首页 > 最新文献

Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
Color lock: 16 bit digital color based security system 彩色锁:16位数字彩色安全系统
M. Chowdhury, M. K. Jahan, Silvia Shukla Karmokar, S. Mahmud
In this research paper we have introduced a new security system where user will set the password based on any colors and the system will be unlocked only with colors. Each color is a combination of Red, Green & Blue color. Any given color by the user consists of 16 bits Red, 16 bits green & 16 bit Blue color. So the total depth of any given color is 48 bits. The user can choose any random 4 to 6 colors as his/her password. Then the user will provide these passwords through RGB LEDs to the system. If the password matches, the system will be unlocked. For wrong password, alarm will be turned on. It's quite a bit impossible for the hacker/fraud to hack/break the system password as the value of any color lies between 0 to 2̂∧48(16 bits Red +16 bits Green+16 bits Blue). This security system can be used to prevent any unauthorized access to start/stop a computer or any machine.
在这篇研究论文中,我们介绍了一种新的安全系统,用户可以根据任何颜色设置密码,系统将只有颜色解锁。每种颜色都是红色,绿色和蓝色的组合。任何给定的颜色由16位红色、16位绿色和16位蓝色组成。所以任何给定颜色的总深度是48位。用户可以随机选择4到6种颜色作为密码。然后用户将通过RGB led向系统提供这些密码。如果密码匹配,系统将被解锁。如果密码输入错误,报警将会开启。由于任何颜色的值都在0到2∧48(16位红+16位绿+16位蓝)之间,黑客/骗子几乎不可能破解/破解系统密码。此安全系统可用于防止任何未经授权的访问启动/停止计算机或任何机器。
{"title":"Color lock: 16 bit digital color based security system","authors":"M. Chowdhury, M. K. Jahan, Silvia Shukla Karmokar, S. Mahmud","doi":"10.1109/ICCCNT.2014.6963113","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963113","url":null,"abstract":"In this research paper we have introduced a new security system where user will set the password based on any colors and the system will be unlocked only with colors. Each color is a combination of Red, Green & Blue color. Any given color by the user consists of 16 bits Red, 16 bits green & 16 bit Blue color. So the total depth of any given color is 48 bits. The user can choose any random 4 to 6 colors as his/her password. Then the user will provide these passwords through RGB LEDs to the system. If the password matches, the system will be unlocked. For wrong password, alarm will be turned on. It's quite a bit impossible for the hacker/fraud to hack/break the system password as the value of any color lies between 0 to 2̂∧48(16 bits Red +16 bits Green+16 bits Blue). This security system can be used to prevent any unauthorized access to start/stop a computer or any machine.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The extension of the rough set theory based on parallel equivalence operator in pansystems 泛系统中基于平行等价算子的粗糙集理论的推广
He Lin, Mengyao Nie, LingYue Li
The concept of parallel equivalence operator arises from the equivalence operator and the pansystems series-parallel model, by which a family of arbitrary binary relations can be converted into equivalence relations. This paper presents the pansystems rough set based on parallel equivalence operator, which provides a new thought to process rough sets with non-equivalence relations(incomplete, uncertain, or vague information), as well as makes the rough set theory more practical in applications.
平行等价算子的概念是由等价算子和泛系统串联-并行模型产生的,通过该模型,可以将一组任意的二元关系转化为等价关系。本文提出了基于并行等价算子的泛系统粗糙集,为处理具有不等价关系(不完全、不确定或模糊信息)的粗糙集提供了一种新的思路,使粗糙集理论在实际应用中更加实用。
{"title":"The extension of the rough set theory based on parallel equivalence operator in pansystems","authors":"He Lin, Mengyao Nie, LingYue Li","doi":"10.1109/ICCCNT.2014.6963103","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963103","url":null,"abstract":"The concept of parallel equivalence operator arises from the equivalence operator and the pansystems series-parallel model, by which a family of arbitrary binary relations can be converted into equivalence relations. This paper presents the pansystems rough set based on parallel equivalence operator, which provides a new thought to process rough sets with non-equivalence relations(incomplete, uncertain, or vague information), as well as makes the rough set theory more practical in applications.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129856260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preserving and anonymity in multi sinks wireless sensor networks with master sink 带主sink的多sink无线传感器网络的隐私保护和匿名性
M. Kazemi, R. Azmi
The wireless network is become larger than past. So in the recent years the wireless with multiple sinks is more useful. The anonymity and privacy in this network is a challenge now. In this paper, we propose a new method for anonymity in multi sink wireless sensor network. In this method we use layer encryption to provide source and event privacy and we use a label switching routing method to provide sink anonymity in each cluster. A master sink that is a powerful base station is used to connect sinks to each other.
