首页 > 最新文献

2015 Eighth International Conference on Contemporary Computing (IC3)最新文献

英文 中文
Stochastic model for lifetime improvement of wireless sensor node 无线传感器节点寿命改进的随机模型
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346718
Anuradha Pughat, Vidushi Sharma
Energy constraint wireless sensor networks area is the most promising research domain today. A dynamic power management technique at operational level can effectively oversee the power consumption and prolong the lifespan of a sensor node. Several stochastic models have been introduced and presented to analyze the system. To improve upon the given models, a semi Markov model with analyser has been proposed. Further, this paper gives the detailed stochastic modelling and analysis of lifetime improvement and power consumption of analyser based sensor node. To observe the effect of analyser on overall power consumption of sensor node, the power consumption of analyser block is also analyzed.
能量约束无线传感器网络是目前最有前途的研究领域。在操作层面采用动态电源管理技术,可以有效地监控传感器节点的功耗,延长节点的使用寿命。介绍并提出了几种随机模型来分析该系统。为了改进已有的模型,提出了一种带分析器的半马尔可夫模型。在此基础上,对传感器节点的寿命改善和功耗进行了详细的随机建模和分析。为了观察分析仪对传感器节点总功耗的影响,还分析了分析仪模块的功耗。
{"title":"Stochastic model for lifetime improvement of wireless sensor node","authors":"Anuradha Pughat, Vidushi Sharma","doi":"10.1109/IC3.2015.7346718","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346718","url":null,"abstract":"Energy constraint wireless sensor networks area is the most promising research domain today. A dynamic power management technique at operational level can effectively oversee the power consumption and prolong the lifespan of a sensor node. Several stochastic models have been introduced and presented to analyze the system. To improve upon the given models, a semi Markov model with analyser has been proposed. Further, this paper gives the detailed stochastic modelling and analysis of lifetime improvement and power consumption of analyser based sensor node. To observe the effect of analyser on overall power consumption of sensor node, the power consumption of analyser block is also analyzed.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123719213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An extension of FMAP for joint actions FMAP的扩展,用于联合行动
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346731
A. Nath, R. Niyogi
Although there has been a lot of work in multi-agent planning, very few state-of-the-art multi-agent planners exist; a notable exception being FMAP. In multi agent planning joint actions frequently arise. Although FMAP is quite powerful, it cannot handle a type of joint actions. In this paper, we show how FMAP can be tuned to handle such joint actions. The proposed system has been validated with a benchmark domain.
虽然在多智能体规划方面已经做了大量的工作,但是先进的多智能体规划器还很少;一个明显的例外是FMAP。在多智能体规划中,经常会出现联合行为。尽管FMAP非常强大,但它不能处理某种类型的联合动作。在本文中,我们展示了如何调整FMAP来处理这种联合动作。该系统在一个基准域上得到了验证。
{"title":"An extension of FMAP for joint actions","authors":"A. Nath, R. Niyogi","doi":"10.1109/IC3.2015.7346731","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346731","url":null,"abstract":"Although there has been a lot of work in multi-agent planning, very few state-of-the-art multi-agent planners exist; a notable exception being FMAP. In multi agent planning joint actions frequently arise. Although FMAP is quite powerful, it cannot handle a type of joint actions. In this paper, we show how FMAP can be tuned to handle such joint actions. The proposed system has been validated with a benchmark domain.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
All your Google and Facebook logins are belong to us: A case for single sign-off 你所有的谷歌和Facebook登录信息都属于我们:这是一个单一登录的案例
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346717
Vaibhav Rastogi, Ankit Agrawal
The websites of the modern Web integrate content from multiple parties to provide an enriched user experience. The so-called single sign-on forms part of this integration whereby a relying website enables a user to use her credentials on a third-party provider (such as Google or Facebook) to authenticate with itself and, if desired, authorize itself to use her resources on the provider. The user benefits by not remembering credentials for different websites separately and by allowing controlled use of her resources with a provider by other website. However, we observe that the current protocols for single sign-on do not have any provision of what we call single sign-off: once the user logs out of a relying website, the user still remains signed into the provider website. This can leave the user vulnerable if she forgets to sign out of the provider website after signing out of the relying website on a shared computer. We manually analyze the top twenty websites using Facebook or Google providers and conclude that the above problem is widespread. All but one website do not even warn the user with regard to this problem.
