首页 > 最新文献

International Conference on Advances in Computing and Artificial Intelligence最新文献

英文 中文
Architecture for intelligent transport system for automated vehicle 自动驾驶车辆智能运输系统体系结构
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007096
N. Sanduja, P. Kaur
An ITS Automated Vehicle is a vehicle equipped with an autopilot system, which is capable of driving from one point to another without input from a human operator (Driver). It is a proposed system depends on infrastructure-based guidance systems (i.e. systems embedded in or near the road itself), while more advanced systems propose to simulate human perception and decision-making during steering of a car via advanced computer software linked to a range of sensors such as cameras, radar and GPS. This paper tells us the architecture for the computer software used for ITS automated vehicle. This architecture helps to get indication to avoid collision from the front as well as from rear. It also helps for the lane Departure prevention and Blind spot Intervention of the vehicle. In this software architecture GPS system is used to get the actual position of the vehicle.
ITS自动驾驶汽车是一种配备了自动驾驶系统的车辆,它能够在没有人类操作员(驾驶员)输入的情况下从一个点行驶到另一个点。这是一种基于基础设施的引导系统(即嵌入在道路内部或道路附近的系统)的拟议系统,而更先进的系统则是通过与一系列传感器(如摄像头、雷达和GPS)相连的先进计算机软件,模拟人类在驾驶汽车时的感知和决策。本文介绍了用于ITS自动驾驶汽车的计算机软件体系结构。这种结构有助于从前面和后面获得避免碰撞的指示。对车辆的车道偏离预防和盲点干预也有帮助。在该软件体系结构中,采用GPS系统获取车辆的实际位置。
{"title":"Architecture for intelligent transport system for automated vehicle","authors":"N. Sanduja, P. Kaur","doi":"10.1145/2007052.2007096","DOIUrl":"https://doi.org/10.1145/2007052.2007096","url":null,"abstract":"An ITS Automated Vehicle is a vehicle equipped with an autopilot system, which is capable of driving from one point to another without input from a human operator (Driver). It is a proposed system depends on infrastructure-based guidance systems (i.e. systems embedded in or near the road itself), while more advanced systems propose to simulate human perception and decision-making during steering of a car via advanced computer software linked to a range of sensors such as cameras, radar and GPS. This paper tells us the architecture for the computer software used for ITS automated vehicle. This architecture helps to get indication to avoid collision from the front as well as from rear. It also helps for the lane Departure prevention and Blind spot Intervention of the vehicle. In this software architecture GPS system is used to get the actual position of the vehicle.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133764986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient fault tolerant consensus using preemptive token 使用抢占式令牌的高效容错共识
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007064
P. Saini, Awadhesh Kumar Singh
The problem of agreement has been widely studied by many research groups in crash-stop as well as Byzantine model for distributed transaction systems. In one of our previous works [12], we assumed a trustworthy Transaction Manager, TM amenable to the job of view creation, detection of faulty primary as well as backup replicas, and to evacuate them from the transaction processing system. The TM provides an efficient failure-resiliency in the protocol; however, to eliminate the dependency on a single TM, later, we introduced the concept of Distributed Transaction Manager DTM [13], which distributes the responsibilities of TM among 3f+1(f are faulty) replicas. Both of the above mentioned protocols employ proactive approaches that is, essentially, preemptive in nature. It acts, in advance, in order to mitigate the tentative failures in the transaction processing system. The present article insinuates a system model to optimize the performance of DTM in terms of overall message overhead, latency, and throughput. A deterministic solution has been proposed to synchronize the processes via eventual bisource where the connecting links (incoming and outgoing) of at least one non-faulty process with all other processes is eventually timely.
