Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638185
Zhonghua Shen, Leonid Smalov
Planning requires decision making which is most important factor in the manufacturing production process. Effective decision making determines efficiency and cost of the production process. However, it is well-known that job-shop scheduling problem (JSP) is the hardest combinatorial optimisation problem, especially in the planning and managing of manufacturing processes. In this paper, a real case study of a brewery production scheduling problem is introduced which belongs to the JSP. In the brewery, orders will be received to queuing for production with a varying demand in the business process. A sequencing of orders will be allocated optimally whilst satisfying constraints subsequently forms the basis of a model-based control-theoretical approach. The paper implements three tools that included genetic algorithm; simulated annealing; ant colony optimisation to solve this problem which is to minimise the total production time and their performances are thus compared.
{"title":"Comparative Performance of Genetic Algorithm, Simulated Annealing and Ant Colony Optimisation in solving the Job-shop Scheduling Problem","authors":"Zhonghua Shen, Leonid Smalov","doi":"10.1109/ICSENG.2018.8638185","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638185","url":null,"abstract":"Planning requires decision making which is most important factor in the manufacturing production process. Effective decision making determines efficiency and cost of the production process. However, it is well-known that job-shop scheduling problem (JSP) is the hardest combinatorial optimisation problem, especially in the planning and managing of manufacturing processes. In this paper, a real case study of a brewery production scheduling problem is introduced which belongs to the JSP. In the brewery, orders will be received to queuing for production with a varying demand in the business process. A sequencing of orders will be allocated optimally whilst satisfying constraints subsequently forms the basis of a model-based control-theoretical approach. The paper implements three tools that included genetic algorithm; simulated annealing; ant colony optimisation to solve this problem which is to minimise the total production time and their performances are thus compared.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638234
Naila Mukhtar, Yinan Kong
Side-channel attacks are the class of attacks which exploits the physical leakages of the system to recover the secret key, based on the weakness induced due to implementation of algorithm on embedded systems. AES is mathematically secure but side-channel information can lead to key recovery. Over the last decade, machine learning has been introduced in parallel along with traditional statistical side-channel analysis methods. Accurate classification u sing t he machine-learning-based approaches critically depends on various factors including, precision of the input data-sets which consist of the features, tuning of different parameters for that particular algorithm, per feature sample length, number of validation folds and feature extraction/selection methods. For analysis of leaked signals in this study, hyper-parameter tuning is carried out on the feature data-sets formed on basis of the time and frequency domain properties of the signals. Results provide the comparative analysis of the best choices and leads to concrete selection of the parameters.
{"title":"Hyper-parameter Optimization for Machine-Learning based Electromagnetic Side-Channel Analysis","authors":"Naila Mukhtar, Yinan Kong","doi":"10.1109/ICSENG.2018.8638234","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638234","url":null,"abstract":"Side-channel attacks are the class of attacks which exploits the physical leakages of the system to recover the secret key, based on the weakness induced due to implementation of algorithm on embedded systems. AES is mathematically secure but side-channel information can lead to key recovery. Over the last decade, machine learning has been introduced in parallel along with traditional statistical side-channel analysis methods. Accurate classification u sing t he machine-learning-based approaches critically depends on various factors including, precision of the input data-sets which consist of the features, tuning of different parameters for that particular algorithm, per feature sample length, number of validation folds and feature extraction/selection methods. For analysis of leaked signals in this study, hyper-parameter tuning is carried out on the feature data-sets formed on basis of the time and frequency domain properties of the signals. Results provide the comparative analysis of the best choices and leads to concrete selection of the parameters.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638213
Patryk Schauer, Łukasz Falas, P. Swiatek
Internet of Things is one of the key fields of modern computer science. The development of key concepts, architectures, methods and solutions is a driving factor research in this field conducted by both, academia and enterprises. Many of those researches focus on important concepts associated with hardware architecture of devices, their sustainability, power efficiency, their connectivity with the cloud and other related topics. However current solutions and concepts related to IoT are lacking a general and standardized methodology for building such systems, which would guide IT practitioners and architects in the process of design and development of such systems. This paper addresses the introduced problem with proposition of an end-to-end methodology for development intelligent IoT systems. The introduced methodology discusses the IoT service-based system’s architecture, the role of computing and communication services and, finally, practical management methods and solutions, enabling efficient and standardized development of IoT systems.
