首页 > 最新文献

Recent Patents on Computer Science最新文献

英文 中文
Hyperbolic Spider Monkey Optimization Algorithm 双曲蜘蛛猴优化算法
Pub Date : 2020-03-13 DOI: 10.2174/2213275912666181207155334
Sandeep Kumar, A. Nayyar, Nhu Gia Nguyen, Rajani Kumari
Spider monkey optimization algorithm is recently developed natureinspiredalgorithm. It is based on fission-fusion social structure of spider monkeys. Perturbation rateis one of the important parameter of spider monkey optimization algorithm, which affects the convergencebehavior of spider monkey optimization algorithm. Generally, perturbation rate is a linearlyincreasing function. However, due to the availability of non-linearity in different applications, anon-linear function may affect the performance of spider monkey optimization algorithm.This paper provides a detailed study on various perturbation techniques used in spidermonkey optimization algorithm and recommends a novel alternative of hyperbolic spider monkeyoptimization algorithm. The new approach is named as hyperbolic Spider Monkey Optimization algorithmas the perturbation strategy inspired by hyperbolic growth function.The proposed algorithm is tested over a set of 23 CEC 2005 benchmark problems.The experimental outcomes illustrate that the hyperbolic spider monkey optimization algorithmeffectively increase the reliability of spider monkey optimization algorithm in comparison tothe considered approaches.The hyperbolic spider monkey optimization algorithm provides improved perturbationrate, desirable convergence precision, rapid convergence rate, and improved global search capability.
蜘蛛猴优化算法是近年来发展起来的一种受自然启发的算法。它基于蜘蛛猴的裂变融合社会结构。摄动率是蜘蛛猴优化算法的重要参数之一,它影响着蜘蛛猴优化算法的收敛行为。一般来说,摄动率是一个线性递增的函数。然而,由于非线性在不同应用中的可用性,非线性函数可能会影响蜘蛛猴优化算法的性能。本文详细研究了蜘蛛猴优化算法中使用的各种摄动技术,并提出了一种新的双曲蜘蛛猴优化算法。这种新方法被命名为双曲蜘蛛猴优化算法——一种受双曲生长函数启发的摄动策略。通过23个CEC 2005基准问题对该算法进行了测试。实验结果表明,与所考虑的方法相比,双曲蜘蛛猴优化算法有效地提高了蜘蛛猴优化算法的可靠性。双曲蜘蛛猴优化算法提供了改进的摄动率、理想的收敛精度、快速的收敛速度和改进的全局搜索能力。
{"title":"Hyperbolic Spider Monkey Optimization Algorithm","authors":"Sandeep Kumar, A. Nayyar, Nhu Gia Nguyen, Rajani Kumari","doi":"10.2174/2213275912666181207155334","DOIUrl":"https://doi.org/10.2174/2213275912666181207155334","url":null,"abstract":"\u0000\u0000Spider monkey optimization algorithm is recently developed natureinspired\u0000algorithm. It is based on fission-fusion social structure of spider monkeys. Perturbation rate\u0000is one of the important parameter of spider monkey optimization algorithm, which affects the convergence\u0000behavior of spider monkey optimization algorithm. Generally, perturbation rate is a linearly\u0000increasing function. However, due to the availability of non-linearity in different applications, a\u0000non-linear function may affect the performance of spider monkey optimization algorithm.\u0000\u0000\u0000\u0000This paper provides a detailed study on various perturbation techniques used in spider\u0000monkey optimization algorithm and recommends a novel alternative of hyperbolic spider monkey\u0000optimization algorithm. The new approach is named as hyperbolic Spider Monkey Optimization algorithm\u0000as the perturbation strategy inspired by hyperbolic growth function.\u0000\u0000\u0000\u0000The proposed algorithm is tested over a set of 23 CEC 2005 benchmark problems.\u0000\u0000\u0000\u0000The experimental outcomes illustrate that the hyperbolic spider monkey optimization algorithm\u0000effectively increase the reliability of spider monkey optimization algorithm in comparison to\u0000the considered approaches.\u0000\u0000\u0000\u0000The hyperbolic spider monkey optimization algorithm provides improved perturbation\u0000rate, desirable convergence precision, rapid convergence rate, and improved global search capability.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Non-cooperative Iris Segmentation: A Two-stage Approach 非合作虹膜分割:一种两阶段方法
Pub Date : 2019-11-14 DOI: 10.2174/2213275912666191114144935
