首页 > 最新文献

2008 First International Conference on Emerging Trends in Engineering and Technology最新文献

英文 中文
Rough Neuron Based Neural Classifier 基于粗糙神经元的神经分类器
A. Kothari, A. Keskar, R. Chalasani, S. Srinath
Rough sets theory can be applied to the problem of pattern recognition using neural networks in three different stages: preprocessing, learning rule and in the architecture. This paper discusses the use of rough set theory in the architecture of the unsupervised neural network, which is implemented, by the use of rough neuron. The rough neuron consists of two neurons: upper boundary neuron and lower boundary neuron, derived on the upper and lower boundaries of the input vector. The proposed neural network uses the Kohonen learning rule. Problem of character recognition is taken to verify the usefulness of such a network. The data set is formed by the images of English alphabets of ten different fonts. The approximation quality of such a network is better compared to the traditional networks. The number of iterations reduce significantly for such a network and hence the convergence time.
粗糙集理论在神经网络模式识别问题中的应用可分为预处理、规则学习和体系结构三个阶段。本文讨论了粗糙集理论在无监督神经网络结构中的应用,并利用粗糙神经元实现了无监督神经网络的结构。粗糙神经元由两个神经元组成:上界神经元和下界神经元,分别在输入向量的上界和下界上导出。所提出的神经网络采用Kohonen学习规则。通过字符识别问题验证了该网络的有效性。该数据集由十种不同字体的英文字母图像组成。与传统网络相比,该网络的逼近质量更好。这种网络的迭代次数大大减少,因此收敛时间也大大缩短。
{"title":"Rough Neuron Based Neural Classifier","authors":"A. Kothari, A. Keskar, R. Chalasani, S. Srinath","doi":"10.1109/ICETET.2008.229","DOIUrl":"https://doi.org/10.1109/ICETET.2008.229","url":null,"abstract":"Rough sets theory can be applied to the problem of pattern recognition using neural networks in three different stages: preprocessing, learning rule and in the architecture. This paper discusses the use of rough set theory in the architecture of the unsupervised neural network, which is implemented, by the use of rough neuron. The rough neuron consists of two neurons: upper boundary neuron and lower boundary neuron, derived on the upper and lower boundaries of the input vector. The proposed neural network uses the Kohonen learning rule. Problem of character recognition is taken to verify the usefulness of such a network. The data set is formed by the images of English alphabets of ten different fonts. The approximation quality of such a network is better compared to the traditional networks. The number of iterations reduce significantly for such a network and hence the convergence time.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133639836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Time Synchronization against Malicious Attacks for Wireless Sensor Networks 针对无线传感器网络恶意攻击的安全时间同步
V. Vijayalakshmi, T. G. Palanivelu, N. Agalya
Wireless sensor networks (WSNs) have emerged as an interesting research area in the last few years. The applications envisioned for such networks require collaborative execution of a distributed task amongst a large set of sensor nodes. The collaborative execution is realized by exchanging messages that are time-stamped using the local clocks on the nodes. Hence, time synchronization becomes indispensable in such distributed systems. For years, protocols such as network time protocol (NTP) have kept the clocks of networked systems in perfect synchronization. However, wireless sensor networks has a large density of nodes and very limited energy resource at every node which leads to improved scalability requirements while limiting the resources. This paper proposes a technique called level-based time synchronization to provide redundant ways for each node to synchronize its clock with the common source, so that it can tolerate partially missing or false synchronization information provided by compromised nodes. The efficacy of this technique is evaluated via simulations.
