首页 > 最新文献

2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
An Approach to Terrain Trafficability Evaluation Based on a Neural Network for Emergency Decision-Support Systems 基于神经网络的应急决策支持系统地形可通行性评价方法
A. Pershutkin, A. Dukhanov, Petr Gladilin
This paper deals with a new method to evaluate the velocity of a transport unit based on static and dynamic data on terrain relief, urban objects, and the values of hydrometeorological parameters. We considered the existing and available approaches to off-road routes based on the parameters mentioned above (considering velocity reduction depending on terrain parameters) and defined the problem statement. Then, we designed the method to evaluate the velocity on a terrain surface using an artificial neural network. Our method considers the static data (e.g., type of surface) and dynamic hydro-meteorological parameters of the terrain. To determine the efficiency of the method, we conducted the experiment using data from the Leningrad region. The experiment shows significantly increased accuracy in the velocity evaluation of the transport unit.
本文提出了一种基于地形起伏、城市地物和水文气象参数的静态和动态资料估算运输单元速度的新方法。我们考虑了基于上述参数的现有和可用的越野路线方法(考虑根据地形参数降低速度),并定义了问题陈述。然后,我们设计了一种基于人工神经网络的地形表面速度评估方法。我们的方法考虑了地形的静态数据(如地表类型)和动态水文气象参数。为了确定该方法的效率,我们使用来自列宁格勒地区的数据进行了实验。实验结果表明,该方法大大提高了运输单元速度计算的精度。
{"title":"An Approach to Terrain Trafficability Evaluation Based on a Neural Network for Emergency Decision-Support Systems","authors":"A. Pershutkin, A. Dukhanov, Petr Gladilin","doi":"10.1109/AICT47866.2019.8981782","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981782","url":null,"abstract":"This paper deals with a new method to evaluate the velocity of a transport unit based on static and dynamic data on terrain relief, urban objects, and the values of hydrometeorological parameters. We considered the existing and available approaches to off-road routes based on the parameters mentioned above (considering velocity reduction depending on terrain parameters) and defined the problem statement. Then, we designed the method to evaluate the velocity on a terrain surface using an artificial neural network. Our method considers the static data (e.g., type of surface) and dynamic hydro-meteorological parameters of the terrain. To determine the efficiency of the method, we conducted the experiment using data from the Leningrad region. The experiment shows significantly increased accuracy in the velocity evaluation of the transport unit.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132296168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conceptual Model of an Intelligent Platform for Security Risk Assessment in SMEs 中小企业安全风险评估智能平台的概念模型
Laura Arenda, O. Popov
SMEs are increasingly targeted by cyberattacks and usually less in control of their Information Security Management System than larger organizations due to a lack of resources. Risk assessment can help them to determine which changes are needed bearing in mind their constraints. However, common frameworks for risk assessments are more suitable for large organizations. Some of them have been designed specifically for SMEs but still target an audience of information security experts and are considered as time-consuming by SMEs. This article aims at tackling those issues by introducing a conceptual model of an Intelligent Platform for supporting SMEs in security risk assessment process. The design research method was used to develop a model taking into account the inputs from relevant stakeholders collected via interviews. The model was validated and improved with case studies where quick security risk assessments in three different SMEs have been performed following the activities that the proposed model is supposed to perform.