M. R. Kumar, K. Arthi
Recently, segmentation of iris image is the most important process in a robust iris recognition system due to the images captured from non-cooperative environments which introduce occlusions, blur, specular reflections, and off-axis. However, several techniques are developed to overcome these drawbacks in the iris segmentation process; it is still a challenging task to localize the iris texture regions. In this research, an effective two-stage of iris segmentation technique is proposed in a non-cooperative environment. At first, modified Geodesic Active Contour-based level set segmentation with Particle Swarm Optimization (PSO) is employed for iris segmentation. In this, the PSO algorithm is used to minimize the energy of the gradient descent equation in a region-based level set segmentation algorithm. Then, the global threshold-based segmentation is employed for pupil region segmentation. The experiment considered two well-known databases such as UBIRIS.V1 and UBIRIS.V2. The simulation outcomes demonstrate that the proposed novel approach attained more accurate and robust iris segmentation under non-cooperative conditions. Also, the results of the modified Geodesic Active Contour-based level set segmentation with the PSO algorithm attained better results than the conventional segmentation techniques.
目前,虹膜图像的分割是鲁棒性虹膜识别系统中最重要的过程,因为从非合作环境中捕获的图像会引入遮挡、模糊、镜面反射和离轴。然而,为了克服虹膜分割过程中的这些缺点,开发了几种技术;虹膜纹理区域的定位仍然是一个具有挑战性的任务。本研究提出了一种有效的非合作环境下的两阶段虹膜分割技术。首先,采用改进的基于测地线活动轮廓的水平集分割和粒子群算法(PSO)对虹膜进行分割。在基于区域的水平集分割算法中,利用粒子群算法最小化梯度下降方程的能量。然后,采用基于全局阈值的分割方法进行瞳孔区域分割。该实验考虑了两个知名的数据库,如UBIRIS。V1和UBIRIS.V2。仿真结果表明,该方法在非合作条件下具有更高的虹膜分割精度和鲁棒性。改进的基于测地线活动轮廓的水平集分割与粒子群算法的分割结果也优于传统的分割方法。
{"title":"Non-cooperative Iris Segmentation: A Two-stage Approach","authors":"M. R. Kumar, K. Arthi","doi":"10.2174/2213275912666191114144935","DOIUrl":"https://doi.org/10.2174/2213275912666191114144935","url":null,"abstract":"\u0000\u0000Recently, segmentation of iris image is the most important process in a robust iris recognition system due to the images captured from non-cooperative environments which introduce occlusions, blur, specular reflections, and off-axis. However, several techniques are developed to overcome these drawbacks in the iris segmentation process; it is still a challenging task to localize the iris texture regions. In this research, an effective two-stage of iris segmentation technique is proposed in a non-cooperative environment. At first, modified Geodesic Active Contour-based level set segmentation with Particle Swarm Optimization (PSO) is employed for iris segmentation. In this, the PSO algorithm is used to minimize the energy of the gradient descent equation in a region-based level set segmentation algorithm. Then, the global threshold-based segmentation is employed for pupil region segmentation. The experiment considered two well-known databases such as UBIRIS.V1 and UBIRIS.V2. The simulation outcomes demonstrate that the proposed novel approach attained more accurate and robust iris segmentation under non-cooperative conditions. Also, the results of the modified Geodesic Active Contour-based level set segmentation with the PSO algorithm attained better results than the conventional segmentation techniques.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances in Swarm Intelligence and Machine Learning for Optimizing Problems in Image Processing and Data Analytics (Part 1) 群智能和机器学习在图像处理和数据分析优化问题中的研究进展(上)
Pub Date : 2019-10-31 DOI: 10.2174/221327591204190517082230
A. Nayyar, Sandeep Kumar, Nhu Gia Nguyen
{"title":"Advances in Swarm Intelligence and Machine Learning for Optimizing Problems in Image Processing and Data Analytics (Part 1)","authors":"A. Nayyar, Sandeep Kumar, Nhu Gia Nguyen","doi":"10.2174/221327591204190517082230","DOIUrl":"https://doi.org/10.2174/221327591204190517082230","url":null,"abstract":"","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128775593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Genetic Algorithm Based Feature Selection for Handwritten Digit Recognition 基于遗传算法的手写体数字识别特征选择