无线传感器网络(WSNs)是近年来兴起的一个有趣的研究领域。为这种网络设想的应用程序需要在大量传感器节点之间协作执行分布式任务。协作执行是通过使用节点上的本地时钟交换带有时间戳的消息来实现的。因此,在这样的分布式系统中,时间同步变得必不可少。多年来,网络时间协议(NTP)等协议使网络系统的时钟保持完美同步。然而,无线传感器网络的节点密度大,每个节点上的能量资源非常有限,这导致在限制资源的同时提高了可扩展性要求。本文提出了一种基于层次的时间同步技术,为每个节点提供冗余的方式与公共源同步时钟,使其能够容忍受损节点提供的部分丢失或错误的同步信息。通过仿真对该技术的有效性进行了评价。
{"title":"Secure Time Synchronization against Malicious Attacks for Wireless Sensor Networks","authors":"V. Vijayalakshmi, T. G. Palanivelu, N. Agalya","doi":"10.1109/ICETET.2008.224","DOIUrl":"https://doi.org/10.1109/ICETET.2008.224","url":null,"abstract":"Wireless sensor networks (WSNs) have emerged as an interesting research area in the last few years. The applications envisioned for such networks require collaborative execution of a distributed task amongst a large set of sensor nodes. The collaborative execution is realized by exchanging messages that are time-stamped using the local clocks on the nodes. Hence, time synchronization becomes indispensable in such distributed systems. For years, protocols such as network time protocol (NTP) have kept the clocks of networked systems in perfect synchronization. However, wireless sensor networks has a large density of nodes and very limited energy resource at every node which leads to improved scalability requirements while limiting the resources. This paper proposes a technique called level-based time synchronization to provide redundant ways for each node to synchronize its clock with the common source, so that it can tolerate partially missing or false synchronization information provided by compromised nodes. The efficacy of this technique is evaluated via simulations.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Learning Context-Free Grammars Using Skeletons 关于使用框架学习上下文无关语法
G. L. Prajapati, N. Chaudhari, M. Chandwani
In 1992, Sakakibara introduced a well-known approach for learning context-free grammars from positive samples of structural descriptions (skeletons). In particular, Sakakibarapsilas approach uses reversible tree automata construction algorithm RT. Here, we introduce a modification of the learning algorithm RT for reversible tree automata. With respect to n, where n is the sum of the sizes of the input skeletons, our modification for RT, called e_RT, needs O(n3) operations and achieves the storage space saving by a factor of O(n) over RT. Using our e_RT, we give an algorithm e_RC to learn reversible context-free grammars from positive samples of their structural descriptions. Furthermore, we modify e_RC to learn extended reversible context-free grammars from positive-only examples. Finally, we present summary of our experiments carried out to see how our results compare with those of Sakakibara, which also confirms our approach as efficient and useful.
1992年,Sakakibara介绍了一种著名的方法,用于从结构描述的正面样本(骨架)中学习上下文无关语法。特别是,Sakakibarapsilas方法使用可逆树自动机构建算法RT。在这里,我们介绍了对可逆树自动机学习算法RT的修改。对于n,其中n是输入骨架大小的总和,我们对RT的修改称为e_RT,需要O(n3)次操作,并通过O(n) / RT节省存储空间。使用我们的e_RT,我们给出了一个算法e_RC从其结构描述的正样本中学习可逆的上下文无关语法。此外,我们修改e_RC以从仅限正的示例中学习扩展的可逆上下文无关语法。最后,我们总结了我们所进行的实验,看看我们的结果与Sakakibara的结果如何比较,这也证实了我们的方法是有效和有用的。
{"title":"On Learning Context-Free Grammars Using Skeletons","authors":"G. L. Prajapati, N. Chaudhari, M. Chandwani","doi":"10.1109/ICETET.2008.167","DOIUrl":"https://doi.org/10.1109/ICETET.2008.167","url":null,"abstract":"In 1992, Sakakibara introduced a well-known approach for learning context-free grammars from positive samples of structural descriptions (skeletons). In particular, Sakakibarapsilas approach uses reversible tree automata construction algorithm RT. Here, we introduce a modification of the learning algorithm RT for reversible tree automata. With respect to n, where n is the sum of the sizes of the input skeletons, our modification for RT, called e_RT, needs O(n3) operations and achieves the storage space saving by a factor of O(n) over RT. Using our e_RT, we give an algorithm e_RC to learn reversible context-free grammars from positive samples of their structural descriptions. Furthermore, we modify e_RC to learn extended reversible context-free grammars from positive-only examples. Finally, we present summary of our experiments carried out to see how our results compare with those of Sakakibara, which also confirms our approach as efficient and useful.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical Solution for One-Dimensional Stresses in a Hollow FGM Sphere with Heat Source 带热源的空心FGM球内一维应力的解析解
Sasan Mohammadi, A. H. Mohazzab, M. Jabbari
This paper presents the analytical solution of one-dimensional stresses for a hollow sphere made of functionally graded material. The material properties vary continuously across the thickness, according to power functions of radial direction. The thermal boundary conditions may include conduction, flux, and convection for inside or outside of hollow sphere. Thermoelasticity equation is steady state and include heat source. The aim of this work is considering the effect of heat source on thermal stresses. The heat conduction and Navier equations are solved analytically and a direct method of solution of Navier equation is presented.
