首页 > 最新文献

2014 17th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
An Alternative Methodology for Authentication and Confidentiality Based on Zero Knowledge Protocols Using Diffie-Hellman Key Exchange 基于Diffie-Hellman密钥交换的零知识协议认证和机密性替代方法
P. Lalitha Surya Kumari, A. Damodaram
This paper presents a concept for a new method to provide the authentication and confidentiality using zero knowledge protocol and key exchange. Zero knowledge proof protocol is a essential component of cryptography, which in recent years has increasingly popular amongst scholars. Its applications have widened and it has made inroads in several areas including mathematics and network safety and so on. This simple protocol based on zero knowledge proof by which user can prove to the authentication server that he has the password without having to send the password to the server either clear text or in encrypted format. This is a protocol in which the data learned by one party (i.e., The inspector) allow him/her to verify that a statement is true but does not reveal any additional information. In this paper we first discuss about zero-knowledge protocol proof system of knowledge and also key exchange between users and which then is modified into an authentication scheme with secret key exchange for confidentiality. The whole protocol involves mutual identification of two users, exchange of a random common secret key or session key for the verification of public keys.
本文提出了一种利用零知识协议和密钥交换来提供认证和机密性的新方法。零知识证明协议是密码学的重要组成部分,近年来越来越受到学者们的关注。它的应用范围越来越广,在数学、网络安全等多个领域都取得了进展。这个简单的协议基于零知识证明,通过它,用户可以向身份验证服务器证明他拥有密码,而不必将密码以明文或加密格式发送给服务器。这是一种协议,其中一方(即检查员)获得的数据允许他/她核实陈述是否属实,但不透露任何额外信息。本文首先讨论了零知识协议的知识证明系统和用户之间的密钥交换,然后将其修改为具有保密密钥交换的认证方案。整个协议涉及到两个用户的相互识别,交换一个随机的公共密钥或会话密钥来验证公钥。
{"title":"An Alternative Methodology for Authentication and Confidentiality Based on Zero Knowledge Protocols Using Diffie-Hellman Key Exchange","authors":"P. Lalitha Surya Kumari, A. Damodaram","doi":"10.1109/ICIT.2014.39","DOIUrl":"https://doi.org/10.1109/ICIT.2014.39","url":null,"abstract":"This paper presents a concept for a new method to provide the authentication and confidentiality using zero knowledge protocol and key exchange. Zero knowledge proof protocol is a essential component of cryptography, which in recent years has increasingly popular amongst scholars. Its applications have widened and it has made inroads in several areas including mathematics and network safety and so on. This simple protocol based on zero knowledge proof by which user can prove to the authentication server that he has the password without having to send the password to the server either clear text or in encrypted format. This is a protocol in which the data learned by one party (i.e., The inspector) allow him/her to verify that a statement is true but does not reveal any additional information. In this paper we first discuss about zero-knowledge protocol proof system of knowledge and also key exchange between users and which then is modified into an authentication scheme with secret key exchange for confidentiality. The whole protocol involves mutual identification of two users, exchange of a random common secret key or session key for the verification of public keys.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"368-373"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79235767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Framework for Multiple Parallel Task Graphs (PTG) Scheduler 多并行任务图(PTG)调度的框架
U. Boregowda, Venugopal R. Chakravarthy
Many applications in scientific computations exhibit both data and task parallelism. Several studies have proved that designing parallel applications using both task and data parallelism is an effective approach than pure data or pure task parallel models. This mixed parallelism achieves both higher scalability and performance. Mixed parallel applications are represented as Parallel Task Graph (PTG), a graph of data parallel tasks. Scheduling such a mixed-parallel application is NP-complete even on a single homogeneous cluster. To maximize resource utilizations and to increase cluster throughput, multiple applications are scheduled concurrently on a cluster. Scheduling multiple applications is challenging as different applications compete for the shared resources and also fairness must be ensured. A new method to perform concurrent schedule of multiple PTGs on a cluster is proposed in this work. Further a complete framework to schedule PTGs submitted at different instants of time and to vary processor allotment for each application during their depending on processor availability is proposed. From simulation experiments, it is observed that the proposed method to schedule multiple PTGs performs better than other methods found in the literature. The suggested scheduler framework to handle online submission of PTGs is proved to be a promising one.
