首页 > 最新文献

2017 3rd International Conference on Computational Intelligence and Networks (CINE)最新文献

英文 中文
QoWS Analysis for Web Service Selection Using WS Monitoring Tool 使用WS监控工具进行Web服务选择的QoWS分析
G. Raj, Dheerendra Singh, Triveni Mishra
The focus of this research effort is to build Web Services based on open standards and monitor their requestresponse exchanges with a ASP.NET based application that stores performance information of the calls made to the web services, built in Microsoft Visual Studio for the purpose of generating performance data in the form of QoS quantifying quantities of Successes (similar to throughput), Failures (Total attemptssuccesses*) , Datasize or length and the Time taken (Response Time) measured from the service calls of web services for usage in research efforts for the selection and/or recommendation of these services to Web Service consumers. An approach for web service selection has been suggested as well as implemented using data mining techniques included in the selection algorithm.
这项研究工作的重点是基于开放标准构建Web服务,并监控它们与ASP之间的请求-响应交换。基于。NET的应用程序,存储对web服务的调用的性能信息,在Microsoft Visual Studio中构建,用于以QoS的形式生成性能数据,量化成功(类似于吞吐量),失败(总尝试次数*),从web服务的服务调用开始测量的数据化或长度和所用时间(响应时间),用于向web服务消费者选择和/或推荐这些服务的研究工作。提出了一种web服务选择方法,并使用选择算法中包含的数据挖掘技术实现了该方法。
{"title":"QoWS Analysis for Web Service Selection Using WS Monitoring Tool","authors":"G. Raj, Dheerendra Singh, Triveni Mishra","doi":"10.1109/CINE.2017.15","DOIUrl":"https://doi.org/10.1109/CINE.2017.15","url":null,"abstract":"The focus of this research effort is to build Web Services based on open standards and monitor their requestresponse exchanges with a ASP.NET based application that stores performance information of the calls made to the web services, built in Microsoft Visual Studio for the purpose of generating performance data in the form of QoS quantifying quantities of Successes (similar to throughput), Failures (Total attemptssuccesses*) , Datasize or length and the Time taken (Response Time) measured from the service calls of web services for usage in research efforts for the selection and/or recommendation of these services to Web Service consumers. An approach for web service selection has been suggested as well as implemented using data mining techniques included in the selection algorithm.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identity Crime Detection Using Data Mining 基于数据挖掘的身份犯罪侦查
Sharmistha Dutta, Ankit Gupta, Neetu Narayan
Identity Crime is considered as crimes which involve masquerading one's identity and steal confidential information with respect to the concerned person's identity. This paper mainly deals with identity crime related to credit card application, which nowadays is quite prevalent and costly even. The existing non data-mining techniques for eliminating identity theft have some flaws and to combat them a new data-mining layer of defence has been proposed. This novel layer makes use of two algorithms-Communal Detection and Spike Detection for detecting frauds in applications.
身份犯罪是指伪装身份,窃取与当事人身份有关的机密信息的犯罪。本文主要研究与信用卡申请有关的身份犯罪,这类犯罪在当今非常普遍,甚至代价高昂。针对现有的消除身份盗窃的非数据挖掘技术存在的缺陷,提出了一种新的数据挖掘防御层。这个新层利用两种算法——公共检测和峰值检测来检测应用程序中的欺诈行为。
{"title":"Identity Crime Detection Using Data Mining","authors":"Sharmistha Dutta, Ankit Gupta, Neetu Narayan","doi":"10.1109/CINE.2017.18","DOIUrl":"https://doi.org/10.1109/CINE.2017.18","url":null,"abstract":"Identity Crime is considered as crimes which involve masquerading one's identity and steal confidential information with respect to the concerned person's identity. This paper mainly deals with identity crime related to credit card application, which nowadays is quite prevalent and costly even. The existing non data-mining techniques for eliminating identity theft have some flaws and to combat them a new data-mining layer of defence has been proposed. This novel layer makes use of two algorithms-Communal Detection and Spike Detection for detecting frauds in applications.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134394090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Advancement towards Efficient Face Recognition Using Live Video Feed: "For the Future" 使用实时视频馈送实现高效人脸识别的进展:“面向未来”
J. Dhamija, T. Choudhury, Praveen Kumar, Y. Rathore
Image based or live video feed based face recognition is a very interesting field in research and applications. Various face recognition methods have been devised and applied over the past several years of technological development. Fields like security and surveillance have widely used face recognition over the years as people are very concerned as to identifying and catching criminals or people with mal intentions. Catching them without being able to promptly recognize and their faces has been a major problem. A person's facial features are dynamic and have variable appearances, which makes it a problem to be very accurate and fast in identification of a person. Not only this, security access controls through face recognizers makes it highly difficult for hackers and crackers to use a person's identity or data. The basic objective of this paper hence is to understand several pre-existing face detection and recognition algorithms and then provide a viable solution for live video based facial recognition with better accuracy, higher speed and efficiency so as to help develop a technology such which can help catch criminals promptly and as well as protect people's privacy and identity from hackers. Many facial databases have been considered so as to differentiate them in conditions of changes in poses, illuminations and emotions. Various other conditions to obstruct identification of faces are discussed later.
