首页 > 最新文献

2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)最新文献

英文 中文
Classification of Product Images in Different Color Models with Customized Kernel for Support Vector Machine 基于支持向量机自定义核的不同颜色模型产品图像分类
S. A. Oyewole, O. Olugbara, Emmanuel Adetiba, T. Nepal
Support Vector Machine (SVM) is widely recognized as a potent data mining technique for solving supervised learning problems. The technique has practical applications in many domains such as e-commerce product classification. However, data sets of large sizes in this application domain often present a negative repercussion for SVM coverage because its training complexity is highly dependent on input size. Moreover, a single kernel may not adequately produce an optimal division between product classes, thereby inhibiting its performance. The literature recommends using multiple kernels to achieve flexibility in the applications of SVM. In addition, color features of product images have been found to improve classification performance of a learning technique, but choosing the right color model is particularly challenging because different color models have varying properties. In this paper, we propose color image classification framework that integrates linear and radial basis function (LaRBF) kernels for SVM. Experiments were performed in five different color models to validate the performance of SVM based LaRBF in classifying 100 classes of e-commerce product images obtained from the PI 100 Microsoft corpus. Classification accuracy of 83.5% was realized with the LaRBF in RGB color model, which is an improvement over an existing method.
支持向量机(SVM)被广泛认为是解决监督学习问题的一种有效的数据挖掘技术。该技术在电子商务产品分类等领域具有实际应用价值。然而,在该应用领域中,由于其训练复杂度高度依赖于输入大小,大规模的数据集往往会对支持向量机的覆盖率产生负面影响。此外,单个内核可能无法充分地在产品类别之间产生最佳划分,从而抑制了其性能。文献建议使用多核来实现支持向量机应用的灵活性。此外,已经发现产品图像的颜色特征可以提高学习技术的分类性能,但是选择正确的颜色模型特别具有挑战性,因为不同的颜色模型具有不同的属性。本文提出了一种基于线性和径向基函数(LaRBF)核的支持向量机彩色图像分类框架。在五种不同的颜色模型下进行实验,验证基于SVM的LaRBF对100类电子商务产品图像进行分类的性能。LaRBF在RGB颜色模型下实现了83.5%的分类准确率,是对现有方法的改进。
{"title":"Classification of Product Images in Different Color Models with Customized Kernel for Support Vector Machine","authors":"S. A. Oyewole, O. Olugbara, Emmanuel Adetiba, T. Nepal","doi":"10.1109/AIMS.2015.33","DOIUrl":"https://doi.org/10.1109/AIMS.2015.33","url":null,"abstract":"Support Vector Machine (SVM) is widely recognized as a potent data mining technique for solving supervised learning problems. The technique has practical applications in many domains such as e-commerce product classification. However, data sets of large sizes in this application domain often present a negative repercussion for SVM coverage because its training complexity is highly dependent on input size. Moreover, a single kernel may not adequately produce an optimal division between product classes, thereby inhibiting its performance. The literature recommends using multiple kernels to achieve flexibility in the applications of SVM. In addition, color features of product images have been found to improve classification performance of a learning technique, but choosing the right color model is particularly challenging because different color models have varying properties. In this paper, we propose color image classification framework that integrates linear and radial basis function (LaRBF) kernels for SVM. Experiments were performed in five different color models to validate the performance of SVM based LaRBF in classifying 100 classes of e-commerce product images obtained from the PI 100 Microsoft corpus. Classification accuracy of 83.5% was realized with the LaRBF in RGB color model, which is an improvement over an existing method.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121347789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Tamper Detection in Speech Based Access Control Systems Using Watermarking 基于水印的语音访问控制系统中的篡改检测
B. Garlapati, S. Chalamala, K. Kakkirala
General voice based access control systems are based on voice biometrics. This process enables an unauthorized access by recording the voice of the authorized person. So there is a requirement to prevent unauthorized access through recording speech. Other than voice biometrics, here we have two challenges. (i) To extract the authentication information. (ii) To find the unauthorized source. The speech goes through DA-AD-DA conversion, while it is recorded and used for access control. The watermarking method which will use for this purpose must be robust to DA-AD conversion attack, which is usually involved in recordings. In this work, we propose a method based on casting Log Co-ordinate Mapping (LCM), in which embedding two watermark segments in two different frequency regions, one for authentication information purpose and other for finding unauthorized source. The LCM method has approving performance against DA-AD conversion attacks [1]. The modifications made for this does not impact the perceptible auditory quality and the embedding capacity improved by selecting the appropriate frequency regions in the log scale. Our results show that our method robustly extracts the source identification information while detecting the malicious source if the audio is being recorded and played back by unauthorized source.
