首页 > 最新文献

2010 Second International Conference on Communication Software and Networks最新文献

英文 中文
A Robust Visual Tracking Approach with Adaptive Particle Filtering 基于自适应粒子滤波的鲁棒视觉跟踪方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.66
Tao Xi, Shengxiu Zhang, Shiyuan Yan
In order to improve the robustness and stability as well as the computation efficiency of the video tracker based on particle filtering, an adaptive state evolution equation and an online increment learning observation likelihood model configured by an updatable eigen-basis of the object appearance subspace is combined into the particle filter to cope with the uncertainties during tracking, and the strategy of online self-adjusting the number of particle needed for approximating the state posterior density function is adopted to enhance the computation efficiency. The experimental results show that the approach proposed in this paper can not only track the moving object in the video reliably and effectively, but has nice robustness to the appearance variation caused by illumination, occlusion and pose changes.
为了提高基于粒子滤波的视频跟踪器的鲁棒性、稳定性和计算效率,将自适应状态演化方程和由目标外观子空间的可更新特征基配置的在线增量学习观察似然模型结合到粒子滤波中,以应对跟踪过程中的不确定性。采用在线自调整逼近状态后验密度函数所需粒子数的策略,提高了计算效率。实验结果表明,本文提出的方法不仅可以可靠有效地跟踪视频中的运动目标,而且对光照、遮挡和姿态变化引起的外观变化具有良好的鲁棒性。
{"title":"A Robust Visual Tracking Approach with Adaptive Particle Filtering","authors":"Tao Xi, Shengxiu Zhang, Shiyuan Yan","doi":"10.1109/ICCSN.2010.66","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.66","url":null,"abstract":"In order to improve the robustness and stability as well as the computation efficiency of the video tracker based on particle filtering, an adaptive state evolution equation and an online increment learning observation likelihood model configured by an updatable eigen-basis of the object appearance subspace is combined into the particle filter to cope with the uncertainties during tracking, and the strategy of online self-adjusting the number of particle needed for approximating the state posterior density function is adopted to enhance the computation efficiency. The experimental results show that the approach proposed in this paper can not only track the moving object in the video reliably and effectively, but has nice robustness to the appearance variation caused by illumination, occlusion and pose changes.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121257563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Personal Authentication Based on Keystroke Dynamics Using Soft Computing Techniques 基于软计算技术的击键动力学个人认证
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.50
M. Karnan, M. Akila
The need to secure sensitive data and computer systems from intruders, while allowing ease of access for authenticate user is one of the main problems in computer security. Traditionally, passwords have been the usual method for controlling access to computer systems but this approach has many inherent flaws. Keystroke dynamics is a promising biometric technique to recognize an individual based on an analysis of his/her typing patterns. In the experiment, we measure mean, standard deviation and median values of keystroke features such as latency, duration, digraph and their combinations and compare their performance. Particle swarm optimization (PSO), genetic algorithm (GA) and the proposed ant colony optimization (ACO) are used for feature subset selection. Back propagation neural network (BPNN) is used for classification. ACO gives better performance than PSO and GA with regard to feature reduction rate and classification accuracy. Using digraph as the feature for feature subset selection is novel and show good classification performance.
