首页 > 最新文献

Int. J. Nat. Comput. Res.最新文献

英文 中文
Classification of Rusty and Non-Rusty Images: A Machine Learning Approach 生锈和未生锈图像的分类:一种机器学习方法
Pub Date : 2020-10-01 DOI: 10.4018/ijncr.2020100101
Mridu Sahu, T. Jani, Maski Saijahnavi, Amrit Kumar, U. Chaurasiya, Samrudhi Mohdiwale
Rust detection is necessary for proper working and maintenance of machines for security purposes. Images are one of the suggested platforms for rust detection in which rust can be detected even though the human can't reach to the area. However, there are a lack of online databases available that can provide a sizable dataset to identify the most suitable model that can be used further. This paper provides a data augmentation technique by using Perlin noise, and further, the generated images are tested on standard features (i.e., statistical values, entropy, along with SIFT and SURF methods). The two most generalized classifiers, naïve Bayes and support vector machine, are identified and tested to obtain the performance of classification of rusty and non-rusty images. The support vector machine provides better classification accuracy, which also suggests that that the combined features of statistics, SIFT, and SURF are able to differentiate the images. Hence, it can be further used to detect the rust in different parts of machines.
防锈检测对于机器的正常工作和维护是必要的。图像是生锈检测的建议平台之一,即使人类无法到达该区域,也可以检测到生锈。然而,缺乏可用的在线数据库,可以提供相当大的数据集,以确定可以进一步使用的最合适的模型。本文提供了一种使用Perlin噪声的数据增强技术,并进一步对生成的图像进行标准特征(即统计值,熵,以及SIFT和SURF方法)的测试。对两种最广义的分类器naïve贝叶斯和支持向量机进行了识别和测试,获得了对生锈和未生锈图像的分类性能。支持向量机提供了更好的分类精度,这也表明统计学、SIFT和SURF的结合特征能够区分图像。因此,它可以进一步用于检测机器不同部位的锈蚀。
{"title":"Classification of Rusty and Non-Rusty Images: A Machine Learning Approach","authors":"Mridu Sahu, T. Jani, Maski Saijahnavi, Amrit Kumar, U. Chaurasiya, Samrudhi Mohdiwale","doi":"10.4018/ijncr.2020100101","DOIUrl":"https://doi.org/10.4018/ijncr.2020100101","url":null,"abstract":"Rust detection is necessary for proper working and maintenance of machines for security purposes. Images are one of the suggested platforms for rust detection in which rust can be detected even though the human can't reach to the area. However, there are a lack of online databases available that can provide a sizable dataset to identify the most suitable model that can be used further. This paper provides a data augmentation technique by using Perlin noise, and further, the generated images are tested on standard features (i.e., statistical values, entropy, along with SIFT and SURF methods). The two most generalized classifiers, naïve Bayes and support vector machine, are identified and tested to obtain the performance of classification of rusty and non-rusty images. The support vector machine provides better classification accuracy, which also suggests that that the combined features of statistics, SIFT, and SURF are able to differentiate the images. Hence, it can be further used to detect the rust in different parts of machines.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133957176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Approach to Tracking and Characterizing Planar or Near Planar Fluid Flow 一种跟踪和表征平面或近平面流体流动的机器学习方法
Pub Date : 2020-07-01 DOI: 10.4018/ijncr.2020070105
M. Gooroochurn, D. Kerr, K. Bouazza-Marouf
This paper presents a framework to segment planar or near-planar fluid flow and uses artificial neural networks to characterize fluid flow by determining the rate of flow and source of the fluid, which can be applied in various areas (e.g., characterizing fluid flow in surface irrigation from aerial pictures, in leakage detection, and in surgical robotics for characterizing blood flow over an operative site). For the latter, the outcome enables to assess bleeding severity and find the source of the bleeding. Based on its importance in assessing injuries and from a medical perspective in directing the course of surgery, fluid flow assessment is deemed to be a desirable addition to a surgical robot's capabilities. The results from tests on fluid flows generated from a test rig show that the proposed methods can contribute to an automated characterization of fluid flow, which in the presence of several fluid flow sources can be achieved by tracking the flows, determining the locations of the sources and their relative severities, with execution times suitable for real-time operation.