无线网络变得比过去更大了。因此,近年来,具有多个接收器的无线网络更加有用。网络中的匿名性和隐私性现在是一个挑战。本文提出了一种新的多sink无线传感器网络匿名算法。在该方法中,我们使用层加密来提供源和事件隐私,并使用标签交换路由方法来提供每个集群的接收器匿名性。主接收器是一个强大的基站,用于将接收器彼此连接起来。
{"title":"Privacy preserving and anonymity in multi sinks wireless sensor networks with master sink","authors":"M. Kazemi, R. Azmi","doi":"10.1109/ICCCNT.2014.6963107","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963107","url":null,"abstract":"The wireless network is become larger than past. So in the recent years the wireless with multiple sinks is more useful. The anonymity and privacy in this network is a challenge now. In this paper, we propose a new method for anonymity in multi sink wireless sensor network. In this method we use layer encryption to provide source and event privacy and we use a label switching routing method to provide sink anonymity in each cluster. A master sink that is a powerful base station is used to connect sinks to each other.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122009152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transformation between BPMN and BPEL based on graph grammar 基于图语法的BPMN和BPEL之间的转换
Zhan Shi, Xiaoqin Zeng, Song Huang, Hui Li, Bing Hu, Xiaoyu Lei, Yi Wang
As a graphical language, the Business Process Modelling Notation (BPMN) plays an important role in enterprise information systems. BPMN is a standard notation for capturing business processes, while Business Process Execution Language (BPEL) provides a standard executable language for specifying business process compositions and interactions. This paper proposes a new method based on graph grammars to map from BPMN to BPEL codes. In the first place, the existing Edge-based Graph Grammar (EGG) is introduced, which is a context-sensitive grammar and a new formal method for simply specifying graph grammars. Secondly, some aspects of EGGs are extended to conveniently map from BPMN to BPEL. Finally, new mapping steps and a parsing algorithm are put forward, which achieve a goal of this paper.
业务流程建模符号(BPMN)作为一种图形化语言,在企业信息系统中扮演着重要的角色。BPMN是捕获业务流程的标准符号,而业务流程执行语言(BPEL)提供了用于指定业务流程组合和交互的标准可执行语言。本文提出了一种基于图语法的BPMN到BPEL代码映射的新方法。首先介绍了现有的基于边缘的图语法(EGG), EGG是一种上下文敏感的语法,是一种简单指定图语法的新的形式化方法。其次,对EGGs的某些方面进行了扩展,以便方便地从BPMN映射到BPEL。最后,提出了新的映射步骤和解析算法,实现了本文的目标。
{"title":"Transformation between BPMN and BPEL based on graph grammar","authors":"Zhan Shi, Xiaoqin Zeng, Song Huang, Hui Li, Bing Hu, Xiaoyu Lei, Yi Wang","doi":"10.1109/ICCCNT.2014.6963105","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963105","url":null,"abstract":"As a graphical language, the Business Process Modelling Notation (BPMN) plays an important role in enterprise information systems. BPMN is a standard notation for capturing business processes, while Business Process Execution Language (BPEL) provides a standard executable language for specifying business process compositions and interactions. This paper proposes a new method based on graph grammars to map from BPMN to BPEL codes. In the first place, the existing Edge-based Graph Grammar (EGG) is introduced, which is a context-sensitive grammar and a new formal method for simply specifying graph grammars. Secondly, some aspects of EGGs are extended to conveniently map from BPMN to BPEL. Finally, new mapping steps and a parsing algorithm are put forward, which achieve a goal of this paper.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122420158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SDWLAN: A flexible architecture of enterprise WLAN for client-unaware fast AP handoff SDWLAN:一种灵活的企业WLAN架构,用于实现客户端不知情的快速AP切换
Dong Zhao, M. Zhu, Ming Xu