Pub Date : 2019-10-31 DOI: 10.2174/2213275911666181120111342
Savita Ahlawat and Rahul Rishi
The data proliferation has been resulted in large-scale, high dimensional dataand brings new challenges for feature selection in handwriting recognition problems. The practicalchallenges like the large variability and ambiguities present in the individual’s handwriting styledemand an optimal feature selection algorithm that would be capable to enhance the recognition accuracyof handwriting recognition system with reduced training efforts and computational cost.This paper gives emphasis on the feature selection process and proposed a genetic algorithmbased feature selection technique for handwritten digit recognition.A hybrid feature set of statistical and geometrical features is developed in order to get theeffective feature set consist of local and global characteristics of sample digits. The method utilizes agenetic algorithm based feature selection for selecting best distinguishable features and k-nearestneighbour for evaluating the fitness of features of handwritten digit dataset.The experiments are carried out on standard The Chars74K handwritten digit dataset andreported a 66% reduction in the original feature set without sacrificing the recognition accuracy.The experiment results show the effectiveness of the proposed approach.
数据的激增导致了大规模、高维的数据,给手写识别中的特征选择问题带来了新的挑战。实际的挑战,如个人手写风格存在的巨大可变性和模糊性,需要一种优化的特征选择算法,该算法能够在减少训练工作量和计算成本的情况下提高手写识别系统的识别准确性。本文重点研究了特征选择过程,提出了一种基于遗传算法的手写体数字识别特征选择技术。为了得到包含样本数字局部特征和全局特征的有效特征集,提出了统计特征和几何特征的混合特征集。该方法利用基于遗传算法的特征选择来选择最佳可区分特征,利用k近邻来评估手写数字数据集的特征适应度。实验在标准的Chars74K手写数字数据集上进行,在不牺牲识别精度的情况下,将原始特征集减少了66%。实验结果表明了该方法的有效性。
{"title":"A Genetic Algorithm Based Feature Selection for Handwritten Digit Recognition","authors":"Savita Ahlawat and Rahul Rishi","doi":"10.2174/2213275911666181120111342","DOIUrl":"https://doi.org/10.2174/2213275911666181120111342","url":null,"abstract":"\u0000\u0000The data proliferation has been resulted in large-scale, high dimensional data\u0000and brings new challenges for feature selection in handwriting recognition problems. The practical\u0000challenges like the large variability and ambiguities present in the individual’s handwriting style\u0000demand an optimal feature selection algorithm that would be capable to enhance the recognition accuracy\u0000of handwriting recognition system with reduced training efforts and computational cost.\u0000\u0000\u0000\u0000This paper gives emphasis on the feature selection process and proposed a genetic algorithm\u0000based feature selection technique for handwritten digit recognition.\u0000\u0000\u0000\u0000A hybrid feature set of statistical and geometrical features is developed in order to get the\u0000effective feature set consist of local and global characteristics of sample digits. The method utilizes a\u0000genetic algorithm based feature selection for selecting best distinguishable features and k-nearest\u0000neighbour for evaluating the fitness of features of handwritten digit dataset.\u0000\u0000\u0000\u0000The experiments are carried out on standard The Chars74K handwritten digit dataset and\u0000reported a 66% reduction in the original feature set without sacrificing the recognition accuracy.\u0000\u0000\u0000\u0000The experiment results show the effectiveness of the proposed approach.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128136500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research on Video Encryption and Privacy Protection in Cloud Monitoring System Based on H.264 基于H.264的云监控系统视频加密与隐私保护研究
Pub Date : 2019-10-19 DOI: 10.2174/2213275912666191019141453
Qingtao Wu, Zaihui Cao
Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.