本文提出了一个平面或近平面流体分割的框架,并利用人工神经网络通过确定流体的流速和来源来表征流体流动,这可以应用于各个领域(例如,从航空图像中表征地表灌溉中的流体流动,泄漏检测,以及用于表征手术部位血流的外科机器人)。对于后者,结果能够评估出血严重程度并找到出血的来源。基于其在评估损伤和从医学角度指导手术过程中的重要性,流体流量评估被认为是手术机器人功能的理想补充。在一个试验台上对流体流动的测试结果表明,所提出的方法可以实现流体流动的自动化表征,在存在多个流体流动源的情况下,可以通过跟踪流动,确定源的位置及其相对严重程度来实现,执行时间适合实时操作。
{"title":"A Machine Learning Approach to Tracking and Characterizing Planar or Near Planar Fluid Flow","authors":"M. Gooroochurn, D. Kerr, K. Bouazza-Marouf","doi":"10.4018/ijncr.2020070105","DOIUrl":"https://doi.org/10.4018/ijncr.2020070105","url":null,"abstract":"This paper presents a framework to segment planar or near-planar fluid flow and uses artificial neural networks to characterize fluid flow by determining the rate of flow and source of the fluid, which can be applied in various areas (e.g., characterizing fluid flow in surface irrigation from aerial pictures, in leakage detection, and in surgical robotics for characterizing blood flow over an operative site). For the latter, the outcome enables to assess bleeding severity and find the source of the bleeding. Based on its importance in assessing injuries and from a medical perspective in directing the course of surgery, fluid flow assessment is deemed to be a desirable addition to a surgical robot's capabilities. The results from tests on fluid flows generated from a test rig show that the proposed methods can contribute to an automated characterization of fluid flow, which in the presence of several fluid flow sources can be achieved by tracking the flows, determining the locations of the sources and their relative severities, with execution times suitable for real-time operation.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115768788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anatomical Therapeutic Chemical Classification (ATC) With Multi-Label Learners and Deep Features 基于多标签学习器和深度特征的解剖治疗化学分类(ATC)
Pub Date : 2020-07-01 DOI: 10.4018/ijncr.2020070102
L. Nanni, S. Brahnam, Gianluca Maguolo
Automatic anatomical therapeutic chemical (ATC) classification predicts an unknown compound's therapeutic and chemical characteristics. Predicting the organs/systems an unidentified compound will act on has the potential of expediting drug development and research. That a given compound can affect multiple organs/systems makes automatic ATC classification a complex problem. In this paper, the authors experimentally develop a multi-label ensemble for ATC prediction. The proposed approach extracts a 1D feature vector based on a compound's chemical-chemical interaction and its structural and fingerprint similarities to other compounds, as defined by the ATC coding system. This 1D vector is reshaped into 2D matrices and fed into seven pre-trained convolutional neural networks (CNN). A bidirectional long short-term memory network (BiLSTM) is trained on the 1D vector. Features extracted from both deep learners are then trained on multi-label classifiers, with results fused. The best system proposed here is shown to outperform other methods reported in the literature.