Currently, enterprise WLAN is facing rapid growth of user scale and traffic load, as well as constantly emerging new features. However, traditional enterprise WLAN architecture suffers from poor flexibility and the lack of coordination between wireless access points (APs) and wired backbone. Inspired by the emerging idea of Software-Defined Networking (SDN), we proposed SDWLAN, an alternative architecture for enterprise WLAN. The salient features of SDWLAN are twofold. First, most of 802.11 AP functions are decoupled from scattered devices and centralized in a controller, leaving some simplified devices (i.e., wireless access switches, or WASes) manipulated by the controller through extended OpenFlow protocol. Second, the control of APs and wired backbone are consolidated to provide a unified network control platform. By reorganizing 802.11 AP's functional modules, SDWLAN can achieve remarkable flexibility. Benefiting from the extended OpenFlow protocol and the unified control platform, we proposed a client-unaware fast AP handoff mechanism in SDWLAN. Simulation results demonstrated that AP handoff operation in SDWLAN leads to negligible throughput fluctuation of on-going connection compared to traditional architecture with 802.11 standard handoff mechanism. Furthermore, SDWLAN requires no modification to existing 802.11 clients, which make our solution practical.
当前,企业WLAN面临着用户规模和流量负荷的快速增长,以及不断涌现的新特性。然而,传统的企业WLAN架构存在灵活性差、无线接入点(ap)与有线骨干网之间缺乏协调等问题。受到新兴的软件定义网络(SDN)思想的启发,我们提出了SDWLAN,这是企业WLAN的另一种架构。SDWLAN的显著特点有两个方面。首先,大多数802.11 AP功能与分散的设备解耦并集中在控制器中,留下一些简化的设备(即无线接入交换机,或wase)由控制器通过扩展的OpenFlow协议进行操作。二是对接入点和有线骨干网的控制进行整合,提供统一的网络控制平台。通过对802.11 AP的功能模块进行重组,SDWLAN实现了极大的灵活性。利用扩展的OpenFlow协议和统一的控制平台,我们在SDWLAN中提出了一种不受客户端影响的快速AP切换机制。仿真结果表明,与采用802.11标准切换机制的传统架构相比,SDWLAN中的AP切换操作对正在进行的连接的吞吐量波动可以忽略。此外,SDWLAN不需要修改现有的802.11客户机,这使我们的解决方案具有实用性。
{"title":"SDWLAN: A flexible architecture of enterprise WLAN for client-unaware fast AP handoff","authors":"Dong Zhao, M. Zhu, Ming Xu","doi":"10.1109/ICCCNT.2014.6963100","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963100","url":null,"abstract":"Currently, enterprise WLAN is facing rapid growth of user scale and traffic load, as well as constantly emerging new features. However, traditional enterprise WLAN architecture suffers from poor flexibility and the lack of coordination between wireless access points (APs) and wired backbone. Inspired by the emerging idea of Software-Defined Networking (SDN), we proposed SDWLAN, an alternative architecture for enterprise WLAN. The salient features of SDWLAN are twofold. First, most of 802.11 AP functions are decoupled from scattered devices and centralized in a controller, leaving some simplified devices (i.e., wireless access switches, or WASes) manipulated by the controller through extended OpenFlow protocol. Second, the control of APs and wired backbone are consolidated to provide a unified network control platform. By reorganizing 802.11 AP's functional modules, SDWLAN can achieve remarkable flexibility. Benefiting from the extended OpenFlow protocol and the unified control platform, we proposed a client-unaware fast AP handoff mechanism in SDWLAN. Simulation results demonstrated that AP handoff operation in SDWLAN leads to negligible throughput fluctuation of on-going connection compared to traditional architecture with 802.11 standard handoff mechanism. Furthermore, SDWLAN requires no modification to existing 802.11 clients, which make our solution practical.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Robust speaker verification using self organizing map 基于自组织映射的鲁棒说话人验证
P. Das, Utpal Bhatacharjee
This paper proposes a new approach of noise reduction based on the analysis of MFCC feature space using self-organizing map network. Here the U-matrix plot of the feature space is analyzed in presence of white noise at different signal to noise ratio. Based on the observation, boundary neurons separating clusters are identified in the feature space. For each such neuron in the boundary, its 2-D feature vector is extracted from the U-matrix and hit matrix. This collection of feature vectors based on the boundary neurons are eliminated from the original feature space. Thus the new feature space obtained is used to perform the tasks of visualization and speaker verification. Experiments were carried out by combining synthetic white noise with real world data sets.
