首页 > 最新文献

2009 12th International Conference on Computers and Information Technology最新文献

英文 中文
Capacity enhancement of limited user traffic of mobile cellular networks using DOVE technique 利用DOVE技术增强移动蜂窝网络有限用户流量的容量
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407166
Md. Omar Faruq, M. Rahman, M. Islam, M. Amin
In this paper, a simple scheme is presented to improve the performance of mobile cellular networks by using delay of voice end user (DOVE) to the new originating calls over handoff calls in a two-dimensional (2D) traffic model for finite number of users. Expressions for probability of forced termination of handoff calls and the blocking probability of new originating calls have been derived. From this study, it has been found that the probability of forced termination of handoff calls is significantly reduced due to the incorporation of the delay of voice end user compared to the case when no such delay of voice end user is used in the system.
本文提出了一种简单的方案,在有限用户数量的二维流量模型中,利用语音终端用户(DOVE)对新发起呼叫的延迟优于切换呼叫,从而提高移动蜂窝网络的性能。推导了切换呼叫强制终止概率和新发起呼叫阻塞概率的表达式。本研究发现,与系统中不使用语音终端用户延迟的情况相比,加入语音终端用户延迟后,切换呼叫强制终止的概率显著降低。
{"title":"Capacity enhancement of limited user traffic of mobile cellular networks using DOVE technique","authors":"Md. Omar Faruq, M. Rahman, M. Islam, M. Amin","doi":"10.1109/ICCIT.2009.5407166","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407166","url":null,"abstract":"In this paper, a simple scheme is presented to improve the performance of mobile cellular networks by using delay of voice end user (DOVE) to the new originating calls over handoff calls in a two-dimensional (2D) traffic model for finite number of users. Expressions for probability of forced termination of handoff calls and the blocking probability of new originating calls have been derived. From this study, it has been found that the probability of forced termination of handoff calls is significantly reduced due to the incorporation of the delay of voice end user compared to the case when no such delay of voice end user is used in the system.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131199867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An intelligent SMS-based remote Water Metering System 基于短信的智能远程水表计量系统
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407279
Nusrat S. Islam, M. Wasi-ur-Rahman
The Integrated Prepaid Water Meter System is a technology for prepaid billing of water along with sufficient monitoring of the water meter readings automatically from a remote place without any human intervention. This system promises fast and accurate billing of water as well as prevents any misuse of it. In this paper, a technique having adequate security support, for prepaid billing of water using Short Message Service (SMS) has been illustrated. Existing Global System for Mobile communications (GSM) networks have been used for sending and receiving SMS. A prototype of the system has been designed and developed for system exploration and experiment.
综合预付费水表系统是一种预付水费的技术,可以在没有任何人为干预的情况下,从远程自动监控水表读数。该系统保证了快速准确的水费计费,并防止任何误用。本文介绍了一种具有充分安全保障的水费预付费短消息服务技术。现有的全球移动通信系统(GSM)网络已被用于发送和接收SMS。设计并开发了系统原型,进行了系统探索和实验。
{"title":"An intelligent SMS-based remote Water Metering System","authors":"Nusrat S. Islam, M. Wasi-ur-Rahman","doi":"10.1109/ICCIT.2009.5407279","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407279","url":null,"abstract":"The Integrated Prepaid Water Meter System is a technology for prepaid billing of water along with sufficient monitoring of the water meter readings automatically from a remote place without any human intervention. This system promises fast and accurate billing of water as well as prevents any misuse of it. In this paper, a technique having adequate security support, for prepaid billing of water using Short Message Service (SMS) has been illustrated. Existing Global System for Mobile communications (GSM) networks have been used for sending and receiving SMS. A prototype of the system has been designed and developed for system exploration and experiment.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A new hashing and caching approach for reducing call delivery cost and location server's load in wireless mobile networks 一种降低无线移动网络呼叫传递成本和位置服务器负载的哈希缓存新方法
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407165
Md. Mohsin Ali, Md. Amjad Hossain, Md. Kowsar Hossain, G. M. Mashrur-E-Elahi, Md. Asadul Islam
This paper proposes a new approach for reducing average call delivery cost and location server's load of wireless mobile networks. It uses caches whose up-todate information is responsible for dropping these costs and these caches are updated not only during call arrival moment from the calling Mobile Hosts (MHs) but also during call receiving moment to those MHs. To achieve load balancing among replicated Home Location Registers (HLRs), hashing technique is also used and this load is also affected by up-to-date cache information. The analytical model and experimental results show that our proposed method prepares the cache with up-to-date information more frequently with the increase of average call arrival rate as well as average call receiving rate. This increases probability of finding MH's location as well as hit ratio of the cache. As a result, both the average call delivery cost and load on a particular HLR are minimized considerably than all other previous approaches.