自动解剖治疗化学(ATC)分类预测未知化合物的治疗和化学特性。预测未知化合物将作用于的器官/系统具有加速药物开发和研究的潜力。一个给定的化合物可以影响多个器官/系统,这使得自动ATC分类成为一个复杂的问题。在本文中,作者实验开发了一个用于ATC预测的多标签集成。该方法根据ATC编码系统定义的化合物的化学-化学相互作用及其与其他化合物的结构和指纹相似性提取1D特征向量。这个一维向量被重塑成二维矩阵,并输入到七个预训练的卷积神经网络(CNN)中。在一维向量上训练双向长短期记忆网络(BiLSTM)。然后在多标签分类器上训练从两个深度学习器中提取的特征,并融合结果。这里提出的最佳系统被证明优于文献中报道的其他方法。
{"title":"Anatomical Therapeutic Chemical Classification (ATC) With Multi-Label Learners and Deep Features","authors":"L. Nanni, S. Brahnam, Gianluca Maguolo","doi":"10.4018/ijncr.2020070102","DOIUrl":"https://doi.org/10.4018/ijncr.2020070102","url":null,"abstract":"Automatic anatomical therapeutic chemical (ATC) classification predicts an unknown compound's therapeutic and chemical characteristics. Predicting the organs/systems an unidentified compound will act on has the potential of expediting drug development and research. That a given compound can affect multiple organs/systems makes automatic ATC classification a complex problem. In this paper, the authors experimentally develop a multi-label ensemble for ATC prediction. The proposed approach extracts a 1D feature vector based on a compound's chemical-chemical interaction and its structural and fingerprint similarities to other compounds, as defined by the ATC coding system. This 1D vector is reshaped into 2D matrices and fed into seven pre-trained convolutional neural networks (CNN). A bidirectional long short-term memory network (BiLSTM) is trained on the 1D vector. Features extracted from both deep learners are then trained on multi-label classifiers, with results fused. The best system proposed here is shown to outperform other methods reported in the literature.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"53 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128935798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks 多sink分层无线传感器网络中的智能认证模型
Pub Date : 2020-07-01 DOI: 10.4018/ijncr.2020070103
Anusha Vangala, Sachi Pandey, P. Parwekar, Ikechi Augustine Ukaegbu
A wireless sensor network consists of a number of sensors laid out in a field with mobile sinks dynamically aggregating data from the nodes. Sensitive applications such as military environment require the sink to identify if a sensor that it visits is legitimate, and in turn, the sensor has to ensure that the sink is authenticated to access its sensitive data. For the system to intelligently learn the credentials of non-malicious sink and non-malicious sensors based on the dynamically observed data, four approaches using access control lists, authenticator tokens, message digests, and elliptic curve variant of RSA algorithm are proposed along with the formal logic for correctness. The experimented data is analysed using false acceptance rate, false rejection rate, precision, and curve analysis parameters. The approaches are further compared based on the attacks they are vulnerable to and execution time, ultimately concluding that exchange of message digests and elliptic curve RSA algorithm are more widely applicable.
无线传感器网络由多个传感器组成,这些传感器布置在现场,移动接收器动态地聚合来自节点的数据。敏感的应用,如军事环境,需要接收器识别其访问的传感器是否合法,反过来,传感器必须确保接收器通过身份验证才能访问其敏感数据。针对系统基于动态观测数据智能学习非恶意接收器和非恶意传感器的凭证,提出了访问控制列表、认证令牌、消息摘要和RSA算法的椭圆曲线变体四种方法,并给出了正确性的形式逻辑。用误接受率、误拒率、精度和曲线分析参数对实验数据进行了分析。从易受攻击的程度和执行时间等方面对两种算法进行了比较,最终得出消息摘要交换算法和椭圆曲线RSA算法适用范围更广的结论。
{"title":"Intelligent Authentication Model in a Hierarchical Wireless Sensor Network With Multiple Sinks","authors":"Anusha Vangala, Sachi Pandey, P. Parwekar, Ikechi Augustine Ukaegbu","doi":"10.4018/ijncr.2020070103","DOIUrl":"https://doi.org/10.4018/ijncr.2020070103","url":null,"abstract":"A wireless sensor network consists of a number of sensors laid out in a field with mobile sinks dynamically aggregating data from the nodes. Sensitive applications such as military environment require the sink to identify if a sensor that it visits is legitimate, and in turn, the sensor has to ensure that the sink is authenticated to access its sensitive data. For the system to intelligently learn the credentials of non-malicious sink and non-malicious sensors based on the dynamically observed data, four approaches using access control lists, authenticator tokens, message digests, and elliptic curve variant of RSA algorithm are proposed along with the formal logic for correctness. The experimented data is analysed using false acceptance rate, false rejection rate, precision, and curve analysis parameters. The approaches are further compared based on the attacks they are vulnerable to and execution time, ultimately concluding that exchange of message digests and elliptic curve RSA algorithm are more widely applicable.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent Visual Tracking in Unstabilized Videos 不稳定视频中的智能视觉跟踪
Pub Date : 2020-07-01 DOI: 10.4018/ijncr.2020070104
Kamlesh Verma, D. Ghosh, Harsh Saxena, Himanshu Singh, Rajeev Marathe, Avnish Kumar
Visual tracking requirement is increasing day by day due to the availability of high-performance digital cameras at low prices. Visual tracking becomes a complex problem when cameras suffer with unwanted and unintentional motion, resulting in motion-blurred unstabilized video. The problem in hand becomes more challenging when the target of interest is to be detected automatically in this unstabilized video. This paper presents a comprehensive single intelligent solution for these problems. The proposed algorithm auto-detects the camera motion, filters out the unintentional motion while stabilizing the video keeping intentional motion only using speeded-up robust features (SURF) technique. Motion smear due to unstabilization is also removed, providing sharp stabilized video output with video quality enhancement of up to 20dB. Gabor filter is used innovatively for auto-detection of target of interest in each stabilized frame. Then the target is tracked using SURF method.
