首页 > 最新文献

2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)最新文献

英文 中文
A theoretical workflow for the verification of embedded threats on mobile devices 在移动设备上验证嵌入式威胁的理论工作流程
Michelle Ann Joseph, S. Philip, Bryan Miranada, Amol Deshmukh, Nrashant Singh
Mobile phones are a big part of today's life. However, these mobile phones are not built for data security and privacy, making them a common communication monitoring device. Communication monitoring is the control of the mobile device performance and data on hard drives or the transmission of data over networks such as the internet. This surveillance is often hidden and may be carried out by government, organizations or criminals. Digital forensics is the application of knowledge and expertise to legally extract information from any physical gadget, such as computers and smartphones. The purpose of this study was to propose a mobile forensic workflow for detecting and analyzing embedded threats that can be used as a surveillance tool at various levels of a mobile device.
手机是当今生活的重要组成部分。然而,这些手机并不是为数据安全和隐私而设计的,这使它们成为一种常见的通信监控设备。通信监控是对移动设备性能和硬盘驱动器上的数据或通过互联网等网络传输数据的控制。这种监视通常是隐蔽的,可能是由政府、组织或犯罪分子实施的。数字取证是应用知识和专业知识,从任何物理设备(如计算机和智能手机)中合法提取信息。本研究的目的是提出一种移动取证工作流程,用于检测和分析嵌入式威胁,这些威胁可以用作移动设备各级的监视工具。
{"title":"A theoretical workflow for the verification of embedded threats on mobile devices","authors":"Michelle Ann Joseph, S. Philip, Bryan Miranada, Amol Deshmukh, Nrashant Singh","doi":"10.1109/ICCAKM50778.2021.9357707","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357707","url":null,"abstract":"Mobile phones are a big part of today's life. However, these mobile phones are not built for data security and privacy, making them a common communication monitoring device. Communication monitoring is the control of the mobile device performance and data on hard drives or the transmission of data over networks such as the internet. This surveillance is often hidden and may be carried out by government, organizations or criminals. Digital forensics is the application of knowledge and expertise to legally extract information from any physical gadget, such as computers and smartphones. The purpose of this study was to propose a mobile forensic workflow for detecting and analyzing embedded threats that can be used as a surveillance tool at various levels of a mobile device.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Hindi Mnemonics for generating private keys used in Hierarchical Deterministic wallets 开发用于生成分层确定性钱包中使用的私钥的印地语助记符
R. Kanday, Ranbir Singh Batth
In the cryptography the most important part is the security of the wallet. The wallets are secured till date by some alphanumeric private keys. The generation of the private keys are playing most important role in the security of the whole system which is directly proportional to password security. Therefore the security of the password and also the usability of the password is the main concern for all the administrators. Several strategies are analyzed for password formation. In this research work we proposed a novel technology of using Hindi words for the development of the security keys makes them more strong as binary function works on Hindi dictionary are very few common. In this certain sets of algorithm has been developed for the selection of the Hindi words, their character length and there way of representation. This article introduced a technique of the words to be selected that will be used in future for the development of private keys and makes wallets more secure system. Hindi mnemonics aides joins the request for composing strokes of letters with secret phrase age to assist clients with making protected and essential passwords.