科学计算中的许多应用都表现出数据和任务并行性。一些研究已经证明,使用任务和数据并行设计并行应用程序比使用纯数据或纯任务并行模型更有效。这种混合并行性实现了更高的可伸缩性和性能。混合并行应用程序表示为并行任务图(PTG),一种数据并行任务图。即使在单个同构集群上调度这样的混合并行应用程序也是np完全的。为了最大限度地利用资源并提高集群吞吐量,可以在一个集群上并发地调度多个应用程序。调度多个应用程序是具有挑战性的,因为不同的应用程序争夺共享资源,而且必须确保公平性。提出了一种实现集群上多个ptg并行调度的新方法。此外,提出了一个完整的框架来调度在不同时刻提交的ptg,并根据处理器可用性在每个应用程序期间改变处理器分配。仿真实验表明,本文提出的调度多个ptg的方法优于文献中其他方法。所建议的调度框架处理在线提交PTGs被证明是一个有前途的。
{"title":"A Framework for Multiple Parallel Task Graphs (PTG) Scheduler","authors":"U. Boregowda, Venugopal R. Chakravarthy","doi":"10.1109/ICIT.2014.34","DOIUrl":"https://doi.org/10.1109/ICIT.2014.34","url":null,"abstract":"Many applications in scientific computations exhibit both data and task parallelism. Several studies have proved that designing parallel applications using both task and data parallelism is an effective approach than pure data or pure task parallel models. This mixed parallelism achieves both higher scalability and performance. Mixed parallel applications are represented as Parallel Task Graph (PTG), a graph of data parallel tasks. Scheduling such a mixed-parallel application is NP-complete even on a single homogeneous cluster. To maximize resource utilizations and to increase cluster throughput, multiple applications are scheduled concurrently on a cluster. Scheduling multiple applications is challenging as different applications compete for the shared resources and also fairness must be ensured. A new method to perform concurrent schedule of multiple PTGs on a cluster is proposed in this work. Further a complete framework to schedule PTGs submitted at different instants of time and to vary processor allotment for each application during their depending on processor availability is proposed. From simulation experiments, it is observed that the proposed method to schedule multiple PTGs performs better than other methods found in the literature. The suggested scheduler framework to handle online submission of PTGs is proved to be a promising one.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"15 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79776418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-party Key-Exchange with Perfect Forward Secrecy 具有完美前向保密的多方密钥交换
Susmita Mandal, S. Mohanty
The paper proposes a multi-party key exchange scheme with Perfect Forward Secrecy (PFS) which ensures that a session key derived from a set of long-term public and private keys used in the protocol to authenticate, does not compromise the secrecy of session key. In this protocol, each group establishes connection by communicating through a trusted third party. The trusted party acts as a group controller generates a public key and broadcasts it among the groups. Each group generate their public keys and send to trusted party. After receiving all the keys the group controller shares it among all the parties to generate the session key. Similarly, each group manager of individual group communicates with the members of the corresponding group. The security of the proposed scheme is analysed rigorously and proved to be resistant against non-repudiation attack, replay attack, chosen cipher attack, man-in-the middle attack. The scheme has wider applications such as, sending encrypted e-mail in a military environment to multiple users, securing submitted bids information in online tender, contract signing by many organizations, etc.
