首页 > 最新文献

2022 3rd International Conference for Emerging Technology (INCET)最新文献

英文 中文
Transient Analysis of Fog Nodes with Catastrophes 具有突变的雾节点瞬态分析
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824789
Mahmoud Al Ahmad, Saed Alnazer, S. Patra
The networking business has recently seen significant transformations. It also necessitates high-speed operations and the ability to solve difficult problems. The Internet-of-Things (IoT) is being presented as a method to manage these changes from a variety of technical perspectives. Handling such large amounts of network data, as well as its privacy and security, as well as QoS requirements and the variety of underlying networking components, are all issues in IoT implementations. Fog computing is a new technology paradigm that instead of executing in the cloud, delivers a set of networking services closer to the user. In terms of minimising latency, scalability of the networking infrastructure, reliability in networking services, and security in networking devices, fog computing outperforms cloud computing. As a result, fog computing has altered the technical mindset by bringing cloud-based networking services closer to the client level in order to give the highest quality of service. There are numerous scenarios in which fog servers fail. We investigate the model with Markovian queue having heterogeneous VMs and fog server catastrophes in this work. Exact formulas for the transient probabilities of system capacity are obtained for queues with discouraged arrival and infinite VMs.
网络业务最近经历了重大变革。它还需要高速操作和解决难题的能力。物联网(IoT)被认为是一种从各种技术角度管理这些变化的方法。处理如此大量的网络数据,以及其隐私和安全性,以及QoS要求和各种底层网络组件,都是物联网实施中的问题。雾计算是一种新的技术范例,它不是在云中执行,而是提供一组更接近用户的网络服务。在最小化延迟、网络基础设施的可扩展性、网络服务的可靠性和网络设备的安全性方面,雾计算优于云计算。因此,雾计算通过使基于云的网络服务更接近客户端来提供最高质量的服务,从而改变了技术思维方式。雾服务器出现故障的场景有很多。本文研究了具有异构虚拟机和雾服务器灾难的马尔可夫队列模型。得到了系统容量暂态概率的精确公式。
{"title":"Transient Analysis of Fog Nodes with Catastrophes","authors":"Mahmoud Al Ahmad, Saed Alnazer, S. Patra","doi":"10.1109/incet54531.2022.9824789","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824789","url":null,"abstract":"The networking business has recently seen significant transformations. It also necessitates high-speed operations and the ability to solve difficult problems. The Internet-of-Things (IoT) is being presented as a method to manage these changes from a variety of technical perspectives. Handling such large amounts of network data, as well as its privacy and security, as well as QoS requirements and the variety of underlying networking components, are all issues in IoT implementations. Fog computing is a new technology paradigm that instead of executing in the cloud, delivers a set of networking services closer to the user. In terms of minimising latency, scalability of the networking infrastructure, reliability in networking services, and security in networking devices, fog computing outperforms cloud computing. As a result, fog computing has altered the technical mindset by bringing cloud-based networking services closer to the client level in order to give the highest quality of service. There are numerous scenarios in which fog servers fail. We investigate the model with Markovian queue having heterogeneous VMs and fog server catastrophes in this work. Exact formulas for the transient probabilities of system capacity are obtained for queues with discouraged arrival and infinite VMs.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123105813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the development of complex social systems of characters in a work of literary fiction 分析一部文学小说作品中人物复杂社会系统的发展
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824015
A. Jayakumar, Vedica Rao, A.S. Rohit Kumar, Prithwijit Banerjee, Roopa Ravish
Studying character interactions and personalities plays an important role in representing and interpreting narratives. Most research work pertaining to the analysis of characters in fictional novels disregard development and assume static relationships and roles of characters. The proposed approach centers on interpreting relationships and personalities as temporally evolving entities with the progress of the novel or narrative. The focus is to model the developing characteristics of literary works as a dynamic and ever-changing network of edges and nodes representing protagonists and their communications with fellow characters, through which we can study the significance and interactions of important characters in various literary texts. The approach also seeks to extract dialogue of characters, identify their personality traits and the personality change or development over the course of the novel. The proposed methodologies are primarily intended to be applied in the fields of literary analysis, with more practical applications to be used by writers and scriptwriters for visualisation and analysis of their work. Extraneously, the work could also be applied to learn desirable personality traits and personality development of influential people through their literary works.