基于图像或实时视频的人脸识别是一个非常有趣的研究和应用领域。在过去几年的技术发展中,各种各样的人脸识别方法被设计和应用。多年来,安全和监视等领域广泛使用人脸识别技术,因为人们非常关心识别和抓捕罪犯或有不良意图的人。抓住他们而不能及时识别他们的脸一直是一个主要问题。一个人的面部特征是动态变化的,这就给快速准确地识别一个人带来了困难。不仅如此,通过面部识别的安全访问控制使得黑客和破解者很难使用一个人的身份或数据。因此,本文的基本目标是了解现有的几种人脸检测和识别算法,然后为基于实时视频的人脸识别提供更高精度,更高速度和效率的可行解决方案,从而帮助开发一种能够帮助及时捕获罪犯并保护人们隐私和身份免受黑客攻击的技术。为了在姿势、光照和情绪变化的条件下区分它们,我们考虑了许多面部数据库。后面将讨论妨碍人脸识别的各种其他条件。
{"title":"An Advancement towards Efficient Face Recognition Using Live Video Feed: \"For the Future\"","authors":"J. Dhamija, T. Choudhury, Praveen Kumar, Y. Rathore","doi":"10.1109/CINE.2017.21","DOIUrl":"https://doi.org/10.1109/CINE.2017.21","url":null,"abstract":"Image based or live video feed based face recognition is a very interesting field in research and applications. Various face recognition methods have been devised and applied over the past several years of technological development. Fields like security and surveillance have widely used face recognition over the years as people are very concerned as to identifying and catching criminals or people with mal intentions. Catching them without being able to promptly recognize and their faces has been a major problem. A person's facial features are dynamic and have variable appearances, which makes it a problem to be very accurate and fast in identification of a person. Not only this, security access controls through face recognizers makes it highly difficult for hackers and crackers to use a person's identity or data. The basic objective of this paper hence is to understand several pre-existing face detection and recognition algorithms and then provide a viable solution for live video based facial recognition with better accuracy, higher speed and efficiency so as to help develop a technology such which can help catch criminals promptly and as well as protect people's privacy and identity from hackers. Many facial databases have been considered so as to differentiate them in conditions of changes in poses, illuminations and emotions. Various other conditions to obstruct identification of faces are discussed later.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Comparative Analysis of Application of Niblack and Sauvola Binarization to Retinal Vessel Segmentation Niblack二值化与Sauvola二值化在视网膜血管分割中的应用对比分析
M. Nandy, M. Banerjee
This paper demonstrates a comparative analysis of two binarization techniques- Niblack and Sauvola algorithm in context with their applications to retinal vessel segmentation. Preprocessed images are applied with Niblack’s binarization. Sauvola’s binarization is also applied as modification to Niblack’s algorithm. Drawbacks of Sauvola algorithm are addressed by incorporating some changes in the original algorithm and by setting experimentally the value of its Dynamic Range and the constant k in an application oriented way. Some post processing steps are needed to get rid of background noise pixels, The result is compared with the ground truth images of DRIVE database. The method achieves 93.23% accuracy in case of Niblack’s algorithm application and 93.31% (without post processing) and 94.34% (with post processing) accuracy in case of Sauvola algorithm. The accuracy obtained is very encouraging as far as the simplicity of the method is concerned.