云监控技术是云平台重要的维护和管理工具。云监控系统是一种基于互联网的网络监控服务、监控技术和监控平台。目前,监控系统正从本地监控向云监控转变,随着灵活性和便利性的提高,也暴露出更多的安全问题。云视频在传输过程中可能被截取或改变。现有的加密算法大多在实时性和安全性方面存在缺陷。针对目前云视频监控存在的安全问题,提出了一种基于H.264标准的视频加密算法。利用先进的FMO机制,可以将相关的宏块驱动到不同的Slice中。本文提出的加密算法通过对FMO子图像进行加密,实现对整个视频内容的加密。该方法实时性高,加密过程可以与编码过程并行执行。该算法还可以与传统的置乱算法相结合,进一步提高视频加密效果。该算法选择视频数据中加密的部分,减少了需要加密的数据量。从而降低了加密系统的计算复杂度,具有更快的加密速度,提高了实时性和安全性,适合通过移动多媒体和无线多媒体网络传输。
{"title":"Research on Video Encryption and Privacy Protection in Cloud Monitoring System Based on H.264","authors":"Qingtao Wu, Zaihui Cao","doi":"10.2174/2213275912666191019141453","DOIUrl":"https://doi.org/10.2174/2213275912666191019141453","url":null,"abstract":"\u0000\u0000Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Trust Management Model for the Internet of Things and Smart Sensors: The Challenges and Applications 物联网与智能传感器动态信任管理模型:挑战与应用
Pub Date : 2019-08-23 DOI: 10.2174/2213275912666190823103344
A. Dwivedi, A. Sharma, Rakesh Kumar
The endeavor of this observational examination is to build up another exploration structure that clarifies the consumer mentality toward the Internet of Things (IoT) benefit through the Wireless Sensor Network (WSN). WSN should be associated with the Internet because of its assortment of uses as well as their significance. There are a few difficulties along with the issues inside coordinating WSN and IoT. Since a wide-reaching WSN is to be fully migrating into the Internet as an important part of IoT, it is important to think about different safety questions that come with IoT, such as the observation of bad attacks. Sensors or sensor fix things may organization straight to exchange between each other using various protocol. A have trust is making out as an important part to put forward arguments for a complex made distribution sensor networks in IoT against bad net-work point attacks, since trust setup mechanisms can bracing combination among distributed computing and communication entities, facilitate the detection of unprincipled entities, and assist the decision-making process of different protocols. In this paper, in view of inside and out comprehension of trust foundation process and quantitative examination among trust foundation techniques, we present trust and notoriety show TRM-IoT to authorize the participation between things in a system of IoT dependent on their practices. In this model the internet of thing (IOT) system to pledge with misbehaving nodes whose status are non deterministic. This paper also presents an overview of trust management model in IOT.The accuracy, robustness, and lightness of the proposed model is approved through a wide arrangement of recreations.
这项观察性研究的目的是建立另一种探索结构,阐明消费者对通过无线传感器网络(WSN)获得物联网(IoT)利益的心态。无线传感器网络应该与互联网联系在一起,因为它具有多种用途以及它们的重要性。在WSN和物联网的协调中存在一些困难和问题。由于广泛的WSN将作为物联网的重要组成部分完全迁移到互联网,因此考虑物联网带来的不同安全问题非常重要,例如观察恶意攻击。传感器或传感器固定的东西可以使用各种协议直接组织在彼此之间进行交换。由于信任建立机制可以支撑分布式计算和通信实体之间的组合,便于对无原则实体的检测,并辅助不同协议的决策过程,因此信任建立机制作为物联网中复杂分布式传感器网络抵御恶意网络点攻击的重要组成部分。本文从对信任建立过程的全面理解和对信任建立技术的定量考察出发,提出了基于实践的物联网系统中物之间参与授权的信任和恶名显示TRM-IoT。在该模型中,物联网系统中存在行为不端的节点,其状态是不确定的。本文还概述了物联网中的信任管理模型。所提出的模型的准确性、鲁棒性和轻巧性通过广泛的娱乐活动得到了认可。
{"title":"Dynamic Trust Management Model for the Internet of Things and Smart Sensors: The Challenges and Applications","authors":"A. Dwivedi, A. Sharma, Rakesh Kumar","doi":"10.2174/2213275912666190823103344","DOIUrl":"https://doi.org/10.2174/2213275912666190823103344","url":null,"abstract":"\u0000\u0000The endeavor of this observational examination is to build up another exploration structure that clarifies the consumer mentality toward the Internet of Things (IoT) benefit through the Wireless Sensor Network (WSN). WSN should be associated with the Internet because of its assortment of uses as well as their significance. There are a few difficulties along with the issues inside coordinating WSN and IoT. Since a wide-reaching WSN is to be fully migrating into the Internet as an important part of IoT, it is important to think about different safety questions that come with IoT, such as the observation of bad attacks. Sensors or sensor fix things may organization straight to exchange between each other using various protocol. A have trust is making out as an important part to put forward arguments for a complex made distribution sensor networks in IoT against bad net-work point attacks, since trust setup mechanisms can bracing combination among distributed computing and communication entities, facilitate the detection of unprincipled entities, and assist the decision-making process of different protocols. In this paper, in view of inside and out comprehension of trust foundation process and quantitative examination among trust foundation techniques, we present trust and notoriety show TRM-IoT to authorize the participation between things in a system of IoT dependent on their practices. In this model the internet of thing (IOT) system to pledge with misbehaving nodes whose status are non deterministic. This paper also presents an overview of trust management model in IOT.The accuracy, robustness, and lightness of the proposed model is approved through a wide arrangement of recreations.