研究角色互动和个性在表现和解释叙事中起着重要作用。大多数与虚构小说人物分析有关的研究工作都忽略了发展,假设人物的静态关系和角色。所提出的方法集中于将关系和个性解释为随着小说或叙事的进展而暂时演变的实体。重点是将文学作品的发展特征建模为一个动态的、不断变化的边缘和节点网络,代表主人公及其与其他人物的交流,通过这个网络,我们可以研究各种文学文本中重要人物的意义和互动。这种方法还试图提取人物的对话,识别他们的个性特征和个性在小说过程中的变化或发展。所提出的方法主要用于文学分析领域,更多的实际应用将被作家和编剧用于可视化和分析他们的作品。此外,本研究还可以应用于通过文学作品了解有影响力人物的理想人格特征和人格发展。
{"title":"Analyzing the development of complex social systems of characters in a work of literary fiction","authors":"A. Jayakumar, Vedica Rao, A.S. Rohit Kumar, Prithwijit Banerjee, Roopa Ravish","doi":"10.1109/incet54531.2022.9824015","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824015","url":null,"abstract":"Studying character interactions and personalities plays an important role in representing and interpreting narratives. Most research work pertaining to the analysis of characters in fictional novels disregard development and assume static relationships and roles of characters. The proposed approach centers on interpreting relationships and personalities as temporally evolving entities with the progress of the novel or narrative. The focus is to model the developing characteristics of literary works as a dynamic and ever-changing network of edges and nodes representing protagonists and their communications with fellow characters, through which we can study the significance and interactions of important characters in various literary texts. The approach also seeks to extract dialogue of characters, identify their personality traits and the personality change or development over the course of the novel. The proposed methodologies are primarily intended to be applied in the fields of literary analysis, with more practical applications to be used by writers and scriptwriters for visualisation and analysis of their work. Extraneously, the work could also be applied to learn desirable personality traits and personality development of influential people through their literary works.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Objective Cuckoo Search Optimization Algorithm for Optimal Resource Allocation in Cloud Environment 云环境下资源优化分配的多目标布谷鸟搜索优化算法
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9823985
Mufeed Ahmed Naji Saif, Vasudha, S. Niranjan, Belal Abdullah Hezam Murshed
Cloud technology refer to a pool of virtualized heterogeneous computational resources which are served to different customers as a service through the internet. These virtualized resources get provisioned to cloud users dynamically based on demand. however, dealing with resources in such a dynamic environment is still a challenging task. Deciding the way, the available cloud computational resources get allocated to the workload requires efficient provisioning and allocation techniques. The clients need to operate their various applications on cloud servers with variant Quality of Service (QoS) requirements based on the workloads and type of application whereas the objective of the cloud providers is effectively reducing the energy consumption by optimizing the CPU and bandwidth utilization and maintaining the Service Level Agreement (SLA). This, however, makes resource provisioning and allocation a very complicated task. This article implements the meta-heuristic Multi-Objective Cuckoo Search Algorithm (MOCSA) for efficient resource allocation to dynamic upcoming user workloads and scheduling user tasks on cloud VMs, which aim at minimizing the energy consumption with efficient utilization of CPU and bandwidth. The implementation and simulation experiments were conducted on the Cloudsim simulation toolkit. The evaluation results proved that MOCSA performed well in terms of performance, energy consumption, CPU utilization, bandwidth utilization, and SLA violation.
