降。该方法在保持总段数不变的情况下,将某一图像部分的段分割为两个,并在另一图像部分对相邻的段进行合并。为了进一步增强分割效果,将该方法与先进的K-means方法结合使用。近似误差急剧下降,图像分割的感知质量明显提高。该效果是由于为每个段生成的嵌套段的二进制自适应层次结构而实现的。该分割改进方法可用于改进计算机视觉系统使用传统的分割方法,即将图像分割成相互连接的部分。
{"title":"Image segmentation improvement by reversible segment merging","authors":"I. Khanykov, M. Kharinov, Chirag Patel","doi":"10.1109/ICSOFTCOMP.2017.8280096","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280096","url":null,"abstract":"The paper focuses on image segmentation by means of approaching by piecewise-constant approximations. The objective is the improvement of the segmented image, expressed in the noticeable drop of image approximation error (total squared error). The proposed method involves segment dividing into two in some image part and merge of a pair of adjacent segments in another image part, keeping a total segment number constant. For further enhancement of the segmentation, the proposed method is used in combination with advanced K-means method. The steep decline of the approximation error is provided along with obvious increase of perceptual quality of image segmentation. The effect is achieved owing to binary adaptive hierarchy of nested segments, generated for each segment. The segmentation improvement method is usable for the advancement of the computer vision systems using conventional segmentation by partitioning image into connected segments.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis of dimensionality reduced local directional pattern on different scales 不同尺度下的降维局部方向图分析
R. Perumal, P. Mouli
This paper affords an analysis of a novel local descriptor-dimensionality reduced local directional Pattern (DR-LDP) on different scales. DR-LDP extracts the features of the face by partitioning the image into 3 χ 3 sub-regions and the sub-region was convoluted with a set of eight Kirsch masks. The single eight-bit code generated for each sub-region. The histogram features are extracted by partitioning the resultant DR-LDP encoded image into 8 × 8 regions. The features of each regions are combined to form a feature vector for the given facial image. For any query image, the same process is carried out to extract the feature vector. A chi-square test is used to measure the dissimilarity of the feature, the dissimilarity of feature vector in the database with the feature vector of query image was determined to recognize the face. The experiments had been accomplished on well-known benchmark databases. In this paper, an analysis of DR-LDP on 3 χ 3, 5 χ 5, 7 χ 7 regions and convultes each region with 3 × 3, 5 × 5, 7 × 7 eight Kirsch masks are performed to test the robustness of it. From the analysis, it is evident that the DR-LDP performs the best for the scale 3 χ 3.
本文在不同尺度上分析了一种新的局部描述符-降维局部定向图(DR-LDP)。DR-LDP通过将图像划分为3 χ 3子区域来提取人脸特征,并用一组8个Kirsch掩模对子区域进行卷积。为每个子区域生成的单个8位代码。通过将生成的DR-LDP编码图像划分为8 × 8个区域来提取直方图特征。将每个区域的特征组合起来,形成给定人脸图像的特征向量。对于任何查询图像,都执行相同的过程来提取特征向量。使用卡方检验来衡量特征的不相似度,确定数据库中的特征向量与查询图像的特征向量的不相似度来识别人脸。实验已经在知名的基准数据库上完成。本文对DR-LDP在3 χ 3、5 χ 5、7 χ 7区域上进行了分析,并对每个区域进行了3 × 3、5 × 5、7 × 7 8个Kirsch掩模的震荡,以检验其鲁棒性。从分析中可以明显看出,DR-LDP在规模3 χ 3中表现最佳。
{"title":"Analysis of dimensionality reduced local directional pattern on different scales","authors":"R. Perumal, P. Mouli","doi":"10.1109/ICSOFTCOMP.2017.8280095","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280095","url":null,"abstract":"This paper affords an analysis of a novel local descriptor-dimensionality reduced local directional Pattern (DR-LDP) on different scales. DR-LDP extracts the features of the face by partitioning the image into 3 χ 3 sub-regions and the sub-region was convoluted with a set of eight Kirsch masks. The single eight-bit code generated for each sub-region. The histogram features are extracted by partitioning the resultant DR-LDP encoded image into 8 × 8 regions. The features of each regions are combined to form a feature vector for the given facial image. For any query image, the same process is carried out to extract the feature vector. A chi-square test is used to measure the dissimilarity of the feature, the dissimilarity of feature vector in the database with the feature vector of query image was determined to recognize the face. The experiments had been accomplished on well-known benchmark databases. In this paper, an analysis of DR-LDP on 3 χ 3, 5 χ 5, 7 χ 7 regions and convultes each region with 3 × 3, 5 × 5, 7 × 7 eight Kirsch masks are performed to test the robustness of it. From the analysis, it is evident that the DR-LDP performs the best for the scale 3 χ 3.