在密码学中,最重要的部分是钱包的安全性。到目前为止,这些钱包是由一些字母数字的私钥保护的。私钥的生成对整个系统的安全性起着至关重要的作用,它与密码的安全性成正比。因此,密码的安全性和可用性是所有管理员关心的主要问题。分析了密码生成的几种策略。在这项研究工作中,我们提出了一种使用印地语单词来开发安全密钥的新技术,使其更加强大,因为二进制函数在印地语字典上工作很少。在此基础上,开发了一套特定的算法,用于选择印地语单词,其字符长度和表示方式。本文介绍了一种将在未来用于私钥开发的词语选择技术,使钱包系统更加安全。印地语助记助手加入了对包含秘密短语的字母笔画的要求,以帮助客户制作受保护的重要密码。
{"title":"Development of Hindi Mnemonics for generating private keys used in Hierarchical Deterministic wallets","authors":"R. Kanday, Ranbir Singh Batth","doi":"10.1109/ICCAKM50778.2021.9357729","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357729","url":null,"abstract":"In the cryptography the most important part is the security of the wallet. The wallets are secured till date by some alphanumeric private keys. The generation of the private keys are playing most important role in the security of the whole system which is directly proportional to password security. Therefore the security of the password and also the usability of the password is the main concern for all the administrators. Several strategies are analyzed for password formation. In this research work we proposed a novel technology of using Hindi words for the development of the security keys makes them more strong as binary function works on Hindi dictionary are very few common. In this certain sets of algorithm has been developed for the selection of the Hindi words, their character length and there way of representation. This article introduced a technique of the words to be selected that will be used in future for the development of private keys and makes wallets more secure system. Hindi mnemonics aides joins the request for composing strokes of letters with secret phrase age to assist clients with making protected and essential passwords.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"123 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129525483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integration of Artificial Intelligence into software reuse: An overview of Software Intelligence 人工智能与软件重用的集成:软件智能概述
A. Sandhu, Ranbir Singh Batth
Software reuse not only reduces time-to-market but also improve productivity and reliability of the software. Developers can take the benefits of reusable modules of the software by simply accessing the software repository. To create these repositories Data Mining techniques are used and later to predict the reusability factor of the modules Artificial Intelligence comes into light. This integration of Data Mining with Artificial Intelligence to perform software engineering task is termed as software Intelligence. This paper provides a roadmap of conventional reuse approaches to Software Intelligence approaches. Intense survey is conducted on various Artificial Intelligence algorithms applied to measure reusability of the extracted component. From the survey it is concluded that Components Based Development fits best for modern applications as it supports object-oriented paradigm. Besides, the existing Artificial intelligence approaches lack is efficient prediction of reusable module.
软件重用不仅缩短了上市时间,而且还提高了软件的生产力和可靠性。开发人员可以通过简单地访问软件存储库来获得软件可重用模块的好处。为了创建这些存储库,使用了数据挖掘技术,然后预测模块的可重用性因素,人工智能出现了。这种将数据挖掘与人工智能相结合来执行软件工程任务的方法被称为软件智能。本文提供了软件智能方法的常规重用方法的路线图。对用于度量提取组件可重用性的各种人工智能算法进行了深入的研究。从调查中可以得出结论,基于组件的开发最适合现代应用程序,因为它支持面向对象的范例。此外,现有的人工智能方法缺乏对可重用模块的有效预测。
{"title":"Integration of Artificial Intelligence into software reuse: An overview of Software Intelligence","authors":"A. Sandhu, Ranbir Singh Batth","doi":"10.1109/iccakm50778.2021.9357738","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357738","url":null,"abstract":"Software reuse not only reduces time-to-market but also improve productivity and reliability of the software. Developers can take the benefits of reusable modules of the software by simply accessing the software repository. To create these repositories Data Mining techniques are used and later to predict the reusability factor of the modules Artificial Intelligence comes into light. This integration of Data Mining with Artificial Intelligence to perform software engineering task is termed as software Intelligence. This paper provides a roadmap of conventional reuse approaches to Software Intelligence approaches. Intense survey is conducted on various Artificial Intelligence algorithms applied to measure reusability of the extracted component. From the survey it is concluded that Components Based Development fits best for modern applications as it supports object-oriented paradigm. Besides, the existing Artificial intelligence approaches lack is efficient prediction of reusable module.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127137359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analyzing COVID-19 Dataset through Data Mining Tool “Orange” 利用数据挖掘工具“Orange”分析COVID-19数据集