本文提出了一种基于自组织映射网络对MFCC特征空间进行分析的降噪方法。本文分析了不同信噪比下存在白噪声时特征空间的u矩阵图。在此基础上,在特征空间中识别分离聚类的边界神经元。对于边界上的每个这样的神经元,从u矩阵和hit矩阵中提取其二维特征向量。基于边界神经元的特征向量集合从原始特征空间中消除。从而利用获得的新特征空间来执行可视化和说话人验证任务。实验将合成白噪声与真实世界的数据集相结合。
{"title":"Robust speaker verification using self organizing map","authors":"P. Das, Utpal Bhatacharjee","doi":"10.1109/ICCCNT.2014.6963091","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963091","url":null,"abstract":"This paper proposes a new approach of noise reduction based on the analysis of MFCC feature space using self-organizing map network. Here the U-matrix plot of the feature space is analyzed in presence of white noise at different signal to noise ratio. Based on the observation, boundary neurons separating clusters are identified in the feature space. For each such neuron in the boundary, its 2-D feature vector is extracted from the U-matrix and hit matrix. This collection of feature vectors based on the boundary neurons are eliminated from the original feature space. Thus the new feature space obtained is used to perform the tasks of visualization and speaker verification. Experiments were carried out by combining synthetic white noise with real world data sets.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of single-walled carbon nanotube and multi-walled carbon nanotube in 32nm technology for on-chip interconnect applications 单壁碳纳米管和多壁碳纳米管32nm片上互连性能分析
P. Murugeswari, A. P. Kabilan, M. Vaishnavi, C. Divya
The semiconductor industry is facing a crucial problem in the interconnect section when IC is scaled down below 32 nm technology. Scaling increases the number of devices per unit area, which in turn increases the performance of the transistor resulting in the overall increase of performance per unit area. But there is a decrease in the performance of interconnect especially in that of global interconnect. The reduction in the cross section of copper interconnects in accordance with technology scaling, increases the resistivity due to size effects. This increase in resistivity affects performance, namely delay and current carrying capability of copper interconnect. Carbon nanotube is proposed as the replacement for copper to alleviate the bottleneck in all levels of interconnects because it has high mean free path and ballistic transport. The performance evaluation of both single-walled carbon nanotube and multi-walled carbon nanotube interconnect delay is carried out and the results are compared with that of the copper interconnects. Both the CNTs and copper interconnects are examined thoroughly with the help of HSPICE simulation using its transmission line model. Comparison shows that MWCNT is the most promising candidate for local, intermediate and global levels of interconnects.
当集成电路缩小到32纳米以下时,半导体行业在互连部分面临着一个关键问题。缩放增加了每单位面积的器件数量,这反过来又提高了晶体管的性能,从而提高了每单位面积的整体性能。但是互连的性能有所下降,特别是全局互连的性能有所下降。铜互连线的截面积按工艺尺度缩小,由于尺寸效应,电阻率增大。电阻率的增加会影响铜互连的性能,即延迟和载流能力。由于碳纳米管具有较高的平均自由程和弹道输运特性,因此被提出作为铜的替代品来缓解各级互连中的瓶颈。对单壁碳纳米管和多壁碳纳米管互连延迟性能进行了评价,并与铜互连延迟性能进行了比较。利用HSPICE的传输线模型,对碳纳米管和铜互连线进行了全面的研究。比较表明,MWCNT是最有希望用于局部、中间和全局互连的候选材料。
{"title":"Performance analysis of single-walled carbon nanotube and multi-walled carbon nanotube in 32nm technology for on-chip interconnect applications","authors":"P. Murugeswari, A. P. Kabilan, M. Vaishnavi, C. Divya","doi":"10.1109/ICCCNT.2014.6963141","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963141","url":null,"abstract":"The semiconductor industry is facing a crucial problem in the interconnect section when IC is scaled down below 32 nm technology. Scaling increases the number of devices per unit area, which in turn increases the performance of the transistor resulting in the overall increase of performance per unit area. But there is a decrease in the performance of interconnect especially in