首页 > 最新文献

International Journal of Computer Science & Engineering Survey最新文献

英文 中文
Time Alignment Techniques for Experimental Sensor Data 实验传感器数据的时间对准技术
Pub Date : 2014-04-30 DOI: 10.5121/IJCSES.2014.5201
M. Rhudy
Experimental data is subject to data loss , which presents a challenge for representing the data with a proper time scale. Additionally, data from separate measurement systems needto be aligned in order to use the data cooperatively. Due to the need for accurate time alignment, various practical techniques are presented along with an illustrative example detailing each step of the t ime alignment procedure for actual experimental data from an Unmanned Aerial Vehicle (UAV). Some examp le MATLAB code is also provided.
实验数据存在数据丢失的问题,这给用合适的时间尺度表示数据提出了挑战。此外,为了协同使用数据,需要对来自不同测量系统的数据进行对齐。由于需要精确的时间对准,各种实用技术连同一个说说性的例子一起提出,详细说明了从无人机(UAV)的实际实验数据的时间对准程序的每一步。还提供了一些示例MATLAB代码。
{"title":"Time Alignment Techniques for Experimental Sensor Data","authors":"M. Rhudy","doi":"10.5121/IJCSES.2014.5201","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5201","url":null,"abstract":"Experimental data is subject to data loss , which presents a challenge for representing the data with a proper time scale. Additionally, data from separate measurement systems needto be aligned in order to use the data cooperatively. Due to the need for accurate time alignment, various practical techniques are presented along with an illustrative example detailing each step of the t ime alignment procedure for actual experimental data from an Unmanned Aerial Vehicle (UAV). Some examp le MATLAB code is also provided.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132627933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Firewall and VPN Investigation on Cloud Computing Performance 防火墙和VPN对云计算性能的研究
Pub Date : 2014-04-30 DOI: 10.5121/IJCSES.2014.5202
S. Ameen, S. W. Nourildean
The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator has been conducted for the cases of cloud computing with and without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different scenarios and different form application traffic applied. Simulation results showing throughput, delay, servers traffic sent and received have been collected and presented. The results clearly show that there is impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher than that on the delay. Furthermore, the impact show that the email traffic is more affected than web traffic.
本文介绍了如何为计算领域的最新发展之一云计算提供安全保障。主要的兴趣是研究使用虚拟专用网VPN和防火墙对云计算性能的影响。因此,利用OPNET模块化模拟器对云计算进行了计算机建模和仿真,分别针对有VPN和防火墙情况下的云计算进行了仿真。为了清楚地了解这些影响,模拟考虑了不同的场景和不同形式的应用程序流量。仿真结果显示了吞吐量、延迟、发送和接收的服务器流量。结果清楚地表明,使用VPN和防火墙对吞吐量和延迟有影响。对吞吐量的影响大于对延迟的影响。此外,影响表明,电子邮件流量比网络流量更受影响。
{"title":"Firewall and VPN Investigation on Cloud Computing Performance","authors":"S. Ameen, S. W. Nourildean","doi":"10.5121/IJCSES.2014.5202","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5202","url":null,"abstract":"The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator has been conducted for the cases of cloud computing with and without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different scenarios and different form application traffic applied. Simulation results showing throughput, delay, servers traffic sent and received have been collected and presented. The results clearly show that there is impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher than that on the delay. Furthermore, the impact show that the email traffic is more affected than web traffic.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129382001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce 基于Hadoop Pig和典型Mapreduce处理网络流量数据的对比研究
Pub Date : 2014-02-28 DOI: 10.5121/IJCSES.2014.5101
P. AnjaliP, A. Binu
{"title":"A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce","authors":"P. AnjaliP, A. Binu","doi":"10.5121/IJCSES.2014.5101","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5101","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121036345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
VISION BASED ENTOMOLOGY : A SURVEY 基于视觉的昆虫学综述
Pub Date : 2014-02-28 DOI: 10.5121/IJCSES.2014.5103
S. Hassan, N. Rahman, Z. Htike, Shoon Lei Win
Entomology has been deeply rooted in various cultures since prehistoric times for the purpose of agriculture. Nowadays, many scientists are interested in the field of biodiversity in order to maintain the diversity of species within our ecosystem. Out of 1.3 million known species on this earth, insects account for more than two thirds of these known species. Since 400 million years ago, there have been various kinds of interactions between humans and insects. There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. Automation of insect identification is required because there is a shortage of skilled entomologists. This paper provides a review of the past literature in vision-based insect recognition and classifications. Over the past decades, automatic insect recognition and classification has been given extra attention especially in term of crop pest and disease control. This paper details advances in insect recognition, discussing representative works from different types of method and classifiers algorithm. Among the method used in the previous research includes color histogram, edge detection and feature extraction (SIFT vector). We provides discussion on the state-of-the-art and provides perspective on future research direction in insect recognition and classification problem.