一般的基于语音的访问控制系统都是基于语音生物识别技术。此过程通过记录授权人员的声音来允许未经授权的访问。因此需要防止通过录音进行未经授权的访问。除了声音生物识别,我们还有两个挑战。(i)提取认证信息。(ii)查找未经授权的来源。语音经过DA-AD-DA转换,录音后用于访问控制。用于此目的的水印方法必须对录音中通常涉及的DA-AD转换攻击具有鲁棒性。在这项工作中,我们提出了一种基于投影对数坐标映射(LCM)的方法,该方法在两个不同的频率区域嵌入两个水印片段,一个用于身份验证信息,另一个用于查找未经授权的源。LCM方法对DA-AD转换攻击具有良好的性能[1]。为此所做的修改不影响可感知的听觉质量,并且通过在对数尺度中选择适当的频率区域提高了嵌入容量。结果表明,该方法在检测未经授权录制和播放音频的恶意源的同时,能够鲁棒地提取源识别信息。
{"title":"Tamper Detection in Speech Based Access Control Systems Using Watermarking","authors":"B. Garlapati, S. Chalamala, K. Kakkirala","doi":"10.1109/AIMS.2015.59","DOIUrl":"https://doi.org/10.1109/AIMS.2015.59","url":null,"abstract":"General voice based access control systems are based on voice biometrics. This process enables an unauthorized access by recording the voice of the authorized person. So there is a requirement to prevent unauthorized access through recording speech. Other than voice biometrics, here we have two challenges. (i) To extract the authentication information. (ii) To find the unauthorized source. The speech goes through DA-AD-DA conversion, while it is recorded and used for access control. The watermarking method which will use for this purpose must be robust to DA-AD conversion attack, which is usually involved in recordings. In this work, we propose a method based on casting Log Co-ordinate Mapping (LCM), in which embedding two watermark segments in two different frequency regions, one for authentication information purpose and other for finding unauthorized source. The LCM method has approving performance against DA-AD conversion attacks [1]. The modifications made for this does not impact the perceptible auditory quality and the embedding capacity improved by selecting the appropriate frequency regions in the log scale. Our results show that our method robustly extracts the source identification information while detecting the malicious source if the audio is being recorded and played back by unauthorized source.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114110527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pattern Matching Performance Comparisons as Big Data Analysis Recommendations for Hepatitis C Virus (HCV) Sequence DNA 模式匹配性能比较作为丙型肝炎病毒(HCV)序列DNA的大数据分析建议
Berlian Al Kindhi, T. A. Sardjono
A data bank can provide very useful information while mined properly.[27] In order to be optimally extracted, data mining can be done by observing capacity and characteristics of the data; so it can generates Knowledge Discovery in Databases as expected. For instance in Gene Bank, every single record of DNA, there are at least ten thousand sequences recorded. If the data is more than a hundred records, it will be a big sequence of data to be processed. Hepatitis C Virus (HCV) is a liver disease which can infect humans through blood. HCV infection can be asymptomatic, or it can be hepatitis acute, chronic, furthermore cirrhosis. Hepatitis C is generally does not show symptoms in the early stages. About 75 percent people with hepatitis C did not realize that they had infected until liver damage years later. Therefore needed a sequences DNA Mining is needed to analyse the DNA history whether it is infected by HCV or not. This study compares several methods of string matching to discover which methods have the best performance in processing DNA mining. In addition, this study also analyzed DNA HCV genetic mutations trend as a Knowledege Discovery in Database in DNA mining.
