首页 > 最新文献

2014 IEEE International Conference on Computational Intelligence and Computing Research最新文献

英文 中文
An enhanced K-means genetic algorithms for optimal clustering 一种改进的k均值遗传算法用于最优聚类
M. Anusha, J. Sathiaseelan
K-means algorithm is sensitive to the initial cluster centers and clustering results diverge with different initial input which in turn falls into local optimum. Genetic Algorithms are randomized searching technique which provides a better optimal solution for fitness function of an optimization problem. This paper proposes an enhanced K-means Genetic Algorithm for optimal clustering of data (EKMG). The aim is to maximize the compactness the clusters with large separation between at least two clusters. The superiority of EKMG is compared with grouping genetic algorithm (GGA) by using real-life dataset. The experiment shows that EKMG reaches better optimal solution with high accuracy.
K-means算法对初始聚类中心敏感,不同的初始输入会导致聚类结果出现偏差,从而陷入局部最优。遗传算法是一种随机搜索技术,它为优化问题的适应度函数提供了更好的最优解。提出了一种用于数据最优聚类的增强k -均值遗传算法。其目的是使至少两个簇之间有较大间隔的簇的紧凑性最大化。利用实际数据对比了EKMG算法与分组遗传算法(GGA)的优越性。实验结果表明,该方法能得到较好的最优解,且精度较高。
{"title":"An enhanced K-means genetic algorithms for optimal clustering","authors":"M. Anusha, J. Sathiaseelan","doi":"10.1109/ICCIC.2014.7238422","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238422","url":null,"abstract":"K-means algorithm is sensitive to the initial cluster centers and clustering results diverge with different initial input which in turn falls into local optimum. Genetic Algorithms are randomized searching technique which provides a better optimal solution for fitness function of an optimization problem. This paper proposes an enhanced K-means Genetic Algorithm for optimal clustering of data (EKMG). The aim is to maximize the compactness the clusters with large separation between at least two clusters. The superiority of EKMG is compared with grouping genetic algorithm (GGA) by using real-life dataset. The experiment shows that EKMG reaches better optimal solution with high accuracy.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128567639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Agent based simulation of routine activity with social learning behavior 基于智能体的日常活动与社会学习行为模拟
A. S
Routine activity theory and social learning theory are two most important aspects of criminal psychology. Routine activity theory states that criminal acts are caused due to the presence of criminals, victims and the absence of guardians in time and place. As the number of collision of these elements in place and time increases, criminal acts will also increase even if the number of criminals or civilians remains the same within the vicinity of a city. Street robbery is a typical example of routine activity theory and the occurrence of which can be predicted using routine activity theory. Agent-based models allow simulation of diversity among individuals. Therefore agent based simulation of street robbery can be used to visualize how chronological occurrences of human activity influence the incidence of street robbery. The conceptual model identifies three classes of people-criminals, civilians and police with certain activity areas for each. Police exist only as agents of formal guardianship. Criminals with a tendency for crime will be in the search for their victims. Civilians without criminal tendency can be either victims or guardians. These agents are subjected to random walk through a street environment guided by a Q-learning module and the possible outcomes are analyzed. Through the time period some civilian agents with a tendency to commit crime and have criminal background or criminal companions may turn into criminals. This phenomenon reflects social learning theory. The results compare gang and single robberies, robberies made on kids and women, tests on criminal social learning and comparison of different guardian patrolling strategies.
