首页 > 最新文献

2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)最新文献

英文 中文
Performance analysis of student learning metric using K-mean clustering approach K-mean cluster 基于k -均值聚类方法的学生学习绩效分析
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508140
S. Shankar, Bishal Dey Sarkar, S. Sabitha, D. Mehrotra
The large volume of data in all fields across the globe has to be managed and is used by the decision makers to obtain something productive out of it. The big data of 14000×5 of Harvard University online course is analysed to find the performance metrics of registered students from different countries by means of K-mean clustering method. The performance of the student depends on number of factors and grades are not enough to represent the all-round knowledge of a student. The paper aims to analyse the performance of the students based on different attributes with respect to their country.
全球所有领域的大量数据都必须进行管理,并由决策者使用,以从中获得一些富有成效的东西。对哈佛大学在线课程14000×5的大数据进行分析,利用k -均值聚类方法找到不同国家注册学生的绩效指标。学生的表现取决于许多因素,成绩不足以代表学生的全面知识。本文旨在分析学生在不同国家的不同属性下的表现。
{"title":"Performance analysis of student learning metric using K-mean clustering approach K-mean cluster","authors":"S. Shankar, Bishal Dey Sarkar, S. Sabitha, D. Mehrotra","doi":"10.1109/CONFLUENCE.2016.7508140","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508140","url":null,"abstract":"The large volume of data in all fields across the globe has to be managed and is used by the decision makers to obtain something productive out of it. The big data of 14000×5 of Harvard University online course is analysed to find the performance metrics of registered students from different countries by means of K-mean clustering method. The performance of the student depends on number of factors and grades are not enough to represent the all-round knowledge of a student. The paper aims to analyse the performance of the students based on different attributes with respect to their country.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123611602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Metaheuristics memes and biogeography for transcomputational combinatorial optimization problems 跨计算组合优化问题的元启发式模因和生物地理学
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508037
S. Rodzin, O. Rodzina
The article discusses the elements of the theory of population metaheuristics. Original and biogeographical memetic algorithms for solving transcomputational optimization problem are presented for the traveling salesman problem. Authors presented the method of biogeography and its modifications, as well as results of the comparative analysis of genetic, biogeographic and memetic algorithms. Experiments were carried out on certain benchmarks from the library TSPLIB. Efficiency, operating time and the diversity of the population were the criteria for comparison algorithms mentioned above.
本文讨论了人口元启发式理论的构成要素。针对旅行商问题,提出了求解跨计算优化问题的原始模因算法和生物地理模因算法。介绍了生物地理学方法及其改进,并对遗传算法、生物地理学算法和模因算法进行了比较分析。在TSPLIB库的某些基准上进行了实验。效率、操作时间和种群多样性是上述比较算法的标准。
{"title":"Metaheuristics memes and biogeography for transcomputational combinatorial optimization problems","authors":"S. Rodzin, O. Rodzina","doi":"10.1109/CONFLUENCE.2016.7508037","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508037","url":null,"abstract":"The article discusses the elements of the theory of population metaheuristics. Original and biogeographical memetic algorithms for solving transcomputational optimization problem are presented for the traveling salesman problem. Authors presented the method of biogeography and its modifications, as well as results of the comparative analysis of genetic, biogeographic and memetic algorithms. Experiments were carried out on certain benchmarks from the library TSPLIB. Efficiency, operating time and the diversity of the population were the criteria for comparison algorithms mentioned above.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127917889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Outlier Detection: Applications and techniques in Data Mining 异常值检测:数据挖掘中的应用与技术
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508146
Rashi Bansal, Nishant Gaur, S. Singh
Outlier Detection is one of the major issues in Data Mining; finding outliers from a collection of patterns is a popular problem in the field of data mining. An outlier is that pattern which is dissimilar with respect to all the remaining patterns in the data set. Outlier detection is quiet familiar area of research in mining of data set. It is a quiet important task in various application domains. Earlier outliers considered as noisy data, has now become severe difficulty which has been discovered in various domains of research. The discovery of outlier is useful in detection of unpredicted and unidentified data, in certain areas like fraud detection of credit cards, calling cards, discovering computer intrusion and criminal behaviors etc. A number of surveys, research and review articles cover outlier detection techniques in great details. Here in this review paper, my effort is to take as one several techniques of outlier detection. By this attempt, we wish to gain a improved perceptive of various research on outlier detection and analysis for our well-being as well as for those who are the beginners in this field, so that they can easily pickup the links in details.
