首页 > 最新文献

International Journal of Computer Science and Applications最新文献

英文 中文
Regularized Compression of A Noisy Blurred Image 噪声模糊图像的正则化压缩
Q4 Computer Science Pub Date : 2016-12-31 DOI: 10.5121/IJCSA.2016.6601
P. Favati, G. Lotti, O. Menchi, F. Romani
{"title":"Regularized Compression of A Noisy Blurred Image","authors":"P. Favati, G. Lotti, O. Menchi, F. Romani","doi":"10.5121/IJCSA.2016.6601","DOIUrl":"https://doi.org/10.5121/IJCSA.2016.6601","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"23 1","pages":"1-13"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81104381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Unknown Insider Threat Scenarios 检测未知的内部威胁场景
Q4 Computer Science Pub Date : 2016-12-31 DOI: 10.5121/IJCSA.2016.6602
M. S. Lodhi, Rahul Kaul
Problems from the inside of an organization’s perimeters are a significant threat, since it is very difficult to differentiate them from outside activity. In this dissertation, evaluate an insider threat detection motto on its ability to detect different type of scenarios that have not previously been identify or contemplated by the developers of the system. We show the ability to detect a large variety of insider threat scenario instances We report results of an ensemble-based, unsupervised technique for detecting potential insider threat, insider threat scenarios that robustly achieves results. We explore factors that contribute to the success of the ensemble method, such as the number and variety of unsupervised detectors and the use of existing knowledge encoded in scenario based detectors made for different known activity patterns. We report results over the entire period of the ensemble approach and of ablation experiments that remove the scenario-based detectors.
来自组织内部的问题是一个重大的威胁,因为很难将它们与外部活动区分开来。在本文中,评估一个内部威胁检测座右铭的能力,以检测不同类型的场景,这些场景以前没有被系统的开发人员识别或考虑。我们展示了检测各种内部威胁场景实例的能力。我们报告了一种基于集成的、无监督的技术的结果,用于检测潜在的内部威胁,内部威胁场景稳健地实现了结果。我们探索了有助于集成方法成功的因素,例如无监督检测器的数量和种类,以及为不同已知活动模式制作的基于场景的检测器中编码的现有知识的使用。我们报告了整个时期的集合方法和去除基于场景的探测器的烧蚀实验的结果。
{"title":"Detecting Unknown Insider Threat Scenarios","authors":"M. S. Lodhi, Rahul Kaul","doi":"10.5121/IJCSA.2016.6602","DOIUrl":"https://doi.org/10.5121/IJCSA.2016.6602","url":null,"abstract":"Problems from the inside of an organization’s perimeters are a significant threat, since it is very difficult to differentiate them from outside activity. In this dissertation, evaluate an insider threat detection motto on its ability to detect different type of scenarios that have not previously been identify or contemplated by the developers of the system. We show the ability to detect a large variety of insider threat scenario instances We report results of an ensemble-based, unsupervised technique for detecting potential insider threat, insider threat scenarios that robustly achieves results. We explore factors that contribute to the success of the ensemble method, such as the number and variety of unsupervised detectors and the use of existing knowledge encoded in scenario based detectors made for different known activity patterns. We report results over the entire period of the ensemble approach and of ablation experiments that remove the scenario-based detectors.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"10 1","pages":"15-21"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75244782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROTOCOL FOR WIRELESS SENSOR NETWORKS 无线传感器网络的节能、寿命改善和安全定期数据收集协议
Q4 Computer Science Pub Date : 2016-06-30 DOI: 10.5121/IJCSA.2016.6301
P. Anuja, Dr. Raju Shanmugam
The most emerging prominent sensor network applications collect data from sensor nodes and monitors periodically. Resource constraint Sensor motes sense the environment and transit data to the remote sink via multiple hops. Minimum energy dissipation and secure data transmission are crucial to such applications. This paper delivers an energy efficient, lifetime improving, secure periodic Data Gathering scheme that is a hybrid of heuristic path establishment and secure data transmission. This protocol uses artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible optimal path to sink in terms of high residual energy, minimum hop counts and high link quality. This scheme also adopts block encryption Rivest Cipher (RC6) Algorithm to secure the transmission of packets. This code and speed optimized block encryption provides confidentiality against critical data and consumes less energy for encryption. This proposed method increases the network lifetime there by reducing the total traffic load. Evaluation of performance analysis of this algorithm using Network Simulator (NS2) shows the superiority of the proposed scheme.