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Hybrid Fog Architecture: Improving the Efficiency in IoT-Based Smart Parking Systems 混合雾架构:提高基于物联网的智能停车系统效率
Pub Date : 2019-08-23 DOI: 10.2174/2213275912666190823113524
Bhawna Suri, Pijush Kanti Dutta Pramanik, Shweta Taneja
The abundant use of personal vehicles has raised the challenge of parkingthe vehicle in crowded places such as shopping malls. To help the driver with efficient and troublefreeparking, a smart and innovative parking assistance system is required. In addition to discussingthe basics of smart parking, Internet of Things (IoT), Cloud computing, and Fog computing,this chapter proposes an IoT-based smart parking system for shopping malls.To process the IoT data, a hybrid Fog architecture is adopted in order to reduce the latency,where the Fog nodes are connected across the hierarchy. The advantages of this auxiliaryconnection are discussed critically by comparing with other Fog architectures (hierarchical andP2P). An algorithm is defined to support the proposed architecture and is implemented on two real-world use-cases having requirements of identifying the nearest free car parking slot. The implementationis simulated for a single mall scenario as well as for a campus with multiple malls withparking areas spread across them.The simulation results have proved that our proposed architecture shows lower latency ascompared to the traditional smart parking systems that use Cloud architecture.The hybrid Fog architecture minimizes communication latency significantly. Hence,the proposed architecture can suitably be applied for other IoT-based real-time applications.
私家车的大量使用带来了在购物中心等拥挤场所停车的挑战。为了帮助驾驶员实现高效无故障停车,需要一个智能创新的停车辅助系统。除了讨论智能停车、物联网、云计算和雾计算的基础知识外,本章还提出了一种基于物联网的商场智能停车系统。为了处理物联网数据,采用混合雾架构以减少延迟,其中雾节点跨层次连接。通过与其他雾架构(分层和p2p)的比较,详细讨论了这种辅助连接的优点。定义了一种算法来支持所提出的体系结构,并在两个实际用例上实现,这些用例需要识别最近的免费停车位。该实现模拟了单个购物中心的场景,以及具有多个购物中心的校园,其中停车场分布在它们之间。仿真结果表明,与使用云架构的传统智能停车系统相比,我们提出的架构具有更低的延迟。混合雾架构显著降低了通信延迟。因此,所提出的架构可以适用于其他基于物联网的实时应用。
{"title":"A Hybrid Fog Architecture: Improving the Efficiency in IoT-Based Smart Parking Systems","authors":"Bhawna Suri, Pijush Kanti Dutta Pramanik, Shweta Taneja","doi":"10.2174/2213275912666190823113524","DOIUrl":"https://doi.org/10.2174/2213275912666190823113524","url":null,"abstract":"\u0000\u0000The abundant use of personal vehicles has raised the challenge of parking\u0000the vehicle in crowded places such as shopping malls. To help the driver with efficient and troublefree\u0000parking, a smart and innovative parking assistance system is required. In addition to discussing\u0000the basics of smart parking, Internet of Things (IoT), Cloud computing, and Fog computing,\u0000this chapter proposes an IoT-based smart parking system for shopping malls.\u0000\u0000\u0000\u0000To process the IoT data, a hybrid Fog architecture is adopted in order to reduce the latency,\u0000where the Fog nodes are connected across the hierarchy. The advantages of this auxiliary\u0000connection are discussed critically by comparing with other Fog architectures (hierarchical and\u0000P2P). An algorithm is defined to support the proposed architecture and is implemented on two real-\u0000world use-cases having requirements of identifying the nearest free car parking slot. The implementation\u0000is simulated for a single mall scenario as well as for a campus with multiple malls with\u0000parking areas spread across them.\u0000\u0000\u0000\u0000The simulation results have proved that our proposed architecture shows lower latency as\u0000compared to the traditional smart parking systems that use Cloud architecture.\u0000\u0000\u0000\u0000The hybrid Fog architecture minimizes communication latency significantly. Hence,\u0000the proposed architecture can suitably be applied for other IoT-based real-time applications.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134037909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cost-effective Heuristic Workflow Scheduling Algorithm in Cloud Under Deadline Constraint 期限约束下云环境下的高性价比启发式工作流调度算法