that of global interconnect. The reduction in the cross section of copper interconnects in accordance with technology scaling, increases the resistivity due to size effects. This increase in resistivity affects performance, namely delay and current carrying capability of copper interconnect. Carbon nanotube is proposed as the replacement for copper to alleviate the bottleneck in all levels of interconnects because it has high mean free path and ballistic transport. The performance evaluation of both single-walled carbon nanotube and multi-walled carbon nanotube interconnect delay is carried out and the results are compared with that of the copper interconnects. Both the CNTs and copper interconnects are examined thoroughly with the help of HSPICE simulation using its transmission line model. Comparison shows that MWCNT is the most promising candidate for local, intermediate and global levels of interconnects.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124256700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reactive protocols analysis with wormhole attack in ad-hoc networks 自组织网络中虫洞攻击的响应协议分析
G. Garg, S. Kaushal, Akashdeep Sharma
Ad-hoc Networks are constantly prone to variety of attacks at different layers because of its features. Wormhole attack is one of the severe attacks which can be implemented in five different modes. This attack acts as a curse as well as boon for the network users. This paper presents the analysis of reactive protocols (AODV, DSR, DYMO, ANODR) with wormhole attack in both mobile and non-mobile ad-hoc networks. Simulations are carried out under Qualnet 4.5.
Ad-hoc网络由于其自身的特点,在不同的层上经常受到各种攻击。虫洞攻击是最严重的攻击之一,有五种不同的攻击模式。这种攻击对网络用户来说是祸也是福。本文分析了在移动和非移动自组网中响应式协议(AODV、DSR、DYMO、ANODR)与虫洞攻击的关系。仿真在Qualnet 4.5下进行。
{"title":"Reactive protocols analysis with wormhole attack in ad-hoc networks","authors":"G. Garg, S. Kaushal, Akashdeep Sharma","doi":"10.1109/ICCCNT.2014.6963143","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963143","url":null,"abstract":"Ad-hoc Networks are constantly prone to variety of attacks at different layers because of its features. Wormhole attack is one of the severe attacks which can be implemented in five different modes. This attack acts as a curse as well as boon for the network users. This paper presents the analysis of reactive protocols (AODV, DSR, DYMO, ANODR) with wormhole attack in both mobile and non-mobile ad-hoc networks. Simulations are carried out under Qualnet 4.5.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"102 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120877101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Personalized recommendation based on link prediction in dynamic super-networks 动态超级网络中基于链接预测的个性化推荐
Wang Hong, Su Yanshen, Yu Xiaomei
Personalized recommendation is one of the most effective methods to solve the problem of information overloading. As many real existing systems in nature, a recommendation system can also be considered as a complex network system, so we can do personalized recommendation by using the link prediction method which is a new one in complex networks research area. In this paper, we present personalized recommendation method based on the link prediction in Super-networks. Firstly, we give several definitions such as a Super-network, a dynamic Super-network and a utility matrix etc. Secondly, we construct a personalized recommendation model based on these definitions. Thirdly, we define a similarity metric for users and some similarity criteria, put forward five link prediction related algorithms in dynamic Supernetworks and present our recommendation algorithms based on these link prediction algorithms. Finally, we apply our methods to classic datasets in order to evaluate the performance of our algorithms.
