首页 > 最新文献

2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)最新文献

英文 中文
Map Reduce by K-Nearest Neighbor Joins 通过k近邻连接映射约简
Srikanth Bethu, B. Babu, S. G. Rao, R. Florence
Knowledge discovery and Data mining plays a major role in computational intensive tasks with high range of applications. With the increase of volume and dimension of data, the distributed features perform operations in a reasonable period. MapReduce programming is suitable for distributed large scale data processing that provides different ways of solutions to the same problem, that (one) has particular constraints and properties. In this paper, we give comparative analysis and its approaches for computing KNN on MapReduce[1] theoretically and experimental evaluation. Load balancing, accuracy and complexity are analyzed on each step of data preprocessing, data partitioning and computation. The experiment results in this are produced by using variety of datasets. Time and Space complexity are analyzed periodically on each dataset and gives new advantages and short comings that are discussed for each algorithm. Finally this paper can be used as a reference material to handle KNN [2] based problems in the idea of Mapreducing in Big Data.
知识发现和数据挖掘在应用范围广的计算密集型任务中起着重要作用。随着数据量和维数的增加,分布式特征在合理的周期内执行操作。MapReduce编程适用于分布式大规模数据处理,它为相同的问题提供了不同的解决方案,并且(一个)具有特定的约束和属性。本文对MapReduce[1]上的KNN计算方法进行了理论分析和实验评价。分析了数据预处理、数据划分和计算各步骤的负载均衡、精度和复杂度。实验结果是通过使用不同的数据集得出的。对每个数据集的时间和空间复杂度进行了周期性分析,并给出了每个算法的优点和缺点。最后,本文可以作为在大数据中mapreduce思想下处理基于KNN[2]的问题的参考材料。
{"title":"Map Reduce by K-Nearest Neighbor Joins","authors":"Srikanth Bethu, B. Babu, S. G. Rao, R. Florence","doi":"10.1109/CYBERC.2018.00050","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00050","url":null,"abstract":"Knowledge discovery and Data mining plays a major role in computational intensive tasks with high range of applications. With the increase of volume and dimension of data, the distributed features perform operations in a reasonable period. MapReduce programming is suitable for distributed large scale data processing that provides different ways of solutions to the same problem, that (one) has particular constraints and properties. In this paper, we give comparative analysis and its approaches for computing KNN on MapReduce[1] theoretically and experimental evaluation. Load balancing, accuracy and complexity are analyzed on each step of data preprocessing, data partitioning and computation. The experiment results in this are produced by using variety of datasets. Time and Space complexity are analyzed periodically on each dataset and gives new advantages and short comings that are discussed for each algorithm. Finally this paper can be used as a reference material to handle KNN [2] based problems in the idea of Mapreducing in Big Data.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133840334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Asymmetric Cryptography Based Unidirectional Authentication Method for RFID 基于非对称密码的RFID单向认证方法
Zhongke Li, H. Zhao, Xiaoping Su, C. Wan
A novel unidirectional authentication method is proposed to solve the problems of access security and to protect the privacy of the tag in RFID ecosystems on basis of asymmetric cryptography. It provides better security with shorter length of secret key and lower computational cost in contrast to other methods of asymmetric cryptographies. This method implements one-way authentication from the reader-writer to the tag, and allows the tag to update its private key to improve the security of RFID authentication. This method also allows the tag to update its own name, which can keep the attackers from tracking the tag so as to solve the privacy protection of the tags.