云技术指的是一个虚拟化的异构计算资源池,这些资源通过互联网作为服务提供给不同的客户。这些虚拟化资源可以根据需求动态地提供给云用户。然而,在这样一个动态的环境中处理资源仍然是一项具有挑战性的任务。决定将可用的云计算资源分配给工作负载的方式需要有效的供应和分配技术。客户需要根据工作负载和应用程序类型在具有不同服务质量(QoS)要求的云服务器上运行其各种应用程序,而云提供商的目标是通过优化CPU和带宽利用率并维护服务水平协议(SLA)来有效降低能耗。然而,这使得资源供应和分配成为一项非常复杂的任务。本文实现了一种基于元启发式的多目标杜鹃搜索算法(MOCSA),用于在云虚拟机上对动态即将到来的用户工作负载进行有效的资源分配和用户任务调度,目的是在有效利用CPU和带宽的同时最大限度地降低能耗。在Cloudsim仿真工具包上进行了实现和仿真实验。评价结果表明,mosa在性能、能耗、CPU利用率、带宽利用率、SLA违反等方面表现良好。
{"title":"Multi-Objective Cuckoo Search Optimization Algorithm for Optimal Resource Allocation in Cloud Environment","authors":"Mufeed Ahmed Naji Saif, Vasudha, S. Niranjan, Belal Abdullah Hezam Murshed","doi":"10.1109/incet54531.2022.9823985","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9823985","url":null,"abstract":"Cloud technology refer to a pool of virtualized heterogeneous computational resources which are served to different customers as a service through the internet. These virtualized resources get provisioned to cloud users dynamically based on demand. however, dealing with resources in such a dynamic environment is still a challenging task. Deciding the way, the available cloud computational resources get allocated to the workload requires efficient provisioning and allocation techniques. The clients need to operate their various applications on cloud servers with variant Quality of Service (QoS) requirements based on the workloads and type of application whereas the objective of the cloud providers is effectively reducing the energy consumption by optimizing the CPU and bandwidth utilization and maintaining the Service Level Agreement (SLA). This, however, makes resource provisioning and allocation a very complicated task. This article implements the meta-heuristic Multi-Objective Cuckoo Search Algorithm (MOCSA) for efficient resource allocation to dynamic upcoming user workloads and scheduling user tasks on cloud VMs, which aim at minimizing the energy consumption with efficient utilization of CPU and bandwidth. The implementation and simulation experiments were conducted on the Cloudsim simulation toolkit. The evaluation results proved that MOCSA performed well in terms of performance, energy consumption, CPU utilization, bandwidth utilization, and SLA violation.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"164 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120866335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Containerized MPI Application on InfiniBand based HPC: An Empirical Study 基于ib的高性能计算平台容器化MPI应用的实证研究
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824366
Mandeep Kumar, Gagandeep Kaur
Nowadays, containerization techniques for High Performance Computing (HPC) are becoming more prominent with the increase in the features and complexity of scientific applications. Message Passing Interface (MPI) applications have many dependencies in terms of other scientific libraries, new patches, new code versions, and bug fixes to effectively execute scientific workloads. The tasks of updating the version of the code, installing new patches, and troubleshooting build issues are very time-consuming and complicated. These problems are tackled by making MPI applications portable through the use of the containerization concept, which hides system-level dependencies and complexities. This work presents the challenges and approaches for building and executing containerized MPI applications on InfiniBand based HPC. The comprehensive performance evaluation of a containerized MPI application converted from Docker to Singularity is performed on HPC up to 880 MPI ranks using InfiniBand in reference to bare metal. In addition, profiling of MPI applications is done by running them in an isolated container environment on InfiniBand based HPC with 640 MPI ranks.