本文提出了一种降低无线移动网络平均呼叫传输成本和定位服务器负载的新方法。它使用缓存,其最新信息负责降低这些成本,并且这些缓存不仅在呼叫移动主机(mh)的呼叫到达时刻更新,而且在呼叫接收时刻更新到这些mh。为了在复制的Home Location Registers (hlr)之间实现负载平衡,还使用了散列技术,这种负载也受到最新缓存信息的影响。分析模型和实验结果表明,随着平均呼叫到达率和平均呼叫接收率的增加,我们提出的方法更频繁地为缓存准备最新信息。这增加了找到MH位置的概率以及缓存的命中率。因此,与之前的所有其他方法相比,特定HLR上的平均呼叫传递成本和负载都大大降低了。
{"title":"A new hashing and caching approach for reducing call delivery cost and location server's load in wireless mobile networks","authors":"Md. Mohsin Ali, Md. Amjad Hossain, Md. Kowsar Hossain, G. M. Mashrur-E-Elahi, Md. Asadul Islam","doi":"10.1109/ICCIT.2009.5407165","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407165","url":null,"abstract":"This paper proposes a new approach for reducing average call delivery cost and location server's load of wireless mobile networks. It uses caches whose up-todate information is responsible for dropping these costs and these caches are updated not only during call arrival moment from the calling Mobile Hosts (MHs) but also during call receiving moment to those MHs. To achieve load balancing among replicated Home Location Registers (HLRs), hashing technique is also used and this load is also affected by up-to-date cache information. The analytical model and experimental results show that our proposed method prepares the cache with up-to-date information more frequently with the increase of average call arrival rate as well as average call receiving rate. This increases probability of finding MH's location as well as hit ratio of the cache. As a result, both the average call delivery cost and load on a particular HLR are minimized considerably than all other previous approaches.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A modified MAP in performance evaluation of asynchronous packet traffic 一种用于异步分组流量性能评估的改进MAP
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407163
A. Roy, Md. Jweel Hossain, M. Islam
Markov Arrival Process (MAP) is the most widely used traffic model to analyze performance of a node of an asynchronous packet traffic. Recent literatures make transition between overload and underload states of a node without arrival but sometimes transition may take place from underload to overload with an arrival which deviates our analysis from the present literature of Markov Modulated Poisson Process (MMPP) traffic model. In this paper two different rates of packet ‘arrival’ and ‘non arrival’ is incorporated in state transition of underload to overload and a comparison is made with previous literatures.
