首页 > 最新文献

2013 International Conference on Information Systems and Computer Networks最新文献

英文 中文
Probe station placement algorithm for probe set reduction in network fault localization 网络故障定位中减少探测集的探测站放置算法
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524195
B. Patil, S. Kinger, V. Pathak
Fault diagnosis is a central aspect of network fault management. Since faults are unavoidable in communication systems, their quick detection and isolation is essential for the robustness, reliability, and accessibility of a system. Probing technique for fault localization involves placement of probe stations (Probe stations are specially instrumented nodes from where probes can be sent to monitor the network) which affects the diagnosis capability of the probes sent by the probe stations. Probe station locations affect probing efficiency, monitoring capability, and deployment cost. At the same time, probe station selection affects the selection of probe set for fault localization. We are presenting a novel approach for minimal probe station selection with an objective to reduce probe set size that will be used for fault localization. The probe station selected through this approach results into reduced deployment cost as well as it helps in producing smaller probe set for fault localization reducing overall operation cost. We provide experimental evaluation of the proposed algorithms through simulation results.
故障诊断是网络故障管理的核心内容。由于通信系统中故障是不可避免的,因此故障的快速检测和隔离对于系统的鲁棒性、可靠性和可访问性至关重要。用于故障定位的探测技术涉及到探测站的位置(探测站是专门配备仪器的节点,可以从这些节点发送探测器来监测网络),这影响了探测站发送的探测器的诊断能力。探测站的位置影响探测效率、监测能力和部署成本。同时,探测站的选择也影响到故障定位探测集的选择。我们提出了一种新的最小探测站选择方法,目的是减少用于故障定位的探测集大小。通过这种方法选择的探测站不仅降低了部署成本,而且有助于产生更小的探测集用于故障定位,从而降低了总体运行成本。我们通过仿真结果对所提出的算法进行了实验评估。
{"title":"Probe station placement algorithm for probe set reduction in network fault localization","authors":"B. Patil, S. Kinger, V. Pathak","doi":"10.1109/ICISCON.2013.6524195","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524195","url":null,"abstract":"Fault diagnosis is a central aspect of network fault management. Since faults are unavoidable in communication systems, their quick detection and isolation is essential for the robustness, reliability, and accessibility of a system. Probing technique for fault localization involves placement of probe stations (Probe stations are specially instrumented nodes from where probes can be sent to monitor the network) which affects the diagnosis capability of the probes sent by the probe stations. Probe station locations affect probing efficiency, monitoring capability, and deployment cost. At the same time, probe station selection affects the selection of probe set for fault localization. We are presenting a novel approach for minimal probe station selection with an objective to reduce probe set size that will be used for fault localization. The probe station selected through this approach results into reduced deployment cost as well as it helps in producing smaller probe set for fault localization reducing overall operation cost. We provide experimental evaluation of the proposed algorithms through simulation results.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An algorithm to design finite automata that accept strings over input symbol a and b having exactly x number of a & y number of b 一种设计有限自动机的算法,该算法接受输入符号a和b上恰好有x个a和y个b的字符串
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524162
D. Ather, R. Singh, V. Katiyar
Theory of computation is always been an issue for the students to understand. This paper present a algorithm which will simplify the method to design Deterministic finite automata that accept strings over input symbol a, b having exactly x number of a & y number of b. Objective of the research is to make the method of teaching learning easier, simpler and understandable for students. In this paper we develop an algorithm to design finite automata that accept strings over input symbol a, b having exactly x number of a & y number of b.
计算理论一直是学生们难以理解的问题。本文提出了一种简化确定性有限自动机设计方法的算法,该自动机接受输入符号a, b上恰好有x个a和y个b的字符串。研究的目的是使教学方法更容易、更简单、更容易理解。本文提出了一种设计有限自动机的算法,该算法接受输入符号a, b上恰好有x个a和y个b的字符串。
{"title":"An algorithm to design finite automata that accept strings over input symbol a and b having exactly x number of a & y number of b","authors":"D. Ather, R. Singh, V. Katiyar","doi":"10.1109/ICISCON.2013.6524162","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524162","url":null,"abstract":"Theory of computation is always been an issue for the students to understand. This paper present a algorithm which will simplify the method to design Deterministic finite automata that accept strings over input symbol a, b having exactly x number of a & y number of b. Objective of the research is to make the method of teaching learning easier, simpler and understandable for students. In this paper we develop an algorithm to design finite automata that accept strings over input symbol a, b having exactly x number of a & y number of b.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance of EDF-BF algorithm under QoS constraint in grid heterogeneous environment 网格异构环境下QoS约束下的EDF-BF算法性能研究
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524196
Ankit Gupta, Shruti Kohli, SN Jha
Grid computing is one of the most important domain of distributed network. Scheduling in grid is a challenging task to the researchers around the globe. Many different kind of algorithms has been proposed in the literature but because Grid scheduling is a NP-complete problem, more work is undergoing to make the process more optimized and which can provide more effective and efficient solution to the grid load balancing. This paper tries to show some different aspect of one of the most popular grid scheduling algorithm EDF-BF under a special kind of load balancing scheme based on a QoS constraint-CPU speed of the Clusters. Three different parameters were used to test the effectiveness of the approach and the output shows that this novel approach although unconventional, is very effective and a grid scheduler can user this QoS driven approach for this algorithm.