现代Web的网站集成了来自多方的内容,以提供丰富的用户体验。所谓的单点登录是这种集成的一部分,依赖网站允许用户在第三方提供商(如Google或Facebook)上使用自己的凭据进行身份验证,如果需要,还可以授权自己在提供商上使用自己的资源。用户的好处是不需要单独记住不同网站的凭据,并且允许其他网站通过提供者控制地使用其资源。然而,我们注意到当前的单点登录协议没有任何我们称之为单点登录的规定:一旦用户从依赖的网站注销,用户仍然登录到提供者网站。如果用户在从共享计算机上的依赖网站注销后忘记注销提供商网站,这可能会使用户容易受到攻击。我们使用Facebook或Google提供商手动分析了排名前20位的网站,并得出结论,上述问题很普遍。除了一家网站外,其他网站甚至都没有就这个问题警告用户。
{"title":"All your Google and Facebook logins are belong to us: A case for single sign-off","authors":"Vaibhav Rastogi, Ankit Agrawal","doi":"10.1109/IC3.2015.7346717","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346717","url":null,"abstract":"The websites of the modern Web integrate content from multiple parties to provide an enriched user experience. The so-called single sign-on forms part of this integration whereby a relying website enables a user to use her credentials on a third-party provider (such as Google or Facebook) to authenticate with itself and, if desired, authorize itself to use her resources on the provider. The user benefits by not remembering credentials for different websites separately and by allowing controlled use of her resources with a provider by other website. However, we observe that the current protocols for single sign-on do not have any provision of what we call single sign-off: once the user logs out of a relying website, the user still remains signed into the provider website. This can leave the user vulnerable if she forgets to sign out of the provider website after signing out of the relying website on a shared computer. We manually analyze the top twenty websites using Facebook or Google providers and conclude that the above problem is widespread. All but one website do not even warn the user with regard to this problem.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"78 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dimension reduction using spectral methods in FANNY for fuzzy clustering of graphs 在FANNY中使用谱方法进行图的模糊聚类降维
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346659
Abhishek Jatram, Bhaskar Biswas
FANNY is a fuzzy or soft clustering algorithm, where each node in the graph is associated with a membership coefficient, indicating degree of belongingness of each node to different clusters. In this paper, we proposed a method for multiple dimension reduction of feature space of graphs or networks by using Spectral methods for FANNY clustering algorithm. Simulations of our method on two real networks show that, the proposed algorithm produced better result than traditional FANNY in-terms of runtime as well as modularity.
FANNY是一种模糊或软聚类算法,其中图中的每个节点都与一个隶属系数相关联,表示每个节点属于不同聚类的程度。本文提出了一种基于谱方法的FANNY聚类算法对图或网络的特征空间进行多维降维的方法。在两个实际网络上的仿真结果表明,本文提出的算法在运行时间和模块化方面都优于传统的FANNY。
{"title":"Dimension reduction using spectral methods in FANNY for fuzzy clustering of graphs","authors":"Abhishek Jatram, Bhaskar Biswas","doi":"10.1109/IC3.2015.7346659","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346659","url":null,"abstract":"FANNY is a fuzzy or soft clustering algorithm, where each node in the graph is associated with a membership coefficient, indicating degree of belongingness of each node to different clusters. In this paper, we proposed a method for multiple dimension reduction of feature space of graphs or networks by using Spectral methods for FANNY clustering algorithm. Simulations of our method on two real networks show that, the proposed algorithm produced better result than traditional FANNY in-terms of runtime as well as modularity.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122050950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Inverse analysis of a radial porous fin using genetic algorithm 径向多孔鳍的遗传算法反演分析
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346673
S. Panda, R. Das
In this work, various geometrical configurations of a conductive, convective and radiative cylindrical porous fin are estimated by using inverse heat transfer analysis. The temperature distribution, which is used in the inverse analysis, has been calculated by using the finite difference method in conjunction with the genetic algorithm. The study discloses that many feasible combinations of the fin dimensions are possible to acquire a given temperature. This provides the flexibility in selecting a cylindrical porous fin to achieve a given heat transfer duty.