日常活动理论和社会学习理论是犯罪心理学的两个重要方面。常规活动理论认为,犯罪行为是由于犯罪人、被害人和监护人在时间和地点的缺席而引起的。随着这些要素在地点和时间上的碰撞次数的增加,在城市附近,即使犯罪分子或平民人数保持不变,犯罪行为也会增加。街头抢劫是常规活动理论的一个典型例子,它的发生可以用常规活动理论进行预测。基于代理的模型允许模拟个体之间的多样性。因此,基于智能体的街头抢劫模拟可以用来可视化人类活动的时间顺序如何影响街头抢劫的发生率。概念模型确定了三类人——罪犯、平民和警察,每一类人都有特定的活动领域。警察只是作为正式监护的代理人而存在。有犯罪倾向的罪犯会寻找他们的受害者。没有犯罪倾向的平民既可以是受害者,也可以是监护人。在q学习模块的引导下,这些智能体在街道环境中随机行走,并分析可能的结果。随着时间的推移,一些有犯罪倾向、有犯罪背景或有犯罪同伙的民事代理人可能转变为犯罪分子。这种现象反映了社会学习理论。结果比较了团伙抢劫和单人抢劫、针对儿童和妇女的抢劫、犯罪社会学习测试和不同监护人巡逻策略的比较。
{"title":"Agent based simulation of routine activity with social learning behavior","authors":"A. S","doi":"10.1109/ICCIC.2014.7238320","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238320","url":null,"abstract":"Routine activity theory and social learning theory are two most important aspects of criminal psychology. Routine activity theory states that criminal acts are caused due to the presence of criminals, victims and the absence of guardians in time and place. As the number of collision of these elements in place and time increases, criminal acts will also increase even if the number of criminals or civilians remains the same within the vicinity of a city. Street robbery is a typical example of routine activity theory and the occurrence of which can be predicted using routine activity theory. Agent-based models allow simulation of diversity among individuals. Therefore agent based simulation of street robbery can be used to visualize how chronological occurrences of human activity influence the incidence of street robbery. The conceptual model identifies three classes of people-criminals, civilians and police with certain activity areas for each. Police exist only as agents of formal guardianship. Criminals with a tendency for crime will be in the search for their victims. Civilians without criminal tendency can be either victims or guardians. These agents are subjected to random walk through a street environment guided by a Q-learning module and the possible outcomes are analyzed. Through the time period some civilian agents with a tendency to commit crime and have criminal background or criminal companions may turn into criminals. This phenomenon reflects social learning theory. The results compare gang and single robberies, robberies made on kids and women, tests on criminal social learning and comparison of different guardian patrolling strategies.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128269175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of LPCC and MFCC features and GMM and GMM-UBM modeling for limited data speaker verification LPCC和MFCC特征及GMM和GMM- ubm模型在有限数据说话人验证中的比较
Jayanthi Kumari, H. S. Jayanna
This work address text-independent speaker verification with the constraint of limited data (<;15 seconds). The existing techniques for speaker verification work well for sufficient data (>1 minute). Developing techniques for verifying the speakers for limited data condition is a challenging issue since data available of speakers is very small nowadays. This is because people reluctant to give more data. In this work to extract features of speech signal Mel-Frequency Cepstral Coefficients (MFCC) and Linear Prediction Cepstral Coefficients (LPCC) are used. The extracted features are modeled using Gaussian Mixture Model (GMM) and GMM-Universal Background Model (UBM) modeling techniques. The NIST-2003 database is used to carry-out the experiments. The experiments are evaluated for limited amount of training and testing speech data. The experimental observation indicates that the Equal Error Rate of LPCC features is less as compared to MFCC for limited data.
本研究解决了在有限数据(1分钟)约束下的文本无关说话人验证问题。由于目前扬声器的可用数据非常少,因此开发有限数据条件下的扬声器验证技术是一个具有挑战性的问题。这是因为人们不愿意提供更多的数据。本文采用频率倒谱系数(MFCC)和线性预测倒谱系数(LPCC)提取语音信号的特征。利用高斯混合模型(GMM)和GMM-通用背景模型(UBM)建模技术对提取的特征进行建模。实验采用NIST-2003数据库进行。实验是针对有限的训练和测试语音数据进行评估的。实验观察表明,在有限的数据条件下,LPCC特征的等错误率比MFCC要小。
{"title":"Comparison of LPCC and MFCC features and GMM and GMM-UBM modeling for limited data speaker verification","authors":"Jayanthi Kumari, H. S. Jayanna","doi":"10.1109/ICCIC.2014.7238329","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238329","url":null,"abstract":"This work address text-independent speaker verification with the constraint of limited data (<;15 seconds). The existing techniques for speaker verification work well for sufficient data (>1 minute). Developing techniques for verifying the speakers for limited data condition is a challenging issue since data available of speakers is very small nowadays. This is because people reluctant to give more data. In this work to extract features of speech signal Mel-Frequency Cepstral Coefficients (MFCC) and Linear Prediction Cepstral Coefficients (LPCC) are used. The extracted features are modeled using Gaussian Mixture Model (GMM) and GMM-Universal Background Model (UBM) modeling techniques. The NIST-2003 database is used to carry-out the experiments. The experiments are evaluated for limited amount of training and testing speech data. The experimental observation indicates that the Equal Error Rate of LPCC features is less as compared to MFCC for limited data.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128958028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Towards OpenFlow based software defined networks 基于OpenFlow的软件定义网络
Pallavi Chhikara, G. Matharu, V. Deep
Software defined networks (SDN) are an emerging technology that is being increasingly adopted by various network operators. These technologies provide new services and powerful analytics that help to transform the network and unfasten its intelligence to serve today's business demands. This paper briefs about the need for change in the current networking technology and explores the role of Open Flow protocol that is used by researchers to experiment with more realistic settings to provide for a new network architecture. Further, this paper discusses the advantages offered by SDN and the huge potential of OpenFlow based SDN. As SDN can simplify management of virtualized networks, enable cloud computing and reduce costs, the vendors would be encouraged to adopt SDN and OpenFlow. The objective of this paper is to provide an insight into the latest technology to the vendors to assist them in future enhancement of their switch products in the network.