个性化推荐是解决信息过载问题的最有效方法之一。与自然界中许多真实存在的系统一样,推荐系统也可以看作是一个复杂的网络系统,因此我们可以使用链接预测方法进行个性化推荐,这是复杂网络研究领域的一种新方法。本文提出了一种基于超级网络中链接预测的个性化推荐方法。首先给出了超级网络、动态超级网络和效用矩阵等定义。其次,基于这些定义构建个性化推荐模型。第三,定义了用户的相似度度量和相似度准则,提出了动态超级网络中5种链接预测的相关算法,并在这些算法的基础上提出了我们的推荐算法。最后,我们将我们的方法应用于经典数据集,以评估我们的算法的性能。
{"title":"Personalized recommendation based on link prediction in dynamic super-networks","authors":"Wang Hong, Su Yanshen, Yu Xiaomei","doi":"10.1109/ICCCNT.2014.6963067","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963067","url":null,"abstract":"Personalized recommendation is one of the most effective methods to solve the problem of information overloading. As many real existing systems in nature, a recommendation system can also be considered as a complex network system, so we can do personalized recommendation by using the link prediction method which is a new one in complex networks research area. In this paper, we present personalized recommendation method based on the link prediction in Super-networks. Firstly, we give several definitions such as a Super-network, a dynamic Super-network and a utility matrix etc. Secondly, we construct a personalized recommendation model based on these definitions. Thirdly, we define a similarity metric for users and some similarity criteria, put forward five link prediction related algorithms in dynamic Supernetworks and present our recommendation algorithms based on these link prediction algorithms. Finally, we apply our methods to classic datasets in order to evaluate the performance of our algorithms.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121405227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modified fuzzy hyperline-segment neural network for classification with mixed attribues 混合属性分类的改进模糊超线段神经网络
S. Shinde, U. Kulkarni
The fuzzy hyperline segment neural network (FHLSNN) utilizes fuzzy sets as pattern classes in which each fuzzy set is an union of fuzzy set hyperline segments. The fuzzy set hyperline segment is a n-dimensional hyperline segment defined by two end points with a corresponding membership function. In FHLSNN, membership function calculates membership value of the input pattern based on its distance from both the end points of the hyperline segment. But sometimes input pattern is nearer to the hyperline segment but far from its endpoints. To solve this problem, this paper proposes modified fuzzy hyperline segment neural network (MFHLSNN). In MHLSNN membership function is based on minimum of the distance of the input pattern from the midpoint of the hyperline segment and its distance from both the end points. The proposed model is applied to eight different benchmark datasets taken from the UCI machine learning repository. The experimental results of the MFHLSNN are compared with earlier methods like fuzzy min-max neural network, generalized fuzzy min-max neural network and fuzzy hyperline segment neural network. These results show that the MFHLSNN gives improved performance as compared to its earlier methods.
模糊超线段神经网络(FHLSNN)利用模糊集作为模式类,其中每个模糊集是模糊集超线段的并集。模糊集超线段是由两个端点定义的n维超线段,并具有相应的隶属函数。在FHLSNN中,隶属函数根据输入模式与超线段两端的距离计算输入模式的隶属度值。但有时输入模式离超线段较近,但离其端点较远。为了解决这一问题,本文提出了改进模糊超线段神经网络(MFHLSNN)。在MHLSNN中,隶属度函数是基于输入模式到超线段中点的距离及其到两个端点的距离的最小值。提出的模型应用于从UCI机器学习存储库中获取的八个不同的基准数据集。将MFHLSNN的实验结果与模糊最小最大神经网络、广义模糊最小最大神经网络和模糊超线段神经网络进行了比较。这些结果表明,与之前的方法相比,MFHLSNN具有更高的性能。
{"title":"Modified fuzzy hyperline-segment neural network for classification with mixed attribues","authors":"S. Shinde, U. Kulkarni","doi":"10.1109/ICCCNT.2014.6963078","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963078","url":null,"abstract":"The fuzzy hyperline segment neural network (FHLSNN) utilizes fuzzy sets as pattern classes in which each fuzzy set is an union of fuzzy set hyperline segments. The fuzzy set hyperline segment is a n-dimensional hyperline segment defined by two end points with a corresponding membership function. In FHLSNN, membership function calculates membership value of the input pattern based on its distance from both the end points of the hyperline segment. But sometimes input pattern is nearer to the hyperline segment but far from its endpoints. To solve this problem, this paper proposes modified fuzzy hyperline segment neural network (MFHLSNN). In MHLSNN membership function is based on minimum of the distance of the input pattern from the midpoint of the hyperline segment and its distance from both the end points. The proposed model is applied to eight different benchmark datasets taken from the UCI machine learning repository. The experimental results of the MFHLSNN are compared with earlier methods like fuzzy min-max neural network, generalized fuzzy min-max neural network and fuzzy hyperline segment neural network. These results show that the MFHLSNN gives improved performance as compared to its earlier methods.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122466374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1