本文采用反传热分析方法,对导电、对流和辐射圆柱多孔翅片的几何构型进行了估计。利用有限差分法结合遗传算法计算了逆分析中使用的温度分布。研究表明,许多可行的翅片尺寸组合可以获得给定的温度。这提供了选择一个圆柱形多孔翅片的灵活性,以实现给定的传热任务。
{"title":"Inverse analysis of a radial porous fin using genetic algorithm","authors":"S. Panda, R. Das","doi":"10.1109/IC3.2015.7346673","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346673","url":null,"abstract":"In this work, various geometrical configurations of a conductive, convective and radiative cylindrical porous fin are estimated by using inverse heat transfer analysis. The temperature distribution, which is used in the inverse analysis, has been calculated by using the finite difference method in conjunction with the genetic algorithm. The study discloses that many feasible combinations of the fin dimensions are possible to acquire a given temperature. This provides the flexibility in selecting a cylindrical porous fin to achieve a given heat transfer duty.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126612870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Human perception based criminal identification through human robot interaction 基于人类感知的人机交互犯罪识别
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346678
Avinash Kumar Singh, Neha Baranwal, G. Nandi
In India like many other countries, the crimes especially against women are rising. One of the many reasons perhaps is the low conviction rate. The initial stage of criminal investigation starts with the exploration of evidences and eyewitnesses. An eyewitness can act as a guide to trace out the suspect. Her/his perception about the suspect can be useful to identify the criminal. Based on the descriptions of the eyewitnesses normally a manual sketch is prepared and released in the Newspapers which most of the times is vague and ambiguous and hence ineffective. Therefore, a robotic framework has been proposed in this paper to help Police to identify criminals using the imprecise knowledge about the subject. The designed robotic system interacts with the eyewitness by asking several questions about the suspect such as age, height, her/his facial shape and size etc., and then making a guess about her/his face. A human face can be considered as the combination of various macro facial features such as eye. Eyebrows, face shape, lip shape, nose type etc. Although these features vary from person to person but their combination makes a human face unique. An experimental study on 113 Indian Bollywood celebrities, 37 Indian cricketers and 40 persons from Robotics and Artificial Intelligence Laboratory of Indian Institute of Technology Allahabad, India has been performed. The system is able to identify the criminal (here pseudo criminals) if it exists in the database. This system can be useful at the initial stage of investigation where we don't have any knowledge about the criminal.
像许多其他国家一样,在印度,尤其是针对女性的犯罪正在上升。其中一个原因可能是定罪率低。刑事侦查的初始阶段是从对证据和目击证人的调查开始的。目击者可以作为追踪嫌疑犯的向导。她/他对嫌疑犯的看法对识别罪犯很有用。根据目击者的描述,通常会准备一份手工草图,并在报纸上发布,大多数时候是含糊不清的,因此是无效的。因此,本文提出了一个机器人框架,以帮助警方利用有关该主题的不精确知识识别罪犯。设计的机器人系统通过询问嫌疑人的年龄、身高、面部形状和大小等问题与目击者互动,然后猜测他/她的脸。人脸可以看作是眼睛等各种宏观面部特征的组合。眉毛,脸型,唇型,鼻子类型等。虽然这些特征因人而异,但它们的组合使人脸独一无二。对113名印度宝莱坞明星、37名印度板球运动员和40名来自印度阿拉哈巴德印度理工学院机器人和人工智能实验室的人进行了一项实验研究。系统能够识别数据库中存在的罪犯(这里是伪罪犯)。这个系统在我们对罪犯没有任何了解的调查初期很有用。
{"title":"Human perception based criminal identification through human robot interaction","authors":"Avinash Kumar Singh, Neha Baranwal, G. Nandi","doi":"10.1109/IC3.2015.7346678","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346678","url":null,"abstract":"In India like many other countries, the crimes especially against women are rising. One of the many reasons perhaps is the low conviction rate. The initial stage of criminal investigation starts with the exploration of evidences and eyewitnesses. An eyewitness can act as a guide to trace out the suspect. Her/his perception about the suspect can be useful to identify the criminal. Based on the descriptions of the eyewitnesses normally a manual sketch is prepared and released in the Newspapers which most of the times is vague and ambiguous and hence ineffective. Therefore, a robotic framework has been proposed in this paper to help Police to identify criminals using the imprecise knowledge about the subject. The designed robotic system interacts with the eyewitness by asking several questions about the suspect such as age, height, her/his facial shape and size etc., and then making a guess about her/his face. A human face can be considered as the combination of various macro facial features such as eye. Eyebrows, face shape, lip shape, nose type etc. Although these features vary from person to person but their combination makes a human face unique. An experimental study on 113 Indian Bollywood celebrities, 37 Indian cricketers and 40 persons from Robotics and Artificial Intelligence Laboratory of Indian Institute of Technology Allahabad, India has been performed. The system is able to identify the criminal (here pseudo criminals) if it exists in the database. This system can be useful at the initial stage of investigation where we don't have any knowledge about the criminal.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126985827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic simulator and planning tool for studying the defense and attack strategies in a war-zone 战区攻防战略研究的动态模拟器和规划工具