Uzma Thange, V. Shukla, Ritu Punhani, W. Grobbelaar
Data mining is comprehended as a procedure used to get important data from any more extensive cluster of raw data. It infers assessment of data designs in huge data sets utilizing at least one or more applications. Data mining has applications in various fields, for instance science and research. Associations can improve client connections as a use of data mining and execute systems identified with different business capacities and thus upgrade business in an increasingly ideal and compelling way. This encourages organizations draw nearer to arriving at their objectives and to settle on smarter decisions as well. Orange is segment based visual programming for data mining, Artificial Intelligence, and data examination. Work forms are made by interfacing predefined or customer organized parts called widgets. They read the data, process it, envision it, and do gathering, collect prescient models, and so on. Towards the start of December 2019, an erupt of coronavirus contamination 2019 (COVID-19), brought by a new critical intense respiratory issue coronavirus 2 transpired in Wuhan City, Hubei Province, China. On January 30, 2020 the World Health Organization announced the scene as a Public Health Emergency of International Concern. Several episodes forecast models for COVID-19 are being utilized by authorities internationally to settle on instructed decisions and authorize applicable precaution measures. Amidst the standard models for COVID-19 worldwide pandemic expectation, basic epidemiological and authentic models have gotten more consideration by specialists, and they are notable in the media. In this paper, we have taken COVID-19 dataset (downloaded June 2020) from Kaggle, related to India, and with the help of ORANGE tool we have visually represented to understand how certain relations can be depicted.
数据挖掘可以理解为从大量原始数据中获取重要数据的过程。它在使用至少一个或多个应用程序的大型数据集中推断数据设计的评估。数据挖掘在许多领域都有应用,例如科学和研究。通过使用数据挖掘,关联可以改善客户端连接,并执行具有不同业务能力的系统,从而以一种日益理想和引人注目的方式升级业务。这鼓励组织更接近他们的目标,并做出更明智的决定。Orange是基于分段的可视化编程,用于数据挖掘、人工智能和数据检查。工作表单是通过连接预定义的或客户组织的部件(称为小部件)而生成的。他们读取数据,处理数据,设想数据,收集数据,收集有先见之明的模型,等等。2019年12月初,中国湖北省武汉市爆发了由新型严重呼吸道疾病冠状病毒2型引发的2019年冠状病毒污染(COVID-19)疫情。2020年1月30日,世界卫生组织宣布这一场景为国际关注的突发公共卫生事件。国际当局正在利用COVID-19的几个事件预测模型来做出指示决定并批准适用的预防措施。在COVID-19全球大流行预期的标准模型中,流行病学基础模型和真实模型得到了专家的更多关注,并在媒体上得到了关注。在本文中,我们从与印度相关的Kaggle获取了COVID-19数据集(下载于2020年6月),并在ORANGE工具的帮助下,我们直观地表示了如何描述某些关系。
{"title":"Analyzing COVID-19 Dataset through Data Mining Tool “Orange”","authors":"Uzma Thange, V. Shukla, Ritu Punhani, W. Grobbelaar","doi":"10.1109/ICCAKM50778.2021.9357754","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357754","url":null,"abstract":"Data mining is comprehended as a procedure used to get important data from any more extensive cluster of raw data. It infers assessment of data designs in huge data sets utilizing at least one or more applications. Data mining has applications in various fields, for instance science and research. Associations can improve client connections as a use of data mining and execute systems identified with different business capacities and thus upgrade business in an increasingly ideal and compelling way. This encourages organizations draw nearer to arriving at their objectives and to settle on smarter decisions as well. Orange is segment based visual programming for data mining, Artificial Intelligence, and data examination. Work forms are made by interfacing predefined or customer organized parts called widgets. They read the data, process it, envision it, and do gathering, collect prescient models, and so on. Towards the start of December 2019, an erupt of coronavirus contamination 2019 (COVID-19), brought by a new critical intense respiratory issue coronavirus 2 transpired in Wuhan City, Hubei Province, China. On January 30, 2020 the World Health Organization announced the scene as a Public Health Emergency of International Concern. Several episodes forecast models for COVID-19 are being utilized by authorities internationally to settle on instructed decisions and authorize applicable precaution measures. Amidst the standard models for COVID-19 worldwide pandemic expectation, basic epidemiological and authentic models have gotten more consideration by specialists, and they are notable in the media. In this paper, we have taken COVID-19 dataset (downloaded June 2020) from Kaggle, related to India, and with the help of ORANGE tool we have visually represented to understand how certain relations can be depicted.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Monetizing Personal Brand for Business Success, Financial Security and Career Longevity- Sentiment Analysis in COVID 19 Era 将个人品牌货币化以实现商业成功、财务安全和职业寿命——COVID - 19时代的情绪分析
