首页 > 最新文献

2014 International Conference on Parallel, Distributed and Grid Computing最新文献

英文 中文
Distributed computing approach to optimize road traffic simulation 分布式计算方法优化道路交通仿真
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030771
A. Sinha, Tapas Saini, S. Srikanth
Distributed computing is the method of running CPU intensive computations on multiple computers collectively in order to achieve a common objective. Common problems that can be solved on the distributed systems include climate/weather modeling, earthquake simulation, evolutionary computing problems and so on. These type of problems may involve billions or even trillions of computations. A single computer is not capable to finish these computations in short span of time, which is typically in days. Distributed computation helps to solve these problems in hours, which could take weeks to solve on a single computer. Distributed computing generally uses the existing resources of the organization. Traffic simulation is the process of simulating transportation systems through software on a virtual road network. Traffic simulation helps in analyzing city traffic at different time intervals of a single day. Common use cases could be analyzing city wide traffic, estimating traffic demand at a particular traffic junction and so on. This paper discusses about the approach to use distributed computing paradigm for optimizing the traffic simulations. Optimizing simulations involves running a number of traffic simulations followed by estimating the nearness of that simulation to the real available traffic data. This real data could be obtained by either manual counting at traffic junctions, or using the probes such as loop inductors, CCTV cameras etc. This distributed computing based approach works to find the best traffic simulation corresponding to the real data in hand, using evolutionary computing technique.
分布式计算是一种在多台计算机上共同运行CPU密集型计算以实现共同目标的方法。可以在分布式系统上解决的常见问题包括气候/天气建模、地震模拟、进化计算问题等。这类问题可能涉及数十亿甚至数万亿次的计算。单台计算机无法在短时间内(通常是几天)完成这些计算。分布式计算可以在几小时内解决这些问题,而在一台计算机上解决这些问题可能需要几周的时间。分布式计算通常使用组织的现有资源。交通仿真是通过软件在虚拟道路网络上模拟交通系统的过程。交通模拟有助于分析一天中不同时间间隔的城市交通。常见的用例可能是分析整个城市的交通,估计特定交通路口的交通需求等等。本文讨论了利用分布式计算范式优化交通仿真的方法。优化模拟包括运行大量交通模拟,然后估计该模拟与实际可用交通数据的接近程度。这些真实的数据可以通过在交通路口人工计数,或者使用环路电感器、闭路电视摄像机等探头来获得。这种基于分布式计算的方法利用进化计算技术找到与实际数据相对应的最佳交通模拟。
{"title":"Distributed computing approach to optimize road traffic simulation","authors":"A. Sinha, Tapas Saini, S. Srikanth","doi":"10.1109/PDGC.2014.7030771","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030771","url":null,"abstract":"Distributed computing is the method of running CPU intensive computations on multiple computers collectively in order to achieve a common objective. Common problems that can be solved on the distributed systems include climate/weather modeling, earthquake simulation, evolutionary computing problems and so on. These type of problems may involve billions or even trillions of computations. A single computer is not capable to finish these computations in short span of time, which is typically in days. Distributed computation helps to solve these problems in hours, which could take weeks to solve on a single computer. Distributed computing generally uses the existing resources of the organization. Traffic simulation is the process of simulating transportation systems through software on a virtual road network. Traffic simulation helps in analyzing city traffic at different time intervals of a single day. Common use cases could be analyzing city wide traffic, estimating traffic demand at a particular traffic junction and so on. This paper discusses about the approach to use distributed computing paradigm for optimizing the traffic simulations. Optimizing simulations involves running a number of traffic simulations followed by estimating the nearness of that simulation to the real available traffic data. This real data could be obtained by either manual counting at traffic junctions, or using the probes such as loop inductors, CCTV cameras etc. This distributed computing based approach works to find the best traffic simulation corresponding to the real data in hand, using evolutionary computing technique.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130350954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Challenges and issues in underwater acoustics sensor networks: A review 水声传感器网络的挑战与问题综述
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030751
Himanshu Jindal, S. Saxena, Singara Singh
The Underwater Acoustic Sensor Networks (UWASN) consists of sensors that are deployed underwater for gathering information for the unexplored parts of oceans or rivers. UWASN consists of variable number of floating and anchored sensors, sink and vehicles that are deployed over an area to be explored. The characteristics of UWASN are mainly node mobility for floating, capacity for data collection and recording and autonomous vehicles which are battery operable. The communication is possible among underwater devices through optical waves, radio waves, electromagnetic and acoustics. Out of these, acoustics communication is best suited as it can carry digital information through underwater channel and can travel to longer distances. The communication can be classified in two parts: Single and multi hoping. But in underwater we use multi-hop communication for sending data from end nodes to sink nodes. The various challenges to UWASN are limited bandwidth, multipath fading, limited battery, limited data capacity and delay in propagation. Hence, in this paper we have focussed on various issues and challenges in underwater wireless sensor networks for acoustic communications.