在分布式事务系统的crash-stop和Byzantine模型中,一致性问题得到了许多研究小组的广泛研究。在我们之前的工作b[12]中,我们假设有一个值得信赖的事务管理器TM,它可以用于视图创建、检测故障的主副本和备份副本,并将它们从事务处理系统中移除。TM在协议中提供了有效的故障恢复能力;然而,为了消除对单个TM的依赖,稍后,我们引入了分布式事务管理器DTM[13]的概念,它将TM的职责分布到3f+1(f个错误的)副本中。上述两种协议都采用主动方法,本质上是先发制人的。它提前采取行动,以减轻事务处理系统中的试探性故障。本文介绍了一个系统模型,用于从总体消息开销、延迟和吞吐量方面优化DTM的性能。提出了一种确定性解决方案,通过最终双源来同步进程,其中至少一个无故障进程与所有其他进程的连接链接(传入和传出)最终是及时的。
{"title":"Efficient fault tolerant consensus using preemptive token","authors":"P. Saini, Awadhesh Kumar Singh","doi":"10.1145/2007052.2007064","DOIUrl":"https://doi.org/10.1145/2007052.2007064","url":null,"abstract":"The problem of agreement has been widely studied by many research groups in crash-stop as well as Byzantine model for distributed transaction systems. In one of our previous works [12], we assumed a trustworthy Transaction Manager, TM amenable to the job of view creation, detection of faulty primary as well as backup replicas, and to evacuate them from the transaction processing system. The TM provides an efficient failure-resiliency in the protocol; however, to eliminate the dependency on a single TM, later, we introduced the concept of Distributed Transaction Manager DTM [13], which distributes the responsibilities of TM among 3f+1(f are faulty) replicas. Both of the above mentioned protocols employ proactive approaches that is, essentially, preemptive in nature. It acts, in advance, in order to mitigate the tentative failures in the transaction processing system. The present article insinuates a system model to optimize the performance of DTM in terms of overall message overhead, latency, and throughput. A deterministic solution has been proposed to synchronize the processes via eventual bisource where the connecting links (incoming and outgoing) of at least one non-faulty process with all other processes is eventually timely.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116077499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated design space exploration based on power-performance trade-off using genetic algorithm 基于功率-性能权衡的遗传算法集成设计空间探索
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007068
A. Sengupta, R. Sedaghat, Pallabi Sarkar
This paper presents a novel approach for Design Space Exploration (DSE) of integrated scheduling, allocation and binding in High Level Synthesis based on user specified power consumption and execution time constraints using multi structure Genetic Algorithm (GA). A pioneering effort has been made to explore the power-performance tradeoffs related to design of VLSI applications. The new cost function comprising of execution time is useful for data pipelined applications since it considers latency, cycle time (resulting from initiation interval) and number of sets of pipelined data. The GA based DSE initiates with a novel seeding process for parents as proposed in this paper which guarantees that the final solution will be optimal/near optimal. The proposed approach when verified for number of benchmarks yielded superior results in terms of power optimization and latency compared to a recent GA based approach. Moreover, the efficiency of the proposed approach was demonstrated by the fact that the experimental results also indicated the optimized performance (or execution time for pipelined data) as well as the optimal clock frequency for implementation which the current approach was unable to find.