中小型企业越来越多地成为网络攻击的目标,由于缺乏资源,它们对信息安全管理系统的控制通常不如大型组织。风险评估可以帮助他们确定哪些变更是需要的,同时考虑到它们的约束条件。然而,风险评估的通用框架更适合大型组织。其中一些是专门为中小企业设计的,但仍然针对信息安全专家的受众,并且被中小企业认为是耗时的。本文旨在通过引入智能平台的概念模型来解决这些问题,以支持中小企业进行安全风险评估。设计研究方法用于开发一个模型,考虑到通过访谈收集的相关利益相关者的输入。该模型通过案例研究进行了验证和改进,其中在三个不同的中小企业中执行了快速安全风险评估,按照建议的模型应该执行的活动进行了评估。
{"title":"A Conceptual Model of an Intelligent Platform for Security Risk Assessment in SMEs","authors":"Laura Arenda, O. Popov","doi":"10.1109/AICT47866.2019.8981796","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981796","url":null,"abstract":"SMEs are increasingly targeted by cyberattacks and usually less in control of their Information Security Management System than larger organizations due to a lack of resources. Risk assessment can help them to determine which changes are needed bearing in mind their constraints. However, common frameworks for risk assessments are more suitable for large organizations. Some of them have been designed specifically for SMEs but still target an audience of information security experts and are considered as time-consuming by SMEs. This article aims at tackling those issues by introducing a conceptual model of an Intelligent Platform for supporting SMEs in security risk assessment process. The design research method was used to develop a model taking into account the inputs from relevant stakeholders collected via interviews. The model was validated and improved with case studies where quick security risk assessments in three different SMEs have been performed following the activities that the proposed model is supposed to perform.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115405052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning and Advanced Analytics in Tax Fraud Detection 税务欺诈检测中的机器学习和高级分析
A. Adamov
We all are passing through Big Data Renaissance right now. Academic literature shows increasing interest to subject of application of Big Data technology to cross-sectoral business and relevant scientific research. But portion of research papers devoted to application of Big Data to Taxation is relatively small, despite of the fact that tax generates huge amounts of Data and has enormous potential to benefit from Big Data Analytics. This paper is a conceptual approach to build theoretical and methodological foundation for Data Analytics application in taxation. It is described how tax authorities can benefit from their operational data. Primary prerequisites for efficient application of Advanced Data Analytics are revealed.
我们现在都在经历大数据复兴。学术文献对大数据技术在跨部门业务和相关科学研究中的应用这一主题越来越感兴趣。但是,尽管税收产生了大量的数据,并且从大数据分析中受益的潜力巨大,但致力于将大数据应用于税收的研究论文却相对较少。本文旨在为数据分析在税务领域的应用奠定理论和方法基础。它描述了税务机关如何从他们的业务数据中受益。揭示了有效应用高级数据分析的主要先决条件。
{"title":"Machine Learning and Advanced Analytics in Tax Fraud Detection","authors":"A. Adamov","doi":"10.1109/AICT47866.2019.8981758","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981758","url":null,"abstract":"We all are passing through Big Data Renaissance right now. Academic literature shows increasing interest to subject of application of Big Data technology to cross-sectoral business and relevant scientific research. But portion of research papers devoted to application of Big Data to Taxation is relatively small, despite of the fact that tax generates huge amounts of Data and has enormous potential to benefit from Big Data Analytics. This paper is a conceptual approach to build theoretical and methodological foundation for Data Analytics application in taxation. It is described how tax authorities can benefit from their operational data. Primary prerequisites for efficient application of Advanced Data Analytics are revealed.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116923375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Comparison of Convolutional Neural Network Models on GPU 卷积神经网络模型在GPU上的性能比较
M. M. Yapıcı, Adem Tekerek, Nurettin Topaloglu
Deep learning methods are used in many popular areas such: image processing, computer vision, autonomous vehicles, character recognition, audio and video processing. These methods require high processing power, such as graphics cards (GPUs), to obtain successful results in the solution of NP hard problems which have big data. In this study, performance comparison of convolutional neural network (CNN) architectures were performed on GPU. ResNet, VGGNet19 and DenseNet CNN models, and GPDS signature dataset were used for comparison. According to the obtained results, ResNet50 took up the least amount of GPU memory space. The best classification results were obtained with DenseNet121 and the second one was from ResNet50.