如果挖掘得当,数据库可以提供非常有用的信息为了最优提取数据,可以通过观察数据的容量和特征来进行数据挖掘;因此,它可以按照预期在数据库中生成知识发现。例如,在基因库中,每一个DNA记录,至少有一万个序列记录。如果数据超过一百条记录,那么要处理的数据将是一个大序列。丙型肝炎病毒(HCV)是一种可以通过血液感染人类的肝脏疾病。HCV感染可以是无症状的,也可以是急性、慢性肝炎,甚至肝硬化。丙型肝炎在早期阶段一般不表现出症状。大约75%的丙型肝炎患者直到几年后肝脏受损才意识到自己已经感染了丙型肝炎。因此,无论是否感染HCV,都需要进行序列DNA挖掘来分析DNA历史。本研究比较了几种字符串匹配方法,以发现哪种方法在处理DNA挖掘中具有最佳性能。此外,本研究还分析了DNA HCV基因突变趋势,作为DNA挖掘数据库中的知识发现。
{"title":"Pattern Matching Performance Comparisons as Big Data Analysis Recommendations for Hepatitis C Virus (HCV) Sequence DNA","authors":"Berlian Al Kindhi, T. A. Sardjono","doi":"10.1109/AIMS.2015.27","DOIUrl":"https://doi.org/10.1109/AIMS.2015.27","url":null,"abstract":"A data bank can provide very useful information while mined properly.[27] In order to be optimally extracted, data mining can be done by observing capacity and characteristics of the data; so it can generates Knowledge Discovery in Databases as expected. For instance in Gene Bank, every single record of DNA, there are at least ten thousand sequences recorded. If the data is more than a hundred records, it will be a big sequence of data to be processed. Hepatitis C Virus (HCV) is a liver disease which can infect humans through blood. HCV infection can be asymptomatic, or it can be hepatitis acute, chronic, furthermore cirrhosis. Hepatitis C is generally does not show symptoms in the early stages. About 75 percent people with hepatitis C did not realize that they had infected until liver damage years later. Therefore needed a sequences DNA Mining is needed to analyse the DNA history whether it is infected by HCV or not. This study compares several methods of string matching to discover which methods have the best performance in processing DNA mining. In addition, this study also analyzed DNA HCV genetic mutations trend as a Knowledege Discovery in Database in DNA mining.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Computational Study of Risk-Averse Parameter Effects on a 2-Stage Supply Chain Coordination under Refund-Dependent Demand 需求依赖条件下两阶段供应链协调风险规避参数效应的计算研究
N. T. Loi, T. Duc, J. Buddhakulsomsiri
This paper examines a 2-stage supply chain that features a buyback contract between manufacturer and retailer under uncertain demand and consumer returns policy with partial refund amount. The supply chain is optimized using the utility of profit that includes the mean and variance of profit. The optimal values of buyback price, wholesale price, and retailer's order quantity are determined for the coordination situation of the decentralized supply chain when its members are risk averse. Through a computational study, the impacts of the supply chain members' risk attitudes and refund amount on the optimal decisions are investigated for the uncoordinated supply chain where one of the agents makes off-optimal decision.
本文研究了需求不确定条件下制造商和零售商之间的回购契约和消费者部分退款政策下的两阶段供应链。利用利润效用对供应链进行优化,利润效用包括利润均值和方差。在分散供应链的协调情况下,当供应链成员风险厌恶时,确定了回购价格、批发价格和零售商订单数量的最优值。通过计算研究,研究了非协调供应链中一个代理做出非最优决策时,供应链成员的风险态度和退款金额对最优决策的影响。
{"title":"A Computational Study of Risk-Averse Parameter Effects on a 2-Stage Supply Chain Coordination under Refund-Dependent Demand","authors":"N. T. Loi, T. Duc, J. Buddhakulsomsiri","doi":"10.1109/AIMS.2015.51","DOIUrl":"https://doi.org/10.1109/AIMS.2015.51","url":null,"abstract":"This paper examines a 2-stage supply chain that features a buyback contract between manufacturer and retailer under uncertain demand and consumer returns policy with partial refund amount. The supply chain is optimized using the utility of profit that includes the mean and variance of profit. The optimal values of buyback price, wholesale price, and retailer's order quantity are determined for the coordination situation of the decentralized supply chain when its members are risk averse. Through a computational study, the impacts of the supply chain members' risk attitudes and refund amount on the optimal decisions are investigated for the uncoordinated supply chain where one of the agents makes off-optimal decision.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125148776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Enhancement by Adaptive Resource Allocation in WiMAX Networks WiMAX网络中自适应资源分配的性能增强
H. Alyasiri, A. K. Al-Samarrie, Aseel H. Al-Nakkash
The powerful of WiMAX technique for providing the Subscribers (SSs) with a flexible interface to share resources is based on an Orthogonal Frequency Division Multiple Access (OFDMA). Conventional access schemes base on fixed parameters for all SSs in the networks without considering the effects of various channel characteristics among them. This motivates the authors to propose a new Adaptive Resource Allocation Scheme (ARAS) to construct the OFDMA based frame. The proposed ARAS integrates two approaches, the adaptive Cyclic Prefix (CP) length and dynamic frequency allocation. These two approaches are implemented, analyzed and evaluated based on the simulation of WiMAX frames in a dynamic manner resulting in a new frame pattern within each down link connection. The resulting frame shows the contribution of the time domain approach which represented by adaptive CP in mitigation ISI and ICI which improves the network performance in term of BER, where enhancement of 7 dB in SNR was gained at BER equals to 10-3 compared with the network which adopts fixed guard interval equals to 1/8. From the other side, the frequency domain approach, which represented by the dynamic frequency allocation proves its effectiveness in supporting the QoS requirements in term of data rate.