由于高性能、低价格的数码相机的出现,对视觉跟踪的需求日益增加。当摄像机遭受不必要和无意的运动时,视觉跟踪成为一个复杂的问题,导致运动模糊的不稳定视频。当在这个不稳定的视频中自动检测感兴趣的目标时,手头的问题变得更具挑战性。本文针对这些问题提出了一种综合的单一智能解决方案。该算法利用加速鲁棒特征(SURF)技术自动检测摄像机运动,过滤掉无意运动,同时稳定视频,保持有意运动。由于不稳定的运动涂抹也被消除,提供清晰稳定的视频输出,视频质量提高高达20dB。创新地使用Gabor滤波器在每个稳定帧中自动检测感兴趣的目标。然后用SURF方法对目标进行跟踪。
{"title":"Intelligent Visual Tracking in Unstabilized Videos","authors":"Kamlesh Verma, D. Ghosh, Harsh Saxena, Himanshu Singh, Rajeev Marathe, Avnish Kumar","doi":"10.4018/ijncr.2020070104","DOIUrl":"https://doi.org/10.4018/ijncr.2020070104","url":null,"abstract":"Visual tracking requirement is increasing day by day due to the availability of high-performance digital cameras at low prices. Visual tracking becomes a complex problem when cameras suffer with unwanted and unintentional motion, resulting in motion-blurred unstabilized video. The problem in hand becomes more challenging when the target of interest is to be detected automatically in this unstabilized video. This paper presents a comprehensive single intelligent solution for these problems. The proposed algorithm auto-detects the camera motion, filters out the unintentional motion while stabilizing the video keeping intentional motion only using speeded-up robust features (SURF) technique. Motion smear due to unstabilization is also removed, providing sharp stabilized video output with video quality enhancement of up to 20dB. Gabor filter is used innovatively for auto-detection of target of interest in each stabilized frame. Then the target is tracked using SURF method.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Historical Handwritten Kannada Characters Using Local Binary Pattern Features 基于局部二值模式特征的历史手写体卡纳达字识别
Pub Date : 2020-07-01 DOI: 10.4018/ijncr.2020070101
G. Thippeswamy, H. Chandrakala
Archaeological departments throughout the world have undertaken massive digitization projects to digitize their historical document corpus. In order to provide worldwide visibility to these historical documents residing in the digital libraries, a character recognition system is an inevitable tool. Automatic character recognition is a challenging problem as it needs a cautious blend of enhancement, segmentation, feature extraction, and classification techniques. This work presents a novel holistic character recognition system for the digitized Estampages of Historical Handwritten Kannada Stone Inscriptions (EHHKSI) belonging to 11th century. First, the EHHKSI images are enhanced using Retinex and Morphological operations to remove the degradations. Second, the images are segmented into characters by connected component labeling. Third, LBP features are extracted from these characters. Finally, decision tree is used to learn these features and classify the characters into appropriate classes. The LBP features improved the performance of the system significantly.