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133270770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of motion based and feature based algorithms for object detection and tracking 基于运动和基于特征的目标检测和跟踪算法的比较分析
Bhaumik Vaidya, C. Paunwala
Object detection and tracking in the video sequence is a challenging task and time consuming process. Intrinsic factors like pose, appearance, variation in scale and extrinsic factors like variation in illumination, occlusion and clutter are major factors effecting this task. The main aim of this work is to implement and compare different algorithms in challenging conditions and find the algorithm that performs very efficiently on real time videos. In this paper, two motion based algorithms Zivkovic Adaptive Gaussian Mixture Model (ADGMM) and Grimson Gaussian Mixture Models (GGMM) and two feature based algorithms Speeded up Robust features (SURF) and Haar Cascade are implemented. The comparison of these algorithms in real life challenges and application is done to find out suitable algorithm for a particular application.
视频序列中的目标检测和跟踪是一项具有挑战性和耗时的过程。姿势、外观、尺度变化等内在因素和光照、遮挡、杂波变化等外在因素是影响该任务的主要因素。这项工作的主要目的是在具有挑战性的条件下实现和比较不同的算法,并找到在实时视频上执行非常有效的算法。本文实现了两种基于运动的Zivkovic自适应高斯混合模型(ADGMM)和Grimson高斯混合模型(GGMM)算法,以及两种基于特征的加速鲁棒特征(SURF)和Haar级联算法。通过对这些算法在实际应用中的比较,找出适合具体应用的算法。
{"title":"Comparative analysis of motion based and feature based algorithms for object detection and tracking","authors":"Bhaumik Vaidya, C. Paunwala","doi":"10.1109/ICSOFTCOMP.2017.8280088","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280088","url":null,"abstract":"Object detection and tracking in the video sequence is a challenging task and time consuming process. Intrinsic factors like pose, appearance, variation in scale and extrinsic factors like variation in illumination, occlusion and clutter are major factors effecting this task. The main aim of this work is to implement and compare different algorithms in challenging conditions and find the algorithm that performs very efficiently on real time videos. In this paper, two motion based algorithms Zivkovic Adaptive Gaussian Mixture Model (ADGMM) and Grimson Gaussian Mixture Models (GGMM) and two feature based algorithms Speeded up Robust features (SURF) and Haar Cascade are implemented. The comparison of these algorithms in real life challenges and application is done to find out suitable algorithm for a particular application.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130497524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security against malicious node in the vehicular cloud computing using a software-defined networking architecture 基于软件定义网络架构的车载云计算中针对恶意节点的安全防护
Mhidi Bousselham, Abderrahim Abdellaoui, H. Chaoui
Recently Vehicular Cloud Computing (VCC) has become a significant research area, due to its potential to ensure passenger comfort and improve road safety. It has emerged as a promising technology that leverages the cloud computing functionalities to exploit vehicles underutilized computational, storage and communications. However, it has recently shown that the VCC might be vulnerable to various kinds of attacks, due to the public nature of its network. Therefore, ensuring security and privacy in this paradigm is considered as one of its most important challenges. In this paper, we exploit software-defined network (SDN) technology to design a new security approach that protects vehicles from malicious nodes, using pseudonyms, key management and revocation list which provides authentication, confidentiality, integrity and Availability.