WiMAX技术基于正交频分多址(OFDMA)技术,为用户提供灵活的资源共享接口。传统的接入方案对网络中的所有ss都是基于固定的参数,而不考虑它们之间各种信道特性的影响。这促使作者提出了一种新的自适应资源分配方案(ARAS)来构建基于OFDMA的帧。提出的ARAS集成了自适应循环前缀(CP)长度和动态频率分配两种方法。基于WiMAX帧的动态模拟,对这两种方法进行了实现、分析和评估,从而在每个下行链路连接中产生新的帧模式。结果显示了以自适应CP为代表的时域方法在抑制ISI和ICI方面的贡献,从误码率方面提高了网络性能,在误码率为10-3时,与采用固定保护间隔为1/8的网络相比,信噪比提高了7 dB。另一方面,以动态频率分配为代表的频域方法在支持数据速率方面的QoS要求方面证明了其有效性。
{"title":"Performance Enhancement by Adaptive Resource Allocation in WiMAX Networks","authors":"H. Alyasiri, A. K. Al-Samarrie, Aseel H. Al-Nakkash","doi":"10.1109/AIMS.2015.75","DOIUrl":"https://doi.org/10.1109/AIMS.2015.75","url":null,"abstract":"The powerful of WiMAX technique for providing the Subscribers (SSs) with a flexible interface to share resources is based on an Orthogonal Frequency Division Multiple Access (OFDMA). Conventional access schemes base on fixed parameters for all SSs in the networks without considering the effects of various channel characteristics among them. This motivates the authors to propose a new Adaptive Resource Allocation Scheme (ARAS) to construct the OFDMA based frame. The proposed ARAS integrates two approaches, the adaptive Cyclic Prefix (CP) length and dynamic frequency allocation. These two approaches are implemented, analyzed and evaluated based on the simulation of WiMAX frames in a dynamic manner resulting in a new frame pattern within each down link connection. The resulting frame shows the contribution of the time domain approach which represented by adaptive CP in mitigation ISI and ICI which improves the network performance in term of BER, where enhancement of 7 dB in SNR was gained at BER equals to 10-3 compared with the network which adopts fixed guard interval equals to 1/8. From the other side, the frequency domain approach, which represented by the dynamic frequency allocation proves its effectiveness in supporting the QoS requirements in term of data rate.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122458327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Machine Learning-Based Approach to Estimate the CPU-Burst Time for Processes in the Computational Grids 基于机器学习的计算网格中进程cpu突发时间估计方法
T. Helmy, Sadam Al-Azani, Omar Bin-Obaidellah
The implementation of CPU-Scheduling algorithms such as Shortest-Job-First (SJF) and Shortest Remaining Time First (SRTF) is relying on knowing the length of the CPU-bursts for processes in the ready queue. There are several methods to predict the length of the CPU-bursts, such as exponential averaging method, however these methods may not give an accurate or reliable predicted values. In this paper, we will propose a Machine Learning (ML) based approach to estimate the length of the CPU-bursts for processes. The proposed approach aims to select the most significant attributes of the process using feature selection techniques and then predicts the CPU-burst for the process in the grid. ML techniques such as Support Vector Machine (SVM) and K-Nearest Neighbors (K-NN), Artificial Neural Networks (ANN) and Decision Trees (DT) are used to test and evaluate the proposed approach using a grid workload dataset named "GWA-T-4 Auver Grid". The experimental results show that there is a strength linear relationship between the process attributes and the burst CPU time. Moreover, K-NN performs better in nearly all approaches in terms of CC and RAE. Furthermore, applying attribute selection techniques improves the performance in terms of space, time and estimation.