随着科学应用的特点和复杂性的增加,高性能计算(HPC)的容器化技术日益得到重视。为了有效地执行科学工作负载,消息传递接口(MPI)应用程序在其他科学库、新补丁、新代码版本和错误修复方面有许多依赖关系。更新代码版本、安装新补丁以及对构建问题进行故障排除等任务非常耗时且复杂。通过使用容器化概念使MPI应用程序可移植来解决这些问题,容器化概念隐藏了系统级依赖关系和复杂性。这项工作提出了在基于InfiniBand的HPC上构建和执行容器化MPI应用程序的挑战和方法。从Docker到Singularity的容器化MPI应用程序的综合性能评估是在高达880 MPI等级的HPC上执行的,使用InfiniBand参考裸机。此外,MPI应用程序的分析是通过在基于InfiniBand的HPC的隔离容器环境中运行它们来完成的,该HPC具有640个MPI级别。
{"title":"Containerized MPI Application on InfiniBand based HPC: An Empirical Study","authors":"Mandeep Kumar, Gagandeep Kaur","doi":"10.1109/incet54531.2022.9824366","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824366","url":null,"abstract":"Nowadays, containerization techniques for High Performance Computing (HPC) are becoming more prominent with the increase in the features and complexity of scientific applications. Message Passing Interface (MPI) applications have many dependencies in terms of other scientific libraries, new patches, new code versions, and bug fixes to effectively execute scientific workloads. The tasks of updating the version of the code, installing new patches, and troubleshooting build issues are very time-consuming and complicated. These problems are tackled by making MPI applications portable through the use of the containerization concept, which hides system-level dependencies and complexities. This work presents the challenges and approaches for building and executing containerized MPI applications on InfiniBand based HPC. The comprehensive performance evaluation of a containerized MPI application converted from Docker to Singularity is performed on HPC up to 880 MPI ranks using InfiniBand in reference to bare metal. In addition, profiling of MPI applications is done by running them in an isolated container environment on InfiniBand based HPC with 640 MPI ranks.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121003931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Deep learning based Safe Travel Advisory Tool for Covid-19 基于深度学习的Covid-19安全旅行咨询工具
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824039
Haripada Pal, J. Rohith Sundar, Deepanshu, Anamika Chauhan
Looking at the massive spread of SARS CoV2(COVID-19), it not only requires medical solutions at this point but different alternatives must also be examined to prevent its contagious nature getting its hands on a large number of individuals. Getting some prior information before its actual cause can help us to prepare ourselves to fight this pandemic better. It can assist authorities and administration to make better decisions in relatively less time to figure out the most suitable solutions. Since it is difficult to devise a permanent solution to this kind of pandemic, such data analysis can be used to strategize ourselves to cope with it. This study focuses on the forecasting of the number of active cases using deep neural networks. The models used in this approach are Multilayer Perceptron(MLP), Convolution Neural Networks(CNN) and Long Short Term Memory(LSTM). The performance of all three models is analyzed and although all of them are reasonably well, the MLP model outperforms the other two. These models can be used to predict the number of cases on a given day and a potential future outbreak.
考虑到SARS CoV2(COVID-19)的大规模传播,目前不仅需要医疗解决方案,还必须研究不同的替代方案,以防止其传染性感染大量个体。在其实际原因之前获得一些事先信息可以帮助我们更好地做好准备,以应对这一流行病。它可以帮助当局和行政部门在相对较短的时间内做出更好的决策,找出最合适的解决方案。由于很难为这种流行病制定一个永久的解决方案,因此可以利用这种数据分析来制定应对这种流行病的战略。本研究的重点是使用深度神经网络预测活跃病例的数量。该方法中使用的模型是多层感知器(MLP)、卷积神经网络(CNN)和长短期记忆(LSTM)。对这三种模型的性能进行了分析,尽管它们都相当不错,但MLP模型的性能优于其他两种模型。这些模型可用于预测某一天的病例数和未来可能爆发的疫情。
{"title":"A Deep learning based Safe Travel Advisory Tool for Covid-19","authors":"Haripada Pal, J. Rohith Sundar, Deepanshu, Anamika Chauhan","doi":"10.1109/incet54531.2022.9824039","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824039","url":null,"abstract":"Looking at the massive spread of SARS CoV2(COVID-19), it not only requires medical solutions at this point but different alternatives must also be examined to prevent its contagious nature getting its hands on a large number of individuals. Getting some prior information before its actual cause can help us to prepare ourselves to fight this pandemic better. It can assist authorities and administration to make better decisions in relatively less time to figure out the most suitable solutions. Since it is difficult to devise a permanent solution to this kind of pandemic, such data analysis can be used to strategize ourselves to cope with it. This study focuses on the forecasting of the number of active cases using deep neural networks. The models used in this approach are Multilayer Perceptron(MLP), Convolution Neural Networks(CNN) and Long Short Term Memory(LSTM). The performance of all three models is analyzed and although all of them are reasonably well, the MLP model outperforms the other two. These models can be used to predict the number of cases on a given day and a potential future outbreak.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 5-Bit Rectangular Resonator Array for Biomedical Applications 用于生物医学应用的5位矩形谐振器阵列