近年来,车载云计算(VCC)因其在确保乘客舒适度和提高道路安全方面的潜力而成为一个重要的研究领域。它已经成为一项很有前途的技术,它利用云计算功能来开发车辆未充分利用的计算、存储和通信。然而,它最近表明,由于其网络的公共性质,VCC可能容易受到各种攻击。因此,确保该范式中的安全性和隐私性被认为是其最重要的挑战之一。在本文中,我们利用软件定义网络(SDN)技术设计了一种新的安全方法,保护车辆免受恶意节点的攻击,使用假名,密钥管理和撤销列表,提供身份验证,机密性,完整性和可用性。
{"title":"Security against malicious node in the vehicular cloud computing using a software-defined networking architecture","authors":"Mhidi Bousselham, Abderrahim Abdellaoui, H. Chaoui","doi":"10.1109/ICSOFTCOMP.2017.8280084","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280084","url":null,"abstract":"Recently Vehicular Cloud Computing (VCC) has become a significant research area, due to its potential to ensure passenger comfort and improve road safety. It has emerged as a promising technology that leverages the cloud computing functionalities to exploit vehicles underutilized computational, storage and communications. However, it has recently shown that the VCC might be vulnerable to various kinds of attacks, due to the public nature of its network. Therefore, ensuring security and privacy in this paradigm is considered as one of its most important challenges. In this paper, we exploit software-defined network (SDN) technology to design a new security approach that protects vehicles from malicious nodes, using pseudonyms, key management and revocation list which provides authentication, confidentiality, integrity and Availability.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133126427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Revolution in networks of smart objects: Social Internet of Things 智能物联网的革命:社交物联网
Kinjal Rabadiya, Ashwin Makwana, S. Jardosh
Nowadays Internet of Things gives a high comfort level to human life by providing connectivity between objects with a human being. People are also connected with each other via Social Network. There are many researches are being conducted on an integration of Social Network with Internet of Things. This new paradigm knows as “Social Internet of Things”. Internet of Things has many limitations so to overcome it Social IoT can be used. Social IoT provides network of objects with security, navigability and scalability by converting “Smart” objects to “Social” object. Social IoT provides all social network services and best comfort level using IoT. In this way, Social IoT has two separate layers as a network of people and network of smart objects and still, Social IoT paradigm can be represented as a field of state of art in IoT and Social Network and simulations. In this paper, we have contributed the implementation of Social IoT with history of Intranet of Things to Social IoT, Social IoT architectures, various relationships of Smart objects with each other, different policies, challenges and applications etc.
如今,物联网通过提供物体与人之间的连接,给人类的生活带来了很高的舒适度。人们也通过社交网络相互联系。关于社交网络与物联网的融合有很多研究。这种新模式被称为“社交物联网”。物联网有许多局限性,因此可以使用社会物联网来克服它。社交物联网通过将“智能”对象转换为“社交”对象,为对象网络提供安全性、可导航性和可扩展性。社交物联网提供所有社交网络服务和使用物联网的最佳舒适度。通过这种方式,社会物联网有两个独立的层,作为人的网络和智能对象的网络,社会物联网范式仍然可以表示为物联网和社会网络和模拟领域的最新技术。在本文中,我们将物联网的历史与社会物联网的实现,社会物联网架构,智能对象之间的各种关系,不同的政策,挑战和应用等贡献给社会物联网。
{"title":"Revolution in networks of smart objects: Social Internet of Things","authors":"Kinjal Rabadiya, Ashwin Makwana, S. Jardosh","doi":"10.1109/ICSOFTCOMP.2017.8280086","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280086","url":null,"abstract":"Nowadays Internet of Things gives a high comfort level to human life by providing connectivity between objects with a human being. People are also connected with each other via Social Network. There are many researches are being conducted on an integration of Social Network with Internet of Things. This new paradigm knows as “Social Internet of Things”. Internet of Things has many limitations so to overcome it Social IoT can be used. Social IoT provides network of objects with security, navigability and scalability by converting “Smart” objects to “Social” object. Social IoT provides all social network services and best comfort level using IoT. In this way, Social IoT has two separate layers as a network of people and network of smart objects and still, Social IoT paradigm can be represented as a field of state of art in IoT and Social Network and simulations. In this paper, we have contributed the implementation of Social IoT with history of Intranet of Things to Social IoT, Social IoT architectures, various relationships of Smart objects with each other, different policies, challenges and applications etc.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123263828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Keynote: Next generation internet, data science, & soft computing 主题演讲:下一代互联网、数据科学和软计算
