首页 > 最新文献

Proceedings of the The International Conference on Engineering & MIS 2015最新文献

英文 中文
Measurement and modeling of UV intensity inside a photoreactor for wastewater treatment 废水处理光反应器内紫外线强度的测量与建模
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833008
B. Boutra, L. Aoudjit, F. Madjene, A. Sebti, H. Lebik, S. Igoud
Water availability and quality represent a major challenge facing water scarcity and pollution. The United Nations Organization predicts that 44% of the world population will live a severe water scarcity, in 2050. Countries located in sub-humid and semi-arid regions of the world will be especially concerned by this problematic. Water disinfection by Ultraviolet (UV) radiation is a rising technique in water treatments considering its simplicity and the weak risk of toxic byproducts formation. When UV radiation is absorbed by the cells of microorganisms, it damages the genetic material (DNA) within the cell in such a way that the organisms are no longer able to grow or reproduce, thus preventing the human illness cryptosporidiosis. DNA damage mainly results from irradiation at wavelengths within the UV-C region of the spectrum (200-280 nm) and is maximised at around 254 nm. This is the principle by which UV is used for disinfection. Time required to achieve a total disinfection depends both on the quality of water and the intensity of irradiation. Effective disinfection can be provided by a suitable intensity and duration of UV radiation to give a UV "dose" usually expressed in mJ/cm2 (= mW second/cm2, the product of UV intensity in mW/cm2 and contact time in seconds). The target dose will depend on the application, but a dose of 40 mJ/cm2 is commonly used for UV disinfection systems, validated for the broad spectrum inactivation of possible waterborne pathogens such as bacteria, viruses and protozoan parasites such as Cryptosporidium. The objective of this study is to present the state of art of different methods of intensity measurement and modeling, and the use of MPSS model to evaluate the UV intensity distribution inside the photoreactor.
水的供应和质量是水资源短缺和污染面临的主要挑战。联合国预测,到2050年,全球44%的人口将面临严重的水资源短缺。位于世界半湿润和半干旱地区的国家将特别关注这一问题。紫外线(UV)辐射消毒是一种新兴的水处理技术,因为它简单,产生有毒副产物的风险小。当紫外线辐射被微生物细胞吸收时,它会破坏细胞内的遗传物质(DNA),使生物体不再能够生长或繁殖,从而防止人类疾病隐孢子虫病。DNA损伤主要是由紫外线- c波段(200-280纳米)的辐射造成的,在254纳米左右达到最大。这就是紫外线用于消毒的原理。完全消毒所需的时间取决于水质和辐照强度。适当的紫外线照射强度和持续时间可提供有效消毒,紫外线“剂量”通常以mJ/cm2表示(=毫瓦秒/cm2,以毫瓦/cm2为单位的紫外线强度与以秒为单位的接触时间的乘积)。目标剂量将取决于应用,但40 mJ/cm2的剂量通常用于紫外线消毒系统,经验证可广泛灭活可能的水传播病原体,如细菌、病毒和原生动物寄生虫,如隐孢子虫。本研究的目的是介绍不同的强度测量和建模方法的现状,并利用MPSS模型来评估光反应器内的紫外线强度分布。
{"title":"Measurement and modeling of UV intensity inside a photoreactor for wastewater treatment","authors":"B. Boutra, L. Aoudjit, F. Madjene, A. Sebti, H. Lebik, S. Igoud","doi":"10.1145/2832987.2833008","DOIUrl":"https://doi.org/10.1145/2832987.2833008","url":null,"abstract":"Water availability and quality represent a major challenge facing water scarcity and pollution. The United Nations Organization predicts that 44% of the world population will live a severe water scarcity, in 2050. Countries located in sub-humid and semi-arid regions of the world will be especially concerned by this problematic. Water disinfection by Ultraviolet (UV) radiation is a rising technique in water treatments considering its simplicity and the weak risk of toxic byproducts formation. When UV radiation is absorbed by the cells of microorganisms, it damages the genetic material (DNA) within the cell in such a way that the organisms are no longer able to grow or reproduce, thus preventing the human illness cryptosporidiosis. DNA damage mainly results from irradiation at wavelengths within the UV-C region of the spectrum (200-280 nm) and is maximised at around 254 nm. This is the principle by which UV is used for disinfection. Time required to achieve a total disinfection depends both on the quality of water and the intensity of irradiation. Effective disinfection can be provided by a suitable intensity and duration of UV radiation to give a UV \"dose\" usually expressed in mJ/cm2 (= mW second/cm2, the product of UV intensity in mW/cm2 and contact time in seconds). The target dose will depend on the application, but a dose of 40 mJ/cm2 is commonly used for UV disinfection systems, validated for the broad spectrum inactivation of possible waterborne pathogens such as bacteria, viruses and protozoan parasites such as Cryptosporidium. The objective of this study is to present the state of art of different methods of intensity measurement and modeling, and the use of MPSS model to evaluate the UV intensity distribution inside the photoreactor.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating electrical energy consumption using Linear Genetic Programming 利用线性遗传规划估算电能消耗