世界各地的考古部门都进行了大量的数字化项目,将他们的历史文献语料库数字化。为了使这些保存在数字图书馆中的历史文献在世界范围内可见,字符识别系统是一种不可避免的工具。自动字符识别是一个具有挑战性的问题,因为它需要谨慎地混合增强、分割、特征提取和分类技术。本文提出了一种全新的11世纪古卡纳达文手写体石刻数字化刻本的整体汉字识别系统。首先,使用Retinex和形态学操作增强EHHKSI图像以去除退化。其次,通过连通分量标记将图像分割成字符;第三,提取LBP特征。最后,使用决策树来学习这些特征,并将字符分类到适当的类别中。LBP特性显著提高了系统的性能。
{"title":"Recognition of Historical Handwritten Kannada Characters Using Local Binary Pattern Features","authors":"G. Thippeswamy, H. Chandrakala","doi":"10.4018/ijncr.2020070101","DOIUrl":"https://doi.org/10.4018/ijncr.2020070101","url":null,"abstract":"Archaeological departments throughout the world have undertaken massive digitization projects to digitize their historical document corpus. In order to provide worldwide visibility to these historical documents residing in the digital libraries, a character recognition system is an inevitable tool. Automatic character recognition is a challenging problem as it needs a cautious blend of enhancement, segmentation, feature extraction, and classification techniques. This work presents a novel holistic character recognition system for the digitized Estampages of Historical Handwritten Kannada Stone Inscriptions (EHHKSI) belonging to 11th century. First, the EHHKSI images are enhanced using Retinex and Morphological operations to remove the degradations. Second, the images are segmented into characters by connected component labeling. Third, LBP features are extracted from these characters. Finally, decision tree is used to learn these features and classify the characters into appropriate classes. The LBP features improved the performance of the system significantly.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Systematic Memory Forensic Analysis of Ransomware using Digital Forensic Tools 使用数字取证工具对勒索软件进行系统内存取证分析
Pub Date : 2020-04-01 DOI: 10.4018/ijncr.2020040105
Paulraj Joseph, J. Norman
Cybercrimes catastrophically caused great financial loss in the year 2018 as powerful obfuscated malware known as ransomware continued to be a continual threat to governments and organizations. Advanced malwares capable of system encryption with sophisticated obscure keys left organizations paying the ransom that hackers demand. Since every individual is vulnerable to this assault, cyber forensics play a vital role either in educating society or combating the attacks. As cyber forensics is classified into many subdomains, memory forensics is the domain that leads in curbing these types of attacks. This article gives insight on importance of memory forensics and provides widespread analysis on working of ransomware, recognizes the workflow, provides the ways to overcome this attack. Furthermore, this article implements user defined rules by integrating into powerful search tools known as YARA to detect and prevent the ransomware attacks.
网络犯罪在2018年造成了巨大的经济损失,因为被称为勒索软件的强大的模糊恶意软件继续对政府和组织构成持续威胁。高级恶意软件能够使用复杂的模糊密钥进行系统加密,使组织支付黑客要求的赎金。由于每个人都容易受到这种攻击,因此网络取证在教育社会或打击攻击方面发挥着至关重要的作用。由于网络取证分为许多子领域,内存取证是遏制这些类型攻击的主要领域。本文深入了解了内存取证的重要性,并提供了对勒索软件工作的广泛分析,识别了工作流程,并提供了克服这种攻击的方法。此外,本文通过集成到称为YARA的强大搜索工具中来实现用户定义的规则,以检测和防止勒索软件攻击。
{"title":"Systematic Memory Forensic Analysis of Ransomware using Digital Forensic Tools","authors":"Paulraj Joseph, J. Norman","doi":"10.4018/ijncr.2020040105","DOIUrl":"https://doi.org/10.4018/ijncr.2020040105","url":null,"abstract":"Cybercrimes catastrophically caused great financial loss in the year 2018 as powerful obfuscated malware known as ransomware continued to be a continual threat to governments and organizations. Advanced malwares capable of system encryption with sophisticated obscure keys left organizations paying the ransom that hackers demand. Since every individual is vulnerable to this assault, cyber forensics play a vital role either in educating society or combating the attacks. As cyber forensics is classified into many subdomains, memory forensics is the domain that leads in curbing these types of attacks. This article gives insight on importance of memory forensics and provides widespread analysis on working of ransomware, recognizes the workflow, provides the ways to overcome this attack. Furthermore, this article implements user defined rules by integrating into powerful search tools known as YARA to detect and prevent the ransomware attacks.