异常点检测是数据挖掘中的主要问题之一;从模式集合中找到异常值是数据挖掘领域的一个热门问题。异常值是指与数据集中所有其他模式不同的模式。离群点检测是数据集挖掘中比较常见的研究领域。它在各个应用领域都是一项非常重要的任务。早期的异常值被认为是有噪声的数据,现在已经成为各个研究领域发现的严重难题。异常值的发现在检测不可预测和未识别的数据时非常有用,在某些领域,如信用卡、电话卡的欺诈检测、发现计算机入侵和犯罪行为等。许多调查、研究和评论文章非常详细地介绍了异常值检测技术。在这篇综述文章中,我的努力是把离群值检测作为几种技术之一。通过这一尝试,我们希望能够更好地了解各种关于离群值检测和分析的研究,这些研究不仅是为了我们的福祉,也是为了这个领域的初学者,这样他们就可以很容易地找到细节上的联系。
{"title":"Outlier Detection: Applications and techniques in Data Mining","authors":"Rashi Bansal, Nishant Gaur, S. Singh","doi":"10.1109/CONFLUENCE.2016.7508146","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508146","url":null,"abstract":"Outlier Detection is one of the major issues in Data Mining; finding outliers from a collection of patterns is a popular problem in the field of data mining. An outlier is that pattern which is dissimilar with respect to all the remaining patterns in the data set. Outlier detection is quiet familiar area of research in mining of data set. It is a quiet important task in various application domains. Earlier outliers considered as noisy data, has now become severe difficulty which has been discovered in various domains of research. The discovery of outlier is useful in detection of unpredicted and unidentified data, in certain areas like fraud detection of credit cards, calling cards, discovering computer intrusion and criminal behaviors etc. A number of surveys, research and review articles cover outlier detection techniques in great details. Here in this review paper, my effort is to take as one several techniques of outlier detection. By this attempt, we wish to gain a improved perceptive of various research on outlier detection and analysis for our well-being as well as for those who are the beginners in this field, so that they can easily pickup the links in details.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Digital audio watermarking scheme using Harmony Search Algorithm 基于和谐搜索算法的数字音频水印方案
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508168
Rajni, Kajal, Ankur Choudhary, A. Singhal
Harmony Search Algorithm is one of the best optimization algorithm known, due to its capability of escaping the local optima and divergence free behaviour. In this paper, an optimized audio watermarking technique based on harmony search algorithm is presented. The watermark is embedded using dither modulation of the host audio signal blocks. High imperceptibility is proved to be achieved by the proposed technique through subjective test. Moreover, the technique is quite robust against variety of attacks including resampling attack, low-pass filtering, requantization and cropping effect. To improve the robustness and imperceptibility, harmony search technique has been applied on user defined quantization parameter.
和谐搜索算法是目前已知的最佳优化算法之一,因为它具有逃避局部最优和无散度的能力。本文提出了一种基于和声搜索算法的优化音频水印技术。水印是利用主机音频信号块的抖动调制嵌入的。通过主观测试,证明了该方法具有较高的隐蔽性。此外,该技术对重采样攻击、低通滤波、需求化和裁剪效应等多种攻击具有很强的鲁棒性。为了提高量化参数的鲁棒性和不可感知性,在自定义量化参数上应用了和声搜索技术。
{"title":"Digital audio watermarking scheme using Harmony Search Algorithm","authors":"Rajni, Kajal, Ankur Choudhary, A. Singhal","doi":"10.1109/CONFLUENCE.2016.7508168","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508168","url":null,"abstract":"Harmony Search Algorithm is one of the best optimization algorithm known, due to its capability of escaping the local optima and divergence free behaviour. In this paper, an optimized audio watermarking technique based on harmony search algorithm is presented. The watermark is embedded using dither modulation of the host audio signal blocks. High imperceptibility is proved to be achieved by the proposed technique through subjective test. Moreover, the technique is quite robust against variety of attacks including resampling attack, low-pass filtering, requantization and cropping effect. To improve the robustness and imperceptibility, harmony search technique has been applied on user defined quantization parameter.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"38 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122509153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PDF Not Yet Available In IEEE Xplore PDF尚未在IEEE explore中提供
The document that should appear here is not currently available.