本文提出了一种具有完全前向保密(PFS)的多方密钥交换方案,该方案可以保证从协议中用于身份验证的一组长期公钥和私钥中获得的会话密钥不会泄露会话密钥的保密性。在该协议中,每个组通过受信任的第三方进行通信来建立连接。受信任方作为组控制器生成公钥并在组之间广播。每个组生成自己的公钥并发送给可信方。在接收到所有密钥后,组控制器在所有各方之间共享以生成会话密钥。同样,每个组的组经理与相应组的成员进行通信。对该方案的安全性进行了严格的分析,证明了该方案能够抵抗不可否认攻击、重放攻击、选择密码攻击和中间人攻击。该方案具有更广泛的应用,例如,在军事环境中向多个用户发送加密电子邮件,在在线投标中保护提交的投标信息,由多个组织签署合同等。
{"title":"Multi-party Key-Exchange with Perfect Forward Secrecy","authors":"Susmita Mandal, S. Mohanty","doi":"10.1109/ICIT.2014.30","DOIUrl":"https://doi.org/10.1109/ICIT.2014.30","url":null,"abstract":"The paper proposes a multi-party key exchange scheme with Perfect Forward Secrecy (PFS) which ensures that a session key derived from a set of long-term public and private keys used in the protocol to authenticate, does not compromise the secrecy of session key. In this protocol, each group establishes connection by communicating through a trusted third party. The trusted party acts as a group controller generates a public key and broadcasts it among the groups. Each group generate their public keys and send to trusted party. After receiving all the keys the group controller shares it among all the parties to generate the session key. Similarly, each group manager of individual group communicates with the members of the corresponding group. The security of the proposed scheme is analysed rigorously and proved to be resistant against non-repudiation attack, replay attack, chosen cipher attack, man-in-the middle attack. The scheme has wider applications such as, sending encrypted e-mail in a military environment to multiple users, securing submitted bids information in online tender, contract signing by many organizations, etc.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"362-367"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88964053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Diffusion-KLMS Algorithm 扩散- klms算法
R. Mitra, V. Bhatia
The diffusion least mean squares (LMS) [1] algorithm gives faster convergence than the original LMS in a distributed network. Also, it outperforms other distributed LMS algorithms like spatial LMS and incremental LMS [2]. However, both LMS and diffusion-LMS are not applicable in non-linear environments where data may not be linearly separable [3]. A variant of LMS called kernel-LMS (KLMS) has been proposed in [3] for such non-linearities. We intend to propose the kernelised version of diffusion-LMS in this paper.
在分布式网络中,扩散最小均方(LMS)[1]算法比原始LMS算法收敛速度更快。此外,它优于其他分布式LMS算法,如空间LMS和增量LMS[2]。然而,LMS和扩散-LMS都不适用于数据可能不可线性分离的非线性环境[3]。针对这种非线性,[3]中提出了LMS的一种变体,称为核LMS (KLMS)。我们打算在本文中提出扩散- lms的核化版本。
{"title":"The Diffusion-KLMS Algorithm","authors":"R. Mitra, V. Bhatia","doi":"10.1109/ICIT.2014.33","DOIUrl":"https://doi.org/10.1109/ICIT.2014.33","url":null,"abstract":"The diffusion least mean squares (LMS) [1] algorithm gives faster convergence than the original LMS in a distributed network. Also, it outperforms other distributed LMS algorithms like spatial LMS and incremental LMS [2]. However, both LMS and diffusion-LMS are not applicable in non-linear environments where data may not be linearly separable [3]. A variant of LMS called kernel-LMS (KLMS) has been proposed in [3] for such non-linearities. We intend to propose the kernelised version of diffusion-LMS in this paper.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"96 1","pages":"256-259"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72982917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An Architecture of DSP Tool for Publishing the Heterogeneous Data in Dataspace 数据空间异构数据发布的DSP工具体系结构
Mrityunjay Singh, Shubhangi Jain, V. Panchal
A data space system manages a variety of heterogeneous data in integrated and incremental fashion. In order to populate the data uniformly requires a data publication tool which will able to extract the data from the data sources, and translate them into a regular format. In this paper, we have proposed a flexible architecture of Data space Publishing Tool (DSP Tool) for publishing the heterogeneous data into a data space. This tool is simple and easy to customize. The proposed architecture is based on the data space system principle (i.e., Pay-as-you-go), and populates the data space without modeling the semantic heterogeneity of data.