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833021
B. Barán, J. Paciello, Vanessa J. Cañete, N. Hernández
The electrical energy distribution subsystem is a component of the power delivery infrastructure that carries electricity from the high voltage transmission circuits to the customers. In order to prevent damage of the electrical energy distribution infrastructure, companies typically use transformers with digital meters that allow monitoring in real time, certain parameters like the amount of transformed energy. In several underdeveloped countries as Paraguay, the meters are installed only on a limited number of key transformers. Therefore, it is necessary to estimate the power consumption for the unmetered transformers using existing measurements. For this aim, this paper proposes the application of Linear Genetic Programming (LGP) to find good estimates of the power consumption of unmetered transformers. The proposal is compared with an analytical consumption estimation model proposed in a previous related work, being 13% better on average and 41% better in the best case. Dimensionality reduction proves to be useful to speed up calculation without losing much precision in the LGP estimations.
电能分配子系统是电力传输基础设施的一个组成部分,它将电力从高压传输电路输送到用户。为了防止对电力分配基础设施的破坏,公司通常使用带有数字仪表的变压器,以便实时监控转换能量的数量等某些参数。在巴拉圭等几个不发达国家,电表只安装在数量有限的关键变压器上。因此,有必要使用现有的测量来估计未计量变压器的功耗。为此,本文提出应用线性遗传规划(LGP)对未计量变压器的功耗进行较好的估计。该方案与之前相关工作中提出的分析性消费估算模型进行了比较,平均提高了13%,最好情况下提高了41%。在LGP估计中,降维可以在不降低精度的情况下加快计算速度。
{"title":"Estimating electrical energy consumption using Linear Genetic Programming","authors":"B. Barán, J. Paciello, Vanessa J. Cañete, N. Hernández","doi":"10.1145/2832987.2833021","DOIUrl":"https://doi.org/10.1145/2832987.2833021","url":null,"abstract":"The electrical energy distribution subsystem is a component of the power delivery infrastructure that carries electricity from the high voltage transmission circuits to the customers. In order to prevent damage of the electrical energy distribution infrastructure, companies typically use transformers with digital meters that allow monitoring in real time, certain parameters like the amount of transformed energy. In several underdeveloped countries as Paraguay, the meters are installed only on a limited number of key transformers. Therefore, it is necessary to estimate the power consumption for the unmetered transformers using existing measurements. For this aim, this paper proposes the application of Linear Genetic Programming (LGP) to find good estimates of the power consumption of unmetered transformers. The proposal is compared with an analytical consumption estimation model proposed in a previous related work, being 13% better on average and 41% better in the best case. Dimensionality reduction proves to be useful to speed up calculation without losing much precision in the LGP estimations.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131452585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Temporal Databases and Data mining 时态数据库与数据挖掘研究综述
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833064
V. Radhakrishna, P. Kumar, V. Janaki
Temporal database is a database which captures and maintains past, present and future data. Conventional databases are not suitable for handling such time varying data. In this context temporal database has gained a significant importance in the field of databases and data mining. The major objective of this research is to perform a detailed survey on temporal databases and the various temporal data mining techniques and explore the various research issues in temporal data mining. We also throw light on the temporal association rules and temporal clustering works carried in literature.