本文给出了功能梯度材料空心球一维应力的解析解。根据径向的幂函数,材料性能在厚度上连续变化。热边界条件可包括中空球体内部或外部的传导、通量和对流。热弹性方程是稳态方程,包含热源。本工作的目的是考虑热源对热应力的影响。对热传导方程和Navier方程进行了解析求解,给出了求解Navier方程的直接方法。
{"title":"Analytical Solution for One-Dimensional Stresses in a Hollow FGM Sphere with Heat Source","authors":"Sasan Mohammadi, A. H. Mohazzab, M. Jabbari","doi":"10.1109/ICETET.2008.159","DOIUrl":"https://doi.org/10.1109/ICETET.2008.159","url":null,"abstract":"This paper presents the analytical solution of one-dimensional stresses for a hollow sphere made of functionally graded material. The material properties vary continuously across the thickness, according to power functions of radial direction. The thermal boundary conditions may include conduction, flux, and convection for inside or outside of hollow sphere. Thermoelasticity equation is steady state and include heat source. The aim of this work is considering the effect of heat source on thermal stresses. The heat conduction and Navier equations are solved analytically and a direct method of solution of Navier equation is presented.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Notice of Violation of IEEE Publication PrinciplesMeasuring the Quality of Software Modularization Using Coupling-Based Structural Metrics for an OOS System 违反IEEE发布原则的通知:使用基于耦合的OOS系统结构度量来度量软件模块化的质量
M. Aruna, M. Devi, M. Deepa
The fundamental issue faced by the developers in todaypsilas environment is how to measure the quality of software modularization. In this paper a new set of metrics are proposed which measure the quality of modularization of an object-oriented software (OOS) system. A set of design principles are proposed to capture the notion of modularity and metrics are defined based on the principles. The coupling-based structural metrics measures the function-call traffic through the APIpsilas of the modules in relation to the overall function-call traffic. It is now widely accepted that the overall quality of a large body of software is enhanced when module interactions are restricted to take place through the published APIpsilas for the modules. The metrics can be tested on some large legacy-code business applications. The metrics can be validated from the results obtained on human-modularized versions of the software.
如何度量软件模块化的质量是当今软件开发人员面临的一个基本问题。本文提出了一套新的度量方法来度量面向对象软件系统的模块化质量。提出了一组设计原则来捕捉模块化的概念,并根据这些原则定义了度量。基于耦合的结构度量度量通过模块的api的函数调用流量与总体函数调用流量的关系。现在人们普遍认为,当模块交互被限制在通过已发布的模块api silas进行时,大型软件的整体质量就会得到提高。这些指标可以在一些大型遗留代码业务应用程序上进行测试。这些指标可以通过在软件的人工模块化版本上获得的结果进行验证。
{"title":"Notice of Violation of IEEE Publication PrinciplesMeasuring the Quality of Software Modularization Using Coupling-Based Structural Metrics for an OOS System","authors":"M. Aruna, M. Devi, M. Deepa","doi":"10.1109/ICETET.2008.76","DOIUrl":"https://doi.org/10.1109/ICETET.2008.76","url":null,"abstract":"The fundamental issue faced by the developers in todaypsilas environment is how to measure the quality of software modularization. In this paper a new set of metrics are proposed which measure the quality of modularization of an object-oriented software (OOS) system. A set of design principles are proposed to capture the notion of modularity and metrics are defined based on the principles. The coupling-based structural metrics measures the function-call traffic through the APIpsilas of the modules in relation to the overall function-call traffic. It is now widely accepted that the overall quality of a large body of software is enhanced when module interactions are restricted to take place through the published APIpsilas for the modules. The metrics can be tested on some large legacy-code business applications. The metrics can be validated from the results obtained on human-modularized versions of the software.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"34 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124334642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Security Requirements Elicitation Using View Points for Online System 基于视点的在线系统安全需求引出
A. Agarwal, D. Gupta
Security is of great concern for software engineering community for the development of online systems. To handle all the security issues properly we need to have well defined process for Security engineering and this process should be integrated with software development life cycle (SDLC). For integrating security engineering with SDLC the requirement engineers should have clearly understanding of what security requirements are and he/she is able to distinguish security requirements from various architectural and behavioral constraints. In this paper we go on to define a process for security requirements elicitation presenting techniques for activities like requirements discovery, analysis, prioritization and management. With true security requirements identified as early as possible and systematically identified, Architecture team can choose most appropriate mechanism to implement them.