为了解决RFID生态系统中标签的访问安全和隐私保护问题,提出了一种基于非对称加密的单向认证方法。与其他非对称加密方法相比,它具有更短的密钥长度和更低的计算成本,具有更好的安全性。该方法实现了从读写器到标签的单向身份验证,并允许标签更新其私钥,提高了RFID身份验证的安全性。这种方法还允许标签更新自己的名称,这样可以防止攻击者跟踪标签,从而解决标签的隐私保护问题。
{"title":"Asymmetric Cryptography Based Unidirectional Authentication Method for RFID","authors":"Zhongke Li, H. Zhao, Xiaoping Su, C. Wan","doi":"10.1109/CYBERC.2018.00073","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00073","url":null,"abstract":"A novel unidirectional authentication method is proposed to solve the problems of access security and to protect the privacy of the tag in RFID ecosystems on basis of asymmetric cryptography. It provides better security with shorter length of secret key and lower computational cost in contrast to other methods of asymmetric cryptographies. This method implements one-way authentication from the reader-writer to the tag, and allows the tag to update its private key to improve the security of RFID authentication. This method also allows the tag to update its own name, which can keep the attackers from tracking the tag so as to solve the privacy protection of the tags.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drone Detection Based on FD-HOG Descriptor 基于FD-HOG描述符的无人机检测
Zizhe Wang, L. Qi, Tie Yun, Yi Ding, Yang Bai
The rapid development of Unmanned Aerial Vehicle (UAV) technology, also known as drones, has made people benefit in many ways, but it also brings privacy and security issues, such as appeared at private place, airports, prisons, etc. Therefore, the detection of drones in a specific area is crucial. Video detection is an effective method with various advantages. In this paper, we have used the background subtraction method to detect the moving object in the video sequence which recorded by static cameras, then extracted the global Fourier descriptors and the local HOG features of the moving object images. Finally, the FD+HOG features have been sent to the SVM classifier for classification and recognition. Our algorithm is simple and efficient, an overall with 98% accuracy was obtained in our data set.
无人驾驶飞行器(UAV)技术的飞速发展,在给人们带来诸多好处的同时,也带来了隐私和安全问题,如出现在私人场所、机场、监狱等。因此,在特定区域检测无人机至关重要。视频检测是一种有效的检测方法,具有多种优点。本文采用背景减法检测静态摄像机记录的视频序列中的运动目标,提取运动目标图像的全局傅里叶描述子和局部HOG特征。最后将FD+HOG特征发送给SVM分类器进行分类识别。我们的算法简单高效,在我们的数据集上获得了98%的准确率。
{"title":"Drone Detection Based on FD-HOG Descriptor","authors":"Zizhe Wang, L. Qi, Tie Yun, Yi Ding, Yang Bai","doi":"10.1109/CYBERC.2018.00084","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00084","url":null,"abstract":"The rapid development of Unmanned Aerial Vehicle (UAV) technology, also known as drones, has made people benefit in many ways, but it also brings privacy and security issues, such as appeared at private place, airports, prisons, etc. Therefore, the detection of drones in a specific area is crucial. Video detection is an effective method with various advantages. In this paper, we have used the background subtraction method to detect the moving object in the video sequence which recorded by static cameras, then extracted the global Fourier descriptors and the local HOG features of the moving object images. Finally, the FD+HOG features have been sent to the SVM classifier for classification and recognition. Our algorithm is simple and efficient, an overall with 98% accuracy was obtained in our data set.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of the Impact of Denial of Service Attacks on the Group of Robots 拒绝服务攻击对机器人群的影响分析
E. Basan, M. Medvedev, Stanislav Teterevyatnikov
this research is devoted to the analysis of the effect of denial of service attacks on a set of specific parameters of mobile robot network nodes. This analysis made it possible to understand what parameters are appropriate to evaluate for detecting attacks. Another goal of the study was to develop a methodology for instrumental verification of the security of a group of mobile robots. For the testing of mobile robots, a device was developed based on a single-board computer, the Raspberry Pi. This device is a universal portable test device for wireless networks, both from external and internal networks. As a result of the experimental study, the set of parameters was influenced by the attacks: CPU, RAM (MB), CPU temp (°C), Power consumption (mAh), Number of packages. Analyzing these metrics of the attacker and the victim can be found. Furthermore, the effectiveness of the attack can be assessed. As a result of the research, a set of tools were identified that are best suited for the implementation of attacks.