诸如最短作业优先(SJF)和最短剩余时间优先(SRTF)之类的cpu调度算法的实现依赖于知道就绪队列中进程的cpu突发的长度。有几种方法可以预测cpu爆发的长度,例如指数平均法,但是这些方法可能无法给出准确或可靠的预测值。在本文中,我们将提出一种基于机器学习(ML)的方法来估计进程的cpu爆发的长度。该方法旨在利用特征选择技术选择进程最重要的属性,然后在网格中预测进程的cpu突发。ML技术,如支持向量机(SVM)和k -近邻(K-NN),人工神经网络(ANN)和决策树(DT)被用来测试和评估使用名为“GWA-T-4 Auver grid”的网格工作负载数据集提出的方法。实验结果表明,进程属性与突发CPU时间之间存在较强的线性关系。此外,在CC和RAE方面,K-NN在几乎所有方法中都表现得更好。此外,应用属性选择技术在空间、时间和估计方面提高了性能。
{"title":"A Machine Learning-Based Approach to Estimate the CPU-Burst Time for Processes in the Computational Grids","authors":"T. Helmy, Sadam Al-Azani, Omar Bin-Obaidellah","doi":"10.1109/AIMS.2015.11","DOIUrl":"https://doi.org/10.1109/AIMS.2015.11","url":null,"abstract":"The implementation of CPU-Scheduling algorithms such as Shortest-Job-First (SJF) and Shortest Remaining Time First (SRTF) is relying on knowing the length of the CPU-bursts for processes in the ready queue. There are several methods to predict the length of the CPU-bursts, such as exponential averaging method, however these methods may not give an accurate or reliable predicted values. In this paper, we will propose a Machine Learning (ML) based approach to estimate the length of the CPU-bursts for processes. The proposed approach aims to select the most significant attributes of the process using feature selection techniques and then predicts the CPU-burst for the process in the grid. ML techniques such as Support Vector Machine (SVM) and K-Nearest Neighbors (K-NN), Artificial Neural Networks (ANN) and Decision Trees (DT) are used to test and evaluate the proposed approach using a grid workload dataset named \"GWA-T-4 Auver Grid\". The experimental results show that there is a strength linear relationship between the process attributes and the burst CPU time. Moreover, K-NN performs better in nearly all approaches in terms of CC and RAE. Furthermore, applying attribute selection techniques improves the performance in terms of space, time and estimation.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Improving Network Performance with Rate Adaptation Algorithms for Vehicular Simulations 用速率自适应算法改进车辆仿真网络性能
K. Nwizege, Agbeb N. Stephen, Shedrack Mmeah, Michael MacMammah, I. P. Gibson
Below the Media Access Control (MAC) layer is the Physical (PHY) layer which deals with the actual transmission of the bits received from the MAC layer above into electromagnetic signals. This layer is optimized to implore power management in wireless networks. Power management is a crucial issue in wireless and mobile networks. In this paper, we propose an Adaptive Context-Aware Rate Selection (ACARS) algorithm to handle the issue of power consumption in wireless networks. This algorithm is implemented by optimizing the PHY layer to transmit efficiently as the number of nodes changes and we estimate the Signal-to-Noise Ratio (SNR) to the PHY layer. Results show that by using the appropriate power management technique, ACARS is reliable and efficient for power consumption in wireless networks which is a high demand for vehicular networks.