最突出的新兴传感器网络应用程序定期从传感器节点和监视器收集数据。资源约束传感器感知环境并通过多跳将数据传输到远程接收器。最小的能量消耗和安全的数据传输是这类应用的关键。本文提出了一种节能、寿命延长、安全的周期性数据采集方案,该方案将启发式路径建立与安全数据传输相结合。该协议采用基于人工智能(AI)的A*启发式搜索算法,以高剩余能量、最小跳数和高链路质量为目标,建立节能的可接受最优路径。该方案还采用了块加密Rivest Cipher (RC6)算法来保证数据包的传输安全。这种代码和速度优化的块加密提供了对关键数据的机密性,并且加密消耗的能量更少。该方法通过减少总流量负载来提高网络的生存期。利用网络模拟器(NS2)对该算法进行了性能分析,验证了该方案的优越性。
{"title":"ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROTOCOL FOR WIRELESS SENSOR NETWORKS","authors":"P. Anuja, Dr. Raju Shanmugam","doi":"10.5121/IJCSA.2016.6301","DOIUrl":"https://doi.org/10.5121/IJCSA.2016.6301","url":null,"abstract":"The most emerging prominent sensor network applications collect data from sensor nodes and monitors periodically. Resource constraint Sensor motes sense the environment and transit data to the remote sink via multiple hops. Minimum energy dissipation and secure data transmission are crucial to such applications. This paper delivers an energy efficient, lifetime improving, secure periodic Data Gathering scheme that is a hybrid of heuristic path establishment and secure data transmission. This protocol uses artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible optimal path to sink in terms of high residual energy, minimum hop counts and high link quality. This scheme also adopts block encryption Rivest Cipher (RC6) Algorithm to secure the transmission of packets. This code and speed optimized block encryption provides confidentiality against critical data and consumes less energy for encryption. This proposed method increases the network lifetime there by reducing the total traffic load. Evaluation of performance analysis of this algorithm using Network Simulator (NS2) shows the superiority of the proposed scheme.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"26 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86643334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Networks 一种新的无线传感器网络大覆盖聚类算法
Q4 Computer Science Pub Date : 2016-04-30 DOI: 10.5121/IJCSA.2016.6201
Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi
Virtual communities are becoming increasingly popular, particularly on the internet, as a means for like-minded individuals to meet, share or gain access to the information they are most interested in quickly and efficiently, from other individuals. The concept of a community of interest can be supported in a virtual community in order to bring the appropriate parties together, to share their knowledge with each other. The objective of our work is to investigate a community abstraction approach to agent based knowledge management.
虚拟社区正变得越来越受欢迎,特别是在互联网上,作为一种方式,志同道合的人见面,分享或获得他们最感兴趣的信息,从其他个人快速有效。利益社区的概念可以在虚拟社区中得到支持,以便将适当的各方聚集在一起,相互分享他们的知识。我们的工作目标是研究一种基于智能体的知识管理的社区抽象方法。
{"title":"A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Networks","authors":"Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi","doi":"10.5121/IJCSA.2016.6201","DOIUrl":"https://doi.org/10.5121/IJCSA.2016.6201","url":null,"abstract":"Virtual communities are becoming increasingly popular, particularly on the internet, as a means for like-minded individuals to meet, share or gain access to the information they are most interested in quickly and efficiently, from other individuals. The concept of a community of interest can be supported in a virtual community in order to bring the appropriate parties together, to share their knowledge with each other. The objective of our work is to investigate a community abstraction approach to agent based knowledge management.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"01-18"},"PeriodicalIF":0.0,"publicationDate":"2016-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76748856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Advance Solar Power Generation and Control of Brushless DC Motor Using Phase Current Infusion of Sensor Less Vector Control 一种新型无刷直流电动机的无传感器矢量控制与相电流注入太阳能发电
Q4 Computer Science Pub Date : 2016-01-01 DOI: 10.12783/IJCSA.2016.0501.01
A. Sundaram, G. Ramesh
Solar power is a promising solution in recent environmental aspects so several methods of generation were implemented in past to reach advances in generation capacity and critical conditions of solar. This paper deals with Non-inverting Four Switch buck-boost converter (NFSBBC) which is presented to reach advances in generation with respect to solar condition. The advances of generation include maximum power point tracking using incremental conductance, reliable buck boost operation and voltage stability ratio. Incremental conductance can track rapidly on solar power than perturb and observer method, so proposed power generation draws a continuous power across DC-Link inverter drive for wide speed operation of brushless DC motor. A new phase current infusion is implemented to estimate flux, torque and control of speed in wide range without external infusion and sensing loops in present sensor less vector control. 110W/50V capacity of solar is implemented for present solar power generation; output capacity of converter reaches from 25-100V using buck boost operation. 25V/1500 rpm capacity of brushless DC Motor is controlled using proposed sensor less vector using current infusing logic.