保护敏感数据和计算机系统免受入侵者的侵害,同时允许身份验证用户轻松访问是计算机安全的主要问题之一。传统上,密码一直是控制访问计算机系统的常用方法,但这种方法有许多固有的缺陷。击键动力学是一种很有前途的生物识别技术,它可以通过分析一个人的打字模式来识别他/她。在实验中,我们测量了延迟、持续时间、有向图及其组合等击键特征的平均值、标准差和中位数,并比较了它们的性能。采用粒子群算法(PSO)、遗传算法(GA)和蚁群算法(ACO)进行特征子集选择。使用反向传播神经网络(BPNN)进行分类。蚁群算法在特征约简率和分类准确率方面优于粒子群算法和遗传算法。使用有向图作为特征子集选择是一种新颖的方法,具有良好的分类性能。
{"title":"Personal Authentication Based on Keystroke Dynamics Using Soft Computing Techniques","authors":"M. Karnan, M. Akila","doi":"10.1109/ICCSN.2010.50","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.50","url":null,"abstract":"The need to secure sensitive data and computer systems from intruders, while allowing ease of access for authenticate user is one of the main problems in computer security. Traditionally, passwords have been the usual method for controlling access to computer systems but this approach has many inherent flaws. Keystroke dynamics is a promising biometric technique to recognize an individual based on an analysis of his/her typing patterns. In the experiment, we measure mean, standard deviation and median values of keystroke features such as latency, duration, digraph and their combinations and compare their performance. Particle swarm optimization (PSO), genetic algorithm (GA) and the proposed ant colony optimization (ACO) are used for feature subset selection. Back propagation neural network (BPNN) is used for classification. ACO gives better performance than PSO and GA with regard to feature reduction rate and classification accuracy. Using digraph as the feature for feature subset selection is novel and show good classification performance.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127040356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Design and Analysis of Stream Cipher for Network Security 面向网络安全的流密码设计与分析
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.113
Chhattar Singh Lamba
This paper mainly analysis and describe the design issue of stream ciphers in Network security as the streams are widely used to protecting the privacy of digital information. A variety of attacks against stream cipher exist;(algebraic and so on). These attacks have been very successful against a variety of stream ciphers. So in this paper efforts have been done to design and analyze stream ciphers. The main contribution is to design new stream ciphers through analysis of the algebraic immunity of Boolean functions and S-Boxes. In this paper, the cryptographic properties of non-linear transformation have been used for designing of stream ciphers Many LFSR (Linear feedback Shift Register) based stream ciphers use non-linear Boolean function to destroy the linearity of the LFSR(s) output. Many of these designs have been broken by algebraic attacks. Here we analyze a popular and cryptographically significant class of non-linear Boolean functions for their resistance to algebraic attacks.
由于流被广泛应用于数字信息的隐私保护,本文主要分析和描述了网络安全中流密码的设计问题。存在各种针对流密码的攻击(代数攻击等)。这些攻击对各种流密码都非常成功。因此,本文对流密码进行了设计和分析。主要贡献是通过分析布尔函数和s - box的代数免疫来设计新的流密码。本文将非线性变换的密码学特性用于流密码的设计。许多基于线性反馈移位寄存器(LFSR)的流密码使用非线性布尔函数来破坏LFSR输出的线性。许多这样的设计已经被代数攻击所破坏。在这里,我们分析了一类流行且具有密码学意义的非线性布尔函数对代数攻击的抵抗力。
{"title":"Design and Analysis of Stream Cipher for Network Security","authors":"Chhattar Singh Lamba","doi":"10.1109/ICCSN.2010.113","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.113","url":null,"abstract":"This paper mainly analysis and describe the design issue of stream ciphers in Network security as the streams are widely used to protecting the privacy of digital information. A variety of attacks against stream cipher exist;(algebraic and so on). These attacks have been very successful against a variety of stream ciphers. So in this paper efforts have been done to design and analyze stream ciphers. The main contribution is to design new stream ciphers through analysis of the algebraic immunity of Boolean functions and S-Boxes. In this paper, the cryptographic properties of non-linear transformation have been used for designing of stream ciphers Many LFSR (Linear feedback Shift Register) based stream ciphers use non-linear Boolean function to destroy the linearity of the LFSR(s) output. Many of these designs have been broken by algebraic attacks. Here we analyze a popular and cryptographically significant class of non-linear Boolean functions for their resistance to algebraic attacks.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Mobile Web Services in Health Care and Sensor Networks 医疗保健和传感器网络中的移动网络服务
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.42
Fahad Aijaz, Muzzamil Aziz Chaudhary, B. Walke
The Wireless Sensor Networks (WSN) environments are increasingly becoming intelligent with the rapid boost in the capabilities of sensor nodes. The Sun Small Programmable Object Technology (SPOT) platform offers a high-end sensing device in terms of processing, memory and battery configurations compared to other existing in the community. Within the scope of this paper, a health care use case is derived from the concept of service-oriented collector nodes represented by Sun SPOTs. The existing Mobile Web Services (MobWS) framework is ported to Sun SPOT devices that enables domain specific in-network computations enfolding synchronous or asynchronous classes of MobWSs. Based on that, the exemplary requirements of the Web Services (WS) in the health care domain are spotlighted and impressions of a comprehensive prototype, called MEDICARE, are shown.