软件定义网络(SDN)是一种新兴技术,越来越多地被各种网络运营商所采用。这些技术提供了新的服务和强大的分析,有助于改变网络并解除其智能,以满足当今的业务需求。本文简要介绍了当前网络技术变革的必要性,并探讨了开放流协议的作用,该协议被研究人员用于实验更现实的设置,以提供新的网络体系结构。此外,本文还讨论了SDN提供的优势以及基于OpenFlow的SDN的巨大潜力。由于SDN可以简化虚拟化网络的管理,实现云计算,降低成本,因此鼓励供应商采用SDN和OpenFlow。本文的目的是为供应商提供最新技术的见解,以帮助他们未来在网络中增强他们的交换机产品。
{"title":"Towards OpenFlow based software defined networks","authors":"Pallavi Chhikara, G. Matharu, V. Deep","doi":"10.1109/ICCIC.2014.7238395","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238395","url":null,"abstract":"Software defined networks (SDN) are an emerging technology that is being increasingly adopted by various network operators. These technologies provide new services and powerful analytics that help to transform the network and unfasten its intelligence to serve today's business demands. This paper briefs about the need for change in the current networking technology and explores the role of Open Flow protocol that is used by researchers to experiment with more realistic settings to provide for a new network architecture. Further, this paper discusses the advantages offered by SDN and the huge potential of OpenFlow based SDN. As SDN can simplify management of virtualized networks, enable cloud computing and reduce costs, the vendors would be encouraged to adopt SDN and OpenFlow. The objective of this paper is to provide an insight into the latest technology to the vendors to assist them in future enhancement of their switch products in the network.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129006074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive hierarchical control for a class of MIMO uncertain underactuated systems 一类MIMO不确定欠驱动系统的自适应层次控制
A. Kulkarni, A. Kumar
This paper presents an adaptive control strategy which combines the hierarchical control scheme with adaptive wavelet neural network for a class of multi-input multi-output (MIMO) underactuated systems with uncertain dynamics. Proposed scheme develops a systematic framework of the control components by applying hierarchical scheme to underactuated system. Wavelet neural networks are used to mimic the system uncertainties. Adaptive parameters of the wavelet network are tuned on line using gradient based approach. Uniformly ultimately bounded (UUB) stability of the closed loop system is analyzed in the sense of Lyapunov theory. Simulation results demonstrate the performance of proposed control scheme.