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346668
Siddharth Gulati, Abhinav Rastogi, M. Thakur
Augmented Reality (AR) helps create information-enriched, real-time environments that are close to the real world. This paper discusses a unique defense planning tool that has been developed as a technology demonstrator with systems and applications in AR. This tool has a direct link to the planning aspect of strategy development. It is expected that this will serve as a very useful tool for testing the concepts of defense strategic planning. It has features that can simulate an actual war-zone situation, which can help to test the strengths and weaknesses of the proposed defense strategies in real-time. Post simulation analysis of these strategies can help to modify the defense strategy (if needed) and strengthen the on-ground capacities and capabilities of the defense forces for mitigating the perceived threats from the enemy. It is a versatile tool, which can be further adapted to develop strategies that will help in minimizing the impact of natural calamities in zones which are prone to recurrent floods and seismic disturbances, thus contributing to improved disaster preparedness and management.
增强现实(AR)有助于创建接近现实世界的信息丰富的实时环境。本文讨论了一种独特的防御规划工具,该工具已被开发为AR系统和应用的技术演示。该工具与战略发展的规划方面有直接联系。预计这将成为检验国防战略规划概念的一个非常有用的工具。它具有可以模拟实际战区情况的功能,可以帮助实时测试所提出的防御策略的优缺点。这些战略的模拟后分析可以帮助修改防御战略(如果需要),并加强防御部队的地面能力和能力,以减轻来自敌人的感知威胁。它是一种多功能工具,可以进一步加以调整,以制定战略,帮助尽量减少自然灾害对经常发生洪水和地震的地区的影响,从而有助于改进备灾和管理。
{"title":"Dynamic simulator and planning tool for studying the defense and attack strategies in a war-zone","authors":"Siddharth Gulati, Abhinav Rastogi, M. Thakur","doi":"10.1109/IC3.2015.7346668","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346668","url":null,"abstract":"Augmented Reality (AR) helps create information-enriched, real-time environments that are close to the real world. This paper discusses a unique defense planning tool that has been developed as a technology demonstrator with systems and applications in AR. This tool has a direct link to the planning aspect of strategy development. It is expected that this will serve as a very useful tool for testing the concepts of defense strategic planning. It has features that can simulate an actual war-zone situation, which can help to test the strengths and weaknesses of the proposed defense strategies in real-time. Post simulation analysis of these strategies can help to modify the defense strategy (if needed) and strengthen the on-ground capacities and capabilities of the defense forces for mitigating the perceived threats from the enemy. It is a versatile tool, which can be further adapted to develop strategies that will help in minimizing the impact of natural calamities in zones which are prone to recurrent floods and seismic disturbances, thus contributing to improved disaster preparedness and management.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127273360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Test scenario selection for concurrency testing from UML models 从UML模型进行并发测试的测试场景选择
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346739
M. Shirole, Rajeev Kumar
Parallel systems have potentially exponential number of execution interleaving sequences. Each execution interleaving sequence can be used as a test scenario to evaluate the correctness of the system. Both the exponential interleaving space and non-deterministic execution make testing concurrent systems a challenging task. Concurrency errors are classified as synchronization, data-race, data inconsistency, starvation, and deadlock. A good test suite must have test scenarios that uncover above all classes of errors. Selecting test scenarios to uncover above errors needs a systematic analysis of test scenarios to classify them into one of concurrency behaviors. In this paper, we propose an approach to analyze test scenarios from UML models using a state-based classifier. First, we present an extension to UML models to represent data access-tags, which help generating data-access traces. Then, we generate test scenarios from extended UML models using existing test scenario generation techniques. After that, we analyze test scenarios using enhanced state machine diagram (ESMD) classifier for concurrency behaviors, like sequentilization, synchronization, blocking, and non-blocking scenarios. Experimental results show ESMD classifier classifies test scenario accurately thereby helping to design test suite for concurrency testing. Selected test scenarios achieve better concurrency behavior coverage and avoid false test scenarios.