时态数据库是一种捕获和维护过去、现在和未来数据的数据库。传统的数据库不适合处理这种时变数据。在这种背景下,时态数据库在数据库和数据挖掘领域具有重要的意义。本研究的主要目的是对时态数据库和各种时态数据挖掘技术进行详细的综述,并探讨时态数据挖掘中的各种研究问题。我们还对文献中进行的时间关联规则和时间聚类工作进行了阐述。
{"title":"A Survey on Temporal Databases and Data mining","authors":"V. Radhakrishna, P. Kumar, V. Janaki","doi":"10.1145/2832987.2833064","DOIUrl":"https://doi.org/10.1145/2832987.2833064","url":null,"abstract":"Temporal database is a database which captures and maintains past, present and future data. Conventional databases are not suitable for handling such time varying data. In this context temporal database has gained a significant importance in the field of databases and data mining. The major objective of this research is to perform a detailed survey on temporal databases and the various temporal data mining techniques and explore the various research issues in temporal data mining. We also throw light on the temporal association rules and temporal clustering works carried in literature.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134371181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
An Extension of DIRECT Algorithm Using Kriging Metamodel for Global Optimization 基于Kriging元模型的DIRECT算法的全局优化扩展
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833057
Abdulbaset El. Saad, Z. Dong
As a very well-known non-gradient global optimization method, DIviding RECTangles (DIRECT) algorithm has been proven to be an effective and efficient search method for many global optimization problems. However, computation of the algorithm could be costly and slow in solving problems involving computation intensive, Expensive Black Box (EBB) function due to the high number of objective function evolution required. This work proposes a new strategy which integrates meta-modeling techniques with DIRECT for solving EBB problems. The principal idea of the new approach is to use meta-modeling techniques, such as Kriging, to assist DIRECT to identify the optimum with less number of function evolutions. Specifically, the new approach starts with DIRECT search with a number of iterations and then uses the resulting points in Kriging to construct the meta-model. The best point predicted by Kriging search will then be used by DIRECT as new initial point. As a result, the entire search domain will gradually shrink to the region enclosing the possible optimum. Several runs are carried out to avoid high number of function evaluations to obtain the approximation solution at each stage. The newly proposed method has been tested using ten commonly used benchmark functions. All these tests showed significant improvements over the original DIRECT for EBB design problems.
矩形分割(DIRECT)算法作为一种众所周知的非梯度全局优化方法,已被证明是解决许多全局优化问题的一种有效的搜索方法。然而,由于需要大量的目标函数进化,该算法在解决涉及计算密集型,昂贵的黑匣子(EBB)函数的问题时可能会计算成本高且速度慢。这项工作提出了一种新的策略,将元建模技术与DIRECT集成在一起,用于解决EBB问题。新方法的主要思想是使用元建模技术,比如Kriging,来帮助DIRECT用更少的功能演化来确定最优。具体来说,新方法从直接搜索开始,进行多次迭代,然后使用Kriging中的结果点来构建元模型。然后DIRECT将Kriging搜索预测到的最佳点作为新的初始点。因此,整个搜索域将逐渐缩小到可能最优的区域。为了避免在每个阶段进行大量的函数评估以获得近似解,进行了多次运行。新提出的方法已经使用十个常用的基准函数进行了测试。所有这些测试都表明,与针对EBB设计问题的原始DIRECT相比,有了显著的改进。
{"title":"An Extension of DIRECT Algorithm Using Kriging Metamodel for Global Optimization","authors":"Abdulbaset El. Saad, Z. Dong","doi":"10.1145/2832987.2833057","DOIUrl":"https://doi.org/10.1145/2832987.2833057","url":null,"abstract":"As a very well-known non-gradient global optimization method, DIviding RECTangles (DIRECT) algorithm has been proven to be an effective and efficient search method for many global optimization problems. However, computation of the algorithm could be costly and slow in solving problems involving computation intensive, Expensive Black Box (EBB) function due to the high number of objective function evolution required. This work proposes a new strategy which integrates meta-modeling techniques with DIRECT for solving EBB problems. The principal idea of the new approach is to use meta-modeling techniques, such as Kriging, to assist DIRECT to identify the optimum with less number of function evolutions. Specifically, the new approach starts with DIRECT search with a number of iterations and then uses the resulting points in Kriging to construct the meta-model. The best point predicted by Kriging search will then be used by DIRECT as new initial point. As a result, the entire search domain will gradually shrink to the region enclosing the possible optimum. Several runs are carried out to avoid high number of function evaluations to obtain the approximation solution at each stage. The newly proposed method has been tested using ten commonly used benchmark functions. All these tests showed significant improvements over the original DIRECT for EBB design problems.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of Cathode Pt /C Electrocatalyst Degradation and Performance of a PEMFC using Artificial Neural Network 基于人工神经网络的阴极Pt /C电催化剂降解及PEMFC性能建模