网格计算是分布式网络的一个重要领域。网格调度是国内外研究人员面临的一个具有挑战性的课题。文献中提出了许多不同类型的算法,但由于网格调度是一个np完全问题,因此需要进行更多的工作以使过程更加优化,从而为网格负载均衡提供更有效和高效的解决方案。本文在一种特殊的基于QoS约束的负载均衡方案-集群的cpu速度下,试图展示最流行的网格调度算法之一EDF-BF的一些不同方面。使用三个不同的参数来测试该方法的有效性,结果表明该方法虽然非常规,但非常有效,网格调度程序可以使用该算法的QoS驱动方法。
{"title":"Performance of EDF-BF algorithm under QoS constraint in grid heterogeneous environment","authors":"Ankit Gupta, Shruti Kohli, SN Jha","doi":"10.1109/ICISCON.2013.6524196","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524196","url":null,"abstract":"Grid computing is one of the most important domain of distributed network. Scheduling in grid is a challenging task to the researchers around the globe. Many different kind of algorithms has been proposed in the literature but because Grid scheduling is a NP-complete problem, more work is undergoing to make the process more optimized and which can provide more effective and efficient solution to the grid load balancing. This paper tries to show some different aspect of one of the most popular grid scheduling algorithm EDF-BF under a special kind of load balancing scheme based on a QoS constraint-CPU speed of the Clusters. Three different parameters were used to test the effectiveness of the approach and the output shows that this novel approach although unconventional, is very effective and a grid scheduler can user this QoS driven approach for this algorithm.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115689941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A sprint-point based estimation technique in Scrum Scrum中基于sprint点的评估技术
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524182
R. Popli, N. Chauhan
In the last few years Agile methodologies appeared as a reaction to traditional software development methodologies. The Scrum is the widely used method of Agile. Most of the software development organizations are using Scrum these days but these are facing problems related to estimation of cost and effort. It has been observed that the current estimation method in Scrum mostly rely on historical data from past projects and expert opinion but in absence of historical data and experts these methods are not efficient. So there is need of an algorithmic method, which can calculate cost and effort of the software project. In this direction S. Bhalero, Maya Ingel [2] has considered some project-related factors that calculate the cost as well as effort of the project for a general Agile environment. However, several other project as well as people related factors may affect the Scrum environment. In this work an Algorithmic estimation method is being proposed considering various factors thereby estimating the more accurate release date, cost, effort and duration for the project specifically for Scrum. The effectiveness and feasibility of the proposed algorithm has been shown by considering three cases in which different levels of factors are taken and compared.