Navleen Kaur, Supriya Lamba Sahdev, Gurinder Singh, Nisha Tokas
Live the way you want to be remembered. Jeff Bezos founder of Amazon have very rightly quoted “Your brand is what people say about you when you're not in the room.” It is your reputation, how people feel about you. Though branding has been very popular since times immemorial and has always been associated with businesses, but personal branding has become fundamental with the arrival of social media and gig economy. There has been drastic cultural shift from shyness to look-at-me attitude. If you are not branding yourself, be assured that others would be doing that for you. The power of personal branding improves likelihood of career attainment. Individuals reach pinnacles of success when they find ways to continually grow and improve their brand. This paper discusses about the need of personal branding in the present scenario and focusses on the practical ways one can use to build his or her personal brand. It throws light on how personal branding leads to business success, financial security and business longevity. The tool is used sentiment analysis1 to see how strong brands of famous personalities are based on social media posts.
以你希望被人记住的方式生活。亚马逊创始人杰夫·贝索斯说过一句非常正确的话:“你的品牌就是当你不在房间里时人们对你的评价。”重要的是你的声誉,人们对你的看法。尽管品牌自古以来就非常流行,而且总是与企业联系在一起,但随着社交媒体和零工经济的到来,个人品牌也变得至关重要。从害羞到“看着我”的态度已经发生了巨大的文化转变。如果你没有给自己打上品牌,请相信别人会为你做这件事。个人品牌的力量提高了职业成就的可能性。当个人找到持续成长和提升自己品牌的方法时,他们就会达到成功的顶峰。本文讨论了在当前情况下个人品牌的必要性,并着重于一个人可以用来建立自己的个人品牌的实际方法。它揭示了个人品牌如何带来商业成功、财务安全和商业寿命。该工具用于情感分析,以了解基于社交媒体帖子的名人品牌的强大程度。
{"title":"Monetizing Personal Brand for Business Success, Financial Security and Career Longevity- Sentiment Analysis in COVID 19 Era","authors":"Navleen Kaur, Supriya Lamba Sahdev, Gurinder Singh, Nisha Tokas","doi":"10.1109/iccakm50778.2021.9357744","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357744","url":null,"abstract":"Live the way you want to be remembered. Jeff Bezos founder of Amazon have very rightly quoted “Your brand is what people say about you when you're not in the room.” It is your reputation, how people feel about you. Though branding has been very popular since times immemorial and has always been associated with businesses, but personal branding has become fundamental with the arrival of social media and gig economy. There has been drastic cultural shift from shyness to look-at-me attitude. If you are not branding yourself, be assured that others would be doing that for you. The power of personal branding improves likelihood of career attainment. Individuals reach pinnacles of success when they find ways to continually grow and improve their brand. This paper discusses about the need of personal branding in the present scenario and focusses on the practical ways one can use to build his or her personal brand. It throws light on how personal branding leads to business success, financial security and business longevity. The tool is used sentiment analysis1 to see how strong brands of famous personalities are based on social media posts.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131659871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sales Forecast of Manufacturing Companies using Machine Learning navigating the Pandemic like COVID-19 利用机器学习应对COVID-19等大流行的制造企业销售预测
Prabhat Sharma, Shreyansh Khater, Vasudha Vashisht
This project is all about prediction of turnover of a company using machine learning. From this machine learning model, it can easily predict the next outcome in terms of turnover or whichever is equivalent to it. Future result prediction is very helpful for better understanding of market trends and stocks by using simple machine learning techniques. For this particular project, an Indian automobile industry has been selected for car sales prediction in the era of covid-19. This project shows, in the tough time of covid-19, if every other thing remains constant, what will be the sales trend for various automobile companies. will the graph go downwards or upwards? By using various machine learning techniques, it can predict the trend of graphs and in this project, it has been tried to show like this.