水下声学传感器网络(uisn)由部署在水下的传感器组成,用于收集海洋或河流未开发部分的信息。unun由不同数量的浮动和锚定传感器、水槽和车辆组成,部署在待探索区域上。uun的特点主要是浮动节点的移动性,数据收集和记录的能力以及电池可操作的自动驾驶车辆。水下设备之间可以通过光波、无线电波、电磁波和声学进行通信。其中,声学通信是最适合的,因为它可以通过水下信道携带数字信息,并且可以传播到更远的距离。通信可分为单路通信和多路通信两部分。但在水下,我们使用多跳通信将数据从终端节点发送到接收节点。uwan面临的各种挑战是有限的带宽、多径衰落、有限的电池、有限的数据容量和传播延迟。因此,在本文中,我们重点研究了用于声学通信的水下无线传感器网络中的各种问题和挑战。
{"title":"Challenges and issues in underwater acoustics sensor networks: A review","authors":"Himanshu Jindal, S. Saxena, Singara Singh","doi":"10.1109/PDGC.2014.7030751","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030751","url":null,"abstract":"The Underwater Acoustic Sensor Networks (UWASN) consists of sensors that are deployed underwater for gathering information for the unexplored parts of oceans or rivers. UWASN consists of variable number of floating and anchored sensors, sink and vehicles that are deployed over an area to be explored. The characteristics of UWASN are mainly node mobility for floating, capacity for data collection and recording and autonomous vehicles which are battery operable. The communication is possible among underwater devices through optical waves, radio waves, electromagnetic and acoustics. Out of these, acoustics communication is best suited as it can carry digital information through underwater channel and can travel to longer distances. The communication can be classified in two parts: Single and multi hoping. But in underwater we use multi-hop communication for sending data from end nodes to sink nodes. The various challenges to UWASN are limited bandwidth, multipath fading, limited battery, limited data capacity and delay in propagation. Hence, in this paper we have focussed on various issues and challenges in underwater wireless sensor networks for acoustic communications.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131192449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Distributed pattern matching and document analysis in big data using Hadoop MapReduce model 基于Hadoop MapReduce模型的大数据分布式模式匹配与文档分析
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030762
A. Ramya, E. Sivasankar
Sequential pattern mining and Document analysis is an important data mining problem in Big Data with broad applications. This paper investigates a specific framework for managing distributed processing in dataset pattern match and document analysis context. MapReduce programming model on a Hadoop cluster is highly scalable and works with commodity machines with integrated mechanisms for fault tolerance. In this paper, we propose a Knuth Morris Pratt based sequential pattern matching in distributed environment with the help of Hadoop Distributed File System as efficient mining of sequential patterns. It also investigates the feasibility of partitioning and clustering of text document datasets for document comparisons. It simplifies the search space and acquires a higher mining efficiency. Data mining tasks has been decomposed to many Map tasks and distributed to many Task trackers. The map tasks find the intermediate results and send to reduce task which consolidates the final result. Both theoretical analysis and experimental result with data as well as cluster of varying size shows the effectiveness of MapReduce model primarily based on time requirements.