在过去的几年里,敏捷方法作为对传统软件开发方法的一种反应而出现。Scrum是敏捷中被广泛使用的方法。如今,大多数软件开发组织都在使用Scrum,但这些组织都面临着与成本和工作量估算相关的问题。我们观察到,目前Scrum中的评估方法主要依赖于过去项目的历史数据和专家意见,但是在没有历史数据和专家的情况下,这些方法是没有效率的。因此,需要一种算法方法来计算软件项目的成本和工作量。在这个方向上,S. Bhalero, Maya Ingel[2]考虑了一些与项目相关的因素,这些因素计算了一般敏捷环境下项目的成本和工作量。然而,其他一些与项目和人员相关的因素可能会影响Scrum环境。在这项工作中,提出了一种算法估算方法,考虑了各种因素,从而估算出更准确的发布日期、成本、工作量和项目持续时间,特别是针对Scrum。通过对三种不同层次的因素进行比较,证明了该算法的有效性和可行性。
{"title":"A sprint-point based estimation technique in Scrum","authors":"R. Popli, N. Chauhan","doi":"10.1109/ICISCON.2013.6524182","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524182","url":null,"abstract":"In the last few years Agile methodologies appeared as a reaction to traditional software development methodologies. The Scrum is the widely used method of Agile. Most of the software development organizations are using Scrum these days but these are facing problems related to estimation of cost and effort. It has been observed that the current estimation method in Scrum mostly rely on historical data from past projects and expert opinion but in absence of historical data and experts these methods are not efficient. So there is need of an algorithmic method, which can calculate cost and effort of the software project. In this direction S. Bhalero, Maya Ingel [2] has considered some project-related factors that calculate the cost as well as effort of the project for a general Agile environment. However, several other project as well as people related factors may affect the Scrum environment. In this work an Algorithmic estimation method is being proposed considering various factors thereby estimating the more accurate release date, cost, effort and duration for the project specifically for Scrum. The effectiveness and feasibility of the proposed algorithm has been shown by considering three cases in which different levels of factors are taken and compared.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127314097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On the security of robust reference logo watermarking scheme in Fractional Fourier Transform domain 分数阶傅里叶变换域鲁棒参考标志水印方案的安全性研究
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524203
S. Bansal, P. Pandey
Rapid progression of Internet technology and related services has enhanced the simplicity of access to digital information through web, leading to the problem of associated copyright to be confined. The problem of rightful ownership has direct to giving the digital watermarking as an evident solution. The paper has been proposed to emphasize the security issues in new robust reference logo watermarking scheme in Fractional Fourier Transform domain. Recently Bhatnagar and Raman have provided a robust reference logo watermarking algorithm for digital images based on singular value decomposition. Through this paper we have enlighten the issue of false positive problem in reference watermarking algorithm. We have extracted a false watermark by using our proposed algorithm from the reference watermarking scheme in Fractional Fourier Transform domain. Mathematical analysis and experimental results has been used to support our conclusion.
互联网技术和相关服务的快速发展,使得人们更容易通过网络获取数字信息,从而限制了关联版权的问题。合法所有权的问题直接关系到数字水印作为一种明显的解决方案。本文重点讨论了分数阶傅里叶变换域鲁棒参考标志水印方案的安全性问题。最近Bhatnagar和Raman提出了一种基于奇异值分解的鲁棒数字图像参考标志水印算法。通过本文的研究,我们对参考水印算法中的误报问题有所启发。在分数阶傅里叶变换域,利用本文提出的算法从参考水印方案中提取了一个假水印。数学分析和实验结果支持了我们的结论。
{"title":"On the security of robust reference logo watermarking scheme in Fractional Fourier Transform domain","authors":"S. Bansal, P. Pandey","doi":"10.1109/ICISCON.2013.6524203","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524203","url":null,"abstract":"Rapid progression of Internet technology and related services has enhanced the simplicity of access to digital information through web, leading to the problem of associated copyright to be confined. The problem of rightful ownership has direct to giving the digital watermarking as an evident solution. The paper has been proposed to emphasize the security issues in new robust reference logo watermarking scheme in Fractional Fourier Transform domain. Recently Bhatnagar and Raman have provided a robust reference logo watermarking algorithm for digital images based on singular value decomposition. Through this paper we have enlighten the issue of false positive problem in reference watermarking algorithm. We have extracted a false watermark by using our proposed algorithm from the reference watermarking scheme in Fractional Fourier Transform domain. Mathematical analysis and experimental results has been used to support our conclusion.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134151860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assuring Software Quality using data mining methodology: A literature study 使用数据挖掘方法保证软件质量:文献研究
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524184
Ashutosh Kumar Singh, R. Singh
Software Quality is the very popular and a very important topic for researchers within the software engineering communities, most probably everyone has an opinion about the meaning of quality. However, many disagreements and conflicts are very often leaded between peoples whose involve in software development, when they implement to it in the real world. This has been highly notable in the case of customer's complaints about faults in the software products. It is well known that many organizations or individuals are relishing many challenges to preserve software product quality, whenever they develop any types of software product. Appearance of defects is the very much contributor to reduce the product quality and prominently increases in development costs and completion time due to amendment and rework time. The success and demand of a software system is not only pivot on cost and proceedings, but also on software quality. In between many software quality features, to identify the vestigial defects in the product has become the actual industry standard. This paper is a study about software quality, software defect and how both are relate to each other and also discuss defect prediction is batter approach in compare defect correction to assure software product quality. We also discuss some data mining methodologies in brief; they are used to build defect prediction models to ensure the level of defect density of target program modules of software product.