Ashish Ghosh
The Internet used today can be described as a network of computers, which connecats one user to others around the globe. Most of the usage and application of the “Internet of Computers” involves human intervention. The future of the Internet would be — a world where manual intervention for the objects on the network could be minimized and its functionalities would be automatic and smart. This internet would not only connect computers and smart phones; it would be a network of smart objects, the “Internet of Things”. These “things” would be smart enough to sense, process and decide a corresponding action, Examples include smart appliances (refrigerator, lights, air conditioners), traffic signals, smart body monitors, etc. The individual objects along with the network would collect process and exchange data strategically. This interconnected network along with all the smart objects working together in correspondence with each other form a larger “Cyber Physical System” (like smart cities, smart hospital, etc.). A working CPS would generate tons of data, hence efficient processing and effective use of this data is very crucial. There will be data from everywhere like climate data, social network data, video data, medical data, scientific data, etc. Storing these data for analytics may not always be feasible and analyzing them in real time will also be too difficult. Traditional analysis tools are not well suited to capture the complete essence of this massive data. The volume, velocity and variety is too large for comprehensive analysis, and the range of potential correlations and relationships between disparate data sources are too great for any analyst to test all hypotheses and derive all the value buried in the data. Some algorithms already have good capability of letting computers do the heavy thinking for us in case of smaller data. But, we are striving for more to deal with large volumes of such data in a short time. Therefore, we need to revisit old algorithms from statistics, machine learning, data mining and big data analytics and improvise them to tame such big data. Major innovations in big data analytics are still to take place; but, it is believed that emergence of such novel analytics is to come in near future from various domains. Soft computing tools, nature inspired algorithms, are likely to play a key role in this regard.
今天使用的互联网可以被描述为一个计算机网络,它将一个用户连接到全球各地的其他用户。大多数“计算机互联网”的使用和应用都涉及人为干预。互联网的未来将是一个人工干预网络上的对象可以最小化,其功能将是自动和智能的世界。这个互联网不仅可以连接电脑和智能手机;它将是一个智能物体的网络,即“物联网”。这些“东西”将足够智能,能够感知、处理并决定相应的行动,例如智能家电(冰箱、灯、空调)、交通信号、智能身体监视器等。单个对象和网络将有策略地收集、处理和交换数据。这个相互连接的网络以及所有相互通信的智能对象共同形成一个更大的“网络物理系统”(如智能城市,智能医院等)。一个工作的CPS会产生大量的数据,因此高效处理和有效使用这些数据是非常重要的。将会有来自任何地方的数据,比如气候数据、社交网络数据、视频数据、医疗数据、科学数据等。存储这些数据用于分析可能并不总是可行的,并且实时分析它们也太困难了。传统的分析工具并不适合捕捉这些海量数据的全部本质。数据的数量、速度和种类太大,无法进行全面分析,而不同数据源之间的潜在相关性和关系的范围太大,任何分析师都无法测试所有假设并得出数据中隐藏的所有价值。一些算法已经有很好的能力让计算机在小数据的情况下为我们做繁重的思考。但是,我们正在努力在短时间内处理大量这样的数据。因此,我们需要重新审视统计学、机器学习、数据挖掘和大数据分析的旧算法,并对它们进行即兴创作,以驯服这些大数据。大数据分析的重大创新仍在不断涌现;但是,相信这种新颖的分析将在不久的将来从各个领域出现。软计算工具,自然启发的算法,可能在这方面发挥关键作用。
{"title":"Keynote: Next generation internet, data science, & soft computing","authors":"Ashish Ghosh","doi":"10.1109/ICSOFTCOMP.2017.8280074","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280074","url":null,"abstract":"The Internet used today can be described as a network of computers, which connecats one user to others around the globe. Most of the usage and application of the “Internet of Computers” involves human intervention. The future of the Internet would be — a world where manual intervention for the objects on the network could be minimized and its functionalities would be automatic and smart. This internet would not only connect computers and smart phones; it would be a network of smart objects, the “Internet of Things”. These “things” would be smart enough to sense, process and decide a corresponding action, Examples include smart appliances (refrigerator, lights, air conditioners), traffic signals, smart body monitors, etc. The individual objects along with the network would collect process and exchange data strategically. This interconnected network along with all the smart objects working together in