针对一类动态不确定的多输入多输出欠驱动系统,提出了一种将层次控制与自适应小波神经网络相结合的自适应控制策略。该方案将层次结构应用于欠驱动系统,建立了控制元件的系统框架。采用小波神经网络模拟系统的不确定性。采用基于梯度的方法在线调整小波网络的自适应参数。从李雅普诺夫理论的意义上分析了闭环系统的一致最终有界稳定性。仿真结果验证了所提控制方案的有效性。
{"title":"Adaptive hierarchical control for a class of MIMO uncertain underactuated systems","authors":"A. Kulkarni, A. Kumar","doi":"10.1109/ICCIC.2014.7238353","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238353","url":null,"abstract":"This paper presents an adaptive control strategy which combines the hierarchical control scheme with adaptive wavelet neural network for a class of multi-input multi-output (MIMO) underactuated systems with uncertain dynamics. Proposed scheme develops a systematic framework of the control components by applying hierarchical scheme to underactuated system. Wavelet neural networks are used to mimic the system uncertainties. Adaptive parameters of the wavelet network are tuned on line using gradient based approach. Uniformly ultimately bounded (UUB) stability of the closed loop system is analyzed in the sense of Lyapunov theory. Simulation results demonstrate the performance of proposed control scheme.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125686645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to discover the best-fit factors for the optimal performance of Hadoop map reduce in virtualized environment 一种在虚拟化环境下发现Hadoop map reduce最优性能的最适合因子的方法
Solaimurugan Vellaipandiyan, V. Srikrishnan
Map Reduce pioneered by Google is mainly employed in Big Data analytics. In Map Reduce environment, most of the algorithms are re-used for mining the data. Prediction of execution time and system overhead of MapReduce job is very vital, from which performance shall be ascertained. Cloud computing is widely used as a computing platform in business and academic communities. Performance plays a major role, when user runs an application in the cloud. User may want to estimate the application execution time (latency) before submitting a Task or a Job. Hadoop clusters are deployed on Cloud environment performing the experiment. System overhead is determined by running Map Reduce job over Hadoop Clusters. While performing the experiment, metrics such as network I/O, CPU, Swap utilization, Time to complete the job and RSS, VSZ were captured and evaluated in order to diagnose, how performance of Hadoop is influenced by reconstructing the block size and split size with respect to block size.
b谷歌首创的Map Reduce主要用于大数据分析。在Map Reduce环境中,大多数算法被重用来进行数据挖掘。预测MapReduce作业的执行时间和系统开销是非常重要的,可以从中确定性能。云计算作为一种计算平台被广泛应用于企业界和学术界。当用户在云中运行应用程序时,性能起着重要作用。用户可能希望在提交Task或Job之前估计应用程序的执行时间(延迟)。在Cloud环境中部署Hadoop集群进行实验。系统开销是由在Hadoop集群上运行Map Reduce作业决定的。在执行实验时,捕获并评估了诸如网络I/O、CPU、Swap利用率、完成作业的时间以及RSS、VSZ等指标,以便诊断Hadoop的性能如何受到重构块大小和拆分大小对块大小的影响。
{"title":"An approach to discover the best-fit factors for the optimal performance of Hadoop map reduce in virtualized environment","authors":"Solaimurugan Vellaipandiyan, V. Srikrishnan","doi":"10.1109/ICCIC.2014.7238471","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238471","url":null,"abstract":"Map Reduce pioneered by Google is mainly employed in Big Data analytics. In Map Reduce environment, most of the algorithms are re-used for mining the data. Prediction of execution time and system overhead of MapReduce job is very vital, from which performance shall be ascertained. Cloud computing is widely used as a computing platform in business and academic communities. Performance plays a major role, when user runs an application in the cloud. User may want to estimate the application execution time (latency) before submitting a Task or a Job. Hadoop clusters are deployed on Cloud environment performing the experiment. System overhead is determined by running Map Reduce job over Hadoop Clusters. While performing the experiment, metrics such as network I/O, CPU, Swap utilization, Time to complete the job and RSS, VSZ were captured and evaluated in order to diagnose, how performance of Hadoop is influenced by reconstructing the block size and split size with respect to block size.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"81 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133007581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal orthogonal pilots design for MIMO-OFDM channel estimation MIMO-OFDM信道估计的最佳正交导频设计
K. Sagar, P. Palanisamy
This paper presents a pilot based channel estimation method for MIMO-OFDM systems, the combination of MIMO with OFDM is used to increase the bit rate as well as capacity. The existing channel estimation methods uses more OFDM periods (STBC) and gives high MSE(conventional pilots). The proposed channel estimation method has very low complexity, With these orthogonal pilots we can obtain the optimal MSE which is 25% of conventional pilot method MSE and it effectively utilizes OFDM periods compared to STBC pilot method. Experimental results show that the proposed method achieves higher accuracy and gives better performance.