本文对Niblack和Sauvola二值化算法在视网膜血管分割中的应用进行了比较分析。对预处理后的图像进行Niblack二值化。并将Sauvola二值化方法作为Niblack算法的改进。针对Sauvola算法的不足,通过对原算法进行一些修改,并以面向应用的方式,通过实验设置其动态范围和常数k的值。对图像进行后期处理,去除背景噪声像素,并与DRIVE数据库的地面真实图像进行比较。该方法在应用Niblack算法时准确率达到93.23%,在使用Sauvola算法时准确率分别为93.31%(未进行后处理)和94.34%(进行后处理)。就该方法的简单性而言,所获得的准确性是非常令人鼓舞的。
{"title":"A Comparative Analysis of Application of Niblack and Sauvola Binarization to Retinal Vessel Segmentation","authors":"M. Nandy, M. Banerjee","doi":"10.1109/CINE.2017.19","DOIUrl":"https://doi.org/10.1109/CINE.2017.19","url":null,"abstract":"This paper demonstrates a comparative analysis of two binarization techniques- Niblack and Sauvola algorithm in context with their applications to retinal vessel segmentation. Preprocessed images are applied with Niblack’s binarization. Sauvola’s binarization is also applied as modification to Niblack’s algorithm. Drawbacks of Sauvola algorithm are addressed by incorporating some changes in the original algorithm and by setting experimentally the value of its Dynamic Range and the constant k in an application oriented way. Some post processing steps are needed to get rid of background noise pixels, The result is compared with the ground truth images of DRIVE database. The method achieves 93.23% accuracy in case of Niblack’s algorithm application and 93.31% (without post processing) and 94.34% (with post processing) accuracy in case of Sauvola algorithm. The accuracy obtained is very encouraging as far as the simplicity of the method is concerned.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"60 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126105835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Review of and a Proposal for Cross-Layer Design for Efficient Routing and Secure Data Aggregation over WSN 无线传感器网络中高效路由和安全数据聚合的跨层设计综述与建议
Mukesh Mishra, G. S. Gupta, X. Gui
Sensors these days are ubiquitous. They are in homes, factories, farms and just about everywhere. For distributed sensing requirements, several sensors are deployed and connected on a wireless media forming a Wireless Sensor Network (WSN). Sensor nodes communicate with each other and with a base station (BS). In this paper we first review recent work which is focused on cross-layer WSN design techniques based on the Open System Interconnection (OSI) model. Sensor nodes are often clustered and cluster heads (CH) are used to route data to the BS. We have also reviewed constraints-based routing algorithms which select a routing path satisfying administrative-oriented or Quality of Service-oriented (QoS-oriented) constraints. The algorithms minimize costs, balance network load, or increase security. Previous works of cross-layer design for malicious node identification, diagonal data aggregation and route adjustments were deficient to support WSN. The major problem was higher energy consumption and congestion during data aggregation. To overcome all the limitations and the problems that exist in cross layer design of WSN, we have proposed a novel design in this paper.
如今,传感器无处不在。它们存在于家庭、工厂、农场和几乎任何地方。为了满足分布式传感需求,将多个传感器部署并连接在无线介质上,形成无线传感器网络(WSN)。传感器节点之间相互通信,并与基站(BS)通信。本文首先回顾了基于开放系统互连(OSI)模型的无线传感器网络跨层设计技术的研究进展。传感器节点通常是聚类的,簇头(CH)用于将数据路由到BS。我们还回顾了基于约束的路由算法,它选择满足面向管理或面向服务的质量(qos)约束的路由路径。这些算法可以最大限度地降低成本,平衡网络负载或提高安全性。以往针对恶意节点识别、对角数据聚合、路由调整等跨层设计的工作缺乏对WSN的支持。主要的问题是数据聚合过程中较高的能耗和拥塞。为了克服无线传感器网络跨层设计存在的局限性和问题,本文提出了一种新的设计方案。
{"title":"A Review of and a Proposal for Cross-Layer Design for Efficient Routing and Secure Data Aggregation over WSN","authors":"Mukesh Mishra, G. S. Gupta, X. Gui","doi":"10.1109/CINE.2017.30","DOIUrl":"https://doi.org/10.1109/CINE.2017.30","url":null,"abstract":"Sensors these days are ubiquitous. They are in homes, factories, farms and just about everywhere. For distributed sensing requirements, several sensors are deployed and connected on a wireless media forming a Wireless Sensor Network (WSN). Sensor nodes communicate with each other and with a base station (BS). In this paper we first review recent work which is focused on cross-layer