提出了一种基于用户指定功耗和执行时间约束的高阶综合设计空间探索(DSE)集成调度、分配和绑定方法。在探索与超大规模集成电路应用设计相关的功率性能权衡方面,已经做出了开创性的努力。包含执行时间的新成本函数对于数据流水线应用程序非常有用,因为它考虑了延迟、周期时间(由启动间隔引起)和流水线数据集的数量。本文提出了一种基于遗传算法的离散遗传算法,该算法采用了一种新颖的父类播种过程,保证了最终解是最优或接近最优的。与最近的基于遗传算法的方法相比,经过大量基准测试验证后,所提出的方法在功耗优化和延迟方面取得了更好的结果。此外,实验结果还显示了当前方法无法找到的最佳性能(或流水线数据的执行时间)和最佳实现时钟频率,从而证明了该方法的有效性。
{"title":"Integrated design space exploration based on power-performance trade-off using genetic algorithm","authors":"A. Sengupta, R. Sedaghat, Pallabi Sarkar","doi":"10.1145/2007052.2007068","DOIUrl":"https://doi.org/10.1145/2007052.2007068","url":null,"abstract":"This paper presents a novel approach for Design Space Exploration (DSE) of integrated scheduling, allocation and binding in High Level Synthesis based on user specified power consumption and execution time constraints using multi structure Genetic Algorithm (GA). A pioneering effort has been made to explore the power-performance tradeoffs related to design of VLSI applications. The new cost function comprising of execution time is useful for data pipelined applications since it considers latency, cycle time (resulting from initiation interval) and number of sets of pipelined data. The GA based DSE initiates with a novel seeding process for parents as proposed in this paper which guarantees that the final solution will be optimal/near optimal. The proposed approach when verified for number of benchmarks yielded superior results in terms of power optimization and latency compared to a recent GA based approach. Moreover, the efficiency of the proposed approach was demonstrated by the fact that the experimental results also indicated the optimized performance (or execution time for pipelined data) as well as the optimal clock frequency for implementation which the current approach was unable to find.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security policy implementation using connection and event log to achieve network access control 使用连接和事件日志实现安全策略,实现网络访问控制
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007059
Shalvi Dave, J. Mahadevia, Bhushan Trivedi
Network as well as Host security has become an essential requirement to guard important network resources against unauthorized and unauthenticated access. The reason is that due to technology advancements, the threats and attacks are becoming all the more intelligent and insensitive to existing security measures implemented by an Network Intrusion Detection System or Network Intrusion Detection and Prevention System (NIDS/NIDPS). The paper aims to describe how a novice approach helps to implement quota-based security policy for applications running inside the network. It also helps to identify applications as an attacker or a victim and provide elaborate logging to help administrator thwart an attack. Our system introduces three main modules: Event Collector, Network Interceptor and Administrative Server. Together, they identify an attack with help of NIDS along with the name and version of the attacker and victim applications that we try to protect. This paper describes the work we have done in the application connection and event logging part. In the connection log, we maintain application connection information. The connection log information contains start and release time of connection, upload and download data. This information is used to implement a quota-based application access policy with the organization. In this way, we achieve network access control. In the event logger, we first classify an application as an attacker and a victim. When an application attacks a vulnerable client or server on the network, our system identifies this threat and maintains an event log of the same. In addition, if any host from our network tries to land an attack on any application outside the network, our system identifies such applications as threat to the network. An event log is also maintained for such attacker applications within the network. The event log contains information such as Source and Destination IP, application name and version, timestamp etc. This event log is used to generate administrative reports. The administrator, to take corrective measures for such applications, uses these reports.