{"title":"IoT service based systems building methodology","authors":"Patryk Schauer, Łukasz Falas, P. Swiatek","doi":"10.1109/ICSENG.2018.8638213","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638213","url":null,"abstract":"Internet of Things is one of the key fields of modern computer science. The development of key concepts, architectures, methods and solutions is a driving factor research in this field conducted by both, academia and enterprises. Many of those researches focus on important concepts associated with hardware architecture of devices, their sustainability, power efficiency, their connectivity with the cloud and other related topics. However current solutions and concepts related to IoT are lacking a general and standardized methodology for building such systems, which would guide IT practitioners and architects in the process of design and development of such systems. This paper addresses the introduced problem with proposition of an end-to-end methodology for development intelligent IoT systems. The introduced methodology discusses the IoT service-based system’s architecture, the role of computing and communication services and, finally, practical management methods and solutions, enabling efficient and standardized development of IoT systems.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131818138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638208
Suman Ghimire, Dr. Henry Selvaraj
Bitcoin is a peer-to-peer digital decentralized cryptocurrency created by an individual under pseudonym Satoshi Nakamoto. In fact, it is the first digital decentralized currency. The importance of digital cryptocurrency and the concept of blockchain have been explored by several developers and organizations. It is assumed to be one of the secure and easy payment methods that can be used in the coming days. In this paper, we survey various topics under Bitcoin such as blocks, blockchains, mining process and proof of work(PoW).
{"title":"A Survey on Bitcoin Cryptocurrency and its Mining","authors":"Suman Ghimire, Dr. Henry Selvaraj","doi":"10.1109/ICSENG.2018.8638208","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638208","url":null,"abstract":"Bitcoin is a peer-to-peer digital decentralized cryptocurrency created by an individual under pseudonym Satoshi Nakamoto. In fact, it is the first digital decentralized currency. The importance of digital cryptocurrency and the concept of blockchain have been explored by several developers and organizations. It is assumed to be one of the secure and easy payment methods that can be used in the coming days. In this paper, we survey various topics under Bitcoin such as blocks, blockchains, mining process and proof of work(PoW).","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132967377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638198
Changgeng Yu, Liping Lai
Software have been deployed in various measurement and control applications for information and network communication technology. A serious threat to system is malicious software attack that results in fake data delivery or private data disclosure. In order to increase security of the monitoring system, which software code will not be replaced and the tampered. The authors propose a software integrity measurement method based on trust transfer and Hook function. Verify pro- gram integrity during process creation, use program monitoring tools to monitor processes in the isolation environment, and update the white list in real time based on the monitoring results. Finally, experimental results demonstrating the effectiveness of prevent malicious code from destroying the integrity of the monitoring system by window platform experiment.
{"title":"Research on Model for Verifying the Integrity of Software Based on API Hook","authors":"Changgeng Yu, Liping Lai","doi":"10.1109/ICSENG.2018.8638198","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638198","url":null,"abstract":"Software have been deployed in various measurement and control applications for information and network communication technology. A serious threat to system is malicious software attack that results in fake data delivery or private data disclosure. In order to increase security of the monitoring system, which software code will not be replaced and the tampered. The authors propose a software integrity measurement method based on trust transfer and Hook function. Verify pro- gram integrity during process creation, use program monitoring tools to monitor processes in the isolation environment, and update the white list in real time based on the monitoring results. Finally, experimental results demonstrating the effectiveness of prevent malicious code from destroying the integrity of the monitoring system by window platform experiment.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638187
Antonio Pereira dos Santos, Z. Chaczko
Blockchain has been evolving and gaining new heights over the years. The shift in the perspective is allowing new user cases beyond the cryptocurrency space. Cryptocurrencies are digital assets supported by the complexities of cryptography, game theory and peer-to-peer networks. Blockchain became a popular platform for decentralized applications, as well as a valuable tool for start-ups seeking fundraising. The aim of this research paper is to review and assess the status quo for each branch of use cases, and then analyze the enabling and inhibiting factors influencing the adoption of blockchain. These findings permit a broader comprehension over the concepts backing blockchain. It will help new users to establish strategies, develop solutions and encourage the employment of blockchain technology.