深度学习方法被用于许多热门领域,如:图像处理、计算机视觉、自动驾驶汽车、字符识别、音频和视频处理。这些方法需要很高的处理能力,如图形卡(gpu),才能在具有大数据的NP困难问题的解决中获得成功的结果。在本研究中,卷积神经网络(CNN)架构在GPU上进行性能比较。使用ResNet、VGGNet19和DenseNet CNN模型,以及GPDS签名数据集进行比较。根据得到的结果,ResNet50占用了最少的GPU内存空间。用DenseNet121分类效果最好,用ResNet50分类效果次之。
{"title":"Performance Comparison of Convolutional Neural Network Models on GPU","authors":"M. M. Yapıcı, Adem Tekerek, Nurettin Topaloglu","doi":"10.1109/AICT47866.2019.8981749","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981749","url":null,"abstract":"Deep learning methods are used in many popular areas such: image processing, computer vision, autonomous vehicles, character recognition, audio and video processing. These methods require high processing power, such as graphics cards (GPUs), to obtain successful results in the solution of NP hard problems which have big data. In this study, performance comparison of convolutional neural network (CNN) architectures were performed on GPU. ResNet, VGGNet19 and DenseNet CNN models, and GPDS signature dataset were used for comparison. According to the obtained results, ResNet50 took up the least amount of GPU memory space. The best classification results were obtained with DenseNet121 and the second one was from ResNet50.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Another Generalization of $3mathrm{x}+1$ Problem: Existence of periodicity in the construction of numbers in periodic version of generalized Collatz’ problem and its computational aspects $3 mathm {x}+1$问题的另一推广:周期型广义Collatz问题中数构造的周期性存在性及其计算方面
Y. Aliyev
In the paper, another generalization of Collatz's Syracuse problem was discussed. For a given initial integer number, each next integer number is obtained by dividing the previous integer by 2 (T operation), or multiplying it by 3, adding 1 and then dividing by 2 (S operation), or finally, multiplying by 3, adding 2 and then dividing by 2 (V operation), provided that all of these divisions by 2 are possible. The presence of this last operation V makes the problem more general. We ask the following question: How can one find from the given sequence of T, S, V operations whether an initial integer exists which after all these operations, applied in the given order, will end up with the same initial number? We found an algorithm that can quickly find that integer or determine if such an integer doesn't exist. We also discuss relationship of this problem with 3-adic numbers which we use to represent the elements of the periodic sequence.
本文讨论了colatz Syracuse问题的另一个推广。对于给定的初始整数,每个下一个整数都是通过将前一个整数除以2 (T操作),或将其乘以3,加1然后除以2 (S操作),或最后乘以3,加2然后除以2 (V操作)获得的,前提是所有这些除以2都是可能的。最后一个操作V的存在使问题更加普遍。我们问以下问题:如何从给定的T, S, V操作序列中找到是否存在一个初始整数,在所有这些操作之后,按照给定的顺序应用,最终会得到相同的初始数?我们找到了一个算法,可以快速找到这个整数,或者确定这个整数是否存在。我们还讨论了这个问题与用来表示周期序列元素的三进数的关系。
{"title":"Another Generalization of $3mathrm{x}+1$ Problem: Existence of periodicity in the construction of numbers in periodic version of generalized Collatz’ problem and its computational aspects","authors":"Y. Aliyev","doi":"10.1109/AICT47866.2019.8981720","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981720","url":null,"abstract":"In the paper, another generalization of Collatz's Syracuse problem was discussed. For a given initial integer number, each next integer number is obtained by dividing the previous integer by 2 (T operation), or multiplying it by 3, adding 1 and then dividing by 2 (S operation), or finally, multiplying by 3, adding 2 and then dividing by 2 (V operation), provided that all of these divisions by 2 are possible. The presence of this last operation V makes the problem more general. We ask the following question: How can one find from the given sequence of T, S, V operations whether an initial integer exists which after all these operations, applied in the given order, will end up with the same initial number? We found an algorithm that can quickly find that integer or determine if such an integer doesn't exist. We also discuss relationship of this problem with 3-adic numbers which we use to represent the elements of the periodic sequence.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"98 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Topology and Destination Based Routing Protocols in Mobile Ad-Hoc Network Using NS2 基于NS2的移动Ad-Hoc网络拓扑和目的地路由协议性能分析
A. A. Ajibesin, M. Kah, A. T. Ishaq, Caleb A. Ajibesin
In this paper, three MANET routing protocols were simulated. One is the DSDV which is a destination-based proactive protocol. Others are DSR and AODV which are topology-based reactive protocols. Also, three metrics namely, Throughput, Packet delivery ratio (PDR) and Jitter were considered for the performance evaluation. The protocols were simulated using network simulator 2. The results showed that the average Throughput, the PDR and average Jitter of the protocols increased as the number of network topology (nodes) increased. Overall, AODV protocol outperformed the other two protocols for all the observed metrics when the network exceeds 35 nodes while the DSR is the better protocol in smaller networks. Thus, the two reactive protocols (DSR Topology-based and AODV Destination-based) have shown better performance over the DSDV Destination-based proactive protocol. Furthermore, the trend analysis based on the cumulative performance in different network scenarios is useful information for the network designers.