Pub Date : 2019-08-22 DOI: 10.2174/2213275912666190822113039
Jasraj Meena, M. Vardhan
Cloud computing is used to deliver IT resources over the internet. Due tothe popularity of cloud computing, nowadays, most of the scientific workflows are shifted towardsthis environment. Many algorithms have been proposed in the literature to schedule scientific workflowsin the cloud, but their execution cost is very high as they are not meeting the user-defineddeadline constraint.This paper focuses on satisfying the user-defined deadline of a scientific workflow while minimizingthe total execution cost. So, to achieve this, we proposed a Cost-Effective under Deadline (CEuD) constraintworkflow scheduling algorithm.The proposed CEuD algorithm considers all the essential features of the Cloud and resolvesthe major issues such as performance variation and acquisition delay.We compared the proposed CEuD algorithm with the existing literature algorithms forscientific workflows (i.e., Montage, Epigenomics, and CyberShake) and obtained better results forminimizing the overall execution cost of the workflow while satisfying the user-defined deadline.
云计算用于在互联网上传递IT资源。由于云计算的普及,如今,大多数科学工作流程都转移到了这个环境中。文献中已经提出了许多算法来调度云中的科学工作流,但是它们的执行成本非常高,因为它们不满足用户定义的截止日期约束。本文的重点是满足科学工作流的用户自定义期限,同时最小化总执行成本。因此,为了实现这一目标,我们提出了一种具有成本效益的基于截止日期(CEuD)约束的工作流调度算法。提出的CEuD算法考虑了云计算的所有基本特征,并解决了性能变化和获取延迟等主要问题。我们将提出的CEuD算法与现有的科学工作流算法(即Montage, Epigenomics和CyberShake)进行了比较,并获得了更好的结果,在满足用户自定义截止日期的同时最小化了工作流的总体执行成本。
{"title":"Cost-effective Heuristic Workflow Scheduling Algorithm in Cloud Under Deadline Constraint","authors":"Jasraj Meena, M. Vardhan","doi":"10.2174/2213275912666190822113039","DOIUrl":"https://doi.org/10.2174/2213275912666190822113039","url":null,"abstract":"\u0000\u0000 Cloud computing is used to deliver IT resources over the internet. Due to\u0000the popularity of cloud computing, nowadays, most of the scientific workflows are shifted towards\u0000this environment. Many algorithms have been proposed in the literature to schedule scientific workflows\u0000in the cloud, but their execution cost is very high as they are not meeting the user-defined\u0000deadline constraint.\u0000\u0000\u0000\u0000This paper focuses on satisfying the user-defined deadline of a scientific workflow while minimizing\u0000the total execution cost.\u0000\u0000\u0000\u0000 So, to achieve this, we proposed a Cost-Effective under Deadline (CEuD) constraint\u0000workflow scheduling algorithm.\u0000\u0000\u0000\u0000The proposed CEuD algorithm considers all the essential features of the Cloud and resolves\u0000the major issues such as performance variation and acquisition delay.\u0000\u0000\u0000\u0000We compared the proposed CEuD algorithm with the existing literature algorithms for\u0000scientific workflows (i.e., Montage, Epigenomics, and CyberShake) and obtained better results for\u0000minimizing the overall execution cost of the workflow while satisfying the user-defined deadline.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129877322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speed of Things (SoT): Evolution of Isolation-to-Intermingle (I2I) Technology Transition Towards IoT 物联网速度(SoT):从隔离到混合(I2I)技术向物联网转型的演变
Pub Date : 2019-08-19 DOI: 10.2174/2213275911666181010114221
Ravishanker, A. K. Luhach, Sykam V Narendra Kumar, R. Poonia
In today’s world it is highly difficult to manage the smart things and fulfillthe communication needs without the Internet as it provides ultimate means for human to human(H2H) communication. The ‘things’ could be entities or devices that contribute for the communication.But to enhance and improve such smart communication among the things that involves nonhumanintervention, there is a need to add few more smart capabilities to the Internet. As the worldof Internet is on its way of transformation into a new smart world called ‘Internet of Things’ (IoT)where the things should possess the ability of sensing, communication and control to let the thingsexchange information without complete intervention of humans to provide advanced and qualitativeservices, which is possible with the help of protocols.This paper discusses how the transition could be started and being progressed in wiredand wireless systems, and how it changes the traditional means of communication among differentdevices and humans into a smart way.Transition here refers to how isolated things are being intermingled with each other togenerate a smart protocol communication. The aim of such transition is to improve the efficiency, flexibility, adaptabilityand interoperability. This paper also explores various factors that contribute to IoT.