软件质量对于软件工程社区的研究人员来说是一个非常流行和非常重要的话题,几乎每个人都对质量的含义有自己的看法。然而,当人们在现实世界中实现软件开发时,参与软件开发的人们之间经常会产生许多分歧和冲突。这在客户对软件产品故障的投诉中是非常值得注意的。众所周知,无论何时开发任何类型的软件产品,许多组织或个人都在享受保持软件产品质量的许多挑战。缺陷的出现是降低产品质量的重要因素,并且由于修改和返工时间而显著增加了开发成本和完成时间。一个软件系统的成功和需求不仅取决于成本和程序,还取决于软件质量。在众多软件质量特性之间,识别产品中的残留缺陷已经成为实际的行业标准。本文对软件质量、软件缺陷及其相互关系进行了研究,讨论了缺陷预测是保证软件产品质量的较好方法。我们还简要讨论了一些数据挖掘方法;它们被用来建立缺陷预测模型,以保证软件产品的目标程序模块的缺陷密度水平。
{"title":"Assuring Software Quality using data mining methodology: A literature study","authors":"Ashutosh Kumar Singh, R. Singh","doi":"10.1109/ICISCON.2013.6524184","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524184","url":null,"abstract":"Software Quality is the very popular and a very important topic for researchers within the software engineering communities, most probably everyone has an opinion about the meaning of quality. However, many disagreements and conflicts are very often leaded between peoples whose involve in software development, when they implement to it in the real world. This has been highly notable in the case of customer's complaints about faults in the software products. It is well known that many organizations or individuals are relishing many challenges to preserve software product quality, whenever they develop any types of software product. Appearance of defects is the very much contributor to reduce the product quality and prominently increases in development costs and completion time due to amendment and rework time. The success and demand of a software system is not only pivot on cost and proceedings, but also on software quality. In between many software quality features, to identify the vestigial defects in the product has become the actual industry standard. This paper is a study about software quality, software defect and how both are relate to each other and also discuss defect prediction is batter approach in compare defect correction to assure software product quality. We also discuss some data mining methodologies in brief; they are used to build defect prediction models to ensure the level of defect density of target program modules of software product.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116512455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A multi-agent hybrid protocol for data fusion and data aggregation in non-deterministic wireless sensor networks 一种用于不确定性无线传感器网络中数据融合和数据聚合的多智能体混合协议
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524205
P. Sethi, N. Chauhan, D. Juneja
Data fusion deals with collaborative in-network processing and gathers relatively accurate information about the events in the environment. Conventional data fusion algorithms when assisted with mobile agent technology shifts computationally intensive tasks to these intelligent units thereby increasing the lifetime of the network. There exist mobile agent based event driven protocols for accumulating and forwarding the information to the sink(base station) eg: Tree-based Itinerary Design [4]. Usually, such protocols either deploy value-based fusion or decision-based fusion but very few are using both at the same time. Moreover, use of multi-agent systems(MAS) in such protocols is still in its infancy. The focus of this work is thus to propose a multi-agent hybrid protocol exploiting the benefits of both value and decision fusion by performing aggregation at the source level in a clustered WSN.