数据空间系统以集成和增量的方式管理各种异构数据。为了统一地填充数据,需要一个能够从数据源中提取数据并将其转换为常规格式的数据发布工具。本文提出了一种灵活的数据空间发布工具(DSP Tool)架构,用于将异构数据发布到数据空间中。此工具简单且易于定制。所提出的体系结构基于数据空间系统原则(即,随用随付),并在没有对数据的语义异构建模的情况下填充数据空间。
{"title":"An Architecture of DSP Tool for Publishing the Heterogeneous Data in Dataspace","authors":"Mrityunjay Singh, Shubhangi Jain, V. Panchal","doi":"10.1109/ICIT.2014.23","DOIUrl":"https://doi.org/10.1109/ICIT.2014.23","url":null,"abstract":"A data space system manages a variety of heterogeneous data in integrated and incremental fashion. In order to populate the data uniformly requires a data publication tool which will able to extract the data from the data sources, and translate them into a regular format. In this paper, we have proposed a flexible architecture of Data space Publishing Tool (DSP Tool) for publishing the heterogeneous data into a data space. This tool is simple and easy to customize. The proposed architecture is based on the data space system principle (i.e., Pay-as-you-go), and populates the data space without modeling the semantic heterogeneity of data.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"66 1","pages":"209-214"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73533116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Content Based Recommender Systems Using Decision List Based Classification with k-DNF Rule Set 基于k-DNF规则集的基于决策表分类的基于内容的推荐系统
Abinash Pujahari, V. Padmanabhan
Recommender systems are the software or technical tools that help user to find out items/things according to his/her preferences from a wide range of items/things. For example, selecting a movie from a large database of movies from on-line or selecting a song of his/her own kind from a large number of songs available in the internet and much more. In order to generate recommendations for the users the system has to first learn the user preferences from the user's past behaviours so that it can predict new items/things that are suitable for the respective user. These systems generally learn user's preferences from user's past experiences, using any machine learning algorithm and predict new items/things for the user using the learned preferences. In this paper we introduce a different approach to recommender system which will learn rules for user preferences using classification based on Decision Lists. We have followed two Decision List based classification algorithms like Repeated Incremental Pruning to Produce Error Reduction and Predictive Rule Mining, for learning rules for users past behaviours. We also list out our proposed recommendation algorithm and discuss the advantages as well as disadvantages of our approach to recommender system with the traditional approaches. We have validated our recommender system with the movie lens data set that contains hundred thousand movie ratings from different users, which is the bench mark dataset for recommender system testing.
推荐系统是一种软件或技术工具,它可以帮助用户从大量的物品/事物中根据他/她的喜好找到物品/事物。例如,从在线电影的大型数据库中选择一部电影,或者从互联网上大量可用的歌曲中选择一首自己的歌曲等等。为了为用户生成推荐,系统必须首先从用户过去的行为中了解用户的偏好,以便它可以预测适合各自用户的新项目/事物。这些系统通常从用户过去的经验中学习用户的偏好,使用任何机器学习算法,并使用学习到的偏好为用户预测新的项目/事物。在本文中,我们介绍了一种不同的推荐系统方法,该方法将使用基于决策列表的分类来学习用户偏好规则。我们遵循了两种基于决策列表的分类算法,如重复增量修剪以产生错误减少和预测规则挖掘,用于学习用户过去行为的规则。我们还列出了我们提出的推荐算法,并讨论了我们的推荐系统与传统方法的优缺点。我们用电影镜头数据集验证了我们的推荐系统,该数据集包含来自不同用户的十万部电影评分,这是推荐系统测试的基准数据集。
{"title":"An Approach to Content Based Recommender Systems Using Decision List Based Classification with k-DNF Rule Set","authors":"Abinash Pujahari, V. Padmanabhan","doi":"10.1109/ICIT.2014.13","DOIUrl":"https://doi.org/10.1109/ICIT.2014.13","url":null,"abstract":"Recommender systems are the software or technical tools that help user to find out items/things according to his/her preferences from a wide range of items/things. For example, selecting a movie from a large database of movies from on-line or selecting a song of his/her own kind from a large number of songs available in the internet and much more. In order to generate recommendations for the users the system has to first learn the user preferences from the user's past behaviours so that it can predict new items/things that are suitable for the respective user. These systems generally learn user's preferences from user's past experiences, using any machine learning algorithm and predict new items/things for the user using the learned preferences. In this paper we introduce a different approach to recommender system which will learn rules for user preferences using classification based on Decision Lists. We have followed two Decision List based classification algorithms like Repeated Incremental Pruning to Produce Error Reduction and Predictive Rule Mining, for learning rules for users past behaviours. We also list out our proposed recommendation algorithm and discuss the advantages as well as disadvantages of our approach to recommender system with the traditional approaches. We have validated our recommender system with the movie lens data set that contains hundred thousand movie ratings from different users, which is the bench mark dataset for recommender system testing.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"53 1","pages":"260-263"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79299490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Approach for Multicast Routing in Networks-on-Chip 片上网络中的组播路由方法