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824590
Mandadi Mary Arpitha, Priyabrata Sethy, S. Behera
Recent studies lay a strong base that chipless RFID technology is going to continue its reign in the radio wireless communications domain because of its cost-effectiveness and flexible printing techniques. These tags facilitate multi-bit storage capacity. In the proposed work a novel design of concentric square ring resonators is presented. An array of four of such resonators separated by a plus-shaped resonator completes the tag design. This complete structure makes the tag resonate at the frequencies of 1.7GHz, 2.4GHz, 3.7 GHz, 5.4GHz, and 9.5 GHz. These resonating frequencies model the tag suitable for ISM band and biomedical applications. The attained frequencies are attested with the RCS plot and the current distribution patterns
最近的研究奠定了坚实的基础,无芯片射频识别技术将继续其统治在无线电无线通信领域,因为它的成本效益和灵活的印刷技术。这些标签促进了多比特的存储容量。本文提出了一种新的同心圆环形谐振器的设计方法。由四个这样的谐振器组成的阵列由一个加号谐振器分开,完成了标签的设计。这种完整的结构使得标签可以在1.7GHz、2.4GHz、3.7 GHz、5.4GHz和9.5 GHz的频率上共振。这些共振频率模型的标签适合ISM波段和生物医学应用。用RCS图和电流分布模式对所得频率进行了验证
{"title":"A 5-Bit Rectangular Resonator Array for Biomedical Applications","authors":"Mandadi Mary Arpitha, Priyabrata Sethy, S. Behera","doi":"10.1109/incet54531.2022.9824590","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824590","url":null,"abstract":"Recent studies lay a strong base that chipless RFID technology is going to continue its reign in the radio wireless communications domain because of its cost-effectiveness and flexible printing techniques. These tags facilitate multi-bit storage capacity. In the proposed work a novel design of concentric square ring resonators is presented. An array of four of such resonators separated by a plus-shaped resonator completes the tag design. This complete structure makes the tag resonate at the frequencies of 1.7GHz, 2.4GHz, 3.7 GHz, 5.4GHz, and 9.5 GHz. These resonating frequencies model the tag suitable for ISM band and biomedical applications. The attained frequencies are attested with the RCS plot and the current distribution patterns","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple Multicast Architecture for XMPP based Applications 基于XMPP应用的多组播体系结构
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824745
B. R. Harshitha, Niyati B Mehta, Shivangi Rai, Deepti, S. Sheela, SM Dilip Kumar
Extensible Messaging Presence Protocol (XMPP) is a real-time information transmission specification protocol that is based on IP technology and Extensible Markup Language supporting publish/subscribe messaging systems. Multicast is the operation that is carried out by a publisher in a publisher-subscriber scenario such that it simultaneously sends data to multiple subscribers. There are many XMPP Extension Protocols (XEPs) available in the literature, that enable the use of XMPP for multicast. This network is made up of publishers who publish messages to multiple subscribers, some of whom may overlap. This is a case of Multiple Multicast (MMC). In this paper, a novel architecture to extend XMPP for multiple multicast has been proposed to cater multiple multicast in a publish subscribe network. In the literature, it was found that multiple multicast was not extensively considered in a mobile, publish subscribe network, hence the architecture proposed to cater to the multiple multicast nature for data exchange between multiple publishers to multiple groups of subscribers. In the considered network of subscribers in publish subscribe scenario, cluster heads help in forwarding the data to nodes connected to it and a cloud storage is used to ensure that message is successfully delivered to all the subscribers from publishers by creating a hierarchical structure to the network. Multilevel cache ensures that overloading does not happen at any cache memory. This paper attempts to reduce the number of replications and other overheads incurred by these replications. Performing multicast dramatically reduces network traffic by delivering a single stream to multiple receivers.