马尔可夫到达过程(Markov Arrival Process, MAP)是应用最广泛的流量模型,用于分析异步分组流量的节点性能。最近的文献对未到达节点的过载和欠载状态进行了转换,但有时也会从欠载过渡到有到达节点的过载,这与现有文献对马尔可夫调制泊松过程(MMPP)流量模型的分析有所偏离。本文将两种不同的数据包“到达”和“未到达”速率纳入欠载到过载的状态转换中,并与以往文献进行了比较。
{"title":"A modified MAP in performance evaluation of asynchronous packet traffic","authors":"A. Roy, Md. Jweel Hossain, M. Islam","doi":"10.1109/ICCIT.2009.5407163","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407163","url":null,"abstract":"Markov Arrival Process (MAP) is the most widely used traffic model to analyze performance of a node of an asynchronous packet traffic. Recent literatures make transition between overload and underload states of a node without arrival but sometimes transition may take place from underload to overload with an arrival which deviates our analysis from the present literature of Markov Modulated Poisson Process (MMPP) traffic model. In this paper two different rates of packet ‘arrival’ and ‘non arrival’ is incorporated in state transition of underload to overload and a comparison is made with previous literatures.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126311993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of time dependent micro macro cellular network using MMPP traffic 基于MMPP流量的时变微宏蜂窝网络性能评价
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407283
Mushlah Uddin Sarkar, M. Islam, M. Amin
Two-dimensional (2D) and three-dimensional (3D) steady state Markov chains are widely used to analyze the traffic performance of communications networks. When the characteristics of the network changes with time, such steady state Markov chain is unable to determine different probability states. Markov Modulated Poisson Process (MMPP) is a special case of Markov Arrival Process (MAP) where arrival rate depends on probability states. In this paper, a traffic model of micro-macro cellular network of time dependent traffic load is modeled and its probability states are evaluated using MMPP varying load condition of the network under different parts of observation time.
二维(2D)和三维(3D)稳态马尔可夫链被广泛用于分析通信网络的业务性能。当网络的特性随时间变化时,这种稳态马尔可夫链无法确定不同的概率状态。马尔可夫调制泊松过程(MMPP)是马尔可夫到达过程(MAP)的一种特殊情况,到达率取决于概率状态。本文建立了具有时变交通负荷的微宏元胞网络的交通模型,并利用MMPP方法对网络在不同观测时段的变负荷条件下的概率状态进行了评估。
{"title":"Performance evaluation of time dependent micro macro cellular network using MMPP traffic","authors":"Mushlah Uddin Sarkar, M. Islam, M. Amin","doi":"10.1109/ICCIT.2009.5407283","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407283","url":null,"abstract":"Two-dimensional (2D) and three-dimensional (3D) steady state Markov chains are widely used to analyze the traffic performance of communications networks. When the characteristics of the network changes with time, such steady state Markov chain is unable to determine different probability states. Markov Modulated Poisson Process (MMPP) is a special case of Markov Arrival Process (MAP) where arrival rate depends on probability states. In this paper, a traffic model of micro-macro cellular network of time dependent traffic load is modeled and its probability states are evaluated using MMPP varying load condition of the network under different parts of observation time.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128623992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A logical formal model for verification of Web Service Choreography 用于验证Web服务编排的逻辑形式化模型
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407281
Zahra Madani, N. Nematbakhsh
Several methods and languages have been developed to describe computer system specifications and some of them have been deployed to validate and verify the functionality of the system. No one method is equally appropriate for all application domains. Service Oriented Architecture and using web services is a wide growing domain of applications in software engineering these days, so to achieve more goals and benefits in large business works, we need to compose the existing web services from different organizations. In this paper we discuss about web service composition mechanisms and related formal methods and verification issues. One of the solutions in highest level is to use Web Service Choreography Definition Language (WS-CDL) to design the composition of services. With regard to this, we need to get sure about the correctness of choreography behavior, before to employ it for developing and executing services collaboration. In this paper we present a method using first order logic notation based on the partial-order planning problems. This method can be used for interactive systems that all participants have a common understanding of interaction rules. This method will be able to model variable specification of the system. It is consist of three parts included precondition, action and effect, so has a simple structure to understand. In this method we can check the properties of the model for reachability of ideal and safe states. We show the method in a web service interaction case study and verify it in Prolog tool.