太阳能发电在最近的环境方面是一个很有前途的解决方案,因此过去实施了几种发电方法,以达到发电能力和太阳能的关键条件的进步。本文介绍了一种非反相四开关降压-升压变换器(NFSBBC),它是为了在太阳能条件下达到发电的进步而提出的。发电的进步包括使用增量电导跟踪最大功率点,可靠的降压升压操作和电压稳定比。与摄动法和观测器法相比,电导增量法对太阳能发电的跟踪速度更快,因此所提出的发电方式在直流直流无刷电机的大转速运行中,通过DC- link逆变器驱动获得连续的电力。在现有的无传感器矢量控制中,采用了一种新的相电流注入方法,在大范围内估计磁链、转矩和控制速度,而不需要外部注入和传感回路。目前太阳能发电采用110W/50V太阳能发电容量;采用降压升压操作,变换器输出容量可达25-100V。采用电流注入逻辑控制无刷直流电动机25V/ 1500rpm容量。
{"title":"An Advance Solar Power Generation and Control of Brushless DC Motor Using Phase Current Infusion of Sensor Less Vector Control","authors":"A. Sundaram, G. Ramesh","doi":"10.12783/IJCSA.2016.0501.01","DOIUrl":"https://doi.org/10.12783/IJCSA.2016.0501.01","url":null,"abstract":"Solar power is a promising solution in recent environmental aspects so several methods of generation were implemented in past to reach advances in generation capacity and critical conditions of solar. This paper deals with Non-inverting Four Switch buck-boost converter (NFSBBC) which is presented to reach advances in generation with respect to solar condition. The advances of generation include maximum power point tracking using incremental conductance, reliable buck boost operation and voltage stability ratio. Incremental conductance can track rapidly on solar power than perturb and observer method, so proposed power generation draws a continuous power across DC-Link inverter drive for wide speed operation of brushless DC motor. A new phase current infusion is implemented to estimate flux, torque and control of speed in wide range without external infusion and sensing loops in present sensor less vector control. 110W/50V capacity of solar is implemented for present solar power generation; output capacity of converter reaches from 25-100V using buck boost operation. 25V/1500 rpm capacity of brushless DC Motor is controlled using proposed sensor less vector using current infusing logic.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"17 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81381061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BK Web-Based E-Voting System: Ensuring Confidence with Votes and Results Verification BK基于网络的电子投票系统:通过投票和结果验证确保信心
Q4 Computer Science Pub Date : 2016-01-01 DOI: 10.12783/IJCSA.2016.0501.02
Ben Beklisi Kwame Ayawli, G. A. Gershon
The purpose of this study was to design an e-voting system to improve verification and auditing of votes and election results to aid build confidence in the use of e-voting. A top-down design approach was adopted in the design and development of the evoting system. BK Web-based e-voting system after design was implemented in ten different elections in 2012, 2013 and 2014. It was very helpful in ensuring voter’s confidence in e-voting since they were able to verify their votes through Short Message Service, reports generated from the system and the provision of ‘strong room’ facility. The verification procedures demonstrated in this study when applied in e-voting systems would help build voter’s confidence in e-voting systems.