在媒体访问控制层(MAC)下面是物理层(PHY),物理层处理从上面的MAC层接收到的比特实际传输成电磁信号。该层经过优化,以实现无线网络中的电源管理。电源管理是无线和移动网络中的一个关键问题。在本文中,我们提出一种自适应情境感知速率选择(ACARS)算法来处理无线网络中的功耗问题。该算法通过优化物理层来实现,使其随着节点数量的变化而有效传输,并估计物理层的信噪比(SNR)。结果表明,通过采用适当的电源管理技术,ACARS在车载网络对无线网络功耗要求较高的情况下是可靠和高效的。
{"title":"Improving Network Performance with Rate Adaptation Algorithms for Vehicular Simulations","authors":"K. Nwizege, Agbeb N. Stephen, Shedrack Mmeah, Michael MacMammah, I. P. Gibson","doi":"10.1109/AIMS.2015.74","DOIUrl":"https://doi.org/10.1109/AIMS.2015.74","url":null,"abstract":"Below the Media Access Control (MAC) layer is the Physical (PHY) layer which deals with the actual transmission of the bits received from the MAC layer above into electromagnetic signals. This layer is optimized to implore power management in wireless networks. Power management is a crucial issue in wireless and mobile networks. In this paper, we propose an Adaptive Context-Aware Rate Selection (ACARS) algorithm to handle the issue of power consumption in wireless networks. This algorithm is implemented by optimizing the PHY layer to transmit efficiently as the number of nodes changes and we estimate the Signal-to-Noise Ratio (SNR) to the PHY layer. Results show that by using the appropriate power management technique, ACARS is reliable and efficient for power consumption in wireless networks which is a high demand for vehicular networks.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protein Map of Control Mice Exposed to Context Fear Using a Novel Implementation of Granger Causality 使用一种新的格兰杰因果关系实现暴露于情境恐惧的对照小鼠的蛋白质图谱
M. Furqan, M. Y. Siyal
Temporal information plays a substantial role in accessing Granger Causality. However, new technology limits the availability of data by simultaneously analyzing high dimensional data. Recent studies suggest that this problem can be resolved by reusing the data after reversing the timestamp. Based on this idea, we are proposing a new method called Forward Backward Pair wise Granger Causality that can deal with high dimensional data and can extract more causal data. We have used simulated data to compare our proposed method with the existing method and later, we have applied the proposed approach to control mice data to map the protein map involved in studying the fear.
时间信息在格兰杰因果关系的获取中起着重要作用。然而,新技术通过同时分析高维数据限制了数据的可用性。最近的研究表明,这个问题可以通过反转时间戳后重用数据来解决。基于这一思想,我们提出了一种新的方法,称为正向向后对格兰杰因果关系,它可以处理高维数据,并可以提取更多的因果数据。我们使用模拟数据将我们提出的方法与现有方法进行比较,随后,我们将提出的方法应用于控制小鼠数据来绘制研究恐惧所涉及的蛋白质图谱。
{"title":"Protein Map of Control Mice Exposed to Context Fear Using a Novel Implementation of Granger Causality","authors":"M. Furqan, M. Y. Siyal","doi":"10.1109/AIMS.2015.26","DOIUrl":"https://doi.org/10.1109/AIMS.2015.26","url":null,"abstract":"Temporal information plays a substantial role in accessing Granger Causality. However, new technology limits the availability of data by simultaneously analyzing high dimensional data. Recent studies suggest that this problem can be resolved by reusing the data after reversing the timestamp. Based on this idea, we are proposing a new method called Forward Backward Pair wise Granger Causality that can deal with high dimensional data and can extract more causal data. We have used simulated data to compare our proposed method with the existing method and later, we have applied the proposed approach to control mice data to map the protein map involved in studying the fear.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114779073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Idiotypic Solution Sieve for Selecting the Best Performing Solutions in Real-World Distributed Intelligence 现实世界分布式智能中选择最佳解决方案的独特解筛
S. S. Jha, S. B. Nair
Jerne's Idiotypic Network theory features autonomous network formation, adaptation, learning and self-stabilization, all of which find extensive applications in computational realm. Researchers have used this model in a myriad of applications, however, the use of this model in real networked environments has hardly been addressed. This paper describes an Idiotypic Sieve to filter out the optimal solutions from a set of available solutions for a set of heterogeneous problems that could occur asynchronously or concurrently across a real network. The Idiotypic Sieve described herein, is conceived by emulating an Idiotypic network wherein antibodies (solutions) within a real physical network asynchronously interact with one another and also with the antigens (problems) in a distributed and decentralized manner and stimulate and suppress one another consequently changing their respective global populations across the network. The antibodies (solutions) are provided the much required mobility across the network by a set of mobile agents that autonomously patrol and migrate to nodes that are invaded by the antigens (problems). Emulation results carried out on a real network portrayed in this paper, show the effectiveness of the Idiotypic Sieve in generating and controlling the populations of both optimal and generic solutions to the heterogeneous set of problems.