本研究致力于分析拒绝服务攻击对移动机器人网络节点的一组特定参数的影响。通过分析,可以了解哪些参数适合用于检测攻击。该研究的另一个目标是开发一种方法,用于仪器验证一组移动机器人的安全性。为了测试移动机器人,开发了一种基于单板计算机的设备,树莓派。该设备是一种通用的便携式无线网络测试设备,可用于外部和内部网络。实验研究的结果是,受攻击影响的参数集:CPU、RAM (MB)、CPU温度(°C)、功耗(mAh)、封装数量。分析攻击者和受害者的这些指标可以找到。此外,还可以评估攻击的有效性。作为研究的结果,我们确定了一组最适合实施攻击的工具。
{"title":"Analysis of the Impact of Denial of Service Attacks on the Group of Robots","authors":"E. Basan, M. Medvedev, Stanislav Teterevyatnikov","doi":"10.1109/CYBERC.2018.00023","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00023","url":null,"abstract":"this research is devoted to the analysis of the effect of denial of service attacks on a set of specific parameters of mobile robot network nodes. This analysis made it possible to understand what parameters are appropriate to evaluate for detecting attacks. Another goal of the study was to develop a methodology for instrumental verification of the security of a group of mobile robots. For the testing of mobile robots, a device was developed based on a single-board computer, the Raspberry Pi. This device is a universal portable test device for wireless networks, both from external and internal networks. As a result of the experimental study, the set of parameters was influenced by the attacks: CPU, RAM (MB), CPU temp (°C), Power consumption (mAh), Number of packages. Analyzing these metrics of the attacker and the victim can be found. Furthermore, the effectiveness of the attack can be assessed. As a result of the research, a set of tools were identified that are best suited for the implementation of attacks.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on Vehicle Taillight Detection and Semantic Recognition Based on Internet of Vehicle 基于车联网的汽车尾灯检测与语义识别研究
Zhenzhou Wang, Wei Huo, Pingping Yu, Lin Qi, Ning Cao
Internet of Things(IOT) technology provides sufficient information technology and necessary decision-making basis for intelligent transportation. Internet of vehicles(IOV) is based on the architecture of the perception layer, network layer, and application layer. This article focuses on the tail light status in the perception layer of automotive active safety systems and proposes a method of vehicle taillamp detection and recognition based on active contour extraction and color feature analysis to solve the problem of information perception against the front vehicle. First, the front vehicles are detected and extracted by convolutional neural network and active contour models. Second, it analyzes the characteristics of taillamp pair and then segment the correct taillamp pair by color space conversion and location correlation principle. On this basis, the histograms distribution of taillamp are analyzed in different states and complete the recognition of taillamp. The experimental results show that the method can accurately identify the taillamp signal of the front vehicle in the daytime and effectively reduce the rate of false judgement caused by light interference.
物联网技术为智能交通提供了充分的信息技术和必要的决策依据。车联网(Internet of vehicle, IOV)是基于感知层、网络层和应用层的架构。本文以汽车主动安全系统感知层中的尾灯状态为研究对象,提出了一种基于主动轮廓提取和颜色特征分析的汽车尾灯检测与识别方法,解决了对前车的信息感知问题。首先,利用卷积神经网络和主动轮廓模型对前方车辆进行检测和提取;其次,分析尾灯对的特征,利用颜色空间转换和位置相关原理分割出正确的尾灯对;在此基础上,分析不同状态下尾灯的直方图分布,完成尾灯的识别。实验结果表明,该方法能准确识别白天前车尾灯信号,有效降低光干扰造成的误判断率。
{"title":"Research on Vehicle Taillight Detection and Semantic Recognition Based on Internet of Vehicle","authors":"Zhenzhou Wang, Wei Huo, Pingping Yu, Lin Qi, Ning Cao","doi":"10.1109/CYBERC.2018.00038","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00038","url":null,"abstract":"Internet of Things(IOT) technology provides sufficient information technology and necessary decision-making basis for intelligent transportation. Internet of vehicles(IOV) is based on the architecture of the perception layer, network layer, and application layer. This article focuses on the tail light status in the perception layer of automotive active safety systems and proposes a method of vehicle taillamp detection and recognition based on active contour extraction and color feature analysis to solve the problem of information perception against the front vehicle. First, the front vehicles are detected and extracted by convolutional neural network and active contour models. Second, it analyzes the characteristics of taillamp pair and then segment the correct taillamp pair by color space conversion and location correlation principle. On this basis, the histograms distribution of taillamp are analyzed in different states and complete the recognition of taillamp. The experimental results show that the method can accurately identify the taillamp signal of the front vehicle in the daytime and effectively reduce the rate of false judgement caused by light interference.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129350196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Usage Demand Forecast and Quantity Recommendation for Urban Shared Bicycles 城市共享单车使用需求预测及数量建议
Yifeng Cui, Weifeng Lv, Qing Wang, Bowen Du
The rise and wide use of urban shared bicycles brings great convenience to residents' daily trips. However, as the number of shared bicycles continues to increase in the city, more and more shared bicycles are being allocated unreasonably, which has a great impact on the public transportation and city appearance. To solve this problem, in this paper, we focus on the recommendation of the number of shared bicycles near the subway station and take the volume of the station's outbound passenger flow as the potential demand to study. Along this line, we first collect and investigate the subway traffic data which are gathered by automated fare collection(AFC) systems and some related feature data as the basic data source for the demand prediction. Second, upon these data, we develop a novel passenger flow forecast model based on an advanced Xgboost method and the idea of sliding window. Combined with the predicted results, we then design a method to transform the passenger flow results into an usage demand index and recommend a suitable number of shared bicycles for a specific subway station by it. Finally, we conduct a series of experiments with a variety of real-world data, and the results demonstrate our model can achieve a better performance and give us a reasonable quantity recommendation.