M. Prasad, Shirshendu Das, H. Kapoor
The main components for building today's computer systems are Chip Multiprocessors, where multiple processor cores are placed on the same chip. These cores can run several threads of an application or can run multiple applications at the same time. Efficient execution of such applications depends on the ability of the on-chip interconnect to support multicast with minimum overhead. Many of the existing works present efficient solutions to one-to-one and broadcast communication but for multicast they assume the existence of on-chip router capability to provide several point-to-point links one for each destination. In this paper we propose a new approach for multicast routing for on-chip networks with minimum hardware support. Our approach minimizes the average hop traversal of each replica within the network by selecting replication points based on the distribution density of the destination nodes. Experimental results have shown that link utilization and link power consumption have been reduced by 8.36% in case of an 8 x 8 mesh and for mesh networks of dimensions 12 x 12 and 16 x 16 the percentage reduction is 16%, showing the scalability of our approach.
构建当今计算机系统的主要组件是芯片多处理器,其中多个处理器核心被放置在同一芯片上。这些核心可以运行一个应用程序的多个线程,也可以同时运行多个应用程序。这些应用程序的有效执行取决于片上互连以最小开销支持多播的能力。许多现有的工作为一对一和广播通信提供了有效的解决方案,但对于多播通信,它们假设存在片上路由器能力,可以提供多个点对点链路,每个目的地一个。在本文中,我们提出了一种新的片上网络的组播路由方法,它需要最少的硬件支持。我们的方法是根据目标节点的分布密度选择复制点,从而最小化网络中每个副本的平均跳遍历。实验结果表明,在8 × 8网格的情况下,链路利用率和链路功耗降低了8.36%,对于尺寸为12 × 12和16 × 16的网格网络,百分比降低了16%,显示了我们的方法的可扩展性。
{"title":"An Approach for Multicast Routing in Networks-on-Chip","authors":"M. Prasad, Shirshendu Das, H. Kapoor","doi":"10.1109/ICIT.2014.41","DOIUrl":"https://doi.org/10.1109/ICIT.2014.41","url":null,"abstract":"The main components for building today's computer systems are Chip Multiprocessors, where multiple processor cores are placed on the same chip. These cores can run several threads of an application or can run multiple applications at the same time. Efficient execution of such applications depends on the ability of the on-chip interconnect to support multicast with minimum overhead. Many of the existing works present efficient solutions to one-to-one and broadcast communication but for multicast they assume the existence of on-chip router capability to provide several point-to-point links one for each destination. In this paper we propose a new approach for multicast routing for on-chip networks with minimum hardware support. Our approach minimizes the average hop traversal of each replica within the network by selecting replication points based on the distribution density of the destination nodes. Experimental results have shown that link utilization and link power consumption have been reduced by 8.36% in case of an 8 x 8 mesh and for mesh networks of dimensions 12 x 12 and 16 x 16 the percentage reduction is 16%, showing the scalability of our approach.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"2 1","pages":"299-304"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81488349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discrete Differential Evolution for Text Summarization 文本摘要的离散差分进化
Shweta Karwa, N. Chatterjee
The paper proposes a modified version of Differential Evolution (DE) algorithm and optimization criterion function for extractive text summarization applications. Cosine Similarity measure has been used to cluster similar sentences based on a proposed criterion function designed for the text summarization problem, and important sentences from each cluster are selected to generate a summary of the document. The modified Differential Evolution model ensures integer state values and hence expedites the optimization as compared to conventional DE approach. Experiments showed a 95.5% improvement in time in the Discrete DE approach over the conventional DE approach, while the precision and recall of extracted summaries remained comparable in all cases.