本研究的目的是设计一个电子投票系统,以改善对投票和选举结果的核查和审计,以帮助建立对使用电子投票的信心。投票系统的设计和开发采用了自顶向下的设计方法。设计后的BK基于web的电子投票系统在2012年、2013年和2014年的10次不同的选举中实施。这对确保选民对电子投票的信心非常有帮助,因为他们可以通过短信息服务、系统生成的报告和提供“坚固室”设施来核实他们的投票。本研究所示范的验证程序应用于电子投票系统,将有助于建立选民对电子投票系统的信心。
{"title":"BK Web-Based E-Voting System: Ensuring Confidence with Votes and Results Verification","authors":"Ben Beklisi Kwame Ayawli, G. A. Gershon","doi":"10.12783/IJCSA.2016.0501.02","DOIUrl":"https://doi.org/10.12783/IJCSA.2016.0501.02","url":null,"abstract":"The purpose of this study was to design an e-voting system to improve verification and auditing of votes and election results to aid build confidence in the use of e-voting. A top-down design approach was adopted in the design and development of the evoting system. BK Web-based e-voting system after design was implemented in ten different elections in 2012, 2013 and 2014. It was very helpful in ensuring voter’s confidence in e-voting since they were able to verify their votes through Short Message Service, reports generated from the system and the provision of ‘strong room’ facility. The verification procedures demonstrated in this study when applied in e-voting systems would help build voter’s confidence in e-voting systems.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"20 1","pages":"12-22"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82528670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Metadesign Approach in Ontology Construction 本体构建中的元设计方法
Q4 Computer Science Pub Date : 2016-01-01 DOI: 10.12783/IJCSA.2016.0502.02
Mesnan Silalahi
This paper describes the ontology construction using a metadesign approach. The approach will constitutes key concepts such as: supporting human-problem interaction, underdesigning for emergent behavior, enabling legitimate peripheral participation, sharing control, promoting mutual learning and support, rewarding and recognizing contributions, and fostering reflective communities. The approach supports for flexibility and extensibility in the process and the used tools. The development of semantic web applications was part of the tools support to follow the metadesign framework. The central actor along the phases are the domain experts who also were respondencts in the survey. Based on the resultant ontology and the survey of the participatory domain-experts in a case-study, this approach proved to effectively build the ontology.
本文用元设计的方法描述了本体的构建。该方法将构成关键概念,如:支持人与问题的互动,对突发行为的不充分设计,允许合法的外围参与,共享控制,促进相互学习和支持,奖励和认可贡献,以及培养反思社区。该方法支持流程和使用的工具中的灵活性和可扩展性。语义web应用程序的开发是遵循元设计框架的工具支持的一部分。各个阶段的核心参与者是领域专家,他们也是调查中的应答者。通过对参与式领域专家的案例调查和生成的本体验证了该方法的有效性。
{"title":"A Metadesign Approach in Ontology Construction","authors":"Mesnan Silalahi","doi":"10.12783/IJCSA.2016.0502.02","DOIUrl":"https://doi.org/10.12783/IJCSA.2016.0502.02","url":null,"abstract":"This paper describes the ontology construction using a metadesign approach. The approach will constitutes key concepts such as: supporting human-problem interaction, underdesigning for emergent behavior, enabling legitimate peripheral participation, sharing control, promoting mutual learning and support, rewarding and recognizing contributions, and fostering reflective communities. The approach supports for flexibility and extensibility in the process and the used tools. The development of semantic web applications was part of the tools support to follow the metadesign framework. The central actor along the phases are the domain experts who also were respondencts in the survey. Based on the resultant ontology and the survey of the participatory domain-experts in a case-study, this approach proved to effectively build the ontology.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"205 1","pages":"35-43"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73766715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Clustering Algorithm for Energy Efficiency Utilizing Fuzzy Logic in WSN (MCF) 基于模糊逻辑的WSN能效改进聚类算法(MCF)
Q4 Computer Science Pub Date : 2016-01-01 DOI: 10.12783/IJCSA.2016.0502.01
Tuba Firdaus, Meenakshi Yadav