自史前时期以来,昆虫学已深深植根于各种文化中,用于农业。为了保持生态系统中物种的多样性,许多科学家对生物多样性领域感兴趣。在地球上已知的130万种物种中,昆虫占这些已知物种的三分之二以上。从4亿年前开始,人类和昆虫之间就有了各种各样的互动。人们曾多次尝试创造一种准确识别昆虫的方法。准确鉴定昆虫需要丰富的昆虫学知识和经验。由于缺乏熟练的昆虫学家,因此需要昆虫鉴定的自动化。本文综述了基于视觉的昆虫识别与分类的研究进展。近几十年来,昆虫自动识别与分类在作物病虫害防治方面受到了广泛的关注。本文详细介绍了昆虫识别的研究进展,讨论了不同类型方法和分类器算法的代表性成果。在之前的研究中使用的方法包括颜色直方图、边缘检测和特征提取(SIFT向量)。本文就昆虫识别与分类问题的研究现状进行了讨论,并对未来的研究方向进行了展望。
{"title":"VISION BASED ENTOMOLOGY : A SURVEY","authors":"S. Hassan, N. Rahman, Z. Htike, Shoon Lei Win","doi":"10.5121/IJCSES.2014.5103","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5103","url":null,"abstract":"Entomology has been deeply rooted in various cultures since prehistoric times for the purpose of agriculture. Nowadays, many scientists are interested in the field of biodiversity in order to maintain the diversity of species within our ecosystem. Out of 1.3 million known species on this earth, insects account for more than two thirds of these known species. Since 400 million years ago, there have been various kinds of interactions between humans and insects. There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. Automation of insect identification is required because there is a shortage of skilled entomologists. This paper provides a review of the past literature in vision-based insect recognition and classifications. Over the past decades, automatic insect recognition and classification has been given extra attention especially in term of crop pest and disease control. This paper details advances in insect recognition, discussing representative works from different types of method and classifiers algorithm. Among the method used in the previous research includes color histogram, edge detection and feature extraction (SIFT vector). We provides discussion on the state-of-the-art and provides perspective on future research direction in insect recognition and classification problem.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115885119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Survey on Cost Effective Survivable Network Design in Wireless Access Network 无线接入网中具有成本效益的生存性网络设计研究
Pub Date : 2014-02-28 DOI: 10.5121/IJCSES.2014.5102
K. Rajalakshmi, K. Gopal
In today’s technology, the essential property for wireless communication network is to exhibit as a dependable network. The dependability network incorporates the property like availability, reliability and survivability. Although these factors are well taken care by protocol for wired network, still there exists huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access network is very important factor to be considered will performing wireless network designing. This paper focuses on discussion of survivability in wireless access network. Capability of a wireless access network to perform its dedicated accessibility services even in case of infrastructure failure is known as survivability. Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to minimize the overall connection cost for multiple requests. The various failure scenario of wireless access network as existing in literature is been explored. The existing survivability models for access network like shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail here. Further comparison between various existing survivability solutions is also tabulated.