随着传感器节点能力的快速提升,无线传感器网络(WSN)环境正日益智能化。Sun小型可编程对象技术(SPOT)平台在处理、内存和电池配置方面提供了与社区中其他现有设备相比的高端传感设备。在本文的范围内,医疗保健用例派生自由Sun SPOTs表示的面向服务的收集器节点的概念。现有的移动Web服务(MobWS)框架被移植到Sun SPOT设备上,使特定领域的网络内计算能够包含MobWS的同步或异步类。在此基础上,重点介绍了医疗保健领域中Web服务(WS)的示例性需求,并展示了一个称为MEDICARE的综合原型的印象。
{"title":"Mobile Web Services in Health Care and Sensor Networks","authors":"Fahad Aijaz, Muzzamil Aziz Chaudhary, B. Walke","doi":"10.1109/ICCSN.2010.42","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.42","url":null,"abstract":"The Wireless Sensor Networks (WSN) environments are increasingly becoming intelligent with the rapid boost in the capabilities of sensor nodes. The Sun Small Programmable Object Technology (SPOT) platform offers a high-end sensing device in terms of processing, memory and battery configurations compared to other existing in the community. Within the scope of this paper, a health care use case is derived from the concept of service-oriented collector nodes represented by Sun SPOTs. The existing Mobile Web Services (MobWS) framework is ported to Sun SPOT devices that enables domain specific in-network computations enfolding synchronous or asynchronous classes of MobWSs. Based on that, the exemplary requirements of the Web Services (WS) in the health care domain are spotlighted and impressions of a comprehensive prototype, called MEDICARE, are shown.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"295 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114105417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A New Load Balancing Algorithm in Parallel Computing 并行计算中一种新的负载均衡算法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.27
K. Zamanifar, N. Nematbakhsh, R. S. Sadjady
Due to the outstanding progress in computer technology and an ever-rising demand for high-speed processing able to support the distributed mode there is an increasing trend towards the use of parallel and distributed systems. In addition, one of the important stages of any system utilizing parallel computing is the load balancing stage in which the balance of workload among all of the system’s processors is aimed. In this article, load balancing in parallel systems is studied then; a new load balancing algorithm which has new capabilities will be introduced. Among the new capabilities of this algorithm, its independence of a separate route-finder algorithm between the load receiver and sender nodes can be mentioned. Finally the results of the simulation of this algorithm will be presented.
由于计算机技术的显著进步和对能够支持分布式模式的高速处理的不断增长的需求,使用并行和分布式系统的趋势越来越大。此外,任何利用并行计算的系统的一个重要阶段是负载平衡阶段,在这个阶段中,所有系统处理器之间的工作负载平衡是目标。本文对并行系统中的负载均衡问题进行了研究;本文将介绍一种具有新功能的新的负载平衡算法。在该算法的新功能中,可以提到它在负载接收和发送节点之间的独立寻路算法的独立性。最后给出了该算法的仿真结果。
{"title":"A New Load Balancing Algorithm in Parallel Computing","authors":"K. Zamanifar, N. Nematbakhsh, R. S. Sadjady","doi":"10.1109/ICCSN.2010.27","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.27","url":null,"abstract":"Due to the outstanding progress in computer technology and an ever-rising demand for high-speed processing able to support the distributed mode there is an increasing trend towards the use of parallel and distributed systems. In addition, one of the important stages of any system utilizing parallel computing is the load balancing stage in which the balance of workload among all of the system’s processors is aimed. In this article, load balancing in parallel systems is studied then; a new load balancing algorithm which has new capabilities will be introduced. Among the new capabilities of this algorithm, its independence of a separate route-finder algorithm between the load receiver and sender nodes can be mentioned. Finally the results of the simulation of this algorithm will be presented.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"124 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124307795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Diversity Effect of OFDM Communication with IQ Imbalance in the Rayleigh Fading Channel 瑞利衰落信道中IQ不平衡OFDM通信的分集效应
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.78
H. Ryu
Orthogonal frequency division multiplexing (OFDM) has been used widely in several communication systems. However, OFDM is very sensitive to the radio frequency (RF) impairments. One of the serious major impairments is the IQ imbalance between In-phase (I) and Quadrature (Q) branches. This IQ imbalance can be the mail reason of bit error rate (BER) performance degradation in the high-speed OFDM communication system. In this paper, the closed form of BER of OFDM with IQ imbalance is derived in the Rayleigh fading channel and novelly investigates the effect of transmit and receive diversity on this OFDM communication system with Q imbalance in the Rayleigh fading channel. Via the computer simulation, it is verified that analytical result is very close to simulation result. So, it is very useful and convenient to evaluate the BER performance of multi-input multi-output (MIMO) system with IQ imbalance in the Rayleigh fading environment.