在开发在线系统的过程中,安全性一直是软件工程界非常关注的问题。为了正确地处理所有的安全问题,我们需要有一个定义良好的安全工程过程,并且这个过程应该与软件开发生命周期(SDLC)集成。为了将安全工程与SDLC集成,需求工程师应该清楚地了解安全需求是什么,并且他/她能够从各种体系结构和行为约束中区分安全需求。在本文中,我们将继续定义一个安全需求引出的过程,为需求发现、分析、优先级排序和管理等活动提供技术。有了尽早并系统地确定真正的安全需求,体系结构团队就可以选择最合适的机制来实现它们。
{"title":"Security Requirements Elicitation Using View Points for Online System","authors":"A. Agarwal, D. Gupta","doi":"10.1109/ICETET.2008.91","DOIUrl":"https://doi.org/10.1109/ICETET.2008.91","url":null,"abstract":"Security is of great concern for software engineering community for the development of online systems. To handle all the security issues properly we need to have well defined process for Security engineering and this process should be integrated with software development life cycle (SDLC). For integrating security engineering with SDLC the requirement engineers should have clearly understanding of what security requirements are and he/she is able to distinguish security requirements from various architectural and behavioral constraints. In this paper we go on to define a process for security requirements elicitation presenting techniques for activities like requirements discovery, analysis, prioritization and management. With true security requirements identified as early as possible and systematically identified, Architecture team can choose most appropriate mechanism to implement them.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125215550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Using Genetic Algorithm for Unit Testing of Object Oriented Software 遗传算法在面向对象软件单元测试中的应用
N. Gupta, Mukesh Kumar Rohil
Genetic algorithms have been successfully applied in the area of software testing. The demand for automation of test case generation in object oriented software testing is increasing. Genetic algorithms are well applied in procedural software testing but a little has been done in testing of object oriented software. In this paper, we propose a method to generate test cases for classes in object oriented software using a genetic programming approach. This method uses tree representation of statements in test cases. Strategies for encoding the test cases and using the objective function to evolve them as suitable test case are proposed.
遗传算法已成功地应用于软件测试领域。面向对象软件测试对测试用例生成自动化的要求越来越高。遗传算法在过程性软件测试中得到了很好的应用,但在面向对象软件测试中却很少得到应用。在本文中,我们提出了一种使用遗传编程方法为面向对象软件中的类生成测试用例的方法。该方法在测试用例中使用语句的树表示。提出了对测试用例进行编码并利用目标函数将其演化为合适的测试用例的策略。
{"title":"Using Genetic Algorithm for Unit Testing of Object Oriented Software","authors":"N. Gupta, Mukesh Kumar Rohil","doi":"10.1109/ICETET.2008.137","DOIUrl":"https://doi.org/10.1109/ICETET.2008.137","url":null,"abstract":"Genetic algorithms have been successfully applied in the area of software testing. The demand for automation of test case generation in object oriented software testing is increasing. Genetic algorithms are well applied in procedural software testing but a little has been done in testing of object oriented software. In this paper, we propose a method to generate test cases for classes in object oriented software using a genetic programming approach. This method uses tree representation of statements in test cases. Strategies for encoding the test cases and using the objective function to evolve them as suitable test case are proposed.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"414 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A High-Speed Radix-64 Parallel Multiplier Using a Novel Hardware Implementation Approach for Partial Product Generation Based on Redundant Binary Arithmetic 一种基于冗余二进制算法的部分积生成硬件实现方法的高速基数64并行乘法器
S. K. Sahoo, Abhijit Ashati, R. Sahoo, C. Shekhar
A high-speed radix-64 parallel multiplier using novel reduced delay partial product generator is proposed. The use of radix-64 Booth encoder and selector for partial product generation by Sang-Hoon (Sang-Hoon Lee et al., 2002) reduces the number of partial product rows by six fold. The Booth selector selects one among X, 2X, 3X, 4X, 8X, 16X, 24X and 32X where X is the multiplicand. Before selection 3X computation must be completed which accounts for maximum delay because of carry propagation or carry look ahead addition of X and 2X. In this work this fundamental coefficient is generated as 4X-X using redundant binary (RB) arithmetic. This leads to zero delay for 3X computation as well as simplifies the partial product rows accumulation. This novel method of partial product generation decreases delay by 24% in comparison to last high-speed reported parallel multiplier (Sang-Hoon Lee et al., 2002) using radix-64 Booth encoding.