这里应该出现的文档目前不可用。
{"title":"PDF Not Yet Available In IEEE Xplore","authors":"","doi":"10.1109/ofc.2008.4528175","DOIUrl":"https://doi.org/10.1109/ofc.2008.4528175","url":null,"abstract":"The document that should appear here is not currently available.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122866004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards MapReduce based classification approaches for Intrusion Detection 基于MapReduce的入侵检测分类方法研究
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508144
Rachana Sharma, Priyanka Sharma, P. Mishra, E. Pilli
The term Big Data is explosion of high frequency digital data encountering daily through various sources. Velocity, Volume, Variety, Veracity and Value is causing difficulty for processing, storing and analyzing the Data. Intrusion Detection System in Big Data environment is one of the research issue we addressed. Intrusion Detection is a security technique, used to monitor and analyze network traffic in order to detect network violation. We require a robust Intrusion Detection technique to classify between normal and anomalous data and predict security breaches. In this paper, we have analyzed Machine learning techniques to detect intrusion which can scale up to build such systems. There are many algorithms one can opt for depending upon the need of system. This paper deals with Naïve Bayes and K-Nearest Neighbor classifier in MapReduce framework and their performance comparison with WEKA implementations. Our preliminary analysis over NSL-KDD seems to be promising.
大数据一词是指每天通过各种来源接触到的高频数字数据的爆炸式增长。速度、数量、种类、准确性和价值给数据的处理、存储和分析带来了困难。大数据环境下的入侵检测系统是我们研究的课题之一。入侵检测是一种安全技术,用于监控和分析网络流量,以检测网络违规行为。我们需要一种强大的入侵检测技术来区分正常和异常数据,并预测安全漏洞。在本文中,我们分析了机器学习技术来检测入侵,可以扩展到构建这样的系统。根据系统的需要,有许多算法可供选择。本文研究了MapReduce框架中的Naïve贝叶斯和k近邻分类器及其与WEKA实现的性能比较。我们对NSL-KDD的初步分析似乎很有希望。
{"title":"Towards MapReduce based classification approaches for Intrusion Detection","authors":"Rachana Sharma, Priyanka Sharma, P. Mishra, E. Pilli","doi":"10.1109/CONFLUENCE.2016.7508144","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508144","url":null,"abstract":"The term Big Data is explosion of high frequency digital data encountering daily through various sources. Velocity, Volume, Variety, Veracity and Value is causing difficulty for processing, storing and analyzing the Data. Intrusion Detection System in Big Data environment is one of the research issue we addressed. Intrusion Detection is a security technique, used to monitor and analyze network traffic in order to detect network violation. We require a robust Intrusion Detection technique to classify between normal and anomalous data and predict security breaches. In this paper, we have analyzed Machine learning techniques to detect intrusion which can scale up to build such systems. There are many algorithms one can opt for depending upon the need of system. This paper deals with Naïve Bayes and K-Nearest Neighbor classifier in MapReduce framework and their performance comparison with WEKA implementations. Our preliminary analysis over NSL-KDD seems to be promising.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123825461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Software reliability prediction modeling: A comparison of parametric and non-parametric modeling 软件可靠性预测建模:参数化与非参数化建模的比较
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508198
Ankur Choudhary, A. Baghel, O. Sangwan
Reliable softwares are the need of modern digital era. Failure nonlinearity makes software reliability a complicated task. Over past decades, many researchers have contributed many parametric / non parametric software reliability growth models and discussed their assumptions, applicability and predictability. It concluded that traditional parametric software reliability models have many shortcomings related to their unrealistic assumptions, environment-dependent applicability, and questionable predictability. In contrast to parametric software reliability growth models, the non-parametric software reliability growth models which use machine learning techniques or time series modeling have been proposed by researchers. This paper evaluates and compares the accuracy of 2 parametric and 2 non parametric software reliability growth models on 3 real-life data sets for software failures.