XMPP是一种基于IP技术和支持发布/订阅消息传递系统的可扩展标记语言的实时信息传输规范协议。多播是由发布者在发布者-订阅者场景中执行的操作,它可以同时向多个订阅者发送数据。在文献中有许多可用的XMPP扩展协议(XEPs),它们支持将XMPP用于组播。该网络由发布者组成,发布者向多个订阅者发布消息,其中一些订阅者可能重叠。这是多组播(MMC)的一种情况。为了满足发布订阅网络中多组播的需求,本文提出了一种扩展多组播的XMPP结构。在文献中,发现在移动、发布订阅网络中没有广泛考虑多组播,因此提出的架构是为了满足多个发布者与多组订阅者之间的数据交换的多组播性质。在发布订阅场景中考虑的订阅者网络中,集群头帮助将数据转发到与其相连的节点,并使用云存储通过创建网络的分层结构来确保消息成功地从发布者传递给所有订阅者。多级缓存确保在任何缓存内存上都不会发生过载。本文试图减少复制的数量和由这些复制引起的其他开销。执行多播通过将单个流传递给多个接收器来显著减少网络流量。
{"title":"Multiple Multicast Architecture for XMPP based Applications","authors":"B. R. Harshitha, Niyati B Mehta, Shivangi Rai, Deepti, S. Sheela, SM Dilip Kumar","doi":"10.1109/incet54531.2022.9824745","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824745","url":null,"abstract":"Extensible Messaging Presence Protocol (XMPP) is a real-time information transmission specification protocol that is based on IP technology and Extensible Markup Language supporting publish/subscribe messaging systems. Multicast is the operation that is carried out by a publisher in a publisher-subscriber scenario such that it simultaneously sends data to multiple subscribers. There are many XMPP Extension Protocols (XEPs) available in the literature, that enable the use of XMPP for multicast. This network is made up of publishers who publish messages to multiple subscribers, some of whom may overlap. This is a case of Multiple Multicast (MMC). In this paper, a novel architecture to extend XMPP for multiple multicast has been proposed to cater multiple multicast in a publish subscribe network. In the literature, it was found that multiple multicast was not extensively considered in a mobile, publish subscribe network, hence the architecture proposed to cater to the multiple multicast nature for data exchange between multiple publishers to multiple groups of subscribers. In the considered network of subscribers in publish subscribe scenario, cluster heads help in forwarding the data to nodes connected to it and a cloud storage is used to ensure that message is successfully delivered to all the subscribers from publishers by creating a hierarchical structure to the network. Multilevel cache ensures that overloading does not happen at any cache memory. This paper attempts to reduce the number of replications and other overheads incurred by these replications. Performing multicast dramatically reduces network traffic by delivering a single stream to multiple receivers.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126769197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and Addressal of Knowledge Gaps in Students 学生知识差距的识别与解决
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824483
N. Kumar, Rithik Mali, A. Ratnam, Vibha Kurpad, Harichandana Magapu
According to a survey study titled the Annual Status of Education Report (ASER), more than half of fifth-grade children in rural schools cannot read a second-grade textbook or answer simple mathematics problems. This figure hints at some fundamental problems plaguing the rural education system. Whether it is the lack of pocket-friendly schools, inadequate structure, or merely the teaching methodology, we have understood the underlying causes and created software that can help students learn more clearly and identify knowledge gaps. It can also be used as a learning tool to address the inadequacies in the current rural education system. Our application uses the available educational content and develops questions to test the students’ understanding of the fundamental concepts presented. Once students attempt to answer these questions, we assess their weaknesses by analysing their answers. Alongside the questions, we have used gamification to improve engagement with the app. We used the BERT Summarizer to extract and summarise the content. We then generate questions and use the Word2vec model to generate distractors. Multiple models were tried out, but the best results were achieved using the BERT summariser in conjunction with the Word2vec model. Metrics used to compute the results were answerability and BERT scores.