为了保护重要的网络资源免遭未经授权和未经认证的访问,网络和主机安全已经成为一项必不可少的要求。原因是由于技术的进步,威胁和攻击变得越来越智能,对网络入侵检测系统或网络入侵检测与防御系统(NIDS/NIDPS)实施的现有安全措施不敏感。本文旨在描述一种新手方法如何帮助在网络内运行的应用程序实现基于配额的安全策略。它还有助于识别应用程序是攻击者还是受害者,并提供详细的日志记录来帮助管理员阻止攻击。系统主要包括三个模块:事件收集器、网络拦截器和管理服务器。它们一起在NIDS的帮助下识别攻击,以及我们试图保护的攻击者和受害者应用程序的名称和版本。本文介绍了我们在应用程序连接和事件日志部分所做的工作。在连接日志中,我们维护应用程序连接信息。连接日志信息包括连接开始和释放时间、上传和下载数据。此信息用于在组织中实现基于配额的应用程序访问策略。通过这种方式,我们实现了网络访问控制。在事件日志记录器中,我们首先将应用程序分类为攻击者和受害者。当应用程序攻击网络上易受攻击的客户端或服务器时,我们的系统识别此威胁并维护相同的事件日志。此外,如果来自我们网络的任何主机试图对网络外的任何应用程序进行攻击,我们的系统将这些应用程序识别为对网络的威胁。还为网络中的此类攻击者应用程序维护事件日志。事件日志包含源IP和目标IP、应用程序名称和版本、时间戳等信息。此事件日志用于生成管理报告。管理员可以使用这些报告对此类应用程序采取纠正措施。
{"title":"Security policy implementation using connection and event log to achieve network access control","authors":"Shalvi Dave, J. Mahadevia, Bhushan Trivedi","doi":"10.1145/2007052.2007059","DOIUrl":"https://doi.org/10.1145/2007052.2007059","url":null,"abstract":"Network as well as Host security has become an essential requirement to guard important network resources against unauthorized and unauthenticated access. The reason is that due to technology advancements, the threats and attacks are becoming all the more intelligent and insensitive to existing security measures implemented by an Network Intrusion Detection System or Network Intrusion Detection and Prevention System (NIDS/NIDPS). The paper aims to describe how a novice approach helps to implement quota-based security policy for applications running inside the network. It also helps to identify applications as an attacker or a victim and provide elaborate logging to help administrator thwart an attack. Our system introduces three main modules: Event Collector, Network Interceptor and Administrative Server. Together, they identify an attack with help of NIDS along with the name and version of the attacker and victim applications that we try to protect. This paper describes the work we have done in the application connection and event logging part. In the connection log, we maintain application connection information. The connection log information contains start and release time of connection, upload and download data. This information is used to implement a quota-based application access policy with the organization. In this way, we achieve network access control. In the event logger, we first classify an application as an attacker and a victim. When an application attacks a vulnerable client or server on the network, our system identifies this threat and maintains an event log of the same. In addition, if any host from our network tries to land an attack on any application outside the network, our system identifies such applications as threat to the network. An event log is also maintained for such attacker applications within the network. The event log contains information such as Source and Destination IP, application name and version, timestamp etc. This event log is used to generate administrative reports. The administrator, to take corrective measures for such applications, uses these reports.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115971573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient broker cloud management system 高效的代理云管理系统
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007067
G. Raj
In Cloud Computing Architecture, Brokers are responsible for providing applications to end user from Clouds. To manage Broker Cloud Communication, an efficient management infrastructure is required which also take care for cost and time to get application services. In this paper, an Efficient Broker Cloud Management (BCM), a system which works in Broker Cloud Communication Paradigm (BCCP) has been proposed to find a communication link with minimum cost of link uses between broker and cloud. An algorithm, Optimum Route Cost Finder (ORCF) has been proposed for finding optimum route between broker and cloud on the behalf of cost factor. Different VM Scheduling and VMM Allocation policies are analyzed in here which help in executing Cloudlets over VMs to select best policy for BCM System. Furthermore, this paper provided the analysis of processing cost and total execution cost on the bases of Hops Count, Bandwidth, Network Delay or Combined Approach. By using Bandwidth-Delay Product (BDP), It also analyze the link capacity. ORCF help in analyzing the processing cost and link uses cost of executing whole task and identify the total execution cost for broker.