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833000
Nasim Maleki, E. Maleki
Modeling is of a great importance in developing fuel cell technology with less possible expenses. A good understanding of chemical, physical and mechanical processes of the operating system and related equations are needed to model fuel cells, which are hard to determine in many cases. Artificial intelligence (AI) is a choice to overcome this difficulty instead of costly experiments. AI systems such as artificial neural networks (ANNs) have been employed to solve, predict and optimize the engineering problems in the last decade. In the present study, capabilities of ANN to predict the performance of proton exchange membrane fuel cell (PEMFC) considering the cathode electrocatlyst layer degradation is investigated. Experimental data are utilized for training and testing the networks. Current density, temperature, humidity, number of potential cycles, Platinum load and fuel/oxidant flow rates, potential cycle time step are considered as the inputs and the cell potential, Platinum mass loss percentage of the cathode and location of Platinum particles, which are diffused into membrane and deposited there, are regarded as outputs of ANNs. Back propagation (BP) algorithm has been used to train the network. It is observed that when the networks tuned finely, the obtained results from modeling are in good agreement with the experimental data and achieved responses of ANN are acceptable.
建模对于开发成本更低的燃料电池技术具有重要意义。建立燃料电池模型需要很好地理解操作系统的化学、物理和机械过程以及相关方程,而在许多情况下,这些过程很难确定。人工智能(AI)是克服这一困难的一种选择,而不是昂贵的实验。在过去十年中,人工神经网络等人工智能系统已被用于解决、预测和优化工程问题。在本研究中,研究了考虑阴极电催化剂层降解的人工神经网络预测质子交换膜燃料电池(PEMFC)性能的能力。利用实验数据对网络进行训练和测试。电流密度、温度、湿度、电位循环次数、铂负载和燃料/氧化剂流量、电位循环时间步长被认为是输入,而电池电位、阴极铂的质量损失百分比和扩散到膜上并沉积在膜上的铂颗粒的位置被认为是人工神经网络的输出。采用反向传播(BP)算法对网络进行训练。结果表明,在对网络进行微调后,得到的建模结果与实验数据吻合较好,得到的人工神经网络响应是可以接受的。
{"title":"Modeling of Cathode Pt /C Electrocatalyst Degradation and Performance of a PEMFC using Artificial Neural Network","authors":"Nasim Maleki, E. Maleki","doi":"10.1145/2832987.2833000","DOIUrl":"https://doi.org/10.1145/2832987.2833000","url":null,"abstract":"Modeling is of a great importance in developing fuel cell technology with less possible expenses. A good understanding of chemical, physical and mechanical processes of the operating system and related equations are needed to model fuel cells, which are hard to determine in many cases. Artificial intelligence (AI) is a choice to overcome this difficulty instead of costly experiments. AI systems such as artificial neural networks (ANNs) have been employed to solve, predict and optimize the engineering problems in the last decade. In the present study, capabilities of ANN to predict the performance of proton exchange membrane fuel cell (PEMFC) considering the cathode electrocatlyst layer degradation is investigated. Experimental data are utilized for training and testing the networks. Current density, temperature, humidity, number of potential cycles, Platinum load and fuel/oxidant flow rates, potential cycle time step are considered as the inputs and the cell potential, Platinum mass loss percentage of the cathode and location of Platinum particles, which are diffused into membrane and deposited there, are regarded as outputs of ANNs. Back propagation (BP) algorithm has been used to train the network. It is observed that when the networks tuned finely, the obtained results from modeling are in good agreement with the experimental data and achieved responses of ANN are acceptable.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115868537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Session Key Utilization Based Approach For Memory Management in Wireless Networks 基于会话密钥利用的无线网络内存管理方法
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833065
Arun Nagaraja, Saravana Kumar
Symmetric cryptography is used in wireless networks, with the help of session keys to make it used for the public. Keys that are randomly generated to provide security are called as Session key and this is the encryption and decryption key to establish the communication between a user and another computer. However, using session keys, the memory can be managed dynamically by different encryption and decryption techniques. When memory gets overloaded with many requests, then dynamically memory is to be allocated with the help of session keys and gets connected to the external devices. By performing the dynamic operations memory can be managed and users can get uninterrupted process in accessing the network. In this paper, we show that with the help of session keys we can provide the authentication to request handler devices. By this memory can be handled very easily and the congestion can be controlled with the help of session keys.