根据一项名为《年度教育状况报告》(ASER)的调查研究,农村学校超过一半的五年级儿童不会阅读二年级教科书,也不会回答简单的数学问题。这个数字暗示了困扰农村教育系统的一些根本问题。无论是缺少“口袋友好型”学校,还是结构不完善,抑或仅仅是教学方法,我们已经了解了其中的原因,并开发了能够帮助学生更清楚地学习和识别知识差距的软件。它也可以作为一种学习工具来解决当前农村教育体系的不足之处。我们的应用程序使用可用的教育内容并开发问题来测试学生对所呈现的基本概念的理解。一旦学生尝试回答这些问题,我们就会通过分析他们的答案来评估他们的弱点。除了问题,我们还使用游戏化来提高应用程序的参与度。我们使用BERT Summarizer来提取和总结内容。然后我们生成问题,并使用Word2vec模型生成干扰。我们尝试了多个模型,但是使用BERT摘要器与Word2vec模型结合使用获得了最好的结果。用于计算结果的指标是可回答性和BERT分数。
{"title":"Identification and Addressal of Knowledge Gaps in Students","authors":"N. Kumar, Rithik Mali, A. Ratnam, Vibha Kurpad, Harichandana Magapu","doi":"10.1109/incet54531.2022.9824483","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824483","url":null,"abstract":"According to a survey study titled the Annual Status of Education Report (ASER), more than half of fifth-grade children in rural schools cannot read a second-grade textbook or answer simple mathematics problems. This figure hints at some fundamental problems plaguing the rural education system. Whether it is the lack of pocket-friendly schools, inadequate structure, or merely the teaching methodology, we have understood the underlying causes and created software that can help students learn more clearly and identify knowledge gaps. It can also be used as a learning tool to address the inadequacies in the current rural education system. Our application uses the available educational content and develops questions to test the students’ understanding of the fundamental concepts presented. Once students attempt to answer these questions, we assess their weaknesses by analysing their answers. Alongside the questions, we have used gamification to improve engagement with the app. We used the BERT Summarizer to extract and summarise the content. We then generate questions and use the Word2vec model to generate distractors. Multiple models were tried out, but the best results were achieved using the BERT summariser in conjunction with the Word2vec model. Metrics used to compute the results were answerability and BERT scores.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Threaded Topology-Transparent Scheduling Protocol for Wireless Networks 一种新的无线网络线程拓扑透明调度协议
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824446
Dipti Dash
A topology-transparent scheduling algorithm is created without requiring changes to existing schedules when network topology changes in highly volatile mobile networks. It uses only the maximum number and degree of nodes of the network, therefore no changes are required to existing schedules. However, it is often difficult to estimate a priori the maximum nodal degree. Also, the nodal degree may vary significantly within the network. In this paper, we present a threaded topology-transparent scheduling protocol that is composed of a throughput optimal topology-transparent scheduling algorithm. While maintaining the advantages of the component algorithm, it does not rely on the maximum nodal degree.