{"title":"Blockchain: Status-Quo, Enablers and Inhibitors","authors":"Antonio Pereira dos Santos, Z. Chaczko","doi":"10.1109/ICSENG.2018.8638187","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638187","url":null,"abstract":"Blockchain has been evolving and gaining new heights over the years. The shift in the perspective is allowing new user cases beyond the cryptocurrency space. Cryptocurrencies are digital assets supported by the complexities of cryptography, game theory and peer-to-peer networks. Blockchain became a popular platform for decentralized applications, as well as a valuable tool for start-ups seeking fundraising. The aim of this research paper is to review and assess the status quo for each branch of use cases, and then analyze the enabling and inhibiting factors influencing the adoption of blockchain. These findings permit a broader comprehension over the concepts backing blockchain. It will help new users to establish strategies, develop solutions and encourage the employment of blockchain technology.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120965032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638175
Salman Hussain, M. Chowdhury
In the past two decades with the rise of Big data, cloud computing and IoT the world has seen an explosion in the way data is generated, stored and analysed. Data analytics has become the driving factor of many businesses, many of which are interlinked with one another or operate in various parts of the world. Data storage is now very much geographically distributed, and the era of dedicated datacentres is long gone. Currently, there are many scenarios where data resides on various datacentres or cloud, which have heterogenous computational capacity, network capacity and are geographically distributed. Unfortunately, the current paradigms available perform poorly in such scenarios. This has given rise to the need for a computational paradigm that is capable of analysing data over a geo graphically distributed environment.In this paper we propose using a hierarchical framework to improve the performance of Hadoop in a multi cloud or a geographically distributed environment. We have chosen Hadoop due to it being an implementation of the popular map reduce paradigm. The proposed framework considers all the heterogeneity and uses it carry out a dynamic job scheduling strategy capable enough of giving the best execution path with the least latency. The framework basically dictates the use of best possible job scheduling technique to be used in a geo distributed environment by keeping the Hadoop framework intact. The low-level computations would be taken care of by the plain Hadoop implementation, however the job scheduling and the data distribution is where the proposed framework shines.Our primary focus in this work has been to setup a software prototype of the execution environment to describe, devise and calculate factors that would be vital in predicting the best execution path and the data division methodology. We were successful in setting up a semi virtual prototype environment using 3 machines, the prototype met all the theoretical and practical benchmarks as a geo distributed multi cloud environment. Test runs were done, and the two primary factors namely computational factor and reduction factor were calculated.
{"title":"A NOVEL MIDDLEWARE FRAMEWORK FOR IMPLEMENTING BIGDATA ANALYTICS IN MULTI CLOUD ENVIRONMENT","authors":"Salman Hussain, M. Chowdhury","doi":"10.1109/ICSENG.2018.8638175","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638175","url":null,"abstract":"In the past two decades with the rise of Big data, cloud computing and IoT the world has seen an explosion in the way data is generated, stored and analysed. Data analytics has become the driving factor of many businesses, many of which are interlinked with one another or operate in various parts of the world. Data storage is now very much geographically distributed, and the era of dedicated datacentres is long gone. Currently, there are many scenarios where data resides on various datacentres or cloud, which have heterogenous computational capacity, network capacity and are geographically distributed. Unfortunately, the current paradigms available perform poorly in such scenarios. This has given rise to the need for a computational paradigm that is capable of analysing data over a geo graphically distributed environment.In this paper we propose using a hierarchical framework to improve the performance of Hadoop in a multi cloud or a geographically distributed environment. We have chosen Hadoop due to it being an implementation of the popular map reduce paradigm. The proposed framework considers all the heterogeneity and uses it carry out a dynamic job scheduling strategy capable enough of giving the best execution path with the least latency. The framework basically dictates the use of best possible job scheduling technique to be used in a geo distributed environment by keeping the Hadoop framework intact. The low-level computations would be taken care of by the plain Hadoop implementation, however the job scheduling and the data distribution is where the proposed framework shines.Our primary focus in this work has been to setup a software prototype of the execution environment to describe, devise and calculate factors that would be vital in predicting the best execution path and the data division methodology. We were successful in setting up a semi virtual prototype environment using 3 machines, the prototype met all the theoretical and practical benchmarks as a geo distributed multi cloud environment. Test runs were done, and the two primary factors namely computational factor and reduction factor were calculated.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128479373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638203
Takumi Fujimori, Minoru Watanabe
The damaged reactors and melted nuclear fuel of the Fukushima Daiichi nuclear power plant present an extremely intense radiation environment. Decommissioning project members are estimating that the maximum radiation intensity around the melted reactors and melted nuclear fuel is 1000 Sv/h. Since humans cannot approach the region, robots must take the lead in decommissioning operations. Such robots need semiconductor devices for operations. However, such devices are exceptionally vulnerable to radiation. Therefore, a radiation-hardened optically reconfigurable gate array (ORGA) has under development Although the ORGA is also constructed using the same radiation-vulnerable semiconductor technology as that used in currently available radiation-hardened devices, ORGAs use a holographic memory technology to increase the radiation tolerance of semiconductor device components. The soft-error tolerance has been confirmed using an americium alpha particle radiation source (Am-241) as 181 times higher than Artix-7 FPGAs using a high-speed optical scrubbing operation.