城市共享单车的兴起和广泛使用给居民的日常出行带来了极大的便利。然而,随着城市中共享单车数量的不断增加,越来越多的共享单车被不合理地分配,这对公共交通和城市面貌产生了很大的影响。为了解决这一问题,本文以地铁站附近的共享单车数量推荐为研究重点,以地铁站出站客流量作为潜在需求进行研究。在此基础上,首先对自动收费站(AFC)采集的地铁交通数据及相关特征数据进行收集和研究,作为需求预测的基础数据源。其次,在这些数据的基础上,我们基于先进的Xgboost方法和滑动窗口的思想建立了一种新的客流预测模型。结合预测结果,设计了一种方法,将客流结果转化为使用需求指数,并以此为特定地铁站推荐合适的共享单车数量。最后,我们用各种真实的数据进行了一系列的实验,结果表明我们的模型可以达到更好的性能,并给出了合理的数量推荐。
{"title":"Usage Demand Forecast and Quantity Recommendation for Urban Shared Bicycles","authors":"Yifeng Cui, Weifeng Lv, Qing Wang, Bowen Du","doi":"10.1109/CYBERC.2018.00052","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00052","url":null,"abstract":"The rise and wide use of urban shared bicycles brings great convenience to residents' daily trips. However, as the number of shared bicycles continues to increase in the city, more and more shared bicycles are being allocated unreasonably, which has a great impact on the public transportation and city appearance. To solve this problem, in this paper, we focus on the recommendation of the number of shared bicycles near the subway station and take the volume of the station's outbound passenger flow as the potential demand to study. Along this line, we first collect and investigate the subway traffic data which are gathered by automated fare collection(AFC) systems and some related feature data as the basic data source for the demand prediction. Second, upon these data, we develop a novel passenger flow forecast model based on an advanced Xgboost method and the idea of sliding window. Combined with the predicted results, we then design a method to transform the passenger flow results into an usage demand index and recommend a suitable number of shared bicycles for a specific subway station by it. Finally, we conduct a series of experiments with a variety of real-world data, and the results demonstrate our model can achieve a better performance and give us a reasonable quantity recommendation.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
3D Indoor Localization Mechanism Based on Multiple Sensors 基于多传感器的室内三维定位机制
Shijun Chen, Dawei Chen, Yuanyuan Wang, Xinxin Liu
In unfamiliar complicated high-rise building, users not only have to understand the 2D plane location information of floor, but also need to obtain the Z axis information of floor. According to this requirement, we proposed a 3D indoor localization mechanism based on multi-sensor, which integrates the air pressure examination and geomagnetic examination information to assist inertial navigation for calibration, and conduct integrated processing of examined information. The mechanism is based on the dynamic air pressure floor discrimination model, and according to the actual current floor, average time spent by passing each floor and the height of each floor, determine the floor of user in a real-time manner; according to the standard geomagnetic information data of floor, compute the geomagnetic coordinates of current location based on the geomagnetic realtime localization model, and obtain the floor of personnel and the plane location on the floor in a real-time manner. During the localization process of mechanism, it does not require additional hardware equipment or network signal, but only needs the air pressure gauge sensor and geomagnetic sensor to complete the indoor 3D real-time localization of building, which is convenient in practical application with broad adaptability.