correspondence with each other form a larger “Cyber Physical System” (like smart cities, smart hospital, etc.). A working CPS would generate tons of data, hence efficient processing and effective use of this data is very crucial. There will be data from everywhere like climate data, social network data, video data, medical data, scientific data, etc. Storing these data for analytics may not always be feasible and analyzing them in real time will also be too difficult. Traditional analysis tools are not well suited to capture the complete essence of this massive data. The volume, velocity and variety is too large for comprehensive analysis, and the range of potential correlations and relationships between disparate data sources are too great for any analyst to test all hypotheses and derive all the value buried in the data. Some algorithms already have good capability of letting computers do the heavy thinking for us in case of smaller data. But, we are striving for more to deal with large volumes of such data in a short time. Therefore, we need to revisit old algorithms from statistics, machine learning, data mining and big data analytics and improvise them to tame such big data. Major innovations in big data analytics are still to take place; but, it is believed that emergence of such novel analytics is to come in near future from various domains. Soft computing tools, nature inspired algorithms, are likely to play a key role in this regard.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127475714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft computing framework for assessment of water quality in distribution network 配电网水质评价的软计算框架
Jyotirmoy Bhardwaj, K. K. Gupta, R. Gupta
Modern techniques are replacing traditional methods of water quality parameter measurement systems. Continuous effective online monitoring with user friendly decision support system is one of the essential challenges of water quality monitoring system. To achieve the goal of development of user friendly decision support system for monitoring of potable water in distribution network, this paper introduces soft computing framework, mainly consist of Python programming framework and fuzzy sets. In so far, we have exploited the properties of NumPy and Matplotlib libraries of Python for user interface and fuzzy sets for decision support system. The proposed decision support system collects and utilizes the data points generated from integrated Multi Sensor Array and process the obtained data set through rule based fuzzy sets. Effective user interface and decision making are essential prerequisite of any decision support system. Therefore, we developed Rule Based Decision Support System (RBDSS) strategy to measure the extent of potability of water in distribution network. Based on extensive research, five water quality parameters has been considered to implement decision support system i.e pH, Dissolved Oxygen (D.O.), Electrical Conductivity (E.C.), Oxygen Reduction Potential (O.R.P) and Temperature. The conducted study to test the feasibility of proposed decision support system testify the plausibility of framework in water quality distribution network.
现代技术正在取代传统的水质参数测量方法。利用用户友好的决策支持系统进行持续有效的在线监测是水质监测系统面临的重要挑战之一。为了实现开发用户友好的配电网饮用水监测决策支持系统的目标,本文引入了软计算框架,主要由Python编程框架和模糊集组成。到目前为止,我们已经利用了Python的NumPy和Matplotlib库的属性用于用户界面,模糊集用于决策支持系统。该决策支持系统收集和利用集成多传感器阵列产生的数据点,并通过基于规则的模糊集对得到的数据集进行处理。有效的用户界面和决策是任何决策支持系统的必要前提。因此,我们开发了基于规则的决策支持系统(RBDSS)策略来测量配网中水的可饮用程度。在广泛研究的基础上,考虑了pH、溶解氧(D.O.)、电导率(E.C.)、氧还原电位(O.R.P)和温度五个水质参数来实现决策支持系统。通过对所提出的决策支持系统的可行性研究,验证了该框架在水质配网中的可行性。
{"title":"Soft computing framework for assessment of water quality in distribution network","authors":"Jyotirmoy Bhardwaj, K. K. Gupta, R. Gupta","doi":"10.1109/ICSOFTCOMP.2017.8280093","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280093","url":null,"abstract":"Modern techniques are replacing traditional methods of water quality parameter measurement systems. Continuous effective online monitoring with user friendly decision support system is one of the essential challenges of water quality monitoring system. To achieve the goal of development of user friendly decision support system for monitoring of potable water in distribution network, this paper introduces soft computing framework, mainly consist of Python programming framework and fuzzy sets. In so far, we have exploited the properties of NumPy and Matplotlib libraries of Python