正交频分复用技术(OFDM)在多种通信系统中得到了广泛的应用。然而,OFDM对射频(RF)损伤非常敏感。其中一个严重的主要缺陷是同相(I)和正交(Q)分支之间的IQ不平衡。这种IQ失衡是高速OFDM通信系统误码率(BER)性能下降的主要原因。本文推导了瑞利衰落信道中IQ不平衡OFDM误码率的封闭形式,并从新的角度研究了发送分集和接收分集对瑞利衰落信道中IQ不平衡OFDM通信系统的影响。通过计算机仿真,验证了分析结果与仿真结果非常接近。因此,在瑞利衰落环境下,对IQ不平衡的多输入多输出(MIMO)系统的误码率性能进行评估是非常有用和方便的。
{"title":"Diversity Effect of OFDM Communication with IQ Imbalance in the Rayleigh Fading Channel","authors":"H. Ryu","doi":"10.1109/ICCSN.2010.78","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.78","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) has been used widely in several communication systems. However, OFDM is very sensitive to the radio frequency (RF) impairments. One of the serious major impairments is the IQ imbalance between In-phase (I) and Quadrature (Q) branches. This IQ imbalance can be the mail reason of bit error rate (BER) performance degradation in the high-speed OFDM communication system. In this paper, the closed form of BER of OFDM with IQ imbalance is derived in the Rayleigh fading channel and novelly investigates the effect of transmit and receive diversity on this OFDM communication system with Q imbalance in the Rayleigh fading channel. Via the computer simulation, it is verified that analytical result is very close to simulation result. So, it is very useful and convenient to evaluate the BER performance of multi-input multi-output (MIMO) system with IQ imbalance in the Rayleigh fading environment.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115007252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DCSE: A Dynamic Clustering for Saving Energy in Wireless Sensor Network 基于动态聚类的无线传感器网络节能技术
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.98
Farzad Kiyani, Hamidreza Tahmasebi Rad, Hadi Chalangari, Sajjad Yari
In this paper, a dynamic clustering for saving energy for wireless sensor network suggested. Our goal is to decrease the probability of missing the target and to increase the tracking exactness. First phase is consisting of selecting cluster head and creating clusters. In the next phase, new creating cluster based on moving targets. So that cluster head calculates the current location of target. In other phase, target tracking in environment be done by routing target among nodes. This cases cause saving energy in total network. We implemented our tracking algorithm in ns-2 simulator. Missing rate in our algorithm is 9%
本文提出了一种用于无线传感器网络节能的动态聚类算法。我们的目标是降低失靶概率,提高跟踪精度。第一阶段包括选择簇头和创建簇。在下一阶段,新的基于移动目标的创建集群。所以簇头计算目标的当前位置。在另一个阶段,通过在节点之间路由目标来完成环境中的目标跟踪。这种情况下,节省了整个网络的能量。我们在ns-2模拟器中实现了跟踪算法。我们算法的缺失率是9%
{"title":"DCSE: A Dynamic Clustering for Saving Energy in Wireless Sensor Network","authors":"Farzad Kiyani, Hamidreza Tahmasebi Rad, Hadi Chalangari, Sajjad Yari","doi":"10.1109/ICCSN.2010.98","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.98","url":null,"abstract":"In this paper, a dynamic clustering for saving energy for wireless sensor network suggested. Our goal is to decrease the probability of missing the target and to increase the tracking exactness. First phase is consisting of selecting cluster head and creating clusters. In the next phase, new creating cluster based on moving targets. So that cluster head calculates the current location of target. In other phase, target tracking in environment be done by routing target among nodes. This cases cause saving energy in total network. We implemented our tracking algorithm in ns-2 simulator. Missing rate in our algorithm is 9%","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A User-Centered Context-Sensitive Privacy Model in Pervasive Systems 普适系统中以用户为中心的上下文敏感隐私模型
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.43
Camarasen a/l Sagaran, A. Dehghantanha, R. Ramli
with emerging of pervasive computing, computers have increasingly become a part of in our life routines. Ubiquitous computing (also known as pervasive computing) is known as the age of calm technology where technology becomes as necessity and tends to be virtually invisible in our daily life without realizing. Privacy is a major problem in an individual’s daily routine and being a treat in a pervasive computing system. The proposed system to solve individual’s privacy problems is called “User-Centered Context-Sensitive Privacy Model in Pervasive Systems”. Implementation of this system wills emphasize on managing user’s context privacy concern.