数据融合处理网络内的协同处理,收集环境中事件的相对准确的信息。在移动代理技术的辅助下,传统的数据融合算法将计算密集型任务转移到这些智能单元,从而增加了网络的生命周期。已有基于移动代理的事件驱动协议用于积累和转发信息到接收器(基站),如基于树的行程设计[4]。通常,这些协议要么部署基于价值的融合,要么部署基于决策的融合,但很少同时使用这两种融合。此外,在此类协议中使用多代理系统(MAS)仍处于起步阶段。因此,本工作的重点是提出一种多智能体混合协议,通过在集群WSN的源级执行聚合,利用价值和决策融合的优点。
{"title":"A multi-agent hybrid protocol for data fusion and data aggregation in non-deterministic wireless sensor networks","authors":"P. Sethi, N. Chauhan, D. Juneja","doi":"10.1109/ICISCON.2013.6524205","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524205","url":null,"abstract":"Data fusion deals with collaborative in-network processing and gathers relatively accurate information about the events in the environment. Conventional data fusion algorithms when assisted with mobile agent technology shifts computationally intensive tasks to these intelligent units thereby increasing the lifetime of the network. There exist mobile agent based event driven protocols for accumulating and forwarding the information to the sink(base station) eg: Tree-based Itinerary Design [4]. Usually, such protocols either deploy value-based fusion or decision-based fusion but very few are using both at the same time. Moreover, use of multi-agent systems(MAS) in such protocols is still in its infancy. The focus of this work is thus to propose a multi-agent hybrid protocol exploiting the benefits of both value and decision fusion by performing aggregation at the source level in a clustered WSN.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133663582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance evaluation of multilayer feed forward neural network for handwritten English Vowels Characters 多层前馈神经网络对手写英语元音字符的性能评价
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524179
R. Soni, D. Puja
This paper compares the performance of Gradient descent with momentum & adaptive backpropagation (TRAINGDX) and BFGS quasi-Newton backpropagation (TRAINBFG) of Backpropagation Algorithm in multilayer feed forward Neural Network for Handwritten English Characters of Vowels. This analysis is done with five samples of Handwritten English Characters of Vowels collected from five different people and stored as an image. After partition these scanned image into 4 portions, the densities of these images are determined by using MATLAB function. An input pattern will use these 4 densities of each character as an input for the two different Neural Network architectures. In our proposed work the Multilayer feed forward neural networks will train with two learning algorithms; those are the variant of Backpropagation learning algorithm namely Quasi-Newton backpropagation learning algorithm and Gradient descent with momentum and adaptive backpropagation learning algorithm for training set of the Handwritten English Characters of Vowels. The performance analysis of both Neural Network architectures is done for convergence and nonconvergence. Different observations have been considered for trends of error in the case of nonconvergence. From the observation of the result, it can be shown that in the performance of these above two learning algorithms with the training set of handwritten characters of Vowels, there is limitation of gradient descent learning algorithm for convergence due to the problem of local minima which is inherit problem of backpropagation learning algorithm.
本文比较了多层前馈神经网络中梯度下降动量自适应反向传播算法(TRAINGDX)和BFGS准牛顿反向传播算法(TRAINBFG)的性能。这个分析是用从五个不同的人那里收集的五个手写英语元音字符样本来完成的,并以图像的形式存储。将扫描图像分成4个部分,利用MATLAB函数确定图像的密度。输入模式将使用每个字符的这4个密度作为两种不同神经网络架构的输入。在我们提出的工作中,多层前馈神经网络将使用两种学习算法进行训练;它们是反向传播学习算法的变体,即准牛顿反向传播学习算法和带动量梯度下降和自适应反向传播算法,用于手写英语元音字符训练集。对两种神经网络结构进行了收敛性和非收敛性的性能分析。对于非收敛情况下的误差趋势,已经考虑了不同的观测结果。从结果的观察可以看出,在上述两种学习算法对元音手写字符训练集的性能表现中,由于存在局部极小值问题,这是反向传播学习算法的继承问题,因此梯度下降学习算法的收敛性受到限制。
{"title":"Performance evaluation of multilayer feed forward neural network for handwritten English Vowels Characters","authors":"R. Soni, D. Puja","doi":"10.1109/ICISCON.2013.6524179","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524179","url":null,"abstract":"This paper compares the performance of Gradient descent with momentum & adaptive backpropagation (TRAINGDX) and BFGS quasi-Newton backpropagation (TRAINBFG) of Backpropagation Algorithm in multilayer feed forward Neural Network for Handwritten English Characters of Vowels. This analysis is done with five samples of Handwritten English Characters of Vowels collected from five different people and stored as an image. After partition these scanned image into 4 portions, the densities of these images are determined by using MATLAB function. An input pattern will use these 4 densities of each character as an input for the two different Neural Network architectures. In our proposed work the Multilayer feed forward neural networks will train with two learning algorithms; those are the variant of Backpropagation learning algorithm namely Quasi-Newton backpropagation learning algorithm and Gradient descent with momentum and adaptive backpropagation learning algorithm for training set of the Handwritten English Characters of Vowels. The performance analysis of both Neural Network architectures is done for convergence and nonconvergence. Different observations have been considered for trends of error in the case of nonconvergence. From the observation of the result, it can be shown that in the performance of these above two learning algorithms with the training set of handwritten characters of Vowels, there is limitation of gradient descent learning algorithm for convergence due to the problem of local minima which is inherit problem of backpropagation learning algorithm.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A survey paper on routing in delay-tolerant networks 时延容忍网络中的路由研究综述
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524206
P. Puri, M. Singh
This paper presents a comprehensive survey on delay-tolerant networks, an architecture originally designed for the Interplanetary Internet, this delay-tolerant networks is a communication system used to provide Internet-like services in interplanetary distances to support of deep space exploration. This paper describes the basic of Delay-Tolerant Networks (DTN) and its different areas. It also explores the routing techniques used in Delay-Tolerant Networks (DTN). It also comprises the comparison of different routing protocols in Delay-Tolerant Networks (DTN). At last, based on shortcoming of existing protocol, this paper presents the problem definition for new work.