对称密码学在无线网络中使用,借助会话密钥使其用于公共。为提供安全性而随机生成的密钥称为会话密钥,这是在用户和另一台计算机之间建立通信的加密和解密密钥。然而,使用会话密钥,内存可以通过不同的加密和解密技术进行动态管理。当内存因许多请求而超载时,将在会话键的帮助下分配动态内存,并将其连接到外部设备。通过执行动态操作,可以对内存进行管理,使用户可以在访问网络时获得不间断的过程。在本文中,我们展示了在会话密钥的帮助下,我们可以为请求处理程序设备提供身份验证。通过这种方式,可以很容易地处理内存,并且可以通过会话密钥来控制拥塞。
{"title":"A Session Key Utilization Based Approach For Memory Management in Wireless Networks","authors":"Arun Nagaraja, Saravana Kumar","doi":"10.1145/2832987.2833065","DOIUrl":"https://doi.org/10.1145/2832987.2833065","url":null,"abstract":"Symmetric cryptography is used in wireless networks, with the help of session keys to make it used for the public. Keys that are randomly generated to provide security are called as Session key and this is the encryption and decryption key to establish the communication between a user and another computer. However, using session keys, the memory can be managed dynamically by different encryption and decryption techniques. When memory gets overloaded with many requests, then dynamically memory is to be allocated with the help of session keys and gets connected to the external devices. By performing the dynamic operations memory can be managed and users can get uninterrupted process in accessing the network. In this paper, we show that with the help of session keys we can provide the authentication to request handler devices. By this memory can be handled very easily and the congestion can be controlled with the help of session keys.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128061260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluating Quality of Primary Studies on Determining Object-Oriented Code Refactoring Candidates 评估确定面向对象代码重构候选者的初步研究的质量
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833026
Jehad Al Dallal
Refactoring is a maintenance task that aims at improving the quality of a software source code by restructuring it without altering its external behavior. Identifying refactoring opportunities by manually inspecting and analyzing the source code of the system under consideration is a time consuming and costly process. Researchers, in this area, typically introduce fully or semi-automated techniques to determine or predict refactoring candidates and they report related evaluation studies. The quality of the performed studies has a great impact on the accuracy of the obtained results. In this paper, we demonstrate an application for a proposed framework that evaluates published primary studies (PSs) on refactoring prediction/identification techniques. The framework is applied on 47 selected PSs to evaluate the quality of the studies based on their design, conduct, analysis, and conclusion. We used the results to comment on the weaknesses of the existing PSs and the issues that have to be considered with more attention in future studies.
重构是一项维护任务,旨在通过在不改变外部行为的情况下重构软件源代码,从而提高软件源代码的质量。通过手工检查和分析所考虑的系统的源代码来确定重构机会是一个耗时且昂贵的过程。在这个领域,研究人员通常会引入完全或半自动化的技术来确定或预测重构候选,并报告相关的评估研究。所进行研究的质量对所得结果的准确性有很大的影响。在本文中,我们演示了一个拟议框架的应用程序,该框架评估了有关重构预测/识别技术的已发表的初步研究(ps)。该框架应用于47个选定的PSs,以评估基于其设计,实施,分析和结论的研究质量。我们使用这些结果来评论现有ps的弱点以及在未来的研究中需要更多关注的问题。
{"title":"Evaluating Quality of Primary Studies on Determining Object-Oriented Code Refactoring Candidates","authors":"Jehad Al Dallal","doi":"10.1145/2832987.2833026","DOIUrl":"https://doi.org/10.1145/2832987.2833026","url":null,"abstract":"Refactoring is a maintenance task that aims at improving the quality of a software source code by restructuring it without altering its external behavior. Identifying refactoring opportunities by manually inspecting and analyzing the source code of the system under consideration is a time consuming and costly process. Researchers, in this area, typically introduce fully or semi-automated techniques to determine or predict refactoring candidates and they report related evaluation studies. The quality of the performed studies has a great impact on the accuracy of the obtained results. In this paper, we demonstrate an application for a proposed framework that evaluates published primary studies (PSs) on refactoring prediction/identification techniques. The framework is applied on 47 selected PSs to evaluate the quality of the studies based on their design, conduct, analysis, and conclusion. We used the results to comment on the weaknesses of the existing PSs and the issues that have to be considered with more attention in future studies.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121883577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sets Visualization using their Graph Representation 使用图形表示设置可视化
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833023
Abdalmunam Abdalla, M. Koyuturk, Abdelsalam M. Maatuk, A. O. Mohammed
With the emergence of new data acquisition technologies, large amounts of data are available in many domains. While a significant amount of computational research is dedicated to the analysis of such data, it is needed to be visualized in a way that is easy to analyze and understand. Recently, there have been significant advances in visualizing graphs; however, not enough tools exist for automatic visualization of sets. In this paper, we devise a spectral approach for visualizing overlapping sets, so that the underlying hierarchy and relations of the sets can be easily understood by visual inspection. The algorithm utilizes the spectral decomposition of the graph representation of the sets to compute the best coordinates for all items on the Euclidean plane. The experimental results were very encouraging, and showed positive indication on the efficiency of the proposed method.