顺序模式挖掘和文档分析是大数据中一个重要的数据挖掘问题,具有广泛的应用前景。本文研究了一个在数据集模式匹配和文档分析环境下管理分布式处理的特定框架。Hadoop集群上的MapReduce编程模型具有高度可扩展性,并且可以与具有集成容错机制的商用机器一起工作。本文在Hadoop分布式文件系统的帮助下,提出了一种基于Knuth Morris Pratt的分布式环境下的顺序模式匹配方法,实现了对顺序模式的高效挖掘。它还研究了文本文档数据集的分区和聚类的可行性,用于文档比较。它简化了搜索空间,获得了较高的挖掘效率。数据挖掘任务被分解为许多Map任务,并分布到许多Task跟踪器中。map任务查找中间结果并发送给reduce任务,reduce任务合并最终结果。理论分析和实验结果表明,主要基于时间要求的MapReduce模型是有效的。
{"title":"Distributed pattern matching and document analysis in big data using Hadoop MapReduce model","authors":"A. Ramya, E. Sivasankar","doi":"10.1109/PDGC.2014.7030762","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030762","url":null,"abstract":"Sequential pattern mining and Document analysis is an important data mining problem in Big Data with broad applications. This paper investigates a specific framework for managing distributed processing in dataset pattern match and document analysis context. MapReduce programming model on a Hadoop cluster is highly scalable and works with commodity machines with integrated mechanisms for fault tolerance. In this paper, we propose a Knuth Morris Pratt based sequential pattern matching in distributed environment with the help of Hadoop Distributed File System as efficient mining of sequential patterns. It also investigates the feasibility of partitioning and clustering of text document datasets for document comparisons. It simplifies the search space and acquires a higher mining efficiency. Data mining tasks has been decomposed to many Map tasks and distributed to many Task trackers. The map tasks find the intermediate results and send to reduce task which consolidates the final result. Both theoretical analysis and experimental result with data as well as cluster of varying size shows the effectiveness of MapReduce model primarily based on time requirements.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Heterogeneous resource allocation under degree constraints in peer-to-peer networks 对等网络中程度约束下的异构资源分配
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030748
Ch. Sudhakar, Vatsal Rathod, T. Ramesh
Peer-to-peer model is one of the commonly used model for distributed computing. Some of the peers are having demand for certain resources some others may be having additional capacity of resources. Peers may have limitations on the number of concurrent connections (degree). In the present work allocation problem of peers having demand, capacity and degree is considered. The problem is to find an allocation of peers such that the number of peers allocated to a particular peer P should not exceed the degree of P and total demand of allocated peers should not exceed the capacity of P, while maximizing the overall throughput. Two versions namely Offline (when peers are known in advance) and Online (when peers can join and leave the network at any time) versions of the problem are considered. By introducing degree constraints the problem becomes NP-complete. Resource augmentation based three approaches are proposed to solve this problem. The performance (in terms of throughput) and the cost (in terms of disconnections and reconnections) of the proposed approaches is compared through a set of extensive simulations. The observed results are impressive.
点对点模型是分布式计算中常用的模型之一。一些对等体对某些资源有需求,另一些可能有额外的资源能力。对等体可能对并发连接的数量(度)有限制。在现有的工作分配问题中,考虑了具有需求、能力和程度的同伴的工作分配问题。问题是找到一种对等体的分配方式,使分配给特定对等体P的对等体数量不超过P的程度,分配的对等体的总需求不超过P的容量,同时使总体吞吐量最大化。我们考虑了问题的两个版本,即离线(提前知道对等点)和在线(对等点可以随时加入和离开网络)。通过引入度约束,使问题成为np完全问题。针对这一问题,提出了三种基于资源扩充的方法。通过一组广泛的模拟,比较了所提出方法的性能(就吞吐量而言)和成本(就断开和重新连接而言)。观察到的结果令人印象深刻。
{"title":"Heterogeneous resource allocation under degree constraints in peer-to-peer networks","authors":"Ch. Sudhakar, Vatsal Rathod, T. Ramesh","doi":"10.1109/PDGC.2014.7030748","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030748","url":null,"abstract":"Peer-to-peer model is one of the commonly used model for distributed computing. Some of the peers are having demand for certain resources some others may be having additional capacity of resources. Peers may have limitations on the number of concurrent connections (degree). In the present work allocation problem of peers having demand, capacity and degree is considered. The problem is to find an allocation of peers such that the number of peers allocated to a particular peer P should not exceed the degree of P and total demand of allocated peers should not exceed the capacity of P, while maximizing the overall throughput. Two versions namely Offline (when peers are known in advance) and Online (when peers can join and leave the network at any time) versions of the problem are considered. By introducing degree constraints the problem becomes NP-complete. Resource augmentation based three approaches are proposed to solve this problem. The performance (in terms of throughput) and the cost (in terms of disconnections and reconnections) of the proposed approaches is compared through a set of extensive simulations. The observed results are impressive.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting student performance using decision tree classifiers and information gain 使用决策树分类器和信息增益预测学生表现
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030728
P. Guleria, Niveditta Thakur, M. Sood
As competitive environment is prevailing among the academic institutions, challenge is to increase the quality of education through data mining. Student's performance is of great concern to the higher education. In this paper, we have applied data mining techniques by evaluating student's data using decision trees which is helpful in predicting the student's results. In this paper, we have calculated the Entropy of the attributes taken in Educational Data Set and the attribute having highest Information Gain is taken as the root node to split further. The results generated using Data Mining Techniques help faculty members to focus on students who are getting poor class results.