在云计算体系结构中,代理负责从云向最终用户提供应用程序。为了管理Broker Cloud通信,需要一个有效的管理基础设施,它还需要考虑获得应用程序服务的成本和时间。本文提出了一种高效的Broker Cloud Management (BCM)系统,它是一种基于Broker Cloud Communication Paradigm (BCCP)的系统,用于在Broker和Cloud之间寻找链路使用成本最小的通信链路。提出了一种基于成本因子寻找代理与云之间最优路由的算法——最优路由成本查找器(ORCF)。本文分析了不同的VM调度和VMM分配策略,这些策略有助于在VM上执行Cloudlets,从而为BCM系统选择最佳策略。在此基础上,给出了基于跳数、带宽、网络延迟或组合方法的处理成本和总执行成本分析。利用带宽延迟积(BDP)对链路容量进行了分析。ORCF有助于分析执行整个任务的处理成本和链接使用成本,并确定代理的总执行成本。
{"title":"An efficient broker cloud management system","authors":"G. Raj","doi":"10.1145/2007052.2007067","DOIUrl":"https://doi.org/10.1145/2007052.2007067","url":null,"abstract":"In Cloud Computing Architecture, Brokers are responsible for providing applications to end user from Clouds. To manage Broker Cloud Communication, an efficient management infrastructure is required which also take care for cost and time to get application services. In this paper, an Efficient Broker Cloud Management (BCM), a system which works in Broker Cloud Communication Paradigm (BCCP) has been proposed to find a communication link with minimum cost of link uses between broker and cloud. An algorithm, Optimum Route Cost Finder (ORCF) has been proposed for finding optimum route between broker and cloud on the behalf of cost factor. Different VM Scheduling and VMM Allocation policies are analyzed in here which help in executing Cloudlets over VMs to select best policy for BCM System. Furthermore, this paper provided the analysis of processing cost and total execution cost on the bases of Hops Count, Bandwidth, Network Delay or Combined Approach. By using Bandwidth-Delay Product (BDP), It also analyze the link capacity. ORCF help in analyzing the processing cost and link uses cost of executing whole task and identify the total execution cost for broker.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Topic tracking techniques for natural language processing 自然语言处理的主题跟踪技术
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007066
K. Kaur
Text mining is a field that automatically extracts previously unknown and useful information from unstructured textual data. It has strong connections with natural language processing. NLP has produced technologies that teach computers natural language so that they may analyze, understand and even generate text. Topic tracking is one of the technologies that has been developed and can be used in the text mining process. The main purpose of topic tracking is to identify and follow events presented in multiple news sources, including newswires, radio and TV broadcasts. It collects dispersed information together and makes it easy for user to get a general understanding. In this paper, a survey of recent topic tracking techniques is presented.
文本挖掘是一个从非结构化文本数据中自动提取以前未知的有用信息的领域。它与自然语言处理有很强的联系。NLP已经产生了教计算机自然语言的技术,这样它们就可以分析、理解甚至生成文本。主题跟踪是目前已经发展起来的一种可用于文本挖掘的技术。主题跟踪的主要目的是识别和跟踪多个新闻来源中呈现的事件,包括通讯社、广播和电视广播。它将分散的信息收集在一起,便于用户有一个大致的了解。本文对近年来的话题跟踪技术进行了综述。
{"title":"Topic tracking techniques for natural language processing","authors":"K. Kaur","doi":"10.1145/2007052.2007066","DOIUrl":"https://doi.org/10.1145/2007052.2007066","url":null,"abstract":"Text mining is a field that automatically extracts previously unknown and useful information from unstructured textual data. It has strong connections with natural language processing. NLP has produced technologies that teach computers natural language so that they may analyze, understand and even generate text. Topic tracking is one of the technologies that has been developed and can be used in the text mining process. The main purpose of topic tracking is to identify and follow events presented in multiple news sources, including newswires, radio and TV broadcasts. It collects dispersed information together and makes it easy for user to get a general understanding. In this paper, a survey of recent topic tracking techniques is presented.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"72 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of various swarm-based & ant-based algorithms 各种基于群算法和基于蚁算法的分析
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007061
A. Gupta, A. Verma, H. Sadawarti
Ant algorithms and swarm intelligence systems have been offered as a novel computational approach that replaces the traditional emphasis on control, preprogramming and centralization with designs featuring autonomy, emergence and distributed functioning. These designs provide scalable, flexible and robust, able to adapt quickly changes to changing environments and to continue functioning even when individual elements fail. These properties make swarm intelligence very attractive for mobile ad hoc networks. These algorithms also provide potential advantages for conventional routing algorithms. Ant Colony Optimization is popular among other Swarm Intelligence Techniques.In this paper a detailed comparison of different Ant based algorithms is presented. The comparative results will help the researchers to understand the basic differences among various existing Ant colony based routing algorithms.