随着新的数据采集技术的出现,在许多领域都可以获得大量的数据。虽然大量的计算研究致力于分析这些数据,但需要以易于分析和理解的方式将其可视化。最近,在可视化图表方面取得了重大进展;然而,目前还没有足够的工具来实现集合的自动可视化。在本文中,我们设计了一种光谱方法来可视化重叠集,以便通过视觉检查可以很容易地理解集合的底层层次和关系。该算法利用集合的图表示的谱分解来计算欧几里得平面上所有项目的最佳坐标。实验结果令人鼓舞,表明了该方法的有效性。
{"title":"Sets Visualization using their Graph Representation","authors":"Abdalmunam Abdalla, M. Koyuturk, Abdelsalam M. Maatuk, A. O. Mohammed","doi":"10.1145/2832987.2833023","DOIUrl":"https://doi.org/10.1145/2832987.2833023","url":null,"abstract":"With the emergence of new data acquisition technologies, large amounts of data are available in many domains. While a significant amount of computational research is dedicated to the analysis of such data, it is needed to be visualized in a way that is easy to analyze and understand. Recently, there have been significant advances in visualizing graphs; however, not enough tools exist for automatic visualization of sets. In this paper, we devise a spectral approach for visualizing overlapping sets, so that the underlying hierarchy and relations of the sets can be easily understood by visual inspection. The algorithm utilizes the spectral decomposition of the graph representation of the sets to compute the best coordinates for all items on the Euclidean plane. The experimental results were very encouraging, and showed positive indication on the efficiency of the proposed method.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123289831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An approach for Intrusion Detection using Text Mining Techniques 一种基于文本挖掘技术的入侵检测方法
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833076
G. R. Kumar, N. Mangathayaru, G. Narasimha
The problem of clustering is NP-Complete. The existing clustering algorithm in literature is the approximate algorithms, which cluster the underlying data differently for different datasets. The K-Means Clustering algorithm is suitable for frequency but not for binary form. When an application runs several system calls are implicitly invoked in the background. Based on these system calls we can predict the normal or abnormal behavior of applications. This can be done by classification. In this paper we tried to perform classification of processes running into normal and abnormal states by using system call behavior. We reduce the system call feature vector by choosing k-means algorithm which uses the proposed measure for dimensionality reduction. We give the design of the proposed measure. The proposed measure has upper and lower bounds which are finite.