已经开发了几种方法和语言来描述计算机系统规格,其中一些已被用于验证和验证系统的功能。没有一种方法同样适用于所有应用程序领域。面向服务的体系结构和使用web服务是目前软件工程中应用程序的一个广泛增长的领域,因此为了在大型业务工作中实现更多的目标和好处,我们需要组合来自不同组织的现有web服务。本文讨论了web服务组合机制及其形式化方法和验证问题。最高级别的解决方案之一是使用Web服务编排定义语言(WS-CDL)来设计服务的组合。关于这一点,在将编排行为用于开发和执行服务协作之前,我们需要确定它的正确性。本文提出了一种基于一阶逻辑符号的半阶规划方法。该方法可用于所有参与者对交互规则有共同理解的交互系统。这种方法将能够对系统的可变规格进行建模。它由前提、作用和效果三部分组成,结构简单易懂。在这种方法中,我们可以检查模型的性质,以达到理想状态和安全状态。我们在一个web服务交互案例研究中展示了该方法,并在Prolog工具中进行了验证。
{"title":"A logical formal model for verification of Web Service Choreography","authors":"Zahra Madani, N. Nematbakhsh","doi":"10.1109/ICCIT.2009.5407281","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407281","url":null,"abstract":"Several methods and languages have been developed to describe computer system specifications and some of them have been deployed to validate and verify the functionality of the system. No one method is equally appropriate for all application domains. Service Oriented Architecture and using web services is a wide growing domain of applications in software engineering these days, so to achieve more goals and benefits in large business works, we need to compose the existing web services from different organizations. In this paper we discuss about web service composition mechanisms and related formal methods and verification issues. One of the solutions in highest level is to use Web Service Choreography Definition Language (WS-CDL) to design the composition of services. With regard to this, we need to get sure about the correctness of choreography behavior, before to employ it for developing and executing services collaboration. In this paper we present a method using first order logic notation based on the partial-order planning problems. This method can be used for interactive systems that all participants have a common understanding of interaction rules. This method will be able to model variable specification of the system. It is consist of three parts included precondition, action and effect, so has a simple structure to understand. In this method we can check the properties of the model for reachability of ideal and safe states. We show the method in a web service interaction case study and verify it in Prolog tool.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133654260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A two-layer hierarchical permission based mutual exclusion algorithm 一种基于两层分级权限的互斥算法
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407172
M. Rahman, M. Akbar, Mohammad Shafiul Alam
Due to the growing application of peer-to-peer computing, the distributed applications are continuously spreading over extensive number of nodes. To cope with this large number of participants, various cluster based hierarchical solutions have been proposed. Cluster based algorithms are scalable by nature. Several of them are quorum based solutions. All of these solutions exploit the idea of coordinator/leader of cluster. Thus, fault tolerance of these algorithms is low. If any coordinator fails, election of new one is required. Here we propose a two-layer hierarchical cluster based solution where no coordinator is used. We simulate our proposed algorithm and show that it outperforms related ME algorithms.
由于点对点计算的应用日益广泛,分布式应用程序在大量节点上不断扩展。为了应对如此庞大的参与者数量,人们提出了各种基于集群的分层解决方案。基于集群的算法本质上是可伸缩的。其中一些是基于仲裁的解决方案。所有这些解决方案都利用了集群协调者/领导者的思想。因此,这些算法的容错性较低。如果任何协调者失败,则需要选举新的协调者。在这里,我们提出了一个基于两层分层集群的解决方案,其中不使用协调器。仿真结果表明,该算法优于相关的ME算法。
{"title":"A two-layer hierarchical permission based mutual exclusion algorithm","authors":"M. Rahman, M. Akbar, Mohammad Shafiul Alam","doi":"10.1109/ICCIT.2009.5407172","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407172","url":null,"abstract":"Due to the growing application of peer-to-peer computing, the distributed applications are continuously spreading over extensive number of nodes. To cope with this large number of participants, various cluster based hierarchical solutions have been proposed. Cluster based algorithms are scalable by nature. Several of them are quorum based solutions. All of these solutions exploit the idea of coordinator/leader of cluster. Thus, fault tolerance of these algorithms is low. If any coordinator fails, election of new one is required. Here we propose a two-layer hierarchical cluster based solution where no coordinator is used. We simulate our proposed algorithm and show that it outperforms related ME algorithms.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115418848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of a mobile cellular network with two hop ad-hoc relaying 具有两跳自组织中继的移动蜂窝网络的性能评价
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407322
Nusrat Sultana, M. A. J. B. Bakkre, M. Islam, M. Amin
In a mobile cellular network, both new originating calls and handoff calls can be dropped at any time in the midst of a conversation when a user enters in a dead spot. Because of this, there is always some discrepancy between traffic originated by the mobile station (MS) and that of received by the base station (BS). A probability model is used in this paper to evaluate this discrepancy considering geometry of the service area and probability density function of user distribution. Blocking probability experienced by the BS is found less than that of evaluated from the offered traffic of user end, which is the central idea of this paper. Furthermore, the same traffic model is applied to an ad- hoc two hop relay mobile cellular system for performance evaluation.