for user interface and fuzzy sets for decision support system. The proposed decision support system collects and utilizes the data points generated from integrated Multi Sensor Array and process the obtained data set through rule based fuzzy sets. Effective user interface and decision making are essential prerequisite of any decision support system. Therefore, we developed Rule Based Decision Support System (RBDSS) strategy to measure the extent of potability of water in distribution network. Based on extensive research, five water quality parameters has been considered to implement decision support system i.e pH, Dissolved Oxygen (D.O.), Electrical Conductivity (E.C.), Oxygen Reduction Potential (O.R.P) and Temperature. The conducted study to test the feasibility of proposed decision support system testify the plausibility of framework in water quality distribution network.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TIER: Table index evaluator and recommender — A proposed model to improve transaction performance in distributed heterogeneous database TIER:表索引评估器和推荐器——一种在分布式异构数据库中提高事务性能的提议模型
Shefali Naik
Use of appropriate indexing improves the performance of transactions in heterogeneous distributed database whereas inappropriate or no indexing deteriorates the same. Properly designed index leads to faster data access which ultimately improves the execution of transactions. Various relational database management systems and third party tools exist which provide suggestion for index management, but up to certain limits. These tools provide index suggestion with limited and simple queries. They do not analyze or suggest index for aggregate queries, sub queries and other complicated queries. The applications which access data from heterogeneous databases using such type queries need an index evaluator and recommender. To develop a good index evaluator and recommender a model is proposed in this paper on the basis of survey and literature review of existing methods. The survey has been conducted from the experienced people of IT industry to find out the feasibility of proposed model. The tool which is going to be developed from this model will be useful to improve the performance of heterogeneous distributed database transactions and will contribute in resolving index Selection Problem.
使用适当的索引可以提高异构分布式数据库中事务的性能,而不适当的索引或没有索引则会降低事务的性能。正确设计索引可以更快地访问数据,从而最终改善事务的执行。各种关系数据库管理系统和第三方工具为索引管理提供了建议,但都有一定的局限性。这些工具为有限和简单的查询提供索引建议。它们不分析或建议聚合查询、子查询和其他复杂查询的索引。使用此类类型查询从异构数据库访问数据的应用程序需要索引评估器和推荐器。本文在对现有方法进行调查和文献综述的基础上,提出了一种新的指标评价和推荐模型。该调查是由IT行业的经验丰富的人进行的,以找出所提出的模型的可行性。基于该模型开发的工具将有助于提高异构分布式数据库事务的性能,并有助于解决索引选择问题。
{"title":"TIER: Table index evaluator and recommender — A proposed model to improve transaction performance in distributed heterogeneous database","authors":"Shefali Naik","doi":"10.1109/ICSOFTCOMP.2017.8280085","DOIUrl":"https://doi.org/10.1109/ICSOFTCOMP.2017.8280085","url":null,"abstract":"Use of appropriate indexing improves the performance of transactions in heterogeneous distributed database whereas inappropriate or no indexing deteriorates the same. Properly designed index leads to faster data access which ultimately improves the execution of transactions. Various relational database management systems and third party tools exist which provide suggestion for index management, but up to certain limits. These tools provide index suggestion with limited and simple queries. They do not analyze or suggest index for aggregate queries, sub queries and other complicated queries. The applications which access data from heterogeneous databases using such type queries need an index evaluator and recommender. To develop a good index evaluator and recommender a model is proposed in this paper on the basis of survey and literature review of existing methods. The survey has been conducted from the experienced people of IT industry to find out the feasibility of proposed model. The tool which is going to be developed from this model will be useful to improve the performance of heterogeneous distributed database transactions and will contribute in resolving index Selection Problem.","PeriodicalId":118765,"journal":{"name":"2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128252456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 International Conference on Soft Computing and its Engineering Applications (icSoftComp)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1