在学术机构竞争激烈的环境下,如何通过数据挖掘提高教育质量是一个挑战。学生的学习成绩是高等教育非常关注的问题。在本文中,我们应用了数据挖掘技术,通过使用决策树来评估学生的数据,这有助于预测学生的结果。本文计算了教育数据集中各属性的熵值,选取信息增益最高的属性作为根节点进行进一步分割。使用数据挖掘技术生成的结果可以帮助教师关注那些课堂成绩不佳的学生。
{"title":"Predicting student performance using decision tree classifiers and information gain","authors":"P. Guleria, Niveditta Thakur, M. Sood","doi":"10.1109/PDGC.2014.7030728","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030728","url":null,"abstract":"As competitive environment is prevailing among the academic institutions, challenge is to increase the quality of education through data mining. Student's performance is of great concern to the higher education. In this paper, we have applied data mining techniques by evaluating student's data using decision trees which is helpful in predicting the student's results. In this paper, we have calculated the Entropy of the attributes taken in Educational Data Set and the attribute having highest Information Gain is taken as the root node to split further. The results generated using Data Mining Techniques help faculty members to focus on students who are getting poor class results.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"117 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114089079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Spectrum occupancy measurements and analysis in a rural area setting 在农村地区设置频谱占用测量和分析
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030781
Parthu Balina, Kashish Garg, S. V. Rao
We studied the spectrum usage pattern in Waknaghat in the frequency bands ranging from 80 MHz to 500 MHz. The occupancy is quantified as the amount of spectrum detected above a certain received power threshold. The outcome of this study suggests that traditional methods of spectrum allocation (fixed channel allocation) is not efficient and that we may employ emerging spectrum sharing technology such as the cognitive radio technology for future wireless services. This study of spectrum survey is preliminary in its nature, of a very small range and future studies need to be performed for higher ranges (VHF and UHF bands) to determine potential secondary usage on those channels that have low or no active utilization.
我们研究了Waknaghat在80 MHz至500 MHz频段内的频谱使用模式。所述占用量被量化为在某一接收功率阈值之上检测到的频谱量。研究结果表明,传统的频谱分配方法(固定信道分配)效率不高,我们可以在未来的无线业务中采用新兴的频谱共享技术,如认知无线电技术。这项频谱调查研究本质上是初步的,范围很小,未来需要对更高的范围(甚高频和超高频频段)进行研究,以确定在那些利用率低或没有主动利用率的信道上的潜在二次利用。
{"title":"Spectrum occupancy measurements and analysis in a rural area setting","authors":"Parthu Balina, Kashish Garg, S. V. Rao","doi":"10.1109/PDGC.2014.7030781","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030781","url":null,"abstract":"We studied the spectrum usage pattern in Waknaghat in the frequency bands ranging from 80 MHz to 500 MHz. The occupancy is quantified as the amount of spectrum detected above a certain received power threshold. The outcome of this study suggests that traditional methods of spectrum allocation (fixed channel allocation) is not efficient and that we may employ emerging spectrum sharing technology such as the cognitive radio technology for future wireless services. This study of spectrum survey is preliminary in its nature, of a very small range and future studies need to be performed for higher ranges (VHF and UHF bands) to determine potential secondary usage on those channels that have low or no active utilization.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114287353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance evaluation of various symmetric encryption algorithms 各种对称加密算法的性能评估
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030724
Shaify Kansal, Meenakshi Mittal
With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions are done on the internet. When the information is transferred from the sender to the receiver over the internet, it may be eavesdropped by an intruder and thus is a continuous threat to the secrecy or confidentiality of the data. The popular technique that protects the confidentiality of the data is cryptography which converts the plain text into unreadable form and then receiver applies reverse mechanism to decrypt the unreadable form of data to readable form. This mechanism is called as encryption-decryption process. Thus to secure the data over the internet, it is important to find out which algorithm performs better than the other algorithms. In this paper, the different symmetric encryption algorithms like DES, 3DES, AES have been analyzed with respect to different parameters and data types (like text files, image) on i7 processor.