提出了一种基于新型减延迟部分积发生器的高速64根并行乘法器。Sang-Hoon (Sang-Hoon Lee et al., 2002)使用radix-64 Booth编码器和选择器生成部分产品,将部分产品行数减少了六倍。展台选择器从X、2X、3X、4X、8X、16X、24X、32X中选择一个,其中X为乘数。在选择之前必须完成3X计算,这是由于X和2X的进位传播或进位前瞻相加造成的最大延迟。在这项工作中,这个基本系数是用冗余二进制(RB)算法生成的4X-X。这使得3X计算的延迟为零,并简化了部分乘积行累积。这种新颖的部分积生成方法与上一个高速并行乘法器(Sang-Hoon Lee et al., 2002)使用基数64 Booth编码相比,延迟减少了24%。
{"title":"A High-Speed Radix-64 Parallel Multiplier Using a Novel Hardware Implementation Approach for Partial Product Generation Based on Redundant Binary Arithmetic","authors":"S. K. Sahoo, Abhijit Ashati, R. Sahoo, C. Shekhar","doi":"10.1109/ICETET.2008.128","DOIUrl":"https://doi.org/10.1109/ICETET.2008.128","url":null,"abstract":"A high-speed radix-64 parallel multiplier using novel reduced delay partial product generator is proposed. The use of radix-64 Booth encoder and selector for partial product generation by Sang-Hoon (Sang-Hoon Lee et al., 2002) reduces the number of partial product rows by six fold. The Booth selector selects one among X, 2X, 3X, 4X, 8X, 16X, 24X and 32X where X is the multiplicand. Before selection 3X computation must be completed which accounts for maximum delay because of carry propagation or carry look ahead addition of X and 2X. In this work this fundamental coefficient is generated as 4X-X using redundant binary (RB) arithmetic. This leads to zero delay for 3X computation as well as simplifies the partial product rows accumulation. This novel method of partial product generation decreases delay by 24% in comparison to last high-speed reported parallel multiplier (Sang-Hoon Lee et al., 2002) using radix-64 Booth encoding.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient and Fast Parzen-Window Density Based Clustering Method for Large Data Sets 基于parzen窗密度的大数据集高效快速聚类方法
V. S. Babu, P. Viswanath
Density based clustering technique like DBSCAN finds arbitrary shaped clusters along with noisy outliers. DBSCAN finds the density at a point by counting the number of points falling in a sphere of radius epsi and it has a time complexity of O(n2). Hence it is not suitable for large data sets. The proposed method in this paper is an efficient and fast Parzen-Window density based clustering method which uses (i) prototypes to reduce the computational burden, (ii) a smooth kernel function to estimate density at a point and hence the estimated density is also varies smoothly. Enriched prototypes are derived using counted leaders method. These are used with a special form of the Gaussian kernel function which is radially symmetrical and hence the function can be completely specified by a variance parameter only. The proposed method is experimentally compared with DBSCAN which shows that it is a suitable method for large data sets.