这个项目是关于使用机器学习预测公司的营业额。从这个机器学习模型,它可以很容易地预测下一个结果的营业额或任何相当于它。通过使用简单的机器学习技术,预测未来的结果对更好地理解市场趋势和股票非常有帮助。在这个特别的项目中,我们选择了一个印度汽车行业来预测新冠肺炎时代的汽车销量。这个项目展示了在新冠疫情的艰难时期,如果其他因素都保持不变,那么各个汽车公司的销售趋势将是什么。曲线是向下还是向上?通过使用各种机器学习技术,它可以预测图形的趋势,在这个项目中,它已经尝试像这样展示。
{"title":"Sales Forecast of Manufacturing Companies using Machine Learning navigating the Pandemic like COVID-19","authors":"Prabhat Sharma, Shreyansh Khater, Vasudha Vashisht","doi":"10.1109/iccakm50778.2021.9357751","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357751","url":null,"abstract":"This project is all about prediction of turnover of a company using machine learning. From this machine learning model, it can easily predict the next outcome in terms of turnover or whichever is equivalent to it. Future result prediction is very helpful for better understanding of market trends and stocks by using simple machine learning techniques. For this particular project, an Indian automobile industry has been selected for car sales prediction in the era of covid-19. This project shows, in the tough time of covid-19, if every other thing remains constant, what will be the sales trend for various automobile companies. will the graph go downwards or upwards? By using various machine learning techniques, it can predict the trend of graphs and in this project, it has been tried to show like this.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
End-to-End Elimination of Traffic Elimination Using Self-Adaptive Prediction Model in Cloud 云环境中基于自适应预测模型的端到端流量消除
K. Umamaheswari, M. Sivaram, V. Manikandan, K. Batri, P. Saranya, V. Porkodi
In recent advancement in cloud computing, Traffic Redundancy Elimination (TRE) offers an effective solution to reduce the bandwidth cost. It is found that both short-term and long term data redundancy tends to appear in the network traffic and the TRE - trace driven approach captures both the data traffic redundancy. In this paper, we hence improve the design of a cooperative end-to-end TRE solution in order to improve the process of detection and removal of data redundancy between multiple layers, where the operations between them is in cooperative manner. The proposed method uses a self-adaptive prediction algorithm to increase the efficiency of TRE in multi-layer design that uses hit ratio of predictions to adjust dynamically the prediction window size. The experiment evaluation shows that proposed method reduces the operational cost in terms of reduced energy and makespan through proper scheduling.