在当今的技术中,无线通信网络的基本属性是表现为一个可靠的网络。可靠性网络综合了可用性、可靠性和生存性等特性。虽然有线网络的协议很好地照顾到了这些因素,但对于无线网络来说,协议的有效性还存在很大的不足。此外,无线接入网更加复杂,存在频率分配、服务质量、用户请求等困难。此外,无线接入网极易受到链路和节点故障的影响。因此,无线接入网的生存性是进行无线网络设计时必须考虑的重要因素。本文着重讨论了无线接入网的生存性问题。即使在基础设施发生故障的情况下,无线接入网络执行其专用可访问性服务的能力被称为生存性。在给定可用容量、连通性和可靠性的情况下,分层网络中的生存问题是最小化多个请求的总连接成本。对文献中存在的各种无线接入网故障场景进行了探讨。本文详细讨论了现有的接入网生存性模型,如共享链路、多归巢、覆盖网络、十四行诗环和多模态设备。进一步比较了各种现有的生存能力解决方案,并将其制成表格。
{"title":"A Survey on Cost Effective Survivable Network Design in Wireless Access Network","authors":"K. Rajalakshmi, K. Gopal","doi":"10.5121/IJCSES.2014.5102","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5102","url":null,"abstract":"In today’s technology, the essential property for wireless communication network is to exhibit as a dependable network. The dependability network incorporates the property like availability, reliability and survivability. Although these factors are well taken care by protocol for wired network, still there exists huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access network is very important factor to be considered will performing wireless network designing. This paper focuses on discussion of survivability in wireless access network. Capability of a wireless access network to perform its dedicated accessibility services even in case of infrastructure failure is known as survivability. Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to minimize the overall connection cost for multiple requests. The various failure scenario of wireless access network as existing in literature is been explored. The existing survivability models for access network like shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail here. Further comparison between various existing survivability solutions is also tabulated.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125917785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONS 用于简化布尔表达式的自适应映射
Pub Date : 2013-12-31 DOI: 10.5121/IJCSES.2013.4601
M. H. Al-Jammas
Th e complexity of implementing the Boolean functions by digital logic gates is directly related to the complexity of the Boolean algebraic expression. Although the truth table is used to represent a function, when it is expressed algebraically it appeared in many different, but equivalent, forms. Boolean expressions may be simplified by Boolean algebra. However, this procedure of minimization is awkward because it lacks specific rules to predict each succeeding step in the manipulative process. Other methods like Map methods (Karnaugh map (K-map), and map Entered Variables) are useful to implement the Boolean expression with minimal prime implicants. Or the Boolean function can be represents and design by used type N’s Multiplexers by partitioned variable(s) from the function. An adaptive map is a combined method of Boolean algebra and K-map to reduce and minimize Boolean functions involving more than three Boolean variables.
用数字逻辑门实现布尔函数的复杂度直接关系到布尔代数表达式的复杂度。虽然真值表是用来表示一个函数的,但当它用代数表示时,它会以许多不同但等价的形式出现。布尔表达式可以用布尔代数来简化。然而,这种最小化过程是尴尬的,因为它缺乏具体的规则来预测操作过程中的每个后续步骤。其他方法,如Map方法(Karnaugh Map (K-map)和Map Entered Variables)对于实现具有最小素数隐含的布尔表达式很有用。或者布尔函数可以通过从函数中划分变量的N型复用器来表示和设计。自适应映射是一种布尔代数与k -映射相结合的方法,用于对涉及三个以上布尔变量的布尔函数进行约简和最小化。
{"title":"ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONS","authors":"M. H. Al-Jammas","doi":"10.5121/IJCSES.2013.4601","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4601","url":null,"abstract":"Th e complexity of implementing the Boolean functions by digital logic gates is directly related to the complexity of the Boolean algebraic expression. Although the truth table is used to represent a function, when it is expressed algebraically it appeared in many different, but equivalent, forms. Boolean expressions may be simplified by Boolean algebra. However, this procedure of minimization is awkward because it lacks specific rules to predict each succeeding step in the manipulative process. Other methods like Map methods (Karnaugh map (K-map), and map Entered Variables) are useful to implement the Boolean expression with minimal prime implicants. Or the Boolean function can be represents and design by used type N’s Multiplexers by partitioned variable(s) from the function. An adaptive map is a combined method of Boolean algebra and K-map to reduce and minimize Boolean functions involving more than three Boolean variables.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128058865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Congestion Control in Packet Switched Wide Area Networks using a Feedback Model 基于反馈模型的分组交换广域网拥塞控制
Pub Date : 2013-10-31 DOI: 10.5121/IJCSES.2013.4501
Ogbimi, E.F, A. Oluwatope, G. Aderounmu
In a complex world, where networking expands very rapidly, the network stability of flow of bandwidth played a vital role in transmitting packets. Hence, it was imperative to find solution to the problem of congestion especially in the follow of bandwidth stability. Congestion in computer networking is caused by so many factors. Some of the signs are packet loss, queuing delay resulting from overloading the buffer, faulty hardware devices, intermixing of old and new technologies and unstable flow of bandwidth resulting from positive feedback A negative feedback mechanism was added to the network. Feedback was developed using both control and queuing theory. The congested signalling was tested for stability using control theory. Kendall notation was used to determine both arrival and service rates with all the queue disciplines. Matlab was used to simulate the model. Bode plots and impulse responses were used to analyse the performance of the improved model. The results showed that flow of bandwidth was stable with increase in service rate of packets and decrease in the probability of routers not accepting packets. This shows that adopting dynamic explicit feedback model reduced congestion by minimal packet drops, balanced flow of bandwidth, converges to fairness and minimized amplitude of oscillation.