本文对三种MANET路由协议进行了仿真。一个是DSDV,这是一个基于目的地的主动协议。其他的是DSR和AODV,它们是基于拓扑的反应性协议。此外,三个指标,即吞吐量,分组传输率(PDR)和抖动被认为是性能评估。使用网络模拟器2对协议进行了仿真。结果表明,各协议的平均吞吐量、PDR和平均抖动随网络拓扑(节点)数量的增加而增加。总的来说,当网络超过35个节点时,AODV协议在所有观察到的指标上都优于其他两个协议,而在较小的网络中,DSR是更好的协议。因此,两种响应式协议(基于DSR拓扑和基于AODV目的地)比基于DSDV目的地的主动协议表现出更好的性能。此外,基于不同网络场景下的累积性能的趋势分析对网络设计者来说是有用的信息。
{"title":"Performance Analysis of Topology and Destination Based Routing Protocols in Mobile Ad-Hoc Network Using NS2","authors":"A. A. Ajibesin, M. Kah, A. T. Ishaq, Caleb A. Ajibesin","doi":"10.1109/AICT47866.2019.8981772","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981772","url":null,"abstract":"In this paper, three MANET routing protocols were simulated. One is the DSDV which is a destination-based proactive protocol. Others are DSR and AODV which are topology-based reactive protocols. Also, three metrics namely, Throughput, Packet delivery ratio (PDR) and Jitter were considered for the performance evaluation. The protocols were simulated using network simulator 2. The results showed that the average Throughput, the PDR and average Jitter of the protocols increased as the number of network topology (nodes) increased. Overall, AODV protocol outperformed the other two protocols for all the observed metrics when the network exceeds 35 nodes while the DSR is the better protocol in smaller networks. Thus, the two reactive protocols (DSR Topology-based and AODV Destination-based) have shown better performance over the DSDV Destination-based proactive protocol. Furthermore, the trend analysis based on the cumulative performance in different network scenarios is useful information for the network designers.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127661567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sentiment Analysis of Azerbaijani twits Using Logistic Regression, Naive Bayes and SVM 基于Logistic回归、朴素贝叶斯和支持向量机的阿塞拜疆语情感分析
Huseyn Hasanli, S. Rustamov
In the work, the roadmap of sentiment analysis of twits in Azerbaijani language has been developed. The principles of collecting, cleaning and annotating of twits for Azerbaijani language are described. Machine learning algorithms, such as Linear regression, Naïve Bayes and SVM applied to detect sentiment polarity of text based on bag of word models. Our suggested approach for data processing and classification can be easily adapted and applied to other Turkish language. Achieved results from different machine learning algorithm have been compared and defined optimal parameters for the classification of twits.
在工作中,制定了阿塞拜疆语推文情感分析路线图。介绍了阿塞拜疆语抽语的收集、清理和注释原则。基于词袋模型,采用线性回归、Naïve贝叶斯和SVM等机器学习算法检测文本的情感极性。我们建议的数据处理和分类方法可以很容易地适应并应用于其他土耳其语言。比较了不同机器学习算法的分类结果,确定了twits分类的最优参数。
{"title":"Sentiment Analysis of Azerbaijani twits Using Logistic Regression, Naive Bayes and SVM","authors":"Huseyn Hasanli, S. Rustamov","doi":"10.1109/AICT47866.2019.8981793","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981793","url":null,"abstract":"In the work, the roadmap of sentiment analysis of twits in Azerbaijani language has been developed. The principles of collecting, cleaning and annotating of twits for Azerbaijani language are described. Machine learning algorithms, such as Linear regression, Naïve Bayes and SVM applied to detect sentiment polarity of text based on bag of word models. Our suggested approach for data processing and classification can be easily adapted and applied to other Turkish language. Achieved results from different machine learning algorithm have been compared and defined optimal parameters for the classification of twits.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127231538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Influence of Interlingual Homonymy on How People Mutually Understand and Visually Perceive Oral Speech 语际同音对人们相互理解和视觉感知口语的影响
M. Myasoedova, M. Farkhadov, Z. P. Myasoedova
In this paper we study interlingual homonymy. We compare the Russian language with the languages of other language groups and how homonymy influences the process of speech communication and how speakers understand each other. Interlanguage correspondences attract interest, since if people inaccurately recognize words, the utterance can change its meaning. To a greater extent this is relevant for visual perception of homonyms. Examples of interlanguage homonyms of various linguistic structures are given. We implemented the basis module of the «Chitaem s gub» multimedia program; the program was developed by the authors to teach users to distinguish individual speech elements with similar visemes.