在不熟悉的复杂高层建筑中,用户不仅需要了解楼层的二维平面位置信息,还需要获取楼层的Z轴信息。根据这一需求,我们提出了一种基于多传感器的室内三维定位机制,整合气压检测和地磁检测信息辅助惯性导航进行标定,并对检测信息进行综合处理。该机构基于动态气压楼层判别模型,根据当前实际楼层、通过各楼层的平均时间和各楼层的高度,实时确定用户所在楼层;根据楼层标准地磁信息数据,基于地磁实时定位模型计算当前位置的地磁坐标,实时获取楼层人员及楼层平面位置。在机构定位过程中,不需要额外的硬件设备或网络信号,只需要气压计传感器和地磁传感器即可完成建筑物室内三维实时定位,实际应用方便,适应性广。
{"title":"3D Indoor Localization Mechanism Based on Multiple Sensors","authors":"Shijun Chen, Dawei Chen, Yuanyuan Wang, Xinxin Liu","doi":"10.1109/CYBERC.2018.00097","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00097","url":null,"abstract":"In unfamiliar complicated high-rise building, users not only have to understand the 2D plane location information of floor, but also need to obtain the Z axis information of floor. According to this requirement, we proposed a 3D indoor localization mechanism based on multi-sensor, which integrates the air pressure examination and geomagnetic examination information to assist inertial navigation for calibration, and conduct integrated processing of examined information. The mechanism is based on the dynamic air pressure floor discrimination model, and according to the actual current floor, average time spent by passing each floor and the height of each floor, determine the floor of user in a real-time manner; according to the standard geomagnetic information data of floor, compute the geomagnetic coordinates of current location based on the geomagnetic realtime localization model, and obtain the floor of personnel and the plane location on the floor in a real-time manner. During the localization process of mechanism, it does not require additional hardware equipment or network signal, but only needs the air pressure gauge sensor and geomagnetic sensor to complete the indoor 3D real-time localization of building, which is convenient in practical application with broad adaptability.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127287091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structural Exploration of Chinese Character Combination Networks 汉字组合网络的结构探索
Deshun Zhao, Kun Zhao, Jun Yang, Wei-yi Ma, Bo Yu
In this paper, we learn the statistical properties of Chinese character networks within the framework of complex network theory. We construct two Chinese character networks (CCN1 and CCN2) based on 7000 Modern Chinese characters in common use from different respects. In CCN1, a link between two nodes (each node correspond to one Chinese character) represents that one node is a component part of the other. In CCN2, a link represents that the two nodes can be combined into a new node. It is found that, both in CCN1 and CCN2, there are some common features such as small-world effect, scale-free behavior, hierarchical organization and disassortative mixing. These results effectively explain the origin and formation of Chinese characters, which is absolutely helpful in understanding and using Chinese characters.
本文在复杂网络理论的框架下,研究了汉字网络的统计特性。本文以7000个现代常用汉字为基础,从不同方面构建了CCN1和CCN2两个汉字网络。在CCN1中,两个节点(每个节点对应一个汉字)之间的链接表示一个节点是另一个节点的组成部分。在CCN2中,一条链路代表两个节点可以合并成一个新的节点。研究发现,CCN1和CCN2具有小世界效应、无标度行为、分层组织和非分类混合等共同特征。这些结果有效地解释了汉字的起源和形成,对理解和使用汉字有绝对的帮助。
{"title":"Structural Exploration of Chinese Character Combination Networks","authors":"Deshun Zhao, Kun Zhao, Jun Yang, Wei-yi Ma, Bo Yu","doi":"10.1109/CYBERC.2018.00040","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00040","url":null,"abstract":"In this paper, we learn the statistical properties of Chinese character networks within the framework of complex network theory. We construct two Chinese character networks (CCN1 and CCN2) based on 7000 Modern Chinese characters in common use from different respects. In CCN1, a link between two nodes (each node correspond to one Chinese character) represents that one node is a component part of the other. In CCN2, a link represents that the two nodes can be combined into a new node. It is found that, both in CCN1 and CCN2, there are some common features such as small-world effect, scale-free behavior, hierarchical organization and disassortative mixing. These results effectively explain the origin and formation of Chinese characters, which is absolutely helpful in understanding and using Chinese characters.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129084869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ground Robot Path Planning Based on Simulated Annealing Genetic Algorithm 基于模拟退火遗传算法的地面机器人路径规划
Lanfei Wang, Jun Guo, Qu Wang (王曲), Jiangming Kan
Robot path planning is the key to robot navigation. We implemented the robot path planning based on ant colony algorithm and genetic algorithm, and proposed simulated annealing genetic algorithm. Under the condition that there is not much difference in running time (within 3 seconds), planning results of different terrains, start and end points based on ant colony algorithm(with 200 iterations)and simulated annealing genetic algorithm show that, the optimal path outputted by simulated annealing genetic algorithm is better than the optimal path outputted by ant colony algorithm in terms of avoiding obstacles; The simulated annealing genetic algorithm has shorter average optimal path length than ant colony algorithm in multiple tests, the average path length is reduced by 6.85%.