聚类问题是np完全的。文献中现有的聚类算法是近似算法,针对不同的数据集对底层数据进行不同的聚类。K-Means聚类算法适用于频率形式,但不适用于二进制形式。当应用程序运行时,会在后台隐式调用多个系统调用。基于这些系统调用,我们可以预测应用程序的正常或异常行为。这可以通过分类来实现。在本文中,我们试图通过使用系统调用行为对运行在正常和异常状态的进程进行分类。采用k-means算法对系统调用特征向量进行降维。我们给出了建议措施的设计。该测度具有有限的上界和下界。
{"title":"An approach for Intrusion Detection using Text Mining Techniques","authors":"G. R. Kumar, N. Mangathayaru, G. Narasimha","doi":"10.1145/2832987.2833076","DOIUrl":"https://doi.org/10.1145/2832987.2833076","url":null,"abstract":"The problem of clustering is NP-Complete. The existing clustering algorithm in literature is the approximate algorithms, which cluster the underlying data differently for different datasets. The K-Means Clustering algorithm is suitable for frequency but not for binary form. When an application runs several system calls are implicitly invoked in the background. Based on these system calls we can predict the normal or abnormal behavior of applications. This can be done by classification. In this paper we tried to perform classification of processes running into normal and abnormal states by using system call behavior. We reduce the system call feature vector by choosing k-means algorithm which uses the proposed measure for dimensionality reduction. We give the design of the proposed measure. The proposed measure has upper and lower bounds which are finite.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An Approach for Mining Similarity Profiled Temporal Association Patterns Using Gaussian Based Dissimilarity Measure 基于高斯不相似度量的相似时序关联模式挖掘方法
Pub Date : 2015-09-24 DOI: 10.1145/2832987.2833069
V. Radhakrishna, P. Kumar, V. Janaki
The problem of mining frequent patterns in non-temporal databases is studied extensively. Conventional frequent pattern algorithms are not applicable to find temporal frequent items from the temporal databases. Given a reference support time sequence, the problem of mining similar temporal association patterns has been the current interest among the researchers working in the area of temporal databases. The main objective of this research is to propose and validate the suitability of Gaussian distribution based dissimilarity measure to find similar and dissimilar temporal association patterns of interest. The measure designed serves as similarity measure for finding the similar temporal association patterns. Finally, in this research, we consider the problem of mining similarity profiled temporal patterns from the set of time stamped transaction of temporal database using proposed measure. We show using a case study how the proposed dissimilarity measure may be used to find the temporal frequent patterns and compare the same with the work carried in the literature. The proposed measure has the fixed lower bound and upper bound values as 0 and 1 respectively which is its advantage as compared to Euclidean distance measure which has no fixed upper bound.
非时态数据库中频繁模式的挖掘问题得到了广泛的研究。传统的频繁模式算法不适用于从时态数据库中发现时态频繁项。在给定参考支持时间序列的情况下,挖掘相似时间关联模式的问题一直是时间数据库研究人员关注的问题。本研究的主要目的是提出并验证基于高斯分布的不相似度度量的适用性,以发现感兴趣的相似和不相似的时间关联模式。所设计的度量作为相似性度量,用于发现相似的时间关联模式。最后,在本文的研究中,我们考虑了使用所提出的度量从时间数据库的时间戳事务集中挖掘相似轮廓时间模式的问题。我们通过一个案例研究展示了如何使用提出的不相似性度量来发现时间频率模式,并将其与文献中进行的工作进行比较。该测度具有固定的下界和上界值分别为0和1,这是其相对于没有固定上界的欧氏距离测度的优点。
{"title":"An Approach for Mining Similarity Profiled Temporal Association Patterns Using Gaussian Based Dissimilarity Measure","authors":"V. Radhakrishna, P. Kumar, V. Janaki","doi":"10.1145/2832987.2833069","DOIUrl":"https://doi.org/10.1145/2832987.2833069","url":null,"abstract":"The problem of mining frequent patterns in non-temporal databases is studied extensively. Conventional frequent pattern algorithms are not applicable to find temporal frequent items from the temporal databases. Given a reference support time sequence, the problem of mining similar temporal association patterns has been the current interest among the researchers working in the area of temporal databases. The main objective of this research is to propose and validate the suitability of Gaussian distribution based dissimilarity measure to find similar and dissimilar temporal association patterns of interest. The measure designed serves as similarity measure for finding the similar temporal association patterns. Finally, in this research, we consider the problem of mining similarity profiled temporal patterns from the set of time stamped transaction of temporal database using proposed measure. We show using a case study how the proposed dissimilarity measure may be used to find the temporal frequent patterns and compare the same with the work carried in the literature. The proposed measure has the fixed lower bound and upper bound values as 0 and 1 respectively which is its advantage as compared to Euclidean distance measure which has no fixed upper bound.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"34 21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132828744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
期刊
Proceedings of the The International Conference on Engineering & MIS 2015
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1