本文主要研究语际同音。我们比较了俄语和其他语言群体的语言,以及同音如何影响语音交流的过程以及说话者如何相互理解。中介语通信吸引了人们的兴趣,因为如果人们不准确地识别单词,话语就会改变其含义。在很大程度上,这与同音异义词的视觉感知有关。给出了各种语言结构的中介语同音异义的例子。实现了《Chitaem’s gub》多媒体程序的基础模块;该程序是由作者开发的,目的是教用户区分具有相似音素的单个语音元素。
{"title":"Influence of Interlingual Homonymy on How People Mutually Understand and Visually Perceive Oral Speech","authors":"M. Myasoedova, M. Farkhadov, Z. P. Myasoedova","doi":"10.1109/AICT47866.2019.8981786","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981786","url":null,"abstract":"In this paper we study interlingual homonymy. We compare the Russian language with the languages of other language groups and how homonymy influences the process of speech communication and how speakers understand each other. Interlanguage correspondences attract interest, since if people inaccurately recognize words, the utterance can change its meaning. To a greater extent this is relevant for visual perception of homonyms. Examples of interlanguage homonyms of various linguistic structures are given. We implemented the basis module of the «Chitaem s gub» multimedia program; the program was developed by the authors to teach users to distinguish individual speech elements with similar visemes.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of Increasing the Number of Iterations for Numerical Methods upon Digital Image 增加数值方法迭代次数对数字图像的作用
Fatin E. M. Al-Obaidi, Ali Jassim Mohamed Ali, Khalid G. Mohammed
Due to its numerical procedure, an expected error occurred in applying the numerical algorithms. A challenging attempt toward using such approximation methods on digital image has been utilized here. Bisection, Newton Raphson, and secant methods are some numerical techniques which have been used here for certain considerations to test their evaluation upon a digital image through investigating the role of increasing the number of iterations each time. Results show that Bisection method is the best numerical technique than other used techniques in its approximated use upon an image with least and stable absolute and relative errors. Increasing the number of iterations didn't affect its numerical procedure while an alternative errors with a bell shape resulted in the case of Newton- Raphson and secant methods. Absolute error seems to be more sensitive estimator than relative one toward detecting the suitable number of iterations that caused a least significant error
由于其数值过程,在应用数值算法时出现了预期误差。在数字图像上使用这种近似方法是一个具有挑战性的尝试。二分法、牛顿·拉夫森法和割线法是一些数值技术,在这里通过研究每次增加迭代次数的作用来测试它们对数字图像的评估。结果表明,在图像的近似应用中,对分法的绝对误差和相对误差最小且稳定,是目前常用的数值方法中效果最好的。增加迭代次数对其数值过程没有影响,但在牛顿-拉夫森法和割线法中存在钟形误差。在检测引起最小误差的适当迭代次数方面,绝对误差似乎比相对误差更敏感
{"title":"The role of Increasing the Number of Iterations for Numerical Methods upon Digital Image","authors":"Fatin E. M. Al-Obaidi, Ali Jassim Mohamed Ali, Khalid G. Mohammed","doi":"10.1109/AICT47866.2019.8981760","DOIUrl":"https://doi.org/10.1109/AICT47866.2019.8981760","url":null,"abstract":"Due to its numerical procedure, an expected error occurred in applying the numerical algorithms. A challenging attempt toward using such approximation methods on digital image has been utilized here. Bisection, Newton Raphson, and secant methods are some numerical techniques which have been used here for certain considerations to test their evaluation upon a digital image through investigating the role of increasing the number of iterations each time. Results show that Bisection method is the best numerical technique than other used techniques in its approximated use upon an image with least and stable absolute and relative errors. Increasing the number of iterations didn't affect its numerical procedure while an alternative errors with a bell shape resulted in the case of Newton- Raphson and secant methods. Absolute error seems to be more sensitive estimator than relative one toward detecting the suitable number of iterations that caused a least significant error","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131730960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Bandwidth Management Model using Software-Defined Networking Security Threats 基于软件定义网络安全威胁的新带宽管理模型
K. Nisar, Emilia Rosa Jimson, Mohd. Hanafi bin Ahmad Hijazi, Ag. Asri Ag. Ibrahim, Yong-Jin Park, I. Welch
Available bandwidth in network is limited, it is very critical to manage the network bandwidth efficiently. In this research, bandwidth management model based on Software-Defined Networking (SDN) architecture is examined. Through the recommended model, real-time traffic over network was given importance to approach the restricted bandwidth over non real-time traffic. SDN promises the simplification of network management compared to the traditional network. SDN architecture breaks the vertically integrated current network design and it introduces centralized network control through the SDN controller, which is considered as the greatest contribution of SDN in networking area. SDN architecture is adopted in this paper since it promotes centralized control features which enable grid programmability and supports improve network resources administration. Simulation was conducted using the EstiNet network simulator. Two groups of experiments with different situations have been conducted. Each experiment consisted of five simulations with different number of sender and receiver nodes. The first experiment simulated the traffics in a traditional networking; and the second experiment simulated the traffics in a proposed network model. In addition, bulk of the existing bandwidth was reserved to real-time traffic and the remaining quantity was reserved for non-real-time traffic. The real-time throughput results of the two different experiments have been compared to estimate the performance of the proposed SDN research model. The experiment results presented that the recommended model has successfully given urgency to real-time network traffic to approach the limited network bandwidth. As the number of nodes increases, the conventional real-time throughput of setup one and setup two decreases linearly. When nodes reach 10, the real-time ordinary throughput of setup one and setup two are 63SKBps and 473KBps respectively.