A number of research have taken place in the field of Wireless Sensor Networks (WSN) as there is continuous need of advancement in the field of wireless communication, digital technology and micro-electro-mechanical systems(MEMS) . So the need of growth of low cost, low power, multifunctional sensor nodes have been required. A Wireless Sensor Network is a collection of sensor nodes that have the capability of sensing any environmental phenomenon, processing that information and then sending that data to the base station. A single sensor node is not capable of capturing desired information from a particular region so a collection of nodes are arranged to get accurate and sufficient result. This collection of sensor nodes along with a base station will collaboratively form a network that is known as Wireless Sensor Network. As limited energy is one of the most important constraint of WSN so it must be assured that it is utilized in most efficient way. Clustering is best approach to remove redundant data transmission to base station. Each cluster has a cluster head that is responsible for transmitting data to base station for that cluster members. Cluster head (CH) collect the data from all members of its cluster and perform aggregation on these data to remove redundancy then send it to base station. So appropriate CH election is very important for improving efficiency. In this thesis we have presented a clustering approach that has taken a heterogeneous environment and uses fuzzy logic to elect CHs more efficiently. We have combined two parameters Distance and Residual Energy and apply fuzzy rules on that to find the priority of a node for being a CH. Simulation shows that using fuzzy logic in SEP (Stability Election Protocol) will improve the energy efficiency by providing better load distribution and utilizing the benefits of heterogeneity of network. We have shown our analysis on two parameters- Number of dead nodes and average energy of nodes
随着无线通信、数字技术和微机电系统(MEMS)领域的不断发展,无线传感器网络(WSN)领域的研究也越来越多。因此,低成本、低功耗、多功能传感器节点的发展需求已经被提出。无线传感器网络是一组传感器节点的集合,这些节点具有感知任何环境现象的能力,处理这些信息,然后将这些数据发送到基站。单个传感器节点无法从特定区域捕获所需信息,因此需要安排节点集合以获得准确和充分的结果。这些传感器节点的集合与基站将协同形成一个网络,称为无线传感器网络。有限的能量是无线传感器网络最重要的制约因素之一,因此必须保证其得到最有效的利用。集群是消除基站冗余数据传输的最佳方法。每个集群都有一个集群头,负责将数据传输到该集群成员的基站。集群头(CH)从其集群的所有成员中收集数据,并对这些数据进行聚合以消除冗余,然后将其发送到基站。因此,适当的CH选择对于提高效率非常重要。在本文中,我们提出了一种采用异构环境并使用模糊逻辑更有效地选择CHs的聚类方法。我们结合了距离和剩余能量两个参数,并对其应用模糊规则来确定节点作为CH的优先级。仿真表明,在SEP (Stability Election Protocol)中使用模糊逻辑可以通过提供更好的负载分配和利用网络异构性的好处来提高能量效率。我们对两个参数——死节点数和节点平均能量进行了分析
{"title":"Modified Clustering Algorithm for Energy Efficiency Utilizing Fuzzy Logic in WSN (MCF)","authors":"Tuba Firdaus, Meenakshi Yadav","doi":"10.12783/IJCSA.2016.0502.01","DOIUrl":"https://doi.org/10.12783/IJCSA.2016.0502.01","url":null,"abstract":"A number of research have taken place in the field of Wireless Sensor Networks (WSN) as there is continuous need of advancement in the field of wireless communication, digital technology and micro-electro-mechanical systems(MEMS) . So the need of growth of low cost, low power, multifunctional sensor nodes have been required. A Wireless Sensor Network is a collection of sensor nodes that have the capability of sensing any environmental phenomenon, processing that information and then sending that data to the base station. A single sensor node is not capable of capturing desired information from a particular region so a collection of nodes are arranged to get accurate and sufficient result. This collection of sensor nodes along with a base station will collaboratively form a network that is known as Wireless Sensor Network. As limited energy is one of the most important constraint of WSN so it must be assured that it is utilized in most efficient way. Clustering is best approach to remove redundant data transmission to base station. Each cluster has a cluster head that is responsible for transmitting data to base station for that cluster members. Cluster head (CH) collect the data from all members of its cluster and perform aggregation on these data to remove redundancy then send it to base station. So appropriate CH election is very important for improving efficiency. In this thesis we have presented a clustering approach that has taken a heterogeneous environment and uses fuzzy logic to elect CHs more efficiently. We have combined two parameters Distance and Residual Energy and apply fuzzy rules on that to find the priority of a node for being a CH. Simulation shows that using fuzzy logic in SEP (Stability Election Protocol) will improve the energy efficiency by providing better load distribution and utilizing the benefits of heterogeneity of network. We have shown our analysis on two parameters- Number of dead nodes and average energy of nodes","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"24-34"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88843401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Evaluation with Web Developers of Capturing User Interaction with Rich Internet Applications for Usability Evaluation 与Web开发人员一起对捕获富互联网应用程序的用户交互进行可用性评估
Q4 Computer Science Pub Date : 2015-10-01 DOI: 10.12783/ijcsa.2015.0402.02
Luciano T. E. Pansanato, A. Rivolli, Douglas Felipe Pereira