并行系统具有潜在的指数级交错执行序列。每个执行交错序列都可以用作评估系统正确性的测试场景。指数交错空间和非确定性执行使得测试并发系统成为一项具有挑战性的任务。并发性错误分为同步、数据竞争、数据不一致、饥饿和死锁。一个好的测试套件必须具有能够发现所有类型错误的测试场景。选择测试场景来发现上述错误需要对测试场景进行系统的分析,以将它们分类为并发行为之一。在本文中,我们提出了一种使用基于状态的分类器从UML模型分析测试场景的方法。首先,我们对UML模型进行了扩展,以表示数据访问标记,这有助于生成数据访问跟踪。然后,我们使用现有的测试场景生成技术从扩展的UML模型生成测试场景。之后,我们使用增强的状态机图(ESMD)分类器分析并发行为的测试场景,如序列化、同步、阻塞和非阻塞场景。实验结果表明,ESMD分类器可以准确地对测试场景进行分类,从而有助于设计用于并发测试的测试套件。选定的测试场景可以实现更好的并发行为覆盖,并避免错误的测试场景。
{"title":"Test scenario selection for concurrency testing from UML models","authors":"M. Shirole, Rajeev Kumar","doi":"10.1109/IC3.2015.7346739","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346739","url":null,"abstract":"Parallel systems have potentially exponential number of execution interleaving sequences. Each execution interleaving sequence can be used as a test scenario to evaluate the correctness of the system. Both the exponential interleaving space and non-deterministic execution make testing concurrent systems a challenging task. Concurrency errors are classified as synchronization, data-race, data inconsistency, starvation, and deadlock. A good test suite must have test scenarios that uncover above all classes of errors. Selecting test scenarios to uncover above errors needs a systematic analysis of test scenarios to classify them into one of concurrency behaviors. In this paper, we propose an approach to analyze test scenarios from UML models using a state-based classifier. First, we present an extension to UML models to represent data access-tags, which help generating data-access traces. Then, we generate test scenarios from extended UML models using existing test scenario generation techniques. After that, we analyze test scenarios using enhanced state machine diagram (ESMD) classifier for concurrency behaviors, like sequentilization, synchronization, blocking, and non-blocking scenarios. Experimental results show ESMD classifier classifies test scenario accurately thereby helping to design test suite for concurrency testing. Selected test scenarios achieve better concurrency behavior coverage and avoid false test scenarios.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132651430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Feature analysis for mispronounced phonemes in the case of alvoelar approximant (/r/) substituted with voiced dental consonant (/∂/) 牙辅音(/∂/)代替牙辅音(/∂/)的发音错误音素的特征分析
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346667
P. B. Ramteke, S. Koolagudi, Arun Prabhakar
Mispronunciation is commonly observed in children from age 2 to 8 years. Some of the common mispronunciations are stopping, fronting, backing and affrication. These processes are known as phonological processes. Identification of these processes is crucial in studying the vocal tract development pattern and treating the phonological disorders in children. The features that clearly discriminate correctly pronounced phoneme from corresponding mispronounced phoneme have to be compared to identify the phonological processes. This paper focuses on the analysis of mispronounced alveolar approximant (/r/) substituted with voiced fricative consonant (/∂/). In this work, spectral and pitch related features are considered for the analysis using scatter plots and histograms. From the analysis, it is observed that the energy feature against 2nd and 4th cepstral coefficients achieves 75% and 65% discrimination respectively.