Jerne的独特型网络理论具有自主网络形成、自适应、学习和自稳定等特点,在计算领域有着广泛的应用。研究人员已经在无数的应用中使用了这个模型,然而,这个模型在实际网络环境中的使用几乎没有得到解决。本文描述了一个独特型筛,用于从一组可用的解决方案中过滤出一组异构问题的最优解决方案,这些问题可能在实际网络中异步或并发地发生。本文描述的独特型筛是通过模拟一个独特型网络来构想的,其中真实物理网络中的抗体(解决方案)彼此之间以及与抗原(问题)以分布式和分散的方式异步相互作用,并相互刺激和抑制,从而改变它们各自在网络中的全球种群。抗体(解决方案)通过一组移动代理在网络中提供了非常需要的移动性,这些移动代理自主巡逻并迁移到被抗原(问题)入侵的节点。在实际网络上进行的仿真结果表明,独特型筛在生成和控制异构问题集的最优解和一般解的种群方面是有效的。
{"title":"An Idiotypic Solution Sieve for Selecting the Best Performing Solutions in Real-World Distributed Intelligence","authors":"S. S. Jha, S. B. Nair","doi":"10.1109/AIMS.2015.22","DOIUrl":"https://doi.org/10.1109/AIMS.2015.22","url":null,"abstract":"Jerne's Idiotypic Network theory features autonomous network formation, adaptation, learning and self-stabilization, all of which find extensive applications in computational realm. Researchers have used this model in a myriad of applications, however, the use of this model in real networked environments has hardly been addressed. This paper describes an Idiotypic Sieve to filter out the optimal solutions from a set of available solutions for a set of heterogeneous problems that could occur asynchronously or concurrently across a real network. The Idiotypic Sieve described herein, is conceived by emulating an Idiotypic network wherein antibodies (solutions) within a real physical network asynchronously interact with one another and also with the antigens (problems) in a distributed and decentralized manner and stimulate and suppress one another consequently changing their respective global populations across the network. The antibodies (solutions) are provided the much required mobility across the network by a set of mobile agents that autonomously patrol and migrate to nodes that are invaded by the antigens (problems). Emulation results carried out on a real network portrayed in this paper, show the effectiveness of the Idiotypic Sieve in generating and controlling the populations of both optimal and generic solutions to the heterogeneous set of problems.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"151 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gene Network Inference Using Forward Backward Pairwise Granger Causality 利用正向向后两两格兰杰因果关系进行基因网络推断
M. Furqan, M. Y. Siyal
Discovery of temporal dependence is the basic idea for evaluating gene networks using Granger causality. However, with the advancement of technology, now we can analyze multiple genes simultaneously that result in high dimensional data. Recent studies suggest that more causal information can be retrieved if we reverse the time stamp of time series data along with standard time series data. Based on these findings, we are proposing a new method called Forward Backward Pair wise Granger Causality. The results how that our method can handle high dimensional data and can extract more causal information compared to the standard ordinary least squares method. We have performed a comparison of proposed and existing method using simulated data and then used the proposed method on real Hela cell data and mapped the 19 genes that are commonly present in cancer.
发现时间依赖性是利用格兰杰因果关系评价基因网络的基本思想。然而,随着技术的进步,现在我们可以同时分析多个基因,从而获得高维数据。最近的研究表明,如果我们将时间序列数据的时间戳与标准时间序列数据一起反向,可以检索到更多的因果信息。基于这些发现,我们提出了一种新的方法,称为正向向后配对格兰杰因果关系。结果表明,与标准的普通最小二乘法相比,该方法可以处理高维数据,并且可以提取更多的因果信息。我们使用模拟数据对提出的方法和现有的方法进行了比较,然后将提出的方法用于真实的海拉细胞数据,并绘制了19个常见的癌症基因。
{"title":"Gene Network Inference Using Forward Backward Pairwise Granger Causality","authors":"M. Furqan, M. Y. Siyal","doi":"10.1109/AIMS.2015.58","DOIUrl":"https://doi.org/10.1109/AIMS.2015.58","url":null,"abstract":"Discovery of temporal dependence is the basic idea for evaluating gene networks using Granger causality. However, with the advancement of technology, now we can analyze multiple genes simultaneously that result in high dimensional data. Recent studies suggest that more causal information can be retrieved if we reverse the time stamp of time series data along with standard time series data. Based on these findings, we are proposing a new method called Forward Backward Pair wise Granger Causality. The results how that our method can handle high dimensional data and can extract more causal information compared to the standard ordinary least squares method. We have performed a comparison of proposed and existing method using simulated data and then used the proposed method on real Hela cell data and mapped the 19 genes that are commonly present in cancer.","PeriodicalId":121874,"journal":{"name":"2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1