The user interaction logging with a Rich Internet Applications can provide valuable information for usability evaluation and user behavior study. However, current research has focused only on issues of implementation and validation of tools for capturing user interaction instead tool usage by web developers. This work presents an evaluation through user testing of a tool called WAUTT for capturing user interaction with Rich Internet Applications. The main goal of this evaluation is to investigate the use of a tool for capturing user interaction with web developers. The results indicate that the participants have good understanding of the tool, found easiness to operate the tool for capturing and analyzing the user interaction, consider its future re-use, and they felt satisfied with the experience. The results also assisted for identifying the user interaction data considered more useful to web developers.
富Internet应用程序的用户交互记录可以为可用性评估和用户行为研究提供有价值的信息。然而,目前的研究只关注捕获用户交互的工具的实现和验证问题,而不是web开发人员对工具的使用。这项工作通过用户测试提供了一个名为WAUTT的工具的评估,该工具用于捕获用户与富互联网应用程序的交互。这次评估的主要目标是调查一个工具的使用情况,该工具用于捕获用户与web开发人员的交互。结果表明,参与者对该工具有较好的理解,易于操作该工具来捕获和分析用户交互,考虑其未来的重用性,并且对体验感到满意。该结果还有助于识别对web开发人员更有用的用户交互数据。
{"title":"An Evaluation with Web Developers of Capturing User Interaction with Rich Internet Applications for Usability Evaluation","authors":"Luciano T. E. Pansanato, A. Rivolli, Douglas Felipe Pereira","doi":"10.12783/ijcsa.2015.0402.02","DOIUrl":"https://doi.org/10.12783/ijcsa.2015.0402.02","url":null,"abstract":"The user interaction logging with a Rich Internet Applications can provide valuable information for usability evaluation and user behavior study. However, current research has focused only on issues of implementation and validation of tools for capturing user interaction instead tool usage by web developers. This work presents an evaluation through user testing of a tool called WAUTT for capturing user interaction with Rich Internet Applications. The main goal of this evaluation is to investigate the use of a tool for capturing user interaction with web developers. The results indicate that the participants have good understanding of the tool, found easiness to operate the tool for capturing and analyzing the user interaction, consider its future re-use, and they felt satisfied with the experience. The results also assisted for identifying the user interaction data considered more useful to web developers.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81618675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Generalization Ability of Artificial Neural Networks in Forecasting TCP/IP Traffic Trends: How Much Does the Size of Learning Rate Matter? 人工神经网络在预测TCP/IP流量趋势中的泛化能力:学习率的大小有多大关系?
Q4 Computer Science Pub Date : 2015-04-01 DOI: 10.12783/ijcsa.2015.0401.02
V. Moyo, K. Sibanda
Artificial Neural Networks (ANNs) have attracted increasing attention from researchers in many fields. They have proved to be one of the most powerful tools in the domain of forecasting and analysis of various time series. The ability to model almost any kind of function regardless of its degree of nonlinearity, positions ANNs as good candidates for predicting and modelling self-similar time series such as TCP/IP traffic. Inspite of this, one of the most difficult and least understood tasks in the design of ANN models is the selection of the most appropriate size of the learning rate. Although some guidance in the form of heuristics is available for the choice of this parameter, none have been universally accepted. In this paper we empirically investigate various sizes of learning rates with the aim of determining the optimum learning rate size for generalization ability of an ANN trained on forecasting TCP/IP network traffic trends. MATLAB Version 7.4.0.287’s Neural Network toolbox version 5.0.2 (R2007a) was used for our experiments. The results are found to be promising in terms of ease of design and use of ANNs. We found from the experiments that, depending on the difficulty of the problem at hand, it is advisable to set the learning rate to 0.1 for the standard Backpropagation algorithm and to either 0.1 or 0.2 if used in conjunction with the momentum term of 0.5 or 0.6. We advise minimal use of the momentum term as it greatly interferes with the training process of ANNs. Although the information obtained from the tests carried out in this paper is specific to the problem considered, it provides users of Back-propagation networks with a valuable guide on the behaviour of ANNs under a wide range of operating conditions. It is important to note that the guidelines accrued from this paper are of an assistive and not necessarily restrictive nature to potential ANN modellers.