在网络迅速扩展的复杂世界中,网络带宽流的稳定性对数据包的传输起着至关重要的作用。因此,如何解决网络拥塞问题,尤其是带宽稳定性问题,已迫在眉睫。造成计算机网络拥塞的原因是多方面的。其中一些迹象是丢包、缓冲区过载导致的排队延迟、硬件设备故障、新旧技术混合以及正反馈导致的带宽流不稳定。网络增加了负反馈机制。反馈是利用控制论和排队论发展起来的。利用控制理论对拥塞信号进行了稳定性测试。Kendall符号用于确定所有队列规则的到达率和服务率。利用Matlab对模型进行仿真。利用波德图和脉冲响应分析了改进模型的性能。结果表明,随着数据包的服务速率的增加和路由器不接受数据包的概率的降低,带宽的流动是稳定的。结果表明,采用动态显式反馈模型可以通过最小的丢包、均衡的流量带宽、收敛于公平性和最小的振荡幅度来减少拥塞。
{"title":"Congestion Control in Packet Switched Wide Area Networks using a Feedback Model","authors":"Ogbimi, E.F, A. Oluwatope, G. Aderounmu","doi":"10.5121/IJCSES.2013.4501","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4501","url":null,"abstract":"In a complex world, where networking expands very rapidly, the network stability of flow of bandwidth played a vital role in transmitting packets. Hence, it was imperative to find solution to the problem of congestion especially in the follow of bandwidth stability. Congestion in computer networking is caused by so many factors. Some of the signs are packet loss, queuing delay resulting from overloading the buffer, faulty hardware devices, intermixing of old and new technologies and unstable flow of bandwidth resulting from positive feedback A negative feedback mechanism was added to the network. Feedback was developed using both control and queuing theory. The congested signalling was tested for stability using control theory. Kendall notation was used to determine both arrival and service rates with all the queue disciplines. Matlab was used to simulate the model. Bode plots and impulse responses were used to analyse the performance of the improved model. The results showed that flow of bandwidth was stable with increase in service rate of packets and decrease in the probability of routers not accepting packets. This shows that adopting dynamic explicit feedback model reduced congestion by minimal packet drops, balanced flow of bandwidth, converges to fairness and minimized amplitude of oscillation.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network Based Numerical digits Recognization using NNT in Matlab 基于神经网络的NNT数字识别
Pub Date : 2013-10-31 DOI: 10.5121/IJCSES.2013.4502
Amritpal Kaur, Madhavi Arora
Artificial neural networks are models inspired by human nervous system that is capable of learning. One of the important applications of artificial neural network is character Recognition. Character Recognition finds its application in number of areas, such as banking, security products, hospitals, in robotics also. This paper is based on a system that recognizes a english numeral, given by the user, which is already trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system has a neural network as its core, which is first trained on a database. The training of the neural network extracts the features of the English numbers and stores in the database. The next phase of the system is to recognize the number given by the user. The features of the number given by the user are extracted and compared with the feature database and the recognized number is displayed.
人工神经网络是受人类神经系统启发的具有学习能力的模型。人工神经网络的重要应用之一是字符识别。字符识别在银行、安全产品、医院、机器人等许多领域都有应用。本文以一个基于NNT (Neural network toolbox,神经网络工具箱)的英文数字识别系统为基础,该系统以神经网络为核心,首先在数据库上进行训练。神经网络的训练提取英文数字的特征并存储在数据库中。系统的下一阶段是识别用户给出的号码。提取用户给出的号码的特征,并与特征库进行比较,显示识别出的号码。
{"title":"Neural Network Based Numerical digits Recognization using NNT in Matlab","authors":"Amritpal Kaur, Madhavi Arora","doi":"10.5121/IJCSES.2013.4502","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4502","url":null,"abstract":"Artificial neural networks are models inspired by human nervous system that is capable of learning. One of the important applications of artificial neural network is character Recognition. Character Recognition finds its application in number of areas, such as banking, security products, hospitals, in robotics also. This paper is based on a system that recognizes a english numeral, given by the user, which is already trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system has a neural network as its core, which is first trained on a database. The training of the neural network extracts the features of the English numbers and stores in the database. The next phase of the system is to recognize the number given by the user. The features of the number given by the user are extracted and compared with the feature database and the recognized number is displayed.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS 无线传感器网络qos的多维分析
Pub Date : 2013-08-31 DOI: 10.5121/IJCSES.2013.4401
Ziyati Elhoussaine, Rachid Haboub, M. Ouzzif, Khadija Bami
Nodes in Mobile Ad-hoc network are connected wirelessly and the network is auto configuring [1]. This paper introduces the usefulness of data warehouse as an alternative to manage data collected by WSN. Wireless Sensor Network produces huge quantity of data that need to be proceeded and homogenised, so as to help researchers and other people interested in the information. Collected data is managed and compared with other coming from datasources and systems could participate in technical report and decision making. This paper proposes a model to design, extract, transform and normalize data collected by Wireless Sensor Networks by implementing a multidimensional warehouse for comparing many aspects in WSN such as (routing protocol[4], sensor, sensor mobility, cluster ….). Hence, data warehouse defined and applied to the context above is presented as a useful approach that gives specialists row data and information for decision processes and navigate from one aspect to another.