可靠的软件是现代数字时代的需要。故障非线性使软件可靠性成为一项复杂的任务。在过去的几十年里,许多研究者提出了许多参数/非参数软件可靠性增长模型,并讨论了它们的假设、适用性和可预测性。它的结论是,传统的参数化软件可靠性模型有许多缺点,这些缺点与它们不切实际的假设、依赖于环境的适用性和可疑的可预测性有关。与参数化软件可靠性增长模型相比,研究人员提出了利用机器学习技术或时间序列建模的非参数化软件可靠性增长模型。本文在3个实际软件故障数据集上,对2个参数和2个非参数软件可靠性增长模型的准确性进行了评价和比较。
{"title":"Software reliability prediction modeling: A comparison of parametric and non-parametric modeling","authors":"Ankur Choudhary, A. Baghel, O. Sangwan","doi":"10.1109/CONFLUENCE.2016.7508198","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508198","url":null,"abstract":"Reliable softwares are the need of modern digital era. Failure nonlinearity makes software reliability a complicated task. Over past decades, many researchers have contributed many parametric / non parametric software reliability growth models and discussed their assumptions, applicability and predictability. It concluded that traditional parametric software reliability models have many shortcomings related to their unrealistic assumptions, environment-dependent applicability, and questionable predictability. In contrast to parametric software reliability growth models, the non-parametric software reliability growth models which use machine learning techniques or time series modeling have been proposed by researchers. This paper evaluates and compares the accuracy of 2 parametric and 2 non parametric software reliability growth models on 3 real-life data sets for software failures.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124063876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparison efficacy of restoration method for space variant motion blurred images using kalman & wiener filter 卡尔曼-维纳滤波对空间变运动模糊图像恢复方法的效果比较
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508173
Anita Thakur, Adiba Kausar, Ariz Iqbal
Environment and circumstances are affected the visual quality of recorded images. As no devices are perfect so consequently imaging technology is recorded degrade image. Most of imaging system has a limited resolution and not crucial speed at which images can be recorded. So that, most of images are suffered by motion blur degradations and noise. Distortion in images are not same in whole image which depend on location of pixel in image that type of distortion are space variant type. This paper presenting comparative study of restoration method for space variant motion blurred images using Kalman and Wiener filter. The comparison of performance of method is verified using improvement in signal to noise ratio (ISNR).
环境和环境会影响录制图像的视觉质量。由于没有设备是完美的,因此成像技术记录了图像的退化。大多数成像系统具有有限的分辨率和不关键的速度,可以记录图像。因此,大多数图像都受到运动模糊退化和噪声的影响。图像中的畸变在整个图像中是不一样的,它取决于图像中像素的位置,这种畸变类型是空间变型。本文比较研究了利用卡尔曼滤波和维纳滤波对空间变运动模糊图像进行恢复的方法。通过提高信噪比,验证了该方法的性能对比。
{"title":"Comparison efficacy of restoration method for space variant motion blurred images using kalman & wiener filter","authors":"Anita Thakur, Adiba Kausar, Ariz Iqbal","doi":"10.1109/CONFLUENCE.2016.7508173","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508173","url":null,"abstract":"Environment and circumstances are affected the visual quality of recorded images. As no devices are perfect so consequently imaging technology is recorded degrade image. Most of imaging system has a limited resolution and not crucial speed at which images can be recorded. So that, most of images are suffered by motion blur degradations and noise. Distortion in images are not same in whole image which depend on location of pixel in image that type of distortion are space variant type. This paper presenting comparative study of restoration method for space variant motion blurred images using Kalman and Wiener filter. The comparison of performance of method is verified using improvement in signal to noise ratio (ISNR).","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative analysis of the software techniques available for protecting Alzheimer patient 老年痴呆症患者保护软件技术的比较分析
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508218
A. Popli, Divya Upadhyay
Alzheimer is a kind of a disease that causes problems in thinking, behavior and memory. It is the most common form of Dementia (general term commonly used for the memory loss). This is a very dangerous disease as a victim does not realize that what action can cause harm to him or others too. He even tends to forget his friends, family and close relations. The victim also suffers from the problems like hallucinations, wandering, aggressiveness, eating as well as sleeping disorders. These kind of people are very difficult to handle and the major challenges faced while handling them is to cope up with their behavior and the personality changes that occur time to time. So, as a caregiver one cannot change the patient's behavior and their personality instead try to employ the strategies to change or accommodate with their issues. The main problem comes when the Alzheimer patient leaves home without a caregiver. Various methods have been adopted to prevent the patient from wandering. In this paper an comparative analysis is performed on the available software techniques for their protection. Most of the techniques are not cost efficient and difficult to install.