WSN design techniques based on the Open System Interconnection (OSI) model. Sensor nodes are often clustered and cluster heads (CH) are used to route data to the BS. We have also reviewed constraints-based routing algorithms which select a routing path satisfying administrative-oriented or Quality of Service-oriented (QoS-oriented) constraints. The algorithms minimize costs, balance network load, or increase security. Previous works of cross-layer design for malicious node identification, diagonal data aggregation and route adjustments were deficient to support WSN. The major problem was higher energy consumption and congestion during data aggregation. To overcome all the limitations and the problems that exist in cross layer design of WSN, we have proposed a novel design in this paper.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129113706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Crime Analysis Using K-Means Clustering 基于k -均值聚类的犯罪分析
Anant Joshi, A. Sabitha, T. Choudhury
Analysis of crime is essential for providing safety and security to the civilian population. Using data mining, we can discover critical information which can help local authorities detect crime and areas of importance. The main purpose of this paper is to analyze the crime which entails theft, homicide and various drug offences which also include suspicious activities, noise complaints and burglar alarm by using qualitative and quantitative approach. Using K-means clustering data mining approach on a crime dataset from New South Wales region of Australia, crime rates of each type of crimes and cities with high crime rates have been found.
对犯罪进行分析对于向平民提供安全和保障至关重要。利用数据挖掘,我们可以发现关键信息,帮助地方当局侦查犯罪和重要地区。本文的主要目的是运用定性和定量的方法分析盗窃、杀人和各种毒品犯罪,包括可疑活动、噪音投诉和防盗报警。利用K-means聚类数据挖掘方法,对澳大利亚新南威尔士州的犯罪数据集进行了分析,得到了各类犯罪的犯罪率和高犯罪率城市。
{"title":"Crime Analysis Using K-Means Clustering","authors":"Anant Joshi, A. Sabitha, T. Choudhury","doi":"10.1109/CINE.2017.23","DOIUrl":"https://doi.org/10.1109/CINE.2017.23","url":null,"abstract":"Analysis of crime is essential for providing safety and security to the civilian population. Using data mining, we can discover critical information which can help local authorities detect crime and areas of importance. The main purpose of this paper is to analyze the crime which entails theft, homicide and various drug offences which also include suspicious activities, noise complaints and burglar alarm by using qualitative and quantitative approach. Using K-means clustering data mining approach on a crime dataset from New South Wales region of Australia, crime rates of each type of crimes and cities with high crime rates have been found.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126510400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Overview of the Emerging Technology: Blockchain 新兴技术概述:区块链
Rishav Chatterjee, Rajdeep Chatterjee
A Blockchain is basically a decentralized, distributed ledger of all the transactions or events which takes place only after involving multiple parties. It ensures high level of security as the transactions which takes place are entirely anonymous. Each transactions or digital events taking place in a Blockchain network is verified, only if it is agreed upon by the consensus of the majority party of the users participating in this process. Blockchain is one of the emerging technologies in today's world and a lot of revolution and research has just began regarding this distributed technology. Bitcoin has been the most popular cryptographic currency since it was invented and it is the best example that uses the Blockchain technology. In this paper, we will discuss about the research being done on this new domain of Computer Science. We will outline the underlining concepts about this new technology. We will try to peek a bit into its applications in the financial and non financial sector. It is not only the most popular topic to discuss about, but is the most technological breakthrough, that is all set to revolutionize the entire world.