像DBSCAN这样的基于密度的聚类技术可以发现任意形状的聚类以及有噪声的异常值。DBSCAN通过计算落在半径为epsi的球体上的点的数量来确定某一点的密度,它的时间复杂度为0 (n2)。因此,它不适合大型数据集。本文提出的方法是一种高效、快速的基于Parzen-Window密度的聚类方法,该方法利用原型来减少计算量,利用光滑的核函数来估计某一点的密度,因此估计的密度也平滑变化。利用计数导元法推导了丰富的原型。它们与高斯核函数的一种特殊形式一起使用,它是径向对称的,因此函数可以完全由方差参数指定。将该方法与DBSCAN进行了实验比较,结果表明该方法适用于大数据集。
{"title":"An Efficient and Fast Parzen-Window Density Based Clustering Method for Large Data Sets","authors":"V. S. Babu, P. Viswanath","doi":"10.1109/ICETET.2008.166","DOIUrl":"https://doi.org/10.1109/ICETET.2008.166","url":null,"abstract":"Density based clustering technique like DBSCAN finds arbitrary shaped clusters along with noisy outliers. DBSCAN finds the density at a point by counting the number of points falling in a sphere of radius epsi and it has a time complexity of O(n2). Hence it is not suitable for large data sets. The proposed method in this paper is an efficient and fast Parzen-Window density based clustering method which uses (i) prototypes to reduce the computational burden, (ii) a smooth kernel function to estimate density at a point and hence the estimated density is also varies smoothly. Enriched prototypes are derived using counted leaders method. These are used with a special form of the Gaussian kernel function which is radially symmetrical and hence the function can be completely specified by a variance parameter only. The proposed method is experimentally compared with DBSCAN which shows that it is a suitable method for large data sets.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114806208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intelligent Fuzzy Decision Making for Subjective Answer Evaluation Using Utility Functions 基于效用函数的主观答案评价智能模糊决策
Ani Thomas, M. Kowar, Sanjay Sharma
Fuzzy systems offer numerous methods that prove helpful in solving application problems, where the governing parameters bear fuzziness in nature. In particular, many variants of fuzzy decision making models have been successfully explored as vocational guidance systems to assist decision makers in recognition and guidance processes, specially in the Medical diagnostic realm. In the present communication, an attempt is made to unreveal the fact that even the precisely chosen text fragments from a closed world domain incorporate the fuzzy boundaries among their term-to-term associations for machine-assisted acquisition and subsequent evaluation of Natural Language Semantics of that domain. This inspires further, to provide a decision-making tool that assists the Academicians in assessing the online submitted subjective answers at the candidatespsila end.
模糊系统提供了许多方法,证明有助于解决控制参数具有模糊性的应用问题。特别是,模糊决策模型的许多变体已被成功地探索作为职业指导系统,以协助决策者在识别和指导过程中,特别是在医学诊断领域。在当前的交流中,我们试图揭示这样一个事实,即即使是从封闭世界领域中精确选择的文本片段,也会在它们的术语到术语关联中包含模糊边界,以便机器辅助获取和随后对该领域的自然语言语义进行评估。这进一步激发了提供一个决策工具,帮助院士在候选人端评估在线提交的主观答案。
{"title":"Intelligent Fuzzy Decision Making for Subjective Answer Evaluation Using Utility Functions","authors":"Ani Thomas, M. Kowar, Sanjay Sharma","doi":"10.1109/ICETET.2008.216","DOIUrl":"https://doi.org/10.1109/ICETET.2008.216","url":null,"abstract":"Fuzzy systems offer numerous methods that prove helpful in solving application problems, where the governing parameters bear fuzziness in nature. In particular, many variants of fuzzy decision making models have been successfully explored as vocational guidance systems to assist decision makers in recognition and guidance processes, specially in the Medical diagnostic realm. In the present communication, an attempt is made to unreveal the fact that even the precisely chosen text fragments from a closed world domain incorporate the fuzzy boundaries among their term-to-term associations for machine-assisted acquisition and subsequent evaluation of Natural Language Semantics of that domain. This inspires further, to provide a decision-making tool that assists the Academicians in assessing the online submitted subjective answers at the candidatespsila end.","PeriodicalId":269929,"journal":{"name":"2008 First International Conference on Emerging Trends in Engineering and Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2008 First International Conference on Emerging Trends in Engineering and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1