在当今世界,由于互联网为人与人(H2H)通信提供了最终手段,因此管理智能事物和满足通信需求是非常困难的。“物”可以是有助于交流的实体或设备。但是,为了加强和改善这种涉及非人为干预的事物之间的智能通信,有必要为互联网添加更多的智能功能。随着互联网世界正在向“物联网”(IoT)的新智能世界转变,物应该具有感知、通信和控制的能力,让物在没有人类完全干预的情况下交换信息,提供先进的、有质量的服务,这在协议的帮助下是可能的。本文讨论了在有线和无线系统中如何开始和正在进行的过渡,以及它如何将不同设备和人之间的传统通信方式转变为智能方式。这里的转换是指如何将孤立的事物相互混合以生成智能协议通信。这种转换的目的是提高效率、灵活性、适应性和互操作性。本文还探讨了促成物联网的各种因素。
{"title":"Speed of Things (SoT): Evolution of Isolation-to-Intermingle (I2I) Technology Transition Towards IoT","authors":"Ravishanker, A. K. Luhach, Sykam V Narendra Kumar, R. Poonia","doi":"10.2174/2213275911666181010114221","DOIUrl":"https://doi.org/10.2174/2213275911666181010114221","url":null,"abstract":"\u0000\u0000In today’s world it is highly difficult to manage the smart things and fulfill\u0000the communication needs without the Internet as it provides ultimate means for human to human\u0000(H2H) communication. The ‘things’ could be entities or devices that contribute for the communication.\u0000But to enhance and improve such smart communication among the things that involves nonhuman\u0000intervention, there is a need to add few more smart capabilities to the Internet. As the world\u0000of Internet is on its way of transformation into a new smart world called ‘Internet of Things’ (IoT)\u0000where the things should possess the ability of sensing, communication and control to let the things\u0000exchange information without complete intervention of humans to provide advanced and qualitative\u0000services, which is possible with the help of protocols.\u0000\u0000\u0000\u0000This paper discusses how the transition could be started and being progressed in wired\u0000and wireless systems, and how it changes the traditional means of communication among different\u0000devices and humans into a smart way.\u0000\u0000\u0000\u0000Transition here refers to how isolated things are being intermingled with each other to\u0000generate a smart protocol communication.\u0000\u0000\u0000\u0000 The aim of such transition is to improve the efficiency, flexibility, adaptability\u0000and interoperability. This paper also explores various factors that contribute to IoT.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133756506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Chaos-Based Controlled System Using Discrete Map 基于离散映射的混沌控制系统
Pub Date : 2019-08-19 DOI: 10.2174/2213275912666190819104221
Anup Das, M. Mandal
The design of efficient and fast controller for controlling the process parameteris always a challenging work to the control system designer. The main objective of this articleis to design a secure chaos based controller by synchronizing two chaotic systems. The initialvalues of the chaotic systems are considered as the set value and initial process value of the physicalparameter to be controlled.The proposed design of the controlled is done by synchronizing two-dimensional chaoticHenon map through nonlinear control method. One map is taken as a driver system and its initialvalue is considered as the set value of a specific process of a given system. On the other hand, anotheridentical map is taken as the driven system and its initial value is the initial process value ofthe given process control system. Both the chaotic map become synchronized via nonlinear controllaw. The accumulation of error until synchronization is achieved which is converted into a suitablesignal to operate the final control element to enhance or decrease the initial process value towardsthe set value. This self-repetitive process will achieve the control of the process parameter.In experiment we have observer that the error signal becomes zero after a small time interval(in simulation it takes only few iteration) and the accumulated error remain fixed in a steadyvalue. This error is responsible to maintain the process value to the set value. The entire process hasbeen implemented in hardware environment by using microcontroller ATMEGA 16 and also in theProteus simulation software.The controller is very fast because the algorithm of nonlinear control law for synchronizationis very fast. Since the controller is designed in chaotic regime so it is secure.