区块链基本上是一个分散的分布式账本,它记录了所有交易或事件,这些交易或事件只有在涉及多方之后才会发生。它确保了高度的安全性,因为发生的交易是完全匿名的。在区块链网络中发生的每笔交易或数字事件只有在参与这一过程的大多数用户达成共识的情况下才能得到验证。区块链是当今世界的新兴技术之一,许多关于这种分布式技术的革命和研究才刚刚开始。比特币自发明以来一直是最受欢迎的加密货币,它是使用区块链技术的最佳例子。在本文中,我们将讨论在这个计算机科学的新领域所做的研究。我们将概述有关这项新技术的基本概念。我们将试着看一下它在金融和非金融领域的应用。它不仅是最受欢迎的讨论话题,而且是最具技术突破,这一切都将彻底改变整个世界。
{"title":"An Overview of the Emerging Technology: Blockchain","authors":"Rishav Chatterjee, Rajdeep Chatterjee","doi":"10.1109/CINE.2017.33","DOIUrl":"https://doi.org/10.1109/CINE.2017.33","url":null,"abstract":"A Blockchain is basically a decentralized, distributed ledger of all the transactions or events which takes place only after involving multiple parties. It ensures high level of security as the transactions which takes place are entirely anonymous. Each transactions or digital events taking place in a Blockchain network is verified, only if it is agreed upon by the consensus of the majority party of the users participating in this process. Blockchain is one of the emerging technologies in today's world and a lot of revolution and research has just began regarding this distributed technology. Bitcoin has been the most popular cryptographic currency since it was invented and it is the best example that uses the Blockchain technology. In this paper, we will discuss about the research being done on this new domain of Computer Science. We will outline the underlining concepts about this new technology. We will try to peek a bit into its applications in the financial and non financial sector. It is not only the most popular topic to discuss about, but is the most technological breakthrough, that is all set to revolutionize the entire world.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"327 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123311580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Application of JAYA Algorithm to Tune Fuzzy-PIDF Controller for Automatic Generation Control JAYA算法在模糊pid控制器自动生成控制中的应用
M. Debnath, J. Padhi, Priyambada Satapathy, R. Mallick
Fuzzy-PID controller with derivative filter (Fuzzy-PIDF) is suggested in this article for automatic generation control in a two area multi-unit hydro-thermal system. The controller scaling coefficients are tuned with a simple and a new powerful optimization technique called JAYA algorithm. Integral time absolute error (ITAE) is used as a fitness function to achieve the optimal parameters of the Fuzzy-PIDF controller with an abrupt load disturbance of 0.01p.u. applied in area 1. Further, this controller is scrutinized for robustness by increasing the loading in the system. The dynamic responses of this implemented controller being optimized by JAYA algorithm are evaluated and compared with the results of previously published article such as hybrid firefly algorithm and pattern search technique based PID controller in terms of peak undershoot, overshoot and settling time and supremacy is proved.
本文提出了一种带导数滤波的模糊pid控制器(Fuzzy-PIDF),用于两区多机组热水系统的自动发电控制。控制器的尺度系数采用一种简单而强大的优化技术JAYA算法进行调整。采用积分时间绝对误差(ITAE)作为适应度函数,对负载突变扰动为0.01p.u时模糊pid控制器的最优参数进行求解。应用于区域1。此外,该控制器通过增加系统中的负载来检查其鲁棒性。利用JAYA算法对所实现的控制器的动态响应进行了评价,并与基于混合萤火虫算法和基于模式搜索技术的PID控制器在峰值欠调、超调和沉降时间方面的结果进行了比较,证明了该控制器的优越性。
{"title":"Application of JAYA Algorithm to Tune Fuzzy-PIDF Controller for Automatic Generation Control","authors":"M. Debnath, J. Padhi, Priyambada Satapathy, R. Mallick","doi":"10.1109/CINE.2017.13","DOIUrl":"https://doi.org/10.1109/CINE.2017.13","url":null,"abstract":"Fuzzy-PID controller with derivative filter (Fuzzy-PIDF) is suggested in this article for automatic generation control in a two area multi-unit hydro-thermal system. The controller scaling coefficients are tuned with a simple and a new powerful optimization technique called JAYA algorithm. Integral time absolute error (ITAE) is used as a fitness function to achieve the optimal parameters of the Fuzzy-PIDF controller with an abrupt load disturbance of 0.01p.u. applied in area 1. Further, this controller is scrutinized for robustness by increasing the loading in the system. The dynamic responses of this implemented controller being optimized by JAYA algorithm are evaluated and compared with the results of previously published article such as hybrid firefly algorithm and pattern search technique based PID controller in terms of peak undershoot, overshoot and settling time and supremacy is proved.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Effective Selection Method for Scheduling of Gridlets among Heterogeneous Resources with Load Balancing on GridSim 基于GridSim负载均衡的异构资源调度小网格的有效选择方法
D. Patel, C. Tripathy
Since the GridSim toolkit is used to simulate the Grid computing environment, it has been widely used in the study of Grid. In this paper, the proposed work presents a load balancing scheme called LBLC for GridSim. Here, the load balancing is performed by providing an effective selection method for scheduling of Gridlets among heterogeneous resources with load consideration which maximizes the utilization of the resources and increases the efficiency of the Grid system. The performance is evaluated under various cases by using GridSim. From the simulation results, our load balancing scheme is shown to be quite efficient in maximizing the finished Gridlets and minimizing the execution time, unfinished Gridlets.