提出了一种基于导频的MIMO-OFDM系统信道估计方法,将MIMO与OFDM相结合,提高了信道的比特率和容量。现有的信道估计方法使用了更多的OFDM周期(STBC),并给出了较高的MSE(传统导频)。本文提出的信道估计方法具有非常低的复杂度,利用这些正交导频可以获得最优的MSE,其MSE是传统导频方法MSE的25%,并且与STBC导频方法相比,它有效地利用了OFDM周期。实验结果表明,该方法具有较高的精度和较好的性能。
{"title":"Optimal orthogonal pilots design for MIMO-OFDM channel estimation","authors":"K. Sagar, P. Palanisamy","doi":"10.1109/ICCIC.2014.7238286","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238286","url":null,"abstract":"This paper presents a pilot based channel estimation method for MIMO-OFDM systems, the combination of MIMO with OFDM is used to increase the bit rate as well as capacity. The existing channel estimation methods uses more OFDM periods (STBC) and gives high MSE(conventional pilots). The proposed channel estimation method has very low complexity, With these orthogonal pilots we can obtain the optimal MSE which is 25% of conventional pilot method MSE and it effectively utilizes OFDM periods compared to STBC pilot method. Experimental results show that the proposed method achieves higher accuracy and gives better performance.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132100591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of task scheduling with priority and non-priority in cloud computing 云计算中具有优先级和非优先级的任务调度性能评价
Nidhi Bansal, M. Dutta
Minimizing the total allocation cost is an unavoidable issue needing to be deal with in task scheduling of cloud computing for processing all the tasks. In this paper, the comparative study has been done among the priority algorithms and secondly between the priority and non-priority task scheduling algorithms. In order to emulate the precedence relation of task, the task scheduling algorithms enumerate the priority of tasks according to the specific attributes of task, and then sort tasks by priority. The total allocation costs for each scheduling algorithm are calculated. The experimental results based on cloudsim3.0 toolkit with NetBeans IDE8.0 shows that the ABC algorithm (priority based) achieves good performance in cost parameter with the comparison of QoS driven, virtual machine tree (both are priority based) and traditional scheduling algorithms but the comparison of ABC (priority based) and PSO (non priority based) shows that the non priority algorithm gives best performance due to less waiting time to allocation task.
最小化总分配成本是云计算任务调度中不可避免要解决的问题。本文首先对优先级调度算法进行了比较研究,其次对优先级和非优先级任务调度算法进行了比较研究。为了模拟任务的优先级关系,任务调度算法根据任务的具体属性枚举任务的优先级,然后按优先级对任务进行排序。计算了各调度算法的总分配成本。基于cloudsim3.0工具箱和NetBeans IDE8.0的实验结果表明,ABC算法(基于优先级)与QoS驱动、虚拟机树(均基于优先级)和传统调度算法相比,在成本参数上取得了较好的性能,而ABC算法(基于优先级)和PSO算法(非基于优先级)的比较表明,非优先级算法由于分配任务的等待时间较少,具有最佳性能。
{"title":"Performance evaluation of task scheduling with priority and non-priority in cloud computing","authors":"Nidhi Bansal, M. Dutta","doi":"10.1109/ICCIC.2014.7238289","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238289","url":null,"abstract":"Minimizing the total allocation cost is an unavoidable issue needing to be deal with in task scheduling of cloud computing for processing all the tasks. In this paper, the comparative study has been done among the priority algorithms and secondly between the priority and non-priority task scheduling algorithms. In order to emulate the precedence relation of task, the task scheduling algorithms enumerate the priority of tasks according to the specific attributes of task, and then sort tasks by priority. The total allocation costs for each scheduling algorithm are calculated. The experimental results based on cloudsim3.0 toolkit with NetBeans IDE8.0 shows that the ABC algorithm (priority based) achieves good performance in cost parameter with the comparison of QoS driven, virtual machine tree (both are priority based) and traditional scheduling algorithms but the comparison of ABC (priority based) and PSO (non priority based) shows that the non priority algorithm gives best performance due to less waiting time to allocation task.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128833034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A skew detection and correction technique for Arabic script text-line based on subwords bounding 基于子词边界的阿拉伯文文本行倾斜检测与校正技术
Atallah Al-Shatnawi
Text-line skew detection and correction is the first step in Arabic document recognition and analysis. It is a crucial pre-processing stage of Arabic Character Recognition (ACR). It has a direct effect on the dependability and efficiency of other system stages such as baseline detection, segmentation and feature extraction stages. In this paper an efficient skew detection and correction method for Arabic handwritten text-line based on sub-words bounding is presented. It is constructed from three stages including: pre-processing, skew detection and skew correction stages. The proposed method estimates a text-line baseline based on calculating the middle point for its sub-words bounding. Then align the text-line components on the estimated baseline. The proposed method is implemented on 3960 text-line handwritten images, which were written by 40 writers. It is discussed with the horizontal projection method in terms of effectiveness. The proposed method obtained an accuracy ratio of 96.15%, and takes 6.7 seconds as average time. It can also automatically detect text baselines of documents with any orientation.