在移动蜂窝网络中,当用户进入一个死点时,新的发起呼叫和切换呼叫都可以在通话过程中的任何时间中断。因此,移动站(MS)发出的流量与基站(BS)接收的流量之间总是存在一定的差异。考虑到服务区域的几何形状和用户分布的概率密度函数,本文采用概率模型来评价这种差异。从用户端提供的流量中得到的阻塞概率小于从用户端提供的流量中得到的阻塞概率,这是本文的中心思想。此外,将该流量模型应用于自组织两跳中继移动蜂窝系统的性能评估。
{"title":"Performance evaluation of a mobile cellular network with two hop ad-hoc relaying","authors":"Nusrat Sultana, M. A. J. B. Bakkre, M. Islam, M. Amin","doi":"10.1109/ICCIT.2009.5407322","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407322","url":null,"abstract":"In a mobile cellular network, both new originating calls and handoff calls can be dropped at any time in the midst of a conversation when a user enters in a dead spot. Because of this, there is always some discrepancy between traffic originated by the mobile station (MS) and that of received by the base station (BS). A probability model is used in this paper to evaluate this discrepancy considering geometry of the service area and probability density function of user distribution. Blocking probability experienced by the BS is found less than that of evaluated from the offered traffic of user end, which is the central idea of this paper. Furthermore, the same traffic model is applied to an ad- hoc two hop relay mobile cellular system for performance evaluation.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115448493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple-case outlier detection in least-squares regression model using quantum-inspired evolutionary algorithm 基于量子进化算法的最小二乘回归模型多情况异常点检测
Pub Date : 2009-12-01 DOI: 10.1504/IJAISC.2010.038636
Mozammel H. A. Khan
In ordinary statistical methods, multiple outliers in least-squares regression model are detected sequentially one after another, where smearing and masking effects give misleading results. If the potential multiple outliers can be detected simultaneously, smearing and masking effects can be avoided. Such multiple-case outlier detection is of combinatorial nature and 2N -1 sets of possible outliers need to be tested, where N is the number of data points. This exhaustive search is practically impossible. In this paper, we have used quantum-inspired evolutionary algorithm (QEA) for multiple-case outlier detection in least-squares regression model. An information criterion based fitness function incorporating extra penalty for number of potential outliers has been used for identifying the most appropriate set of potential outliers. Experimental results with four datasets from statistical literature show that the QEA effectively detects the most appropriate set of outliers.