随着普适计算的兴起,计算机已日益成为我们日常生活的一部分。无处不在的计算(也被称为普适计算)被称为平静的技术时代,在这个时代,技术成为一种必需品,并且在我们的日常生活中几乎看不见而没有意识到。隐私是个人日常生活中的一个主要问题,在普适计算系统中也是一种享受。提出的解决个人隐私问题的系统被称为“普适系统中以用户为中心的上下文敏感隐私模型”。本系统的实现将着重于管理用户的上下文隐私问题。
{"title":"A User-Centered Context-Sensitive Privacy Model in Pervasive Systems","authors":"Camarasen a/l Sagaran, A. Dehghantanha, R. Ramli","doi":"10.1109/ICCSN.2010.43","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.43","url":null,"abstract":"with emerging of pervasive computing, computers have increasingly become a part of in our life routines. Ubiquitous computing (also known as pervasive computing) is known as the age of calm technology where technology becomes as necessity and tends to be virtually invisible in our daily life without realizing. Privacy is a major problem in an individual’s daily routine and being a treat in a pervasive computing system. The proposed system to solve individual’s privacy problems is called “User-Centered Context-Sensitive Privacy Model in Pervasive Systems”. Implementation of this system wills emphasize on managing user’s context privacy concern.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Dynamic Approach for Frequent Pattern Mining Using Transposition of Database 基于数据库转置的频繁模式挖掘动态方法
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.15
Sunil Joshi, R. Jain
an Important Problem in Data Mining in Various Fields like Medicine, Telecommunications and World Wide Web is Discovering Patterns. Frequent patterns mining is the focused research topic in association rule analysis. Apriori algorithm is a classical algorithm of association rule mining. Lots of algorithms for mining association rules and their mutations are proposed on basis of Apriori Algorithm. Most of the previous studies adopt Apriori-like algorithms which generate-and-test candidates and improving algorithm strategy and structure but no one concentrate on the structure of database. A simple approach is if we implement in Transposed database then result is very fast. Recently, different works proposed a new way to mine patterns in transposed databases where a database with thousands of attributes but only tens of objects. In this case, mining the transposed database runs through a smaller search space. In this paper, we systematically explore the search space of frequent patterns mining and represent database in transposed form. We develop an algorithm (termed DFPMT—A Dynamic Approach for Frequent Patterns Mining Using Transposition of Database) for mining frequent patterns which are based on Apriori algorithm and used Dynamic Approach like Longest Common Subsequence. The main distinguishing factors among the proposed schemes is the database stores in transposed form and in each iteration database is filter /reduce by generating LCS of transaction id for each pattern. Our solutions provide faster result. A quantitative exploration of these tradeoffs is conducted through an extensive experimental study on synthetic and real-life data sets.
在医学、电信和万维网等各个领域的数据挖掘中,发现模式是一个重要的问题。频繁模式挖掘是关联规则分析中的研究热点。Apriori算法是关联规则挖掘的经典算法。在Apriori算法的基础上,提出了许多挖掘关联规则及其突变的算法。以往的研究大多采用类似apriori的算法来生成和测试候选对象,改进算法策略和结构,但没有人关注数据库的结构。一个简单的方法是,如果我们在转置数据库中实现,那么结果非常快。最近,不同的研究提出了一种新的方法来挖掘转置数据库中的模式,其中一个数据库有数千个属性,但只有几十个对象。在这种情况下,对转置数据库的挖掘需要更小的搜索空间。本文系统地探索了频繁模式挖掘的搜索空间,并用转置形式表示数据库。本文提出了一种基于Apriori算法并采用最长公共子序列等动态方法挖掘频繁模式的算法(DFPMT-A)。不同方案之间的主要区别在于数据库以转置形式存储,并且在每次迭代数据库中通过为每个模式生成事务id的LCS进行过滤/约简。我们的解决方案提供更快的结果。通过对合成和现实数据集的广泛实验研究,对这些权衡进行了定量探索。
{"title":"A Dynamic Approach for Frequent Pattern Mining Using Transposition of Database","authors":"Sunil Joshi, R. Jain","doi":"10.1109/ICCSN.2010.15","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.15","url":null,"abstract":"an Important Problem in Data Mining in Various Fields like Medicine, Telecommunications and World Wide Web is Discovering Patterns. Frequent patterns mining is the focused research topic in association rule analysis. Apriori algorithm is a classical algorithm of association rule mining. Lots of algorithms for mining association rules and their mutations are proposed on basis of Apriori Algorithm. Most of the previous studies adopt Apriori-like algorithms which generate-and-test candidates and improving algorithm strategy and structure but no one concentrate on the structure of database. A simple approach is if we implement in Transposed database then result is very fast. Recently, different works proposed a new way to mine patterns in transposed databases where a database with thousands