文本行歪斜的检测和校正是阿拉伯文文件识别和分析的第一步。预处理是阿拉伯字符识别(ACR)的关键预处理阶段。它直接影响到系统其他阶段的可靠性和效率,如基线检测、分割和特征提取阶段。本文提出了一种基于子词边界的阿拉伯语手写文本行倾斜检测与校正方法。它由预处理、倾斜检测和倾斜校正三个阶段组成。该方法通过计算子词边界的中点来估计文本行基线。然后在估计的基线上对齐文本行组件。该方法在40位写作者的3960幅文本行手写图像上实现。从有效性方面与水平投影法进行了讨论。该方法的准确率为96.15%,平均时间为6.7秒。它还可以自动检测任何方向文档的文本基线。
{"title":"A skew detection and correction technique for Arabic script text-line based on subwords bounding","authors":"Atallah Al-Shatnawi","doi":"10.1109/ICCIC.2014.7238501","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238501","url":null,"abstract":"Text-line skew detection and correction is the first step in Arabic document recognition and analysis. It is a crucial pre-processing stage of Arabic Character Recognition (ACR). It has a direct effect on the dependability and efficiency of other system stages such as baseline detection, segmentation and feature extraction stages. In this paper an efficient skew detection and correction method for Arabic handwritten text-line based on sub-words bounding is presented. It is constructed from three stages including: pre-processing, skew detection and skew correction stages. The proposed method estimates a text-line baseline based on calculating the middle point for its sub-words bounding. Then align the text-line components on the estimated baseline. The proposed method is implemented on 3960 text-line handwritten images, which were written by 40 writers. It is discussed with the horizontal projection method in terms of effectiveness. The proposed method obtained an accuracy ratio of 96.15%, and takes 6.7 seconds as average time. It can also automatically detect text baselines of documents with any orientation.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125716888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mining interesting itemsets from transactional database 从事务性数据库中挖掘感兴趣的项目集
K. Sumangali, R. Aishwarya, E. Hemavathi, A. Niraimathi
Association rule mining is a standard technique used for finding the relationships among the itemsets in a database. The method of extracting the frequent itemsets from the database using existing algorithms has several disadvantages such as generation of large number of candidate itemsets, increase in computational time and database scan. With this aim, the paper proposes Mining Interesting Itemsets (MIIS) algorithm which combines the features of partition algorithm and FP tree which reduces the database scan and produces the reduced itemsets from the transactions. The reduced itemsets are validated using the mathematical measures.
关联规则挖掘是一种用于查找数据库中项目集之间关系的标准技术。使用现有算法从数据库中提取频繁项集的方法存在产生大量候选项集、增加计算时间和数据库扫描等缺点。为此,本文提出了挖掘兴趣项集(MIIS)算法,该算法结合了分区算法和FP树的特点,减少了数据库扫描,并从事务中产生约简的项集。利用数学方法对简化后的项目集进行了验证。
{"title":"Mining interesting itemsets from transactional database","authors":"K. Sumangali, R. Aishwarya, E. Hemavathi, A. Niraimathi","doi":"10.1109/ICCIC.2014.7238414","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238414","url":null,"abstract":"Association rule mining is a standard technique used for finding the relationships among the itemsets in a database. The method of extracting the frequent itemsets from the database using existing algorithms has several disadvantages such as generation of large number of candidate itemsets, increase in computational time and database scan. With this aim, the paper proposes Mining Interesting Itemsets (MIIS) algorithm which combines the features of partition algorithm and FP tree which reduces the database scan and produces the reduced itemsets from the transactions. The reduced itemsets are validated using the mathematical measures.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125721394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 IEEE International Conference on Computational Intelligence and Computing Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1