在普通的统计方法中,最小二乘回归模型中的多个异常点是依次检测出来的,其中涂抹和掩蔽效应会产生误导性的结果。如果可以同时检测到潜在的多个异常值,则可以避免涂抹和掩蔽效果。这种多情况离群值检测具有组合性,需要测试2N -1组可能的离群值,其中N为数据点的数量。这种详尽的搜索实际上是不可能的。本文将量子启发进化算法(QEA)用于最小二乘回归模型的多情况异常点检测。利用基于信息准则的适应度函数,结合潜在异常值数目的额外惩罚,确定了最合适的潜在异常值集合。统计文献中4个数据集的实验结果表明,QEA能有效地检测出最合适的离群值集。
{"title":"Multiple-case outlier detection in least-squares regression model using quantum-inspired evolutionary algorithm","authors":"Mozammel H. A. Khan","doi":"10.1504/IJAISC.2010.038636","DOIUrl":"https://doi.org/10.1504/IJAISC.2010.038636","url":null,"abstract":"In ordinary statistical methods, multiple outliers in least-squares regression model are detected sequentially one after another, where smearing and masking effects give misleading results. If the potential multiple outliers can be detected simultaneously, smearing and masking effects can be avoided. Such multiple-case outlier detection is of combinatorial nature and 2N -1 sets of possible outliers need to be tested, where N is the number of data points. This exhaustive search is practically impossible. In this paper, we have used quantum-inspired evolutionary algorithm (QEA) for multiple-case outlier detection in least-squares regression model. An information criterion based fitness function incorporating extra penalty for number of potential outliers has been used for identifying the most appropriate set of potential outliers. Experimental results with four datasets from statistical literature show that the QEA effectively detects the most appropriate set of outliers.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Challenges in building trust in B2C e-Commerce and proposal to mitigate them: developing countries perspective 在B2C电子商务中建立信任的挑战和缓解这些挑战的建议:发展中国家的观点
Pub Date : 2009-12-01 DOI: 10.1109/ICCIT.2009.5407304
Subrata Kumar Dey, Mohammad Noor Nabi, M. Anwer
In this technology mediated world, e-Commerce is becoming more and more powerful medium for doing business, globally. Existing security technologies are proven to protect online transaction and fund transfer. However, while transacting with global e-merchants, trustworthiness of secure fund transfer and delivery of products/services are affected, and they could not leverage the potential benefit of e-Commerce. In this paper, the authors firstly overview the current state-of-threat by surveying was people's perception about trust in e-Commerce in developing countries like Bangladesh and argue that the security requirements of e-Commerce service generally go beyond the more traditional requirements of network security. The result analysis shows that, challenges in building trust for Business-to-Consumer (B2C) e-Commerce venture (local/international) is the major concern. The authors propose an e-Commerce enabled model for secure electronic fund transfer, and discuss ways to mitigate challenges in building trust in B2C.
在这个以技术为媒介的世界里,电子商务正在成为全球范围内开展业务的越来越强大的媒介。现有的安全技术已被证明可以保护网上交易和资金转移。然而,在与全球电子商务进行交易时,安全资金转移和产品/服务交付的可信度受到影响,他们无法利用电子商务的潜在利益。在本文中,作者首先通过调查孟加拉国等发展中国家人们对电子商务信任的看法来概述当前的威胁状态,并认为电子商务服务的安全要求普遍超出了更传统的网络安全要求。结果分析显示,企业对消费者(B2C)电子商务企业(本地/国际)建立信任的挑战是主要关注的问题。作者提出了一种安全电子资金转移的电子商务模式,并讨论了在B2C中建立信任的方法。
{"title":"Challenges in building trust in B2C e-Commerce and proposal to mitigate them: developing countries perspective","authors":"Subrata Kumar Dey, Mohammad Noor Nabi, M. Anwer","doi":"10.1109/ICCIT.2009.5407304","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.5407304","url":null,"abstract":"In this technology mediated world, e-Commerce is becoming more and more powerful medium for doing business, globally. Existing security technologies are proven to protect online transaction and fund transfer. However, while transacting with global e-merchants, trustworthiness of secure fund transfer and delivery of products/services are affected, and they could not leverage the potential benefit of e-Commerce. In this paper, the authors firstly overview the current state-of-threat by surveying was people's perception about trust in e-Commerce in developing countries like Bangladesh and argue that the security requirements of e-Commerce service generally go beyond the more traditional requirements of network security. The result analysis shows that, challenges in building trust for Business-to-Consumer (B2C) e-Commerce venture (local/international) is the major concern. The authors propose an e-Commerce enabled model for secure electronic fund transfer, and discuss ways to mitigate challenges in building trust in B2C.","PeriodicalId":443258,"journal":{"name":"2009 12th International Conference on Computers and Information Technology","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122641985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2009 12th International Conference on Computers and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1