蚂蚁算法和群体智能系统作为一种新颖的计算方法,取代了传统的控制、预编程和集中的设计,具有自主性、涌现性和分布式功能。这些设计提供了可扩展、灵活和健壮的功能,能够快速适应不断变化的环境,即使单个元素失效也能继续运行。这些特性使得群体智能对移动自组织网络非常有吸引力。这些算法也为传统的路由算法提供了潜在的优势。蚁群优化是群体智能技术中比较流行的一种。本文对不同的基于Ant的算法进行了详细的比较。比较结果将有助于研究人员了解现有各种基于蚁群的路由算法之间的基本差异。
{"title":"Analysis of various swarm-based & ant-based algorithms","authors":"A. Gupta, A. Verma, H. Sadawarti","doi":"10.1145/2007052.2007061","DOIUrl":"https://doi.org/10.1145/2007052.2007061","url":null,"abstract":"Ant algorithms and swarm intelligence systems have been offered as a novel computational approach that replaces the traditional emphasis on control, preprogramming and centralization with designs featuring autonomy, emergence and distributed functioning. These designs provide scalable, flexible and robust, able to adapt quickly changes to changing environments and to continue functioning even when individual elements fail. These properties make swarm intelligence very attractive for mobile ad hoc networks. These algorithms also provide potential advantages for conventional routing algorithms. Ant Colony Optimization is popular among other Swarm Intelligence Techniques.In this paper a detailed comparison of different Ant based algorithms is presented. The comparative results will help the researchers to understand the basic differences among various existing Ant colony based routing algorithms.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127498200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Semantic web services in clouds for semantic computing 语义计算云中的语义web服务
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007100
G. S. Kang, Jaiteg Singh, M. Khanna
The progression of interleaved domains like software engineering, natural language processing, artificial intelligence, programming languages and cloud computing has resulted in evolution of concept called semantic computing. Semantic computing is responsible drilling out the requisite information and semantically analyzes the same for efficient machine training and logic development purposes. Ontology based semantic web services are indispensible for the success of the semantic computing. One can deploy cloud computing to bridge gap between distributed data sources and their use through web services
软件工程、自然语言处理、人工智能、编程语言和云计算等交叉领域的发展导致了语义计算概念的演变。语义计算负责钻出必要的信息,并对其进行语义分析,以实现高效的机器训练和逻辑开发目的。基于本体的语义web服务是语义计算成功的必要条件。可以部署云计算来弥合分布式数据源和通过web服务使用它们之间的差距
{"title":"Semantic web services in clouds for semantic computing","authors":"G. S. Kang, Jaiteg Singh, M. Khanna","doi":"10.1145/2007052.2007100","DOIUrl":"https://doi.org/10.1145/2007052.2007100","url":null,"abstract":"The progression of interleaved domains like software engineering, natural language processing, artificial intelligence, programming languages and cloud computing has resulted in evolution of concept called semantic computing. Semantic computing is responsible drilling out the requisite information and semantically analyzes the same for efficient machine training and logic development purposes. Ontology based semantic web services are indispensible for the success of the semantic computing. One can deploy cloud computing to bridge gap between distributed data sources and their use through web services","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124647293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Transformers in Automatic Speech Recognition 自动语音识别中的变压器
Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-24349-3_8
M. Evrard
{"title":"Transformers in Automatic Speech Recognition","authors":"M. Evrard","doi":"10.1007/978-3-031-24349-3_8","DOIUrl":"https://doi.org/10.1007/978-3-031-24349-3_8","url":null,"abstract":"","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125522713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transformers in Natural Language Processing 自然语言处理中的变形器
Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-24349-3_6
François Yvon
{"title":"Transformers in Natural Language Processing","authors":"François Yvon","doi":"10.1007/978-3-031-24349-3_6","DOIUrl":"https://doi.org/10.1007/978-3-031-24349-3_6","url":null,"abstract":"","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131264320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Conference on Advances in Computing and Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1