设计高效、快速的过程参数控制控制器一直是控制系统设计人员面临的一项挑战。本文的主要目的是通过同步两个混沌系统来设计一个安全的混沌控制器。将混沌系统的初始值视为待控制物理参数的设定值和初始过程值。所提出的被控系统设计是通过非线性控制方法同步二维混沌图来实现的。将一个map作为一个驱动系统,并将其初始值视为给定系统中特定进程的设定值。另一方面,将另一个相同的映射作为被驱动系统,其初始值为给定过程控制系统的初始过程值。两个混沌映射通过非线性控制律实现同步。误差的积累,直到达到同步,它被转换成一个合适的信号来操作最终控制元件,使初始过程值向设定值增加或减少。这种自重复过程将实现对工艺参数的控制。在实验中,我们观察到误差信号在很小的时间间隔后变为零(在模拟中只需要很少的迭代),并且累积误差保持固定在一个稳态值。此错误负责将进程值维持为设定值。整个过程已在硬件环境下使用单片机atmega16和proteus仿真软件实现。该控制器速度非常快,因为非线性同步控制律的算法非常快。由于控制器是在混沌状态下设计的,因此具有一定的安全性。
{"title":"Chaos-Based Controlled System Using Discrete Map","authors":"Anup Das, M. Mandal","doi":"10.2174/2213275912666190819104221","DOIUrl":"https://doi.org/10.2174/2213275912666190819104221","url":null,"abstract":"\u0000\u0000The design of efficient and fast controller for controlling the process parameter\u0000is always a challenging work to the control system designer. The main objective of this article\u0000is to design a secure chaos based controller by synchronizing two chaotic systems. The initial\u0000values of the chaotic systems are considered as the set value and initial process value of the physical\u0000parameter to be controlled.\u0000\u0000\u0000\u0000The proposed design of the controlled is done by synchronizing two-dimensional chaotic\u0000Henon map through nonlinear control method. One map is taken as a driver system and its initial\u0000value is considered as the set value of a specific process of a given system. On the other hand, another\u0000identical map is taken as the driven system and its initial value is the initial process value of\u0000the given process control system. Both the chaotic map become synchronized via nonlinear control\u0000law. The accumulation of error until synchronization is achieved which is converted into a suitable\u0000signal to operate the final control element to enhance or decrease the initial process value towards\u0000the set value. This self-repetitive process will achieve the control of the process parameter.\u0000\u0000\u0000\u0000In experiment we have observer that the error signal becomes zero after a small time interval\u0000(in simulation it takes only few iteration) and the accumulated error remain fixed in a steady\u0000value. This error is responsible to maintain the process value to the set value. The entire process has\u0000been implemented in hardware environment by using microcontroller ATMEGA 16 and also in the\u0000Proteus simulation software.\u0000\u0000\u0000\u0000The controller is very fast because the algorithm of nonlinear control law for synchronization\u0000is very fast. Since the controller is designed in chaotic regime so it is secure.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Recent Patents on Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1