本文提出了一种改进的差分进化(DE)算法和优化准则函数,用于抽取文本摘要应用。基于针对文本摘要问题提出的准则函数,使用余弦相似度度量对相似句子进行聚类,并从每个聚类中选择重要句子生成文档摘要。改进的差分进化模型保证了状态值的整数化,因此与传统的DE方法相比,可以加快优化速度。实验表明,离散DE方法比传统DE方法在时间上提高了95.5%,而提取摘要的精度和召回率在所有情况下都保持相当。
{"title":"Discrete Differential Evolution for Text Summarization","authors":"Shweta Karwa, N. Chatterjee","doi":"10.1109/ICIT.2014.28","DOIUrl":"https://doi.org/10.1109/ICIT.2014.28","url":null,"abstract":"The paper proposes a modified version of Differential Evolution (DE) algorithm and optimization criterion function for extractive text summarization applications. Cosine Similarity measure has been used to cluster similar sentences based on a proposed criterion function designed for the text summarization problem, and important sentences from each cluster are selected to generate a summary of the document. The modified Differential Evolution model ensures integer state values and hence expedites the optimization as compared to conventional DE approach. Experiments showed a 95.5% improvement in time in the Discrete DE approach over the conventional DE approach, while the precision and recall of extracted summaries remained comparable in all cases.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"22 1","pages":"129-133"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86621592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Evolutionary and Swarm Intelligence Methods for Partitional Hard Clustering 局部硬聚类的进化和群体智能方法
J. Prakash, P. Singh
Clustering is an unsupervised classification method where objects in the unlabeled data set are classified on the basis of some similarity measure. The conventional partitional clustering algorithms, e.g., K-Means, K-Medoids have several disadvantages such as the final solution is dependent on initial solution, they easily stuck into local optima. The nature inspired population based global search optimization methods offer to be more effective to overcome the deficiencies of the conventional partitional clustering methods as they possess several desired key features like up gradation of the candidate solutions iteratively, decentralization, parallel nature, and self organizing behavior. In this work, we compare the performance of widely applied evolutionary algorithms namely Genetic Algorithm (GA) and Differential Evolution (DE), and swarm intelligence methods namely Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) to find the clustering solutions by evaluating the quality of cluster with internal validity criteria, Sum of Square Error (SSE), which is based on compactness of cluster. Extensive results are compared based on three real and one synthetic data sets.
聚类是一种无监督的分类方法,它根据一些相似度度量对未标记数据集中的对象进行分类。传统的分割聚类算法,如K-Means、K-Medoids等,存在最终解依赖于初始解,容易陷入局部最优的缺点。基于自然启发的种群全局搜索优化方法具有候选解迭代上阶、去中心化、并行性和自组织行为等关键特性,能够更有效地克服传统分区聚类方法的不足。在这项工作中,我们比较了广泛应用的进化算法,即遗传算法(GA)和差分进化(DE),以及群体智能方法,即粒子群优化(PSO)和人工蜂群(ABC)的性能,通过内部有效性标准来评估聚类的质量,平方误差和(SSE),这是基于聚类的紧密性。基于三个真实数据集和一个合成数据集,对广泛的结果进行了比较。
{"title":"Evolutionary and Swarm Intelligence Methods for Partitional Hard Clustering","authors":"J. Prakash, P. Singh","doi":"10.1109/ICIT.2014.67","DOIUrl":"https://doi.org/10.1109/ICIT.2014.67","url":null,"abstract":"Clustering is an unsupervised classification method where objects in the unlabeled data set are classified on the basis of some similarity measure. The conventional partitional clustering algorithms, e.g., K-Means, K-Medoids have several disadvantages such as the final solution is dