首页 > 最新文献

2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)最新文献

英文 中文
Improved active power sharing strategy for ELC Controlled Synchronous Generators Based Islanded Micro Grid application 基于孤岛微电网的ELC控制同步发电机有功功率共享改进策略
N. Gyawali, Bikram Paudel, B. Subedi
This paper presents an Improved Active Power Sharing Strategy for Electronic Load Controller (ELC) Controlled Synchronous Generator Based Islanded Micro Grid (MG) Application. ELC regulated synchronous generators operating in parallel forming a MG is considered. Existing MG at Baglung District (Interconnected seven nearby Micro Hydro Plants with cumulative power output of 132 kW) was taken as a reference case for the study. Current active power sharing strategy was realized by considering MG with three generators and new concept was proposed to minimize the existing problem on power sharing. The control strategy is presented only for the MG operated in islanded mode. The case is designed and simulated in MATLAB using Simulink. This study does not consider the reactive power flows and sharing issue. This scheme can be efficiently used in MG Application.
提出了一种基于孤岛微电网的改进有功功率共享策略。考虑ELC调节的同步发电机并联运行形成一个MG。以巴格隆地区现有的微型水电站为参考案例(相邻7座微型水电站互联,累计输出功率132千瓦)。通过考虑三台发电机的有功功率共享策略,实现了现有有功功率共享策略,并提出了最小化现有有功功率共享问题的新概念。该控制策略仅针对孤岛模式下运行的MG给出。在MATLAB中使用Simulink对该案例进行了设计和仿真。本研究未考虑无功潮流和共享问题。该方案可以有效地应用于MG应用。
{"title":"Improved active power sharing strategy for ELC Controlled Synchronous Generators Based Islanded Micro Grid application","authors":"N. Gyawali, Bikram Paudel, B. Subedi","doi":"10.1109/SKIMA.2015.7400038","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400038","url":null,"abstract":"This paper presents an Improved Active Power Sharing Strategy for Electronic Load Controller (ELC) Controlled Synchronous Generator Based Islanded Micro Grid (MG) Application. ELC regulated synchronous generators operating in parallel forming a MG is considered. Existing MG at Baglung District (Interconnected seven nearby Micro Hydro Plants with cumulative power output of 132 kW) was taken as a reference case for the study. Current active power sharing strategy was realized by considering MG with three generators and new concept was proposed to minimize the existing problem on power sharing. The control strategy is presented only for the MG operated in islanded mode. The case is designed and simulated in MATLAB using Simulink. This study does not consider the reactive power flows and sharing issue. This scheme can be efficiently used in MG Application.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"56 90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The effect of the time unit on software development effort estimates 时间单位对软件开发工作估计的影响
M. Jørgensen
Estimates of software development effort are frequently inaccurate and over-optimistic. In this paper we describe how changes in the granularity of the unit of estimation, e.g., work-days instead of work-hours, affects the effort estimates. We describe four psychological mechanisms, how they interact and discuss the expected total effect of higher granularity units on effort estimates. We argue that the mechanisms in general imply that higher granularity effort units will result in higher effort estimates, e.g., that estimating software development work in work-days or weeks will lead to higher estimates than when estimating in work-hours. A possible implication of this predicted effect is that, in contexts where there is a tendency towards under-estimation, estimation in work-days or weeks instead of work-hours leads to more realistic estimates.
对软件开发工作的估计经常是不准确和过于乐观的。在本文中,我们描述了评估单位粒度的变化(例如,工作日而不是工作时间)是如何影响工作量评估的。我们描述了四种心理机制,它们是如何相互作用的,并讨论了更高粒度单元对工作量估计的预期总体影响。我们认为,这种机制通常意味着更高粒度的工作单元将导致更高的工作估计,例如,以工作日或周为单位评估软件开发工作将比以工作时间为单位评估获得更高的估计。这种预测效果的一个可能含义是,在有低估倾向的情况下,以工作日或周为单位而不是以工作时间为单位的估计会导致更现实的估计。
{"title":"The effect of the time unit on software development effort estimates","authors":"M. Jørgensen","doi":"10.1109/SKIMA.2015.7399992","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7399992","url":null,"abstract":"Estimates of software development effort are frequently inaccurate and over-optimistic. In this paper we describe how changes in the granularity of the unit of estimation, e.g., work-days instead of work-hours, affects the effort estimates. We describe four psychological mechanisms, how they interact and discuss the expected total effect of higher granularity units on effort estimates. We argue that the mechanisms in general imply that higher granularity effort units will result in higher effort estimates, e.g., that estimating software development work in work-days or weeks will lead to higher estimates than when estimating in work-hours. A possible implication of this predicted effect is that, in contexts where there is a tendency towards under-estimation, estimation in work-days or weeks instead of work-hours leads to more realistic estimates.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132804060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A holistic simulation model for remote patient monitoring systems using Wireless Body Area Sensor Networks (WBASNs) 基于无线身体区域传感器网络(WBASNs)的远程病人监护系统整体仿真模型
M. Akbar, Hongnian Yu, S. Cang
Remote patient monitoring systems mainly depend on the standards and protocols of the Wireless Body Area Sensor Networks (WBASNs). The increasing demand for these systems impose various challenges, including time bounded services, specific data rates, prioritized data transmission and energy consumption, etc. These challenges maps on the different layers of the protocol stack for WBASNs. In this context, a lot of new protocols for applications, MAC, network and physical layer have been proposed; however, few describe a complete simulation model to evaluate patient monitoring system. In this context, this work examines and proposes a simulation model based on the CASTALIA 3.2 simulator with an OMNeT++ framework to evaluate the patient monitoring system. The proposed model consist of six biomedical sensor nodes, including electrocardiography (ECG), blood pressure (BP), accelerometer, temperature, blood oxygen saturation and glucose monitor. The model defines the data rate settings for these nodes at the application layer. All these nodes are configured in star topology and send data to a centralized controller. IEEE 802.15.4 standard is used for the MAC and PHY layer and ZigBee is used over network layer. Slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used as a channel access mechanism, however, the model also accommodate prioritized channel access by configuring guaranteed time service (GTS) for an ECG node. To evaluate the model, the parameters including delay, packet delivery ratio (PDR) and energy consumption is used. To evaluate simulation model over patient monitoring system, we have considered 250 ms as maximum affordable delay. It is observed that most of the nodes delivered data to coordinator under 250 ms Moreover, for the GTS model, the prioritized node (ECG) shows the acceptable delay and PDR values. Further, GTSon mode utilizes less energy as compared to GTSoff mode. Overall, researchers can use this model as a guideline to evaluate new protocols and standards of WBASNs.
远程病人监护系统主要依赖于无线身体区域传感器网络(WBASNs)的标准和协议。对这些系统日益增长的需求带来了各种挑战,包括限时服务、特定数据速率、优先数据传输和能源消耗等。这些挑战映射在wbasn协议栈的不同层上。在此背景下,针对应用层、MAC层、网络层和物理层提出了许多新的协议;然而,很少有人描述一个完整的仿真模型来评估患者监护系统。在此背景下,本工作研究并提出了一个基于CASTALIA 3.2模拟器和omnet++框架的仿真模型来评估患者监护系统。该模型由6个生物医学传感器节点组成,包括心电图(ECG)、血压(BP)、加速度计、体温、血氧饱和度和血糖监测仪。该模型在应用层为这些节点定义数据速率设置。所有这些节点都以星形拓扑结构配置,并将数据发送到集中控制器。MAC层和物理层采用IEEE 802.15.4标准,网络层采用ZigBee标准。该模型采用带避免碰撞的开槽载波感知多路访问(CSMA/CA)作为通道访问机制,同时通过为ECG节点配置保证时间服务(GTS)来适应优先通道访问。为了对模型进行评价,使用了时延、包投递率(PDR)和能耗等参数。为了评估病人监护系统的仿真模型,我们考虑了250毫秒的最大可承受延迟。观察到,大多数节点在250 ms内将数据传递到协调器,并且对于GTS模型,优先节点(ECG)显示出可接受的延迟和PDR值。此外,与gtsoft模式相比,GTSon模式使用更少的能量。总的来说,研究人员可以使用该模型作为评估wbasn新协议和标准的指南。
{"title":"A holistic simulation model for remote patient monitoring systems using Wireless Body Area Sensor Networks (WBASNs)","authors":"M. Akbar, Hongnian Yu, S. Cang","doi":"10.1109/SKIMA.2015.7399990","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7399990","url":null,"abstract":"Remote patient monitoring systems mainly depend on the standards and protocols of the Wireless Body Area Sensor Networks (WBASNs). The increasing demand for these systems impose various challenges, including time bounded services, specific data rates, prioritized data transmission and energy consumption, etc. These challenges maps on the different layers of the protocol stack for WBASNs. In this context, a lot of new protocols for applications, MAC, network and physical layer have been proposed; however, few describe a complete simulation model to evaluate patient monitoring system. In this context, this work examines and proposes a simulation model based on the CASTALIA 3.2 simulator with an OMNeT++ framework to evaluate the patient monitoring system. The proposed model consist of six biomedical sensor nodes, including electrocardiography (ECG), blood pressure (BP), accelerometer, temperature, blood oxygen saturation and glucose monitor. The model defines the data rate settings for these nodes at the application layer. All these nodes are configured in star topology and send data to a centralized controller. IEEE 802.15.4 standard is used for the MAC and PHY layer and ZigBee is used over network layer. Slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used as a channel access mechanism, however, the model also accommodate prioritized channel access by configuring guaranteed time service (GTS) for an ECG node. To evaluate the model, the parameters including delay, packet delivery ratio (PDR) and energy consumption is used. To evaluate simulation model over patient monitoring system, we have considered 250 ms as maximum affordable delay. It is observed that most of the nodes delivered data to coordinator under 250 ms Moreover, for the GTS model, the prioritized node (ECG) shows the acceptable delay and PDR values. Further, GTSon mode utilizes less energy as compared to GTSoff mode. Overall, researchers can use this model as a guideline to evaluate new protocols and standards of WBASNs.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123584251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Communication related issues in GSD: An exploratory study GSD中沟通相关问题的探索性研究
Mohammad Shameem, C. Kumar, B. Chandra
Global Software Development (GSD) projects use virtual teams that linked through telecommunication technologies. The work carried out in GSD process involves several issues. One of the key issues named is effective communication among team members. It has a great effect on the success of global software projects. In this paper, the influencing factors for effective communication have been highlighted considering the life cycle of the project development. Furthermore, a framework incorporating the relevant factors such as temporal distances, geographical distance, socio-cultural distance, attitudinal issues and social communication have been proposed and introduced in this paper. According to our study, social communication and attitudinal issues effects the team members also influences the communication in GSD projects. An exploratory research method has been used for collecting data from various Indian software organizations. Moreover, we also developed propositions for further research in this area.
全球软件开发(GSD)项目使用通过电信技术连接起来的虚拟团队。在GSD过程中进行的工作涉及几个问题。其中一个关键问题是团队成员之间的有效沟通。它对全球软件项目的成功有很大的影响。本文从项目开发的生命周期出发,重点分析了影响有效沟通的因素。此外,本文还提出并介绍了一个包含时间距离、地理距离、社会文化距离、态度问题和社会沟通等相关因素的框架。根据我们的研究,社会沟通和态度问题对团队成员的影响也会影响GSD项目中的沟通。一种探索性的研究方法被用于从不同的印度软件组织收集数据。此外,我们还提出了进一步研究的建议。
{"title":"Communication related issues in GSD: An exploratory study","authors":"Mohammad Shameem, C. Kumar, B. Chandra","doi":"10.1109/SKIMA.2015.7400043","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400043","url":null,"abstract":"Global Software Development (GSD) projects use virtual teams that linked through telecommunication technologies. The work carried out in GSD process involves several issues. One of the key issues named is effective communication among team members. It has a great effect on the success of global software projects. In this paper, the influencing factors for effective communication have been highlighted considering the life cycle of the project development. Furthermore, a framework incorporating the relevant factors such as temporal distances, geographical distance, socio-cultural distance, attitudinal issues and social communication have been proposed and introduced in this paper. According to our study, social communication and attitudinal issues effects the team members also influences the communication in GSD projects. An exploratory research method has been used for collecting data from various Indian software organizations. Moreover, we also developed propositions for further research in this area.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126190696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Human action invarianceness for human action recognition 人体动作不变性用于人体动作识别
N. N. A. Sjarif, S. Shamsuddin
The uniqueness of the human action shape or silhouete can be used for the human action recognition. Acquiring the features of human silhouette to obtained the concept of human action invarianceness have led to an important research in video surveillance domain. This paper discusses the investigation of this concept by extracting individual human action features using integration moment invariant. Experiment result have shown that human action invarianceness are improved with better recognition accuracy. This has verified that the integration method of moment invariant is worth explored in recognition of human action in video surveillance.
人体动作形状或轮廓的唯一性可用于人体动作识别。获取人体轮廓特征以获得人体动作不变性的概念是视频监控领域的一个重要研究课题。本文讨论了利用积分矩不变性提取个体行为特征的概念。实验结果表明,该方法提高了人体动作不变性,提高了识别精度。验证了矩不变积分方法在视频监控中人体动作识别中的应用价值。
{"title":"Human action invarianceness for human action recognition","authors":"N. N. A. Sjarif, S. Shamsuddin","doi":"10.1109/SKIMA.2015.7400036","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400036","url":null,"abstract":"The uniqueness of the human action shape or silhouete can be used for the human action recognition. Acquiring the features of human silhouette to obtained the concept of human action invarianceness have led to an important research in video surveillance domain. This paper discusses the investigation of this concept by extracting individual human action features using integration moment invariant. Experiment result have shown that human action invarianceness are improved with better recognition accuracy. This has verified that the integration method of moment invariant is worth explored in recognition of human action in video surveillance.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"219 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Visual cryptography using image pixel transparency with cover image 视觉密码学使用图像像素透明与封面图像
Dipesh Shrestha, S. Panday
Transparency of pixels of the shares (the two or more encrypted images) can be used to reveal the secret image. The pixels of shares can be generated randomly or the cover image can be used to generate the first share. The encrypted shares generated using cover image seem to be visually less similar to those generated without using cover image. Also, on the basis of image similarity between shares and original image, further encryption of encrypted shares can be performed. Comparison of the outcomes when cover image is used and when not used to generate shares, shows that the latter is more sensitive to the transparency factor (alpha) than the former encouraging the use of properly selected cover image for visual cryptography using pixel transparency.
共享(两个或多个加密图像)像素的透明度可用于显示秘密图像。可以随机生成份额的像素,或者可以使用封面图像来生成第一份额。使用封面图片生成的加密共享在视觉上似乎与不使用封面图片生成的加密共享不太相似。此外,基于共享与原始图像之间的图像相似性,可以对加密后的共享进行进一步加密。使用封面图像和不使用封面图像生成共享时的结果比较表明,后者比前者对透明度因子(alpha)更敏感,鼓励使用适当选择的封面图像进行使用像素透明度的视觉加密。
{"title":"Visual cryptography using image pixel transparency with cover image","authors":"Dipesh Shrestha, S. Panday","doi":"10.1109/SKIMA.2015.7400048","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400048","url":null,"abstract":"Transparency of pixels of the shares (the two or more encrypted images) can be used to reveal the secret image. The pixels of shares can be generated randomly or the cover image can be used to generate the first share. The encrypted shares generated using cover image seem to be visually less similar to those generated without using cover image. Also, on the basis of image similarity between shares and original image, further encryption of encrypted shares can be performed. Comparison of the outcomes when cover image is used and when not used to generate shares, shows that the latter is more sensitive to the transparency factor (alpha) than the former encouraging the use of properly selected cover image for visual cryptography using pixel transparency.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127891079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A DBMS based inventory model and its timeframe study in automobile spare parts import management 基于DBMS的汽车零部件进口库存模型及其时间框架研究
P. L. Tamang, P. Paudyal
The present study is aimed to study the delay that arises in automobile spare parts import system. This is a case study of FIAT dealership, Batas Brothers Motors Pvt. Ltd (BBMPL) based on import of Nepal-India custom. Study includes comparative research design of FIAT general import model, principal standard import model and Database Management System (DBMS) based import model. Input data taken for DBMS model is sales, warranty, clipping, sub-dealership demand data of FY 2069/70 BS, 70/71 BS (2013/014 AD, 2014/2015 AD). These data are used to forecast demand, cost of freight and custom duties for FY 2071/72 and determine the import time information. An accumulated order of forecasted data is generated by DBMS Model for study of time comparison with standard import model and general inventory model. Statistical summary of study shows that general inventory model takes 2.4 times (108 days) longer duration than that of standard import model i.e, 45 days whereas DBMS model reduces standard time by 0.57 times (26 days). The study suggests DBMS inventory model as best model in comparison with standard import model and general inventory import model. Web based application software of DBMS based inventory model has been developed and its reliability test in import management has been carried out. The model is friendly in business intelligence (BI) and enterprise resource planning (ERP) for import industry. If database of spare parts demand viz-normal workshop sales, warranty sales, clipping sales, sub dealership sales can be collected, the model can be effectively used in other industries also, beside the automobile service.
本研究旨在研究汽车零部件进口系统中出现的延迟问题。这是菲亚特经销商巴塔斯兄弟汽车有限公司(BBMPL)基于尼泊尔-印度海关进口的案例研究。研究包括菲亚特通用进口模型、主要标准进口模型和基于数据库管理系统的进口模型的比较研究设计。DBMS模型的输入数据是2069/70财年、70/71财年(2013/014年、2014/2015年)的销售、保修、裁剪、次级经销商需求数据。这些数据用于预测2071/72财年的需求、运费和关税成本,并确定进口时间信息。利用DBMS模型生成预测数据的累积顺序,与标准进口模型和一般库存模型进行时间比较研究。研究统计总结表明,一般库存模型所需时间比标准进口模型长2.4倍(108天),即45天,而DBMS模型将标准时间缩短0.57倍(26天)。通过对标准进口模型和一般库存进口模型的比较,研究表明数据库管理系统库存模型是最佳的进口模型。开发了基于数据库管理系统的库存模型Web应用软件,并对其在进口管理中的可靠性进行了测试。该模型适用于进口行业的商业智能(BI)和企业资源规划(ERP)。如果能够收集到零配件需求数据库,即正规车间销售、保修销售、剪接销售、经销商销售,则该模型除了可以有效地应用于汽车服务之外,还可以有效地应用于其他行业。
{"title":"A DBMS based inventory model and its timeframe study in automobile spare parts import management","authors":"P. L. Tamang, P. Paudyal","doi":"10.1109/SKIMA.2015.7399987","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7399987","url":null,"abstract":"The present study is aimed to study the delay that arises in automobile spare parts import system. This is a case study of FIAT dealership, Batas Brothers Motors Pvt. Ltd (BBMPL) based on import of Nepal-India custom. Study includes comparative research design of FIAT general import model, principal standard import model and Database Management System (DBMS) based import model. Input data taken for DBMS model is sales, warranty, clipping, sub-dealership demand data of FY 2069/70 BS, 70/71 BS (2013/014 AD, 2014/2015 AD). These data are used to forecast demand, cost of freight and custom duties for FY 2071/72 and determine the import time information. An accumulated order of forecasted data is generated by DBMS Model for study of time comparison with standard import model and general inventory model. Statistical summary of study shows that general inventory model takes 2.4 times (108 days) longer duration than that of standard import model i.e, 45 days whereas DBMS model reduces standard time by 0.57 times (26 days). The study suggests DBMS inventory model as best model in comparison with standard import model and general inventory import model. Web based application software of DBMS based inventory model has been developed and its reliability test in import management has been carried out. The model is friendly in business intelligence (BI) and enterprise resource planning (ERP) for import industry. If database of spare parts demand viz-normal workshop sales, warranty sales, clipping sales, sub dealership sales can be collected, the model can be effectively used in other industries also, beside the automobile service.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126181157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Preserving privacy in social network graph with K-anonymize degree sequence generation 基于k -匿名度序列生成的社交网络图隐私保护
Munmun Bhattacharya, Papri Mani
The notion of being connected is primal in the modern world. Everyday people spend a great amount of their time in the virtual world through various online social networking sites. As a result a huge amount of personal information is being exchanged over the social network making them top of the interest to researchers from every field, various application developing companies, advertising companies and even governments. Analysis of these graphs helps discover invaluable knowledge. But this boon does not come without curse. Many invasive adversaries threat the confidentiality of this private information making the users vulnerable to being exposed and identified. So preserving privacy while publishing the social network graph data is one the most important concerns in today's world. Different technique has been adopted to anonymize social network data before publishing. In this paper we have proposed an iterative algorithm to generate k-anonymize vertex degree sequence of a given social network graph in order to protect the graph against passive attack. We have applied our method to some social network graph datasets and demonstrated their efficiency in preventing vertex re-identification attacks where an adversary has background knowledge about the degree of the target vertex.
在现代世界中,连接的概念是原始的。每天人们通过各种在线社交网站在虚拟世界中花费大量时间。因此,大量的个人信息正在通过社交网络进行交换,使其成为各个领域的研究人员,各种应用开发公司,广告公司甚至政府的首要兴趣。对这些图的分析有助于发现宝贵的知识。但这一恩惠并非没有诅咒。许多入侵的对手威胁这些私人信息的机密性,使用户容易暴露和识别。因此,在发布社交网络图形数据的同时保护隐私是当今世界最重要的问题之一。在发布之前,采用了不同的技术对社交网络数据进行匿名处理。本文提出了一种迭代算法来生成给定社交网络图的k-匿名顶点度序列,以保护该图免受被动攻击。我们已经将我们的方法应用于一些社交网络图数据集,并证明了它们在防止攻击者对目标顶点的程度有背景知识的顶点重新识别攻击方面的效率。
{"title":"Preserving privacy in social network graph with K-anonymize degree sequence generation","authors":"Munmun Bhattacharya, Papri Mani","doi":"10.1109/SKIMA.2015.7400035","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400035","url":null,"abstract":"The notion of being connected is primal in the modern world. Everyday people spend a great amount of their time in the virtual world through various online social networking sites. As a result a huge amount of personal information is being exchanged over the social network making them top of the interest to researchers from every field, various application developing companies, advertising companies and even governments. Analysis of these graphs helps discover invaluable knowledge. But this boon does not come without curse. Many invasive adversaries threat the confidentiality of this private information making the users vulnerable to being exposed and identified. So preserving privacy while publishing the social network graph data is one the most important concerns in today's world. Different technique has been adopted to anonymize social network data before publishing. In this paper we have proposed an iterative algorithm to generate k-anonymize vertex degree sequence of a given social network graph in order to protect the graph against passive attack. We have applied our method to some social network graph datasets and demonstrated their efficiency in preventing vertex re-identification attacks where an adversary has background knowledge about the degree of the target vertex.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130479648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Collaborative crosschecking system of observed loss estimation for disaster relief management 救灾管理中观测损失估算的协同交叉核对系统
Sirinrat Khwanpheng, Khin T. Lwin, R. Chaisricharoen, P. Temdee
Disaster is unavoidable but an effective disaster relief management can improve severe situations. Rapid and precise reliefs delivered to right victims are the key to improve situation after an unavoidable disastrous event. This is one of a great challenge in rural area of most developing countries as all required resources can be lacked in any moment. At the same time, there is a lot of observed information from many different sources which has to be manipulated while the relief is indeed required in the timely manner. The observed information can be over and under estimated because it depends mainly on the individual observers. Therefore to promote effective disaster relief management system, this paper presents a system for crosschecking and ranking the collected information from multiple observers to sort victims based on their priorities. The proposed system consists of three main components: the case gathering service, the crosschecking mechanism and the ranking process. Based on information of a real disastrous area suffered by the earthquake in Chiang Rai province which is in the northernmost of Thailand in 2014, the proposed system is evaluated as high availability, moderate satisfaction along with high adequate precision.