移动Ad-hoc网络中的节点是无线连接的,网络是自动配置的[1]。本文介绍了数据仓库作为管理无线传感器网络收集的数据的一种替代方案的实用性。无线传感器网络产生了大量的数据,这些数据需要进行处理和均质化,以帮助研究人员和其他对这些信息感兴趣的人。收集的数据进行管理,并与来自数据源的其他数据进行比较,系统可以参与技术报告和决策。本文提出了一个模型,通过实现一个多维仓库来设计、提取、转换和规范化无线传感器网络收集的数据,用于比较WSN中(路由协议[4]、传感器、传感器移动性、集群....)的许多方面。因此,定义并应用于上述上下文的数据仓库是一种有用的方法,它为专家提供决策过程的行数据和信息,并从一个方面导航到另一个方面。
{"title":"MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS","authors":"Ziyati Elhoussaine, Rachid Haboub, M. Ouzzif, Khadija Bami","doi":"10.5121/IJCSES.2013.4401","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4401","url":null,"abstract":"Nodes in Mobile Ad-hoc network are connected wirelessly and the network is auto configuring [1]. This paper introduces the usefulness of data warehouse as an alternative to manage data collected by WSN. Wireless Sensor Network produces huge quantity of data that need to be proceeded and homogenised, so as to help researchers and other people interested in the information. Collected data is managed and compared with other coming from datasources and systems could participate in technical report and decision making. This paper proposes a model to design, extract, transform and normalize data collected by Wireless Sensor Networks by implementing a multidimensional warehouse for comparing many aspects in WSN such as (routing protocol[4], sensor, sensor mobility, cluster ….). Hence, data warehouse defined and applied to the context above is presented as a useful approach that gives specialists row data and information for decision processes and navigate from one aspect to another.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Detect Packets Using Packet Sniffing 一种通过报文嗅探检测报文的方法
Pub Date : 2013-06-30 DOI: 10.5121/IJCSES.2013.4302
Rupam, A. Verma, Ankit Singh
In the past decades computer network have kept up growing in size, complexity and along with it the number of its user is also being increased day by day. Hence the amount of network traffic flowing at each node has increased drastically. So to keep a track on these nodes a packet sniffer is used. Sometimes a packet sniffer is called a network monitor or network analyzer. Many system administrator or network administrator use it for monitoring and troubleshooting network traffic. Packet sniffers are useful for both wired and wireless networks. The purpose of this paper is to show the basics of packet sniffer, how it works in both switched and non switched environment, its practical approach, its positive vs negative aspects and its safe guards.
在过去的几十年里,计算机网络的规模和复杂性不断增长,其用户数量也日益增加。因此,流经每个节点的网络通信量急剧增加。因此,为了跟踪这些节点,需要使用数据包嗅探器。有时数据包嗅探器被称为网络监视器或网络分析器。许多系统管理员或网络管理员使用它来监视和排除网络流量。数据包嗅探器对有线和无线网络都很有用。本文的目的是展示数据包嗅探器的基础知识,它是如何在交换和非交换环境中工作的,它的实用方法,它的积极与消极方面以及它的安全防护。
{"title":"An Approach to Detect Packets Using Packet Sniffing","authors":"Rupam, A. Verma, Ankit Singh","doi":"10.5121/IJCSES.2013.4302","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4302","url":null,"abstract":"In the past decades computer network have kept up growing in size, complexity and along with it the number of its user is also being increased day by day. Hence the amount of network traffic flowing at each node has increased drastically. So to keep a track on these nodes a packet sniffer is used. Sometimes a packet sniffer is called a network monitor or network analyzer. Many system administrator or network administrator use it for monitoring and troubleshooting network traffic. Packet sniffers are useful for both wired and wireless networks. The purpose of this paper is to show the basics of packet sniffer, how it works in both switched and non switched environment, its practical approach, its positive vs negative aspects and its safe guards.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
International Journal of Computer Science & Engineering Survey
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1