随着互联网在银行、军事和政府部门等各个领域的使用越来越多,数据的安全性和隐私性一直是人们关注的主要问题。今天,大多数数据处理和电子交易都是在互联网上完成的。当信息通过互联网从发送方传送到接收方时,它可能被入侵者窃听,因此对数据的保密性或机密性构成持续威胁。保护数据机密性的常用技术是加密技术,它将明文转换为不可读的形式,然后接收方应用反向机制将不可读的数据解密为可读的形式。这种机制被称为加密-解密过程。因此,为了确保互联网上的数据安全,找出哪种算法比其他算法性能更好是很重要的。本文分析了i7处理器上针对不同参数和数据类型(如文本文件、图像)的不同对称加密算法DES、3DES、AES。
{"title":"Performance evaluation of various symmetric encryption algorithms","authors":"Shaify Kansal, Meenakshi Mittal","doi":"10.1109/PDGC.2014.7030724","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030724","url":null,"abstract":"With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions are done on the internet. When the information is transferred from the sender to the receiver over the internet, it may be eavesdropped by an intruder and thus is a continuous threat to the secrecy or confidentiality of the data. The popular technique that protects the confidentiality of the data is cryptography which converts the plain text into unreadable form and then receiver applies reverse mechanism to decrypt the unreadable form of data to readable form. This mechanism is called as encryption-decryption process. Thus to secure the data over the internet, it is important to find out which algorithm performs better than the other algorithms. In this paper, the different symmetric encryption algorithms like DES, 3DES, AES have been analyzed with respect to different parameters and data types (like text files, image) on i7 processor.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126574855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Hostile intent identification by movement pattern analysis: Using artificial neural networks 基于运动模式分析的敌对意图识别:利用人工神经网络
Pub Date : 2014-12-01 DOI: 10.13140/2.1.4429.7281
Souham Biswas, M. Nene
In the recent years, the problem of identifying suspicious behavior has gained importance and identifying this behavior using computational systems and autonomous algorithms is highly desirable in a tactical scenario. So far, the solutions have been primarily manual which elicit human observation of entities to discern the hostility of the situation. To cater to this problem statement, a number of fully automated and partially automated solutions exist. But, these solutions lack the capability of learning from experiences and work in conjunction with human supervision which is extremely prone to error. In this paper, a generalized methodology to predict the hostility of a given object based on its movement patterns is proposed which has the ability to learn and is based upon the mechanism of humans of “learning from experiences”. The methodology so proposed has been implemented in a computer simulation. The results show that the posited methodology has the potential to be applied in real world tactical scenarios.