机器人路径规划是机器人导航的关键。基于蚁群算法和遗传算法实现了机器人路径规划,提出了模拟退火遗传算法。在运行时间相差不大(3秒以内)的情况下,基于蚁群算法(200次迭代)和模拟退火遗传算法对不同地形、起止点的规划结果表明,模拟退火遗传算法输出的最优路径在避障方面优于蚁群算法输出的最优路径;在多次测试中,模拟退火遗传算法的平均最优路径长度比蚁群算法短,平均路径长度减少6.85%。
{"title":"Ground Robot Path Planning Based on Simulated Annealing Genetic Algorithm","authors":"Lanfei Wang, Jun Guo, Qu Wang (王曲), Jiangming Kan","doi":"10.1109/CYBERC.2018.00081","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00081","url":null,"abstract":"Robot path planning is the key to robot navigation. We implemented the robot path planning based on ant colony algorithm and genetic algorithm, and proposed simulated annealing genetic algorithm. Under the condition that there is not much difference in running time (within 3 seconds), planning results of different terrains, start and end points based on ant colony algorithm(with 200 iterations)and simulated annealing genetic algorithm show that, the optimal path outputted by simulated annealing genetic algorithm is better than the optimal path outputted by ant colony algorithm in terms of avoiding obstacles; The simulated annealing genetic algorithm has shorter average optimal path length than ant colony algorithm in multiple tests, the average path length is reduced by 6.85%.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Spark Load Balancing Strategy Optimization Based on Internet of Things 基于物联网的Spark负载均衡策略优化
Suzhen Wang, Lu Zhang, Yanpiao Zhang, Ning Cao
The data collected by the Internet of Things (IOT) technology is becoming larger and larger, and the traditional data processing methods have encountered tremendous challenges. Spark, as a memory-based distributed computing framework, provides support for the data processing of the IOT. Load balancing is an important indicator to measure the performance of Spark computing. The load balancing strategy of Spark cluster only takes into account the locality of data, and neglects the computing capability and resource utilization of each node, which is prone to load unbalance and affecting the IOT data processing efficiency. Aiming at this issue, this paper optimizes and improves the current load balancing strategy of Spark based on the computing performance of each node in the Spark cluster, and proposes a task execution node assignment algorithm based on genetic algorithm and particle swarm optimization (TENAA). Experiments show that, compared with the Spark load balancing strategy, the load balancing strategy proposed in this paper has a significant increase both in load deviation and task completion time.
物联网(IOT)技术采集的数据量越来越大,传统的数据处理方法遇到了巨大的挑战。Spark作为一个基于内存的分布式计算框架,为物联网的数据处理提供支持。负载均衡是衡量Spark计算性能的重要指标。Spark集群的负载均衡策略只考虑了数据的局部性,忽略了每个节点的计算能力和资源利用率,容易出现负载不均衡,影响物联网数据处理效率。针对这一问题,本文基于Spark集群中每个节点的计算性能,对Spark当前的负载均衡策略进行了优化和改进,提出了一种基于遗传算法和粒子群优化(TENAA)的任务执行节点分配算法。实验表明,与Spark负载均衡策略相比,本文提出的负载均衡策略在负载偏差和任务完成时间上都有显著提高。
{"title":"Spark Load Balancing Strategy Optimization Based on Internet of Things","authors":"Suzhen Wang, Lu Zhang, Yanpiao Zhang, Ning Cao","doi":"10.1109/CYBERC.2018.00025","DOIUrl":"https://doi.org/10.1109/CYBERC.2018.00025","url":null,"abstract":"The data collected by the Internet of Things (IOT) technology is becoming larger and larger, and the traditional data processing methods have encountered tremendous challenges. Spark, as a memory-based distributed computing framework, provides support for the data processing of the IOT. Load balancing is an important indicator to measure the performance of Spark computing. The load balancing strategy of Spark cluster only takes into account the locality of data, and neglects the computing capability and resource utilization of each node, which is prone to load unbalance and affecting the IOT data processing efficiency. Aiming at this issue, this paper optimizes and improves the current load balancing strategy of Spark based on the computing performance of each node in the Spark cluster, and proposes a task execution node assignment algorithm based on genetic algorithm and particle swarm optimization (TENAA). Experiments show that, compared with the Spark load balancing strategy, the load balancing strategy proposed in this paper has a significant increase both in load deviation and task completion time.","PeriodicalId":282903,"journal":{"name":"2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1