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122565670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Software-Based Validation of the Differentiation Scheme for Ethernet and Wireless LAN Access Network Types Using an End-to-End Approach 基于端到端方法的以太网和无线局域网接入网类型区分方案的软件验证
Pub Date : 2020-04-01 DOI: 10.4018/ijncr.2020040104
P. Parwekar, A. Bakambekova, Talgat Bizhigit, Yeldar Toleubay
Different access network types are characterized by a variety of attributes which include link bandwidths, physical media, capacity, and reliability. Therefore, the question of accurately identifying whether the sender uses a wired ethernet connection or a wireless LAN connection comes into place. This article aims to analyse, simulate, validate, and improve the existing classification scheme which is based on measuring entropy of packet pair inter-arrival times and median. A riverbed modeller (former OPNET) is used for simulating the different scenarios. Small-scale experiment conducted on campus at the Nazarbayev University (NU) validates the insignificance of the packet probe size chosen for the classification.
不同的接入网类型具有不同的属性,包括链路带宽、物理介质、容量和可靠性。因此,准确识别发送者是使用有线以太网连接还是无线局域网连接的问题就出现了。本文旨在分析、仿真、验证和改进现有的基于数据包对间隔到达时间和中值熵的分类方案。河床建模器(以前的OPNET)用于模拟不同的场景。在纳扎尔巴耶夫大学(NU)校园进行的小规模实验验证了用于分类的数据包探测大小的不重要性。
{"title":"Software-Based Validation of the Differentiation Scheme for Ethernet and Wireless LAN Access Network Types Using an End-to-End Approach","authors":"P. Parwekar, A. Bakambekova, Talgat Bizhigit, Yeldar Toleubay","doi":"10.4018/ijncr.2020040104","DOIUrl":"https://doi.org/10.4018/ijncr.2020040104","url":null,"abstract":"Different access network types are characterized by a variety of attributes which include link bandwidths, physical media, capacity, and reliability. Therefore, the question of accurately identifying whether the sender uses a wired ethernet connection or a wireless LAN connection comes into place. This article aims to analyse, simulate, validate, and improve the existing classification scheme which is based on measuring entropy of packet pair inter-arrival times and median. A riverbed modeller (former OPNET) is used for simulating the different scenarios. Small-scale experiment conducted on campus at the Nazarbayev University (NU) validates the insignificance of the packet probe size chosen for the classification.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134286051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Exploration of Mixed DNA Samples by Forensic Biological Data 混合DNA样本的法医生物学数据探索
Pub Date : 2020-04-01 DOI: 10.4018/ijncr.2020040101
K. Vani, K. P. Kumar, Geethika Kodali, Naveen Pothineni, S. Aravapalli
This article presents criminal bioinformatics approach which turned out to be fast, exact, and definitive in the evaluation and the investigation of crude DNA profiling information. The most problematic scenario for mixture interpretation, however, is when the amount of DNA is limited for one or more of the sources in a mixture. The present study has examined the utility of legal bioinformatics application to Short Tandem Repeats (STR) information. The DNA profiling information is overseen and investigated on the grounds of the different loci display and changeability in various people. The authors have consolidated a similar general idea Inconstancy in STR areas can be utilized to recognize one DNA profile from another.