在最近的云计算发展中,流量冗余消除(TRE)为降低带宽成本提供了一种有效的解决方案。研究发现,短期和长期的数据冗余都倾向于出现在网络流量中,而TRE - trace驱动方法同时捕获了数据流量冗余。因此,在本文中,我们改进了一个协作的端到端TRE解决方案的设计,以改进多层之间数据冗余的检测和去除过程,其中多层之间的操作以协作的方式进行。该方法采用自适应预测算法,利用预测命中率动态调整预测窗口大小,提高了多层设计中TRE的效率。实验结果表明,该方法通过合理调度,降低了作业成本,降低了能耗,缩短了完工时间。
{"title":"End-to-End Elimination of Traffic Elimination Using Self-Adaptive Prediction Model in Cloud","authors":"K. Umamaheswari, M. Sivaram, V. Manikandan, K. Batri, P. Saranya, V. Porkodi","doi":"10.1109/ICCAKM50778.2021.9357700","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357700","url":null,"abstract":"In recent advancement in cloud computing, Traffic Redundancy Elimination (TRE) offers an effective solution to reduce the bandwidth cost. It is found that both short-term and long term data redundancy tends to appear in the network traffic and the TRE - trace driven approach captures both the data traffic redundancy. In this paper, we hence improve the design of a cooperative end-to-end TRE solution in order to improve the process of detection and removal of data redundancy between multiple layers, where the operations between them is in cooperative manner. The proposed method uses a self-adaptive prediction algorithm to increase the efficiency of TRE in multi-layer design that uses hit ratio of predictions to adjust dynamically the prediction window size. The experiment evaluation shows that proposed method reduces the operational cost in terms of reduced energy and makespan through proper scheduling.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quicker Sort Algorithm: Upgrading time complexity of Quick Sort to Linear Logarithmic 快速排序算法:将快速排序的时间复杂度提升到线性对数
S. Budhani, Naveen Tewari, Mukesh Joshi, Kshitij Kala
Quick Sort is a famous algorithm. It was the fastest algorithm at one point in time. However, sometimes it can give polynomial time complexity. The only thing that is important in this algorithm is the selection of Pivot Element. In this paper, we proposed a new algorithm, which is based on Quick Sort, and through our testing, we conclude that this algorithm is giving good results for small as well as large data sets.
快速排序是一种著名的算法。这是当时最快的算法。然而,有时它会产生多项式的时间复杂度。在这个算法中唯一重要的是选择主元。在本文中,我们提出了一种新的基于快速排序的算法,通过我们的测试,我们得出结论,该算法在小数据集和大数据集上都有很好的结果。
{"title":"Quicker Sort Algorithm: Upgrading time complexity of Quick Sort to Linear Logarithmic","authors":"S. Budhani, Naveen Tewari, Mukesh Joshi, Kshitij Kala","doi":"10.1109/iccakm50778.2021.9357725","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357725","url":null,"abstract":"Quick Sort is a famous algorithm. It was the fastest algorithm at one point in time. However, sometimes it can give polynomial time complexity. The only thing that is important in this algorithm is the selection of Pivot Element. In this paper, we proposed a new algorithm, which is based on Quick Sort, and through our testing, we conclude that this algorithm is giving good results for small as well as large data sets.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geo-SID: A new Geocast Safety Information Dissemination protocol in VANET for urban areas Geo-SID:一种新的城市地区VANET地球广播安全信息发布协议
Oussama Senouci, Z. Aliouat, S. Harous
Recently, many researches on Vehicular Ad Hoc Networks (VANETs) have been performed because of the many related applications. Data dissemination is among the challenging issues face by these kinds of networks to overcome several problems, such as broadcast storm, and network fragmentation. In this respect, the present work proposes a new Geocast-based Safety Information Dissemination protocol for VANETs, called Geo-SID. The proposed protocol is used for dissemination of safety information in a V2V scenario. It is specifically designed and suitable for an urban environment. The main goal of Geo-SID scheme is to perform the safety information dissemination process within a Zone of Relevance (ZoR) and without using the Zone of Forwarding (ZoF) similar to existing dissemination protocols in the literature. Furthermore, our solution aims to eliminate the broadcast storm problem by avoiding irrelevant alert messages and providing an efficient safety data dissemination across a ZoR area by extending the coverage area, reducing the network overhead and improving the latency. We simulate our proposed protocol using network simulator NS-3 and SUMO environment. Our proposed protocol outperforms similar protocols available in the literature based on the obtained simulation results.