人工神经网络(Artificial Neural Networks, ann)越来越受到许多领域研究者的关注。它们已被证明是预测和分析各种时间序列领域中最强大的工具之一。无论其非线性程度如何,几乎可以对任何类型的函数进行建模的能力,使人工神经网络成为预测和建模自相似时间序列(如TCP/IP流量)的良好候选者。尽管如此,人工神经网络模型设计中最困难和最不容易理解的任务之一是选择最合适的学习率大小。虽然对于这个参数的选择有一些启发式的指导,但是没有一个是被普遍接受的。在本文中,我们实证研究了各种学习率的大小,目的是确定用于预测TCP/IP网络流量趋势的人工神经网络泛化能力的最佳学习率大小。我们的实验使用MATLAB Version 7.4.0.287的神经网络工具箱Version 5.0.2 (R2007a)。结果表明,人工神经网络在设计和使用方面是有希望的。我们从实验中发现,根据手头问题的难度,建议将标准反向传播算法的学习率设置为0.1,如果与动量项0.5或0.6结合使用,则设置为0.1或0.2。我们建议尽量少使用动量项,因为它极大地干扰了人工神经网络的训练过程。虽然从本文中进行的测试中获得的信息是特定于所考虑的问题的,但它为反向传播网络的用户提供了关于人工神经网络在广泛工作条件下的行为的有价值的指导。重要的是要注意,从本文中积累的指导方针对潜在的人工神经网络建模者来说是辅助的,而不一定是限制性的。
{"title":"The Generalization Ability of Artificial Neural Networks in Forecasting TCP/IP Traffic Trends: How Much Does the Size of Learning Rate Matter?","authors":"V. Moyo, K. Sibanda","doi":"10.12783/ijcsa.2015.0401.02","DOIUrl":"https://doi.org/10.12783/ijcsa.2015.0401.02","url":null,"abstract":"Artificial Neural Networks (ANNs) have attracted increasing attention from researchers in many fields. They have proved to be one of the most powerful tools in the domain of forecasting and analysis of various time series. The ability to model almost any kind of function regardless of its degree of nonlinearity, positions ANNs as good candidates for predicting and modelling self-similar time series such as TCP/IP traffic. Inspite of this, one of the most difficult and least understood tasks in the design of ANN models is the selection of the most appropriate size of the learning rate. Although some guidance in the form of heuristics is available for the choice of this parameter, none have been universally accepted. In this paper we empirically investigate various sizes of learning rates with the aim of determining the optimum learning rate size for generalization ability of an ANN trained on forecasting TCP/IP network traffic trends. MATLAB Version 7.4.0.287’s Neural Network toolbox version 5.0.2 (R2007a) was used for our experiments. The results are found to be promising in terms of ease of design and use of ANNs. We found from the experiments that, depending on the difficulty of the problem at hand, it is advisable to set the learning rate to 0.1 for the standard Backpropagation algorithm and to either 0.1 or 0.2 if used in conjunction with the momentum term of 0.5 or 0.6. We advise minimal use of the momentum term as it greatly interferes with the training process of ANNs. Although the information obtained from the tests carried out in this paper is specific to the problem considered, it provides users of Back-propagation networks with a valuable guide on the behaviour of ANNs under a wide range of operating conditions. It is important to note that the guidelines accrued from this paper are of an assistive and not necessarily restrictive nature to potential ANN modellers.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75239244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Computer Science and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1