{"title":"Soft-error tolerance of an optically reconfigurable gate array VLSI","authors":"Takumi Fujimori, Minoru Watanabe","doi":"10.1109/ICSENG.2018.8638203","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638203","url":null,"abstract":"The damaged reactors and melted nuclear fuel of the Fukushima Daiichi nuclear power plant present an extremely intense radiation environment. Decommissioning project members are estimating that the maximum radiation intensity around the melted reactors and melted nuclear fuel is 1000 Sv/h. Since humans cannot approach the region, robots must take the lead in decommissioning operations. Such robots need semiconductor devices for operations. However, such devices are exceptionally vulnerable to radiation. Therefore, a radiation-hardened optically reconfigurable gate array (ORGA) has under development Although the ORGA is also constructed using the same radiation-vulnerable semiconductor technology as that used in currently available radiation-hardened devices, ORGAs use a holographic memory technology to increase the radiation tolerance of semiconductor device components. The soft-error tolerance has been confirmed using an americium alpha particle radiation source (Am-241) as 181 times higher than Artix-7 FPGAs using a high-speed optical scrubbing operation.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638020
Shuxiang Song, Z. Wei, Haiying Xia, Mingcan Cen, Chaobo Cai
Although lithium battery has the characteristics of high charge and discharge rate and energy density, its chemical activity is very high. Since the SOC of lithium battery cannot be directly tested, this paper presents a method of estimating the SOC of the battery by the T-S fuzzy neural network regression. Firstly, a T-S fuzzy neural network regression model was constructed. Take the battery voltage, battery current and battery temperature as the training input of the model, and take the corresponding SOC as the training output of the model. And then, used the T-S fuzzy neural network algorithm for model training . Finally, the training model was applied to the battery SOC estimation. The experimental results show that this method can estimate the SOC effectively, improve the estimation accuracy, and has high computational efficiency. This model may provide a theoretical reference for the model construction of future battery charge estimation system.
{"title":"State-of-charge (SOC) estimation using T-S Fuzzy Neural Network for Lithium Iron Phosphate Battery","authors":"Shuxiang Song, Z. Wei, Haiying Xia, Mingcan Cen, Chaobo Cai","doi":"10.1109/ICSENG.2018.8638020","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638020","url":null,"abstract":"Although lithium battery has the characteristics of high charge and discharge rate and energy density, its chemical activity is very high. Since the SOC of lithium battery cannot be directly tested, this paper presents a method of estimating the SOC of the battery by the T-S fuzzy neural network regression. Firstly, a T-S fuzzy neural network regression model was constructed. Take the battery voltage, battery current and battery temperature as the training input of the model, and take the corresponding SOC as the training output of the model. And then, used the T-S fuzzy neural network algorithm for model training . Finally, the training model was applied to the battery SOC estimation. The experimental results show that this method can estimate the SOC effectively, improve the estimation accuracy, and has high computational efficiency. This model may provide a theoretical reference for the model construction of future battery charge estimation system.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121864706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSENG.2018.8638183
M. Akbar, B. Gabrys
Parallel coordinates plots (PCPs) suffer from curse of dimensionality when used with larger multidimensional datasets. Curse of dimentionality results in clutter which hides important visual data trends among coordinates. A number of solutions to address this problem have been proposed including filtering, aggregation, and dimension reordering. These solutions, however, have their own limitations with regard to exploring relationships and trends among the coordinates in PCPs. Correlation based coordinates reordering techniques are among the most popular and have been widely used in PCPs to reduce clutter, though based on the conducted experiments, this research has identified some of their limitations. To achieve better visualization with reduced clutter, we have proposed and evaluated dimensions reordering approach based on minimization of the number of crossing pairs. In the last step, k-means clustering is combined with reordered coordinates to highlight key trends and patterns. The conducted comparative analysis have shown that minimum crossings pairs approach performed much better than other applied techniques for coordinates reordering, and when combined with k-means clustering, resulted in better visualization with significantly reduced clutter.
{"title":"Data Analytics Enhanced Data Visualization and Interrogation with Parallel Coordinates Plots","authors":"M. Akbar, B. Gabrys","doi":"10.1109/ICSENG.2018.8638183","DOIUrl":"https://doi.org/10.1109/ICSENG.2018.8638183","url":null,"abstract":"Parallel coordinates plots (PCPs) suffer from curse of dimensionality when used with larger multidimensional datasets. Curse of dimentionality results in clutter which hides important visual data trends among coordinates. A number of solutions to address this problem have been proposed including filtering, aggregation, and dimension reordering. These solutions, however, have their own limitations with regard to exploring relationships and trends among the coordinates in PCPs. Correlation based coordinates reordering techniques are among the most popular and have been widely used in PCPs to reduce clutter, though based on the conducted experiments, this research has identified some of their limitations. To achieve better visualization with reduced clutter, we have proposed and evaluated dimensions reordering approach based on minimization of the number of crossing pairs. In the last step, k-means clustering is combined with reordered coordinates to highlight key trends and patterns. The conducted comparative analysis have shown that minimum crossings pairs approach performed much better than other applied techniques for coordinates reordering, and when combined with k-means clustering, resulted in better visualization with significantly reduced clutter.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127839262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}