发音错误常见于2至8岁的儿童。一些常见的发音错误是stop, fronting, backing和affrication。这些过程被称为语音过程。识别这些过程对于研究儿童声道发育模式和治疗儿童语音障碍至关重要。为了识别语音过程,必须比较能够明显区分正确发音音素和相应的错误发音音素的特征。本文重点分析了用浊音摩擦辅音(/∂/)代替的发音错误的肺泡近似音(/r/)。在这项工作中,使用散点图和直方图进行分析时考虑了光谱和基音相关特征。从分析中可以看出,对第2和第4倒谱系数的能量特征分别达到75%和65%的鉴别率。
{"title":"Feature analysis for mispronounced phonemes in the case of alvoelar approximant (/r/) substituted with voiced dental consonant (/∂/)","authors":"P. B. Ramteke, S. Koolagudi, Arun Prabhakar","doi":"10.1109/IC3.2015.7346667","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346667","url":null,"abstract":"Mispronunciation is commonly observed in children from age 2 to 8 years. Some of the common mispronunciations are stopping, fronting, backing and affrication. These processes are known as phonological processes. Identification of these processes is crucial in studying the vocal tract development pattern and treating the phonological disorders in children. The features that clearly discriminate correctly pronounced phoneme from corresponding mispronounced phoneme have to be compared to identify the phonological processes. This paper focuses on the analysis of mispronounced alveolar approximant (/r/) substituted with voiced fricative consonant (/∂/). In this work, spectral and pitch related features are considered for the analysis using scatter plots and histograms. From the analysis, it is observed that the energy feature against 2nd and 4th cepstral coefficients achieves 75% and 65% discrimination respectively.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"34 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123342634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BNSR: Border Node preferred Social Ranking based Routing Protocol for VANETs 基于边界节点优先社会排名的vanet路由协议
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346743
Bhuvan Mehan, Sanjay Batish, R. Bhatia, A. Dhiman
Border Node preferred Social Ranking based Routing Protocol (BNSR) is present in this paper which is the expansion of the BMFR routing protocol. Routing strategy of BNSR follows the position based routing by using any location services such as GPS system and forwarding strategy follows the prominence of border node based forwarding to shrivel the delay and optimize the path length. BNSR considers the concept of social ranking which is a parameter of CODO (continuous opinion dynamic optimization) technique on which basis the next hop border node is selected. The protocol is simulated with NS2 simulator and results shows the algorithm works well and produces better packet delivery ratio (PDR) and minimum end-to-end delay. When compared with BMFR protocol the consequence of purposed protocol is much better and much efficient in VANETs. We are the first to acquaint the concept of social ranking in selecting the next hop border nodes in the best of our knowledge.
本文提出了基于边界节点优先社会排名的路由协议(BNSR),它是对边界节点优先社会排名路由协议的扩展。BNSR的路由策略遵循基于位置的路由,利用GPS等任意位置服务;转发策略遵循基于边界节点的转发的突出性,缩小时延,优化路径长度。BNSR考虑了社会排名的概念,这是CODO(连续意见动态优化)技术的一个参数,在此基础上选择下一跳边界节点。在NS2仿真器上对该协议进行了仿真,结果表明该算法运行良好,具有更好的分组投递率(PDR)和最小的端到端延迟。与BMFR协议相比,目标协议在VANETs中的效果更好,效率更高。我们是第一个在选择下一跳边界节点时熟悉社会排名概念的人。
{"title":"BNSR: Border Node preferred Social Ranking based Routing Protocol for VANETs","authors":"Bhuvan Mehan, Sanjay Batish, R. Bhatia, A. Dhiman","doi":"10.1109/IC3.2015.7346743","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346743","url":null,"abstract":"Border Node preferred Social Ranking based Routing Protocol (BNSR) is present in this paper which is the expansion of the BMFR routing protocol. Routing strategy of BNSR follows the position based routing by using any location services such as GPS system and forwarding strategy follows the prominence of border node based forwarding to shrivel the delay and optimize the path length. BNSR considers the concept of social ranking which is a parameter of CODO (continuous opinion dynamic optimization) technique on which basis the next hop border node is selected. The protocol is simulated with NS2 simulator and results shows the algorithm works well and produces better packet delivery ratio (PDR) and minimum end-to-end delay. When compared with BMFR protocol the consequence of purposed protocol is much better and much efficient in VANETs. We are the first to acquaint the concept of social ranking in selecting the next hop border nodes in the best of our knowledge.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 Eighth International Conference on Contemporary Computing (IC3)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1