of attributes but only tens of objects. In this case, mining the transposed database runs through a smaller search space. In this paper, we systematically explore the search space of frequent patterns mining and represent database in transposed form. We develop an algorithm (termed DFPMT—A Dynamic Approach for Frequent Patterns Mining Using Transposition of Database) for mining frequent patterns which are based on Apriori algorithm and used Dynamic Approach like Longest Common Subsequence. The main distinguishing factors among the proposed schemes is the database stores in transposed form and in each iteration database is filter /reduce by generating LCS of transaction id for each pattern. Our solutions provide faster result. A quantitative exploration of these tradeoffs is conducted through an extensive experimental study on synthetic and real-life data sets.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"10 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Scheduling Jobs in a Heterogeneous System with Unreliable Network Links by DLT 基于DLT的网络链路不可靠异构系统作业调度
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.114
Amin Shokripour, M. Othman
During the last decade, the use of parallel and distributed systems has become more common. In these systems, a huge chunk of data or computation is distributed among many systems in order to obtain better performance. Dividing data is one of the challenges in this type of systems. Divisible Load Theory (DLT) is proposed method for scheduling data distribution in parallel or distributed systems. In many researches carried out in this field, it was assumed that all processors are reliable for grid system but that is not always true in real systems. Although unreliable processors were investigated in some studies, unreliable or unreliable link connections have not been addressed before this research. Disconnection in network links is a common happening in all network topologies specially in wireless connections. In this investigation, we assume that we have two static parameters for processors in a unreliable system, probability of disconnection in network links and required time for repairing disconnection. Then, we present a closed-form formula for scheduling tasks in this type of systems. Experiments show this scheduling method has better performance than applying the proposed methods for reliable systems on an unreliable system.
在过去十年中,并行和分布式系统的使用变得越来越普遍。在这些系统中,为了获得更好的性能,大量的数据或计算被分布在许多系统中。在这种类型的系统中,划分数据是一个挑战。可分负荷理论(DLT)是一种用于并行或分布式系统数据分配调度的方法。在该领域的许多研究中,假设所有处理器在网格系统中都是可靠的,但在实际系统中并不总是如此。虽然在一些研究中调查了不可靠的处理器,但在本研究之前尚未解决不可靠或不可靠的链路连接。网络链路断开是所有网络拓扑结构中都会发生的一种现象,特别是在无线连接中。在本研究中,我们假设不可靠系统中的处理器有两个静态参数,网络链路断开的概率和修复断开所需的时间。然后,我们给出了这类系统中任务调度的一个封闭公式。实验表明,该调度方法比在不可靠系统上应用可靠系统调度方法具有更好的性能。
{"title":"Scheduling Jobs in a Heterogeneous System with Unreliable Network Links by DLT","authors":"Amin Shokripour, M. Othman","doi":"10.1109/ICCSN.2010.114","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.114","url":null,"abstract":"During the last decade, the use of parallel and distributed systems has become more common. In these systems, a huge chunk of data or computation is distributed among many systems in order to obtain better performance. Dividing data is one of the challenges in this type of systems. Divisible Load Theory (DLT) is proposed method for scheduling data distribution in parallel or distributed systems. In many researches carried out in this field, it was assumed that all processors are reliable for grid system but that is not always true in real systems. Although unreliable processors were investigated in some studies, unreliable or unreliable link connections have not been addressed before this research. Disconnection in network links is a common happening in all network topologies specially in wireless connections. In this investigation, we assume that we have two static parameters for processors in a unreliable system, probability of disconnection in network links and required time for repairing disconnection. Then, we present a closed-form formula for scheduling tasks in this type of systems. Experiments show this scheduling method has better performance than applying the proposed methods for reliable systems on an unreliable system.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121275083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 Second International Conference on Communication Software and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1