网络中可用带宽有限,如何有效地管理网络带宽至关重要。本文研究了基于软件定义网络(SDN)架构的带宽管理模型。通过推荐的模型,重视网络上的实时流量,以接近非实时流量的受限带宽。与传统网络相比,SDN有望简化网络管理。SDN架构打破了目前垂直一体化的网络设计,通过SDN控制器引入了集中的网络控制,这被认为是SDN在网络领域的最大贡献。本文采用SDN体系结构,因为它具有集中控制的特点,使网格具有可编程性,并支持改进的网络资源管理。利用EstiNet网络模拟器进行仿真。进行了两组不同情况下的实验。每个实验包括5个不同数量的发送和接收节点的模拟。第一个实验模拟了传统网络中的流量;第二个实验模拟了所提出的网络模型中的流量。此外,现有带宽的大部分被保留给实时流量,剩余的部分被保留给非实时流量。比较了两种不同实验的实时吞吐量结果,以估计所提出的SDN研究模型的性能。实验结果表明,所推荐的模型成功地使实时网络流量的紧迫性接近有限的网络带宽。随着节点数量的增加,设置1和设置2的常规实时吞吐量呈线性下降。当节点数达到10时,安装1和安装2的实时普通吞吐量分别为63SKBps和473KBps。
{"title":"A New Bandwidth Management Model using Software-Defined Networking Security Threats","authors":"K. Nisar, Emilia Rosa Jimson, Mohd. Hanafi bin Ahmad Hijazi, Ag. Asri Ag. Ibrahim, Yong-Jin Park, I. Welch","doi":"10.1109/aict47866.2019.8981784","DOIUrl":"https://doi.org/10.1109/aict47866.2019.8981784","url":null,"abstract":"Available bandwidth in network is limited, it is very critical to manage the network bandwidth efficiently. In this research, bandwidth management model based on Software-Defined Networking (SDN) architecture is examined. Through the recommended model, real-time traffic over network was given importance to approach the restricted bandwidth over non real-time traffic. SDN promises the simplification of network management compared to the traditional network. SDN architecture breaks the vertically integrated current network design and it introduces centralized network control through the SDN controller, which is considered as the greatest contribution of SDN in networking area. SDN architecture is adopted in this paper since it promotes centralized control features which enable grid programmability and supports improve network resources administration. Simulation was conducted using the EstiNet network simulator. Two groups of experiments with different situations have been conducted. Each experiment consisted of five simulations with different number of sender and receiver nodes. The first experiment simulated the traffics in a traditional networking; and the second experiment simulated the traffics in a proposed network model. In addition, bulk of the existing bandwidth was reserved to real-time traffic and the remaining quantity was reserved for non-real-time traffic. The real-time throughput results of the two different experiments have been compared to estimate the performance of the proposed SDN research model. The experiment results presented that the recommended model has successfully given urgency to real-time network traffic to approach the limited network bandwidth. As the number of nodes increases, the conventional real-time throughput of setup one and setup two decreases linearly. When nodes reach 10, the real-time ordinary throughput of setup one and setup two are 63SKBps and 473KBps respectively.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1