在高度不稳定的移动网络中,当网络拓扑发生变化时,不需要改变现有的调度算法,从而创建了拓扑透明调度算法。它只使用网络节点的最大数量和程度,因此不需要对现有的调度进行更改。然而,通常很难先验地估计最大节点度。此外,网络内的节点度可能变化很大。本文提出了一种由吞吐量最优拓扑透明调度算法组成的线程拓扑透明调度协议。在保持分量算法优点的同时,不依赖于最大节点度。
{"title":"A Novel Threaded Topology-Transparent Scheduling Protocol for Wireless Networks","authors":"Dipti Dash","doi":"10.1109/incet54531.2022.9824446","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824446","url":null,"abstract":"A topology-transparent scheduling algorithm is created without requiring changes to existing schedules when network topology changes in highly volatile mobile networks. It uses only the maximum number and degree of nodes of the network, therefore no changes are required to existing schedules. However, it is often difficult to estimate a priori the maximum nodal degree. Also, the nodal degree may vary significantly within the network. In this paper, we present a threaded topology-transparent scheduling protocol that is composed of a throughput optimal topology-transparent scheduling algorithm. While maintaining the advantages of the component algorithm, it does not rely on the maximum nodal degree.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115047634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Analysis of End to End Inventory Management System for Perishable Goods 易腐品端到端库存管理系统的预测分析
Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824831
Kaustubh V. Sakhare, I. Kulkarni
Perishable items are the ones that quickly become spoiled or unsafe for consumption and usage. They are the core of supply chain management due to the limited shelf-life. There are many forms of perishable items viz fresh food products like fruits and vegetables, dairy, poultry, frozen or processed foods, commodities like cosmetics, health care products like medicines, oxygen and lifesaving items like blood. The paper addresses issues of the order management system in the estimation of the demands of the essential perishable items based on its fluctuating demands. The prevalent work was not able to correctly estimate the demands of the items labeled as essential goods. This article describes the identification of the most relevant features to estimate the replenishment policies. The work carried out contemplates the feature importance, exceptionally taking into account the effect of calamities or celebrations and festivities. The novelty of the work lies in comparing the complex two-step models using linear programming and reinforcement learning. The proposed model with simple machine learning algorithms is seen more effective for small scale businesses. The devised model focuses on accurately predicting the order estimate of perishable product under dynamically impacting factors in the supply chain management.
易腐物品是指那些很快变质或不安全的物品,不能食用和使用。由于保质期有限,它们是供应链管理的核心。易腐物品有很多种形式,如新鲜食品,如水果和蔬菜,乳制品,家禽,冷冻或加工食品,商品,如化妆品,保健品,如药品,氧气和救生物品,如血液。研究了订单管理系统中基于需求波动的易腐物品需求估算问题。普遍的工作是不能够正确估计项目的需求作为必需品标签。本文描述了识别最相关的特征,以估计补充政策。所进行的工作考虑到特征的重要性,特别考虑到灾难或庆祝活动的影响。这项工作的新颖之处在于比较了使用线性规划和强化学习的复杂两步模型。采用简单机器学习算法的拟议模型被认为对小规模企业更有效。该模型着眼于供应链管理中动态影响因素下易腐产品订单的准确预测。
{"title":"Predictive Analysis of End to End Inventory Management System for Perishable Goods","authors":"Kaustubh V. Sakhare, I. Kulkarni","doi":"10.1109/incet54531.2022.9824831","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824831","url":null,"abstract":"Perishable items are the ones that quickly become spoiled or unsafe for consumption and usage. They are the core of supply chain management due to the limited shelf-life. There are many forms of perishable items viz fresh food products like fruits and vegetables, dairy, poultry, frozen or processed foods, commodities like cosmetics, health care products like medicines, oxygen and lifesaving items like blood. The paper addresses issues of the order management system in the estimation of the demands of the essential perishable items based on its fluctuating demands. The prevalent work was not able to correctly estimate the demands of the items labeled as essential goods. This article describes the identification of the most relevant features to estimate the replenishment policies. The work carried out contemplates the feature importance, exceptionally taking into account the effect of calamities or celebrations and festivities. The novelty of the work lies in comparing the complex two-step models using linear programming and reinforcement learning. The proposed model with simple machine learning algorithms is seen more effective for small scale businesses. The devised model focuses on accurately predicting the order estimate of perishable product under dynamically impacting factors in the supply chain management.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 3rd International Conference for Emerging Technology (INCET)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1