近年来,由于车载自组织网络(Vehicular Ad Hoc Networks, vanet)的应用越来越广泛,引起了人们的广泛关注。数据传播是这类网络面临的挑战之一,需要克服广播风暴和网络碎片化等问题。在这方面,本工作提出了一种新的基于地质cast的VANETs安全信息传播协议,称为Geo-SID。提议的协议用于在V2V场景中传播安全信息。它是专门设计的,适合城市环境。Geo-SID方案的主要目标是在相关区域(ZoR)内执行安全信息传播过程,而不使用与文献中现有传播协议类似的转发区域(ZoF)。此外,我们的解决方案旨在通过避免不相关的警报消息来消除广播风暴问题,并通过扩展覆盖区域,减少网络开销和改善延迟,在ZoR区域内提供有效的安全数据传播。我们使用网络模拟器NS-3和SUMO环境对所提出的协议进行了仿真。基于获得的仿真结果,我们提出的协议优于文献中可用的类似协议。
{"title":"Geo-SID: A new Geocast Safety Information Dissemination protocol in VANET for urban areas","authors":"Oussama Senouci, Z. Aliouat, S. Harous","doi":"10.1109/iccakm50778.2021.9357723","DOIUrl":"https://doi.org/10.1109/iccakm50778.2021.9357723","url":null,"abstract":"Recently, many researches on Vehicular Ad Hoc Networks (VANETs) have been performed because of the many related applications. Data dissemination is among the challenging issues face by these kinds of networks to overcome several problems, such as broadcast storm, and network fragmentation. In this respect, the present work proposes a new Geocast-based Safety Information Dissemination protocol for VANETs, called Geo-SID. The proposed protocol is used for dissemination of safety information in a V2V scenario. It is specifically designed and suitable for an urban environment. The main goal of Geo-SID scheme is to perform the safety information dissemination process within a Zone of Relevance (ZoR) and without using the Zone of Forwarding (ZoF) similar to existing dissemination protocols in the literature. Furthermore, our solution aims to eliminate the broadcast storm problem by avoiding irrelevant alert messages and providing an efficient safety data dissemination across a ZoR area by extending the coverage area, reducing the network overhead and improving the latency. We simulate our proposed protocol using network simulator NS-3 and SUMO environment. Our proposed protocol outperforms similar protocols available in the literature based on the obtained simulation results.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"488 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115880702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Single sink position in wireless sensor networks 无线传感器网络中的单sink位置
Deghima Manel, Lemia Louail, S. Harous
In a wireless sensor network, the sensor nodes collect information from the environment where they are deployed and send it to the base station, also called the sink, to be delivered to the end user. Many metrics such as the latency of communications and the energy consumption can be affected by the position of the sink. This position should be found before exploiting the network and routing information. In this paper, we propose two sink placement techniques in a wireless sensor network using the position of the other nodes in the network in order to minimize the latency of communication and the energy consumption. The computed position of the sink is as close as possible to every node of the network. Simulation results show that the average latency of communication and the average energy consumption of both proposed sink placement techniques are better than similar works existing in the literature.
在无线传感器网络中,传感器节点从部署它们的环境中收集信息,并将其发送到基站(也称为接收器),再传递给最终用户。诸如通信延迟和能耗等许多指标都可能受到接收器位置的影响。在利用网络和路由信息之前,应该找到这个位置。在本文中,我们提出了两种在无线传感器网络中利用网络中其他节点的位置放置接收器的技术,以尽量减少通信延迟和能量消耗。计算出的接收器位置尽可能靠近网络的每个节点。仿真结果表明,所提出的两种sink放置技术的平均通信延迟和平均能耗均优于文献中已有的同类技术。
{"title":"Single sink position in wireless sensor networks","authors":"Deghima Manel, Lemia Louail, S. Harous","doi":"10.1109/ICCAKM50778.2021.9357762","DOIUrl":"https://doi.org/10.1109/ICCAKM50778.2021.9357762","url":null,"abstract":"In a wireless sensor network, the sensor nodes collect information from the environment where they are deployed and send it to the base station, also called the sink, to be delivered to the end user. Many metrics such as the latency of communications and the energy consumption can be affected by the position of the sink. This position should be found before exploiting the network and routing information. In this paper, we propose two sink placement techniques in a wireless sensor network using the position of the other nodes in the network in order to minimize the latency of communication and the energy consumption. The computed position of the sink is as close as possible to every node of the network. Simulation results show that the average latency of communication and the average energy consumption of both proposed sink placement techniques are better than similar works existing in the literature.","PeriodicalId":165854,"journal":{"name":"2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130079189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1