老年痴呆症是一种会导致思维、行为和记忆出现问题的疾病。它是痴呆症(通常用于记忆丧失的总称)最常见的形式。这是一种非常危险的疾病,因为受害者没有意识到什么行为也会对自己或他人造成伤害。他甚至容易忘记他的朋友、家人和亲密的关系。受害者还患有幻觉、徘徊、攻击性、饮食和睡眠障碍等问题。这类人很难处理,处理他们时面临的主要挑战是应对他们的行为和不时发生的个性变化。所以,作为一个照顾者,一个人不能改变病人的行为和他们的个性,而是尝试采用策略来改变或适应他们的问题。当老年痴呆症患者独自离开家时,主要的问题就出现了。采取了各种方法防止病人走神。本文对现有的软件保护技术进行了比较分析。大多数技术的成本效益不高,而且难以安装。
{"title":"Comparative analysis of the software techniques available for protecting Alzheimer patient","authors":"A. Popli, Divya Upadhyay","doi":"10.1109/CONFLUENCE.2016.7508218","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508218","url":null,"abstract":"Alzheimer is a kind of a disease that causes problems in thinking, behavior and memory. It is the most common form of Dementia (general term commonly used for the memory loss). This is a very dangerous disease as a victim does not realize that what action can cause harm to him or others too. He even tends to forget his friends, family and close relations. The victim also suffers from the problems like hallucinations, wandering, aggressiveness, eating as well as sleeping disorders. These kind of people are very difficult to handle and the major challenges faced while handling them is to cope up with their behavior and the personality changes that occur time to time. So, as a caregiver one cannot change the patient's behavior and their personality instead try to employ the strategies to change or accommodate with their issues. The main problem comes when the Alzheimer patient leaves home without a caregiver. Various methods have been adopted to prevent the patient from wandering. In this paper an comparative analysis is performed on the available software techniques for their protection. Most of the techniques are not cost efficient and difficult to install.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117282047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QoS based Cloud Service Selection paradigms 基于QoS的云服务选择范例
Pub Date : 1900-01-01 DOI: 10.1109/CONFLUENCE.2016.7508109
Ravi Khurana, R. K. Bawa
Cloud computing is an emerging trend of 21st century. From last few decades, IT industry and academic researchers are shifting to this paradigm very rapidly. Another side of this issue is they are confused while taking the decision of selecting the provider of cloud services. There are number of Cloud Service Providers (CSPs) in the market, who are providing different cloud services viz Software-as-a-Software, Platform-as-a-Service and Infrastructure-as-a-Service. CSPs are delivering their services to the user based on SLA (Service Level Agreement) document. In this document all the negotiations have been clearly defined, what quality of service will provider give and what the consumer will have to pay have been objectively defined. But unfortunately SLA is not properly followed; quality of service is not up to the mark, breaches in the services are there. In many occasions, availability of service is not there, reliability is compromised, response time is more than what is expected, throughput is not up to the mark and cost factor is fluctuating. In this paper, we will discuss quality of service issues while selecting any cloud services. Researchers and business agents will surely get benefits from the present study.
云计算是21世纪的新兴趋势。从过去的几十年,IT行业和学术研究人员正在非常迅速地转向这种范式。这个问题的另一方面是,他们在选择云服务提供商的决定时感到困惑。市场上有许多云服务提供商(csp),它们提供不同的云服务,即软件即软件、平台即服务和基础设施即服务。csp根据SLA(服务水平协议)文档向用户交付服务。在这份文件中,所有的谈判都有明确的定义,供应商将提供什么样的服务质量,消费者将不得不支付什么样的费用,都有客观的定义。但不幸的是,SLA没有得到适当的遵守;服务质量不达标,服务中存在违规行为。在许多情况下,服务的可用性不存在,可靠性受到损害,响应时间超过预期,吞吐量达不到标准,成本因素波动。在本文中,我们将讨论选择任何云服务时的服务质量问题。研究人员和商业代理人肯定会从目前的研究中受益。
{"title":"QoS based Cloud Service Selection paradigms","authors":"Ravi Khurana, R. K. Bawa","doi":"10.1109/CONFLUENCE.2016.7508109","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2016.7508109","url":null,"abstract":"Cloud computing is an emerging trend of 21st century. From last few decades, IT industry and academic researchers are shifting to this paradigm very rapidly. Another side of this issue is they are confused while taking the decision of selecting the provider of cloud services. There are number of Cloud Service Providers (CSPs) in the market, who are providing different cloud services viz Software-as-a-Software, Platform-as-a-Service and Infrastructure-as-a-Service. CSPs are delivering their services to the user based on SLA (Service Level Agreement) document. In this document all the negotiations have been clearly defined, what quality of service will provider give and what the consumer will have to pay have been objectively defined. But unfortunately SLA is not properly followed; quality of service is not up to the mark, breaches in the services are there. In many occasions, availability of service is not there, reliability is compromised, response time is more than what is expected, throughput is not up to the mark and cost factor is fluctuating. In this paper, we will discuss quality of service issues while selecting any cloud services. Researchers and business agents will surely get benefits from the present study.","PeriodicalId":299044,"journal":{"name":"2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115173961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1