本文介绍了一种快速、准确、明确的犯罪生物信息学方法,用于对原始DNA分析信息的评估和调查。然而,对于混合解释来说,最有问题的情况是当混合物中一个或多个来源的DNA数量有限时。本研究探讨了法律生物信息学应用于短串联重复序列(STR)信息的效用。基于不同人的不同位点显示和可变性,对DNA分析信息进行监督和调查。作者已经巩固了一个类似的一般想法,在STR区域的不稳定性可以用来识别一个DNA图谱从另一个。
{"title":"An Exploration of Mixed DNA Samples by Forensic Biological Data","authors":"K. Vani, K. P. Kumar, Geethika Kodali, Naveen Pothineni, S. Aravapalli","doi":"10.4018/ijncr.2020040101","DOIUrl":"https://doi.org/10.4018/ijncr.2020040101","url":null,"abstract":"This article presents criminal bioinformatics approach which turned out to be fast, exact, and definitive in the evaluation and the investigation of crude DNA profiling information. The most problematic scenario for mixture interpretation, however, is when the amount of DNA is limited for one or more of the sources in a mixture. The present study has examined the utility of legal bioinformatics application to Short Tandem Repeats (STR) information. The DNA profiling information is overseen and investigated on the grounds of the different loci display and changeability in various people. The authors have consolidated a similar general idea Inconstancy in STR areas can be utilized to recognize one DNA profile from another.","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122074881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Batch Mode Fault Tolerance Strategy in Desktop Grids 桌面网格中的混合批处理模式容错策略
Pub Date : 2020-04-01 DOI: 10.4018/ijncr.2020040103
G. Rani, J. Bansal
Desktop grids make use of unused resources of personal computers provided by volunteers to work as a huge processor and make them available to users that need them. The rate of heterogeneity, volatility, and unreliability is higher in case of a desktop grid in comparison to conventional systems. Therefore, the application of fault tolerance strategies becomes an inevitable requirement. In this article, a hybrid fault tolerance strategy is proposed which works in three phases. First, two phases deal with the task and resource scheduling in which appropriate scheduling decisions are taken in order to select the most suitable resource for a task. Even if any failure occurs, it is then recovered in the third phase by using rescheduling and checkpointing. The proposed strategy is compared against existing hybrid fault tolerance scheduling strategies and ensures a 100% success rate and processor utilization and outperforms by a factor of 3.5%, 0.4%, and 0.1% when turnaround time, throughput, and makespan, respectively, are taken into account
桌面网格利用志愿者提供的个人电脑中未使用的资源作为一个巨大的处理器,并将它们提供给需要它们的用户。与传统系统相比,桌面网格的异构性、波动性和不可靠性更高。因此,容错策略的应用成为必然要求。本文提出了一种分三个阶段工作的混合容错策略。首先,两个阶段处理任务和资源调度,其中采取适当的调度决策,以便为任务选择最合适的资源。即使发生了任何故障,也会在第三阶段通过使用重新调度和检查点来恢复故障。将所提出的策略与现有的混合容错调度策略进行比较,可以确保100%的成功率和处理器利用率,并且在考虑周转时间、吞吐量和完工时间时,性能分别高出3.5%、0.4%和0.1%
{"title":"A Hybrid Batch Mode Fault Tolerance Strategy in Desktop Grids","authors":"G. Rani, J. Bansal","doi":"10.4018/ijncr.2020040103","DOIUrl":"https://doi.org/10.4018/ijncr.2020040103","url":null,"abstract":"Desktop grids make use of unused resources of personal computers provided by volunteers to work as a huge processor and make them available to users that need them. The rate of heterogeneity, volatility, and unreliability is higher in case of a desktop grid in comparison to conventional systems. Therefore, the application of fault tolerance strategies becomes an inevitable requirement. In this article, a hybrid fault tolerance strategy is proposed which works in three phases. First, two phases deal with the task and resource scheduling in which appropriate scheduling decisions are taken in order to select the most suitable resource for a task. Even if any failure occurs, it is then recovered in the third phase by using rescheduling and checkpointing. The proposed strategy is compared against existing hybrid fault tolerance scheduling strategies and ensures a 100% success rate and processor utilization and outperforms by a factor of 3.5%, 0.4%, and 0.1% when turnaround time, throughput, and makespan, respectively, are taken into account","PeriodicalId":369881,"journal":{"name":"Int. J. Nat. Comput. Res.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125023335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Nat. Comput. Res.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1