近年来,识别可疑行为的问题变得越来越重要,在战术场景中,使用计算系统和自主算法识别这种行为是非常可取的。到目前为止,解决方案主要是手动的,它引起人类对实体的观察,以辨别情况的敌意。为了迎合这个问题陈述,存在许多完全自动化和部分自动化的解决方案。但是,这些解决方案缺乏从经验中学习的能力和与人类监督相结合的能力,极易出错。本文提出了一种基于人类“从经验中学习”机制的、具有学习能力的、基于物体运动模式预测其敌意的广义方法。所提出的方法已在计算机仿真中实现。结果表明,假设的方法具有应用于现实世界战术场景的潜力。
{"title":"Hostile intent identification by movement pattern analysis: Using artificial neural networks","authors":"Souham Biswas, M. Nene","doi":"10.13140/2.1.4429.7281","DOIUrl":"https://doi.org/10.13140/2.1.4429.7281","url":null,"abstract":"In the recent years, the problem of identifying suspicious behavior has gained importance and identifying this behavior using computational systems and autonomous algorithms is highly desirable in a tactical scenario. So far, the solutions have been primarily manual which elicit human observation of entities to discern the hostility of the situation. To cater to this problem statement, a number of fully automated and partially automated solutions exist. But, these solutions lack the capability of learning from experiences and work in conjunction with human supervision which is extremely prone to error. In this paper, a generalized methodology to predict the hostility of a given object based on its movement patterns is proposed which has the ability to learn and is based upon the mechanism of humans of “learning from experiences”. The methodology so proposed has been implemented in a computer simulation. The results show that the posited methodology has the potential to be applied in real world tactical scenarios.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127507393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster head selection technique for optimization of energy conservation in MANET 基于簇头选择的MANET节能优化技术
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030712
K. Govil, S. Gupta, A. Agarwal
A Mobile Ad hoc Network (MANET) is a wireless network where mobile nodes are connected to each other through infrastructure-less connections. Cluster head is a node within the cluster which acts as a leader node. It maintains the information having list of nodes, path of each and every nodes related to its corresponding cluster. Proposed algorithm forms cluster head which is for energy conservation by considering battery power and neighbor mobile node connectivity level.
移动自组织网络(MANET)是一种无线网络,其中移动节点通过无基础设施连接相互连接。集群头是集群中的一个节点,它充当领导节点。它维护具有节点列表、每个节点的路径以及与其相应集群相关的每个节点的信息。该算法通过考虑电池电量和相邻移动节点的连接水平形成簇头,从而达到节能的目的。
{"title":"Cluster head selection technique for optimization of energy conservation in MANET","authors":"K. Govil, S. Gupta, A. Agarwal","doi":"10.1109/PDGC.2014.7030712","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030712","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a wireless network where mobile nodes are connected to each other through infrastructure-less connections. Cluster head is a node within the cluster which acts as a leader node. It maintains the information having list of nodes, path of each and every nodes related to its corresponding cluster. Proposed algorithm forms cluster head which is for energy conservation by considering battery power and neighbor mobile node connectivity level.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123985530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Proposed optimized algorithm for coverage area with capacity calculation 提出了基于容量计算的覆盖面积优化算法
Pub Date : 2014-12-01 DOI: 10.1109/PDGC.2014.7030790
L. Sharma, H. Saini, Geetanjali Rathee, T. C. Panda
In the current era of the increase customers for cellular networks it is required to optimize the cellular network planning process. Cellular planning incorporates three major component named frequency planning, capacity expansion and coverage area optimization. As the number of cellular users are increasing day by day hence the coverage area should also be optimized in response to serve the more users. Therefore, in the present paper we have discussed one of the existing algorithms known as PSO Algorithm to optimize coverage area and further enhancement is suggested and evaluated in the proposed algorithm for coverage area optimization.
在当前蜂窝网络用户不断增加的时代,需要优化蜂窝网络规划流程。蜂窝规划包括三个主要组成部分:频率规划、容量扩展和覆盖区域优化。随着蜂窝用户数量的日益增加,因此覆盖区域也应进行优化,以服务更多的用户。因此,在本文中,我们讨论了现有的一种被称为粒子群算法的算法来优化覆盖区域,并在所提出的算法中对覆盖区域优化进行了进一步的改进和评估。
{"title":"Proposed optimized algorithm for coverage area with capacity calculation","authors":"L. Sharma, H. Saini, Geetanjali Rathee, T. C. Panda","doi":"10.1109/PDGC.2014.7030790","DOIUrl":"https://doi.org/10.1109/PDGC.2014.7030790","url":null,"abstract":"In the current era of the increase customers for cellular networks it is required to optimize the cellular network planning process. Cellular planning incorporates three major component named frequency planning, capacity expansion and coverage area optimization. As the number of cellular users are increasing day by day hence the coverage area should also be optimized in response to serve the more users. Therefore, in the present paper we have discussed one of the existing algorithms known as PSO Algorithm to optimize coverage area and further enhancement is suggested and evaluated in the proposed algorithm for coverage area optimization.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121328818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 International Conference on Parallel, Distributed and Grid Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1