本文全面介绍了容忍延迟网络,一种最初为星际互联网设计的架构,这种容忍延迟网络是一种通信系统,用于在星际距离提供类似互联网的服务,以支持深空探索。本文介绍了容忍延迟网络(Delay-Tolerant network, DTN)的基本原理及其应用领域。它还探讨了在容忍延迟网络(DTN)中使用的路由技术。它还包括对容忍延迟网络(DTN)中不同路由协议的比较。最后,针对现有协议的不足,提出了新工作的问题定义。
{"title":"A survey paper on routing in delay-tolerant networks","authors":"P. Puri, M. Singh","doi":"10.1109/ICISCON.2013.6524206","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524206","url":null,"abstract":"This paper presents a comprehensive survey on delay-tolerant networks, an architecture originally designed for the Interplanetary Internet, this delay-tolerant networks is a communication system used to provide Internet-like services in interplanetary distances to support of deep space exploration. This paper describes the basic of Delay-Tolerant Networks (DTN) and its different areas. It also explores the routing techniques used in Delay-Tolerant Networks (DTN). It also comprises the comparison of different routing protocols in Delay-Tolerant Networks (DTN). At last, based on shortcoming of existing protocol, this paper presents the problem definition for new work.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116674981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Optimization of SVD over Graphic Processor 图形处理器上SVD的优化
Pub Date : 2013-03-09 DOI: 10.1109/ICISCON.2013.6524198
N. Akhtar, S. N. Khan
Many of the engineering applications employ linear algebra to furnish the analysis. Image Processing deals with Eigen values/vectors, Machine Design requires principal component analysis of stress, Statistics and Data compression requires minimization of dimensionality in data. Singular Value Decomposition serves as the answer to all these varied needs. This method alone serves many computational & analytical purposes. Although the computation of SVD of a matrix is bulky, the process involves a sequence of vector operations. This makes it a good candidate for parallelization of over Graphic Processors. This paper proposes parallelization of SVD modules in LAPACK over GPGPU using OpenCL. OpenCL is crucial for making the implementation platform independent. Narayanan[1] too considers parallelization of SVD over CUDA using CUBLAS. This work proposes a scheme which is platform independent, and focuses on routines beyond BLAS.
许多工程应用使用线性代数来进行分析。图像处理处理特征值/向量,机器设计需要应力的主成分分析,统计学和数据压缩需要最小化数据的维度。奇异值分解作为所有这些不同需求的答案。这种方法本身就适用于许多计算和分析目的。虽然矩阵奇异值分解的计算量很大,但其过程涉及一系列向量运算。这使得它成为图形处理器并行化的一个很好的候选。本文提出了利用OpenCL在GPGPU上并行化LAPACK中的SVD模块。OpenCL对于使实现平台独立至关重要。Narayanan[1]也考虑使用CUBLAS在CUDA上并行化SVD。本文提出了一种独立于平台的方案,重点关注BLAS之外的例程。
{"title":"Optimization of SVD over Graphic Processor","authors":"N. Akhtar, S. N. Khan","doi":"10.1109/ICISCON.2013.6524198","DOIUrl":"https://doi.org/10.1109/ICISCON.2013.6524198","url":null,"abstract":"Many of the engineering applications employ linear algebra to furnish the analysis. Image Processing deals with Eigen values/vectors, Machine Design requires principal component analysis of stress, Statistics and Data compression requires minimization of dimensionality in data. Singular Value Decomposition serves as the answer to all these varied needs. This method alone serves many computational & analytical purposes. Although the computation of SVD of a matrix is bulky, the process involves a sequence of vector operations. This makes it a good candidate for parallelization of over Graphic Processors. This paper proposes parallelization of SVD modules in LAPACK over GPGPU using OpenCL. OpenCL is crucial for making the implementation platform independent. Narayanan[1] too considers parallelization of SVD over CUDA using CUBLAS. This work proposes a scheme which is platform independent, and focuses on routines beyond BLAS.","PeriodicalId":216110,"journal":{"name":"2013 International Conference on Information Systems and Computer Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125438363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 International Conference on Information Systems and Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1