由于GridSim工具包用于模拟网格计算环境,因此在网格研究中得到了广泛的应用。在本文中,提出了一种名为LBLC的GridSim负载平衡方案。其中,负载均衡是通过在考虑负载的情况下,为异构资源间的网格调度提供一种有效的选择方法来实现的,使资源利用率最大化,提高网格系统的效率。利用GridSim对各种情况下的性能进行了评估。仿真结果表明,我们的负载均衡方案在最大化完成的Gridlets和最小化未完成Gridlets的执行时间方面是非常有效的。
{"title":"An Effective Selection Method for Scheduling of Gridlets among Heterogeneous Resources with Load Balancing on GridSim","authors":"D. Patel, C. Tripathy","doi":"10.1109/CINE.2017.17","DOIUrl":"https://doi.org/10.1109/CINE.2017.17","url":null,"abstract":"Since the GridSim toolkit is used to simulate the Grid computing environment, it has been widely used in the study of Grid. In this paper, the proposed work presents a load balancing scheme called LBLC for GridSim. Here, the load balancing is performed by providing an effective selection method for scheduling of Gridlets among heterogeneous resources with load consideration which maximizes the utilization of the resources and increases the efficiency of the Grid system. The performance is evaluated under various cases by using GridSim. From the simulation results, our load balancing scheme is shown to be quite efficient in maximizing the finished Gridlets and minimizing the execution time, unfinished Gridlets.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Deep Q-Learning for Wheel Mobile Robot Navigation 深度q -学习在轮式移动机器人导航中的应用
P. K. Mohanty, Arun Kumar Sah, Vikash Kumar, S. Kundu
Autonomous mobile robot has tremendous application in various environment due to the fact that they work without human intervention. Path planning and obstacle avoidance are challenging problem for autonomous mobile robot. This paper explores--- the obstacle avoidance technique for wheeled mobile robot based on Deep-Q-Learning. In this paper, we introduce a log-based reward value field function which is the reward receives by agent based on relative positions of agent, obstacles and goal. We perform the experiment in simulated environment and physical environment. Finally, we measure the accuracy of the performance of the obstacle avoidance ability of the robot based of hit rate metrices. Our presented method achieves high success rate to avoid collisions.
自主移动机器人由于其工作无需人为干预,在各种环境中有着广泛的应用。路径规划和避障是自主移动机器人面临的难题。本文探讨了基于深度q学习的轮式移动机器人避障技术。本文引入了基于对数的奖励值场函数,该函数是基于智能体、障碍物和目标的相对位置的智能体所获得的奖励。实验分别在模拟环境和物理环境下进行。最后,我们基于命中率度量来衡量机器人避障能力性能的准确性。该方法具有较高的避免碰撞成功率。
{"title":"Application of Deep Q-Learning for Wheel Mobile Robot Navigation","authors":"P. K. Mohanty, Arun Kumar Sah, Vikash Kumar, S. Kundu","doi":"10.1109/CINE.2017.11","DOIUrl":"https://doi.org/10.1109/CINE.2017.11","url":null,"abstract":"Autonomous mobile robot has tremendous application in various environment due to the fact that they work without human intervention. Path planning and obstacle avoidance are challenging problem for autonomous mobile robot. This paper explores--- the obstacle avoidance technique for wheeled mobile robot based on Deep-Q-Learning. In this paper, we introduce a log-based reward value field function which is the reward receives by agent based on relative positions of agent, obstacles and goal. We perform the experiment in simulated environment and physical environment. Finally, we measure the accuracy of the performance of the obstacle avoidance ability of the robot based of hit rate metrices. Our presented method achieves high success rate to avoid collisions.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127396108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2017 3rd International Conference on Computational Intelligence and Networks (CINE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1