灾害是不可避免的,但有效的救灾管理可以改善严重的情况。在不可避免的灾难事件发生后,迅速准确地向正确的受害者提供救济是改善局势的关键。这是大多数发展中国家农村地区面临的巨大挑战之一,因为任何时候都可能缺乏所需的所有资源。与此同时,有许多来自不同来源的观察到的信息需要进行处理,而救灾确实需要及时进行。观察到的信息可能被高估或低估,因为它主要取决于个体观察者。因此,为了促进有效的救灾管理系统,本文提出了一个系统,可以对多个观测者收集的信息进行交叉核对和排序,以根据他们的优先级对受害者进行分类。该系统主要由三个部分组成:案件收集服务、交叉核对机制和排序过程。基于2014年泰国最北端清莱省地震真实灾区的信息,该系统被评价为高可用性、中等满意度和足够高的精度。
{"title":"Collaborative crosschecking system of observed loss estimation for disaster relief management","authors":"Sirinrat Khwanpheng, Khin T. Lwin, R. Chaisricharoen, P. Temdee","doi":"10.1109/SKIMA.2015.7400049","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400049","url":null,"abstract":"Disaster is unavoidable but an effective disaster relief management can improve severe situations. Rapid and precise reliefs delivered to right victims are the key to improve situation after an unavoidable disastrous event. This is one of a great challenge in rural area of most developing countries as all required resources can be lacked in any moment. At the same time, there is a lot of observed information from many different sources which has to be manipulated while the relief is indeed required in the timely manner. The observed information can be over and under estimated because it depends mainly on the individual observers. Therefore to promote effective disaster relief management system, this paper presents a system for crosschecking and ranking the collected information from multiple observers to sort victims based on their priorities. The proposed system consists of three main components: the case gathering service, the crosschecking mechanism and the ranking process. Based on information of a real disastrous area suffered by the earthquake in Chiang Rai province which is in the northernmost of Thailand in 2014, the proposed system is evaluated as high availability, moderate satisfaction along with high adequate precision.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121148298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cyber-physical model for platoon system 排系统的网络物理模型
Madeleine El-Zaher, Baudouin Dafflon, Franck Gechter
Cyber-Physical system (CPS) are now widely used in the design of smart objects. A CPS is the integration of computational elements with physical processes. One of the most widespread application of CPS is the autonomous transportation systems. This paper presents a CPS model for the design of a platoon system approach (i.e. a set of autonomous vehicles that move together without any mechanical link while maintaining a predefined configuration). The proposed approach to platoon issue can be considered to be decentralized since each vehicle perceives its environment and acts based only on its own perceptions. The proposed approach deals with different platoon formation. The vehicles of the platoon are able to maintain their position in the configuration while avoiding collision with obstacles. The paper shows some simulation and experimentation results that allow to evaluate the quality of the proposed platoon approach.
信息物理系统(CPS)在智能物体设计中得到了广泛的应用。CPS是计算元素与物理过程的集成。CPS最广泛的应用之一是自动运输系统。本文提出了一种用于组队系统方法设计的CPS模型(即一组自动驾驶车辆,在保持预定义配置的同时,在没有任何机械连接的情况下一起移动)。所提出的排问题的方法可以被认为是分散的,因为每辆车都感知其环境并仅根据自己的感知采取行动。所提出的方法处理不同的排阵型。该排的车辆能够在避免与障碍物碰撞的同时保持其在配置中的位置。本文给出了一些仿真和实验结果,以评估所提出的排法的质量。
{"title":"A cyber-physical model for platoon system","authors":"Madeleine El-Zaher, Baudouin Dafflon, Franck Gechter","doi":"10.1109/SKIMA.2015.7400045","DOIUrl":"https://doi.org/10.1109/SKIMA.2015.7400045","url":null,"abstract":"Cyber-Physical system (CPS) are now widely used in the design of smart objects. A CPS is the integration of computational elements with physical processes. One of the most widespread application of CPS is the autonomous transportation systems. This paper presents a CPS model for the design of a platoon system approach (i.e. a set of autonomous vehicles that move together without any mechanical link while maintaining a predefined configuration). The proposed approach to platoon issue can be considered to be decentralized since each vehicle perceives its environment and acts based only on its own perceptions. The proposed approach deals with different platoon formation. The vehicles of the platoon are able to maintain their position in the configuration while avoiding collision with obstacles. The paper shows some simulation and experimentation results that allow to evaluate the quality of the proposed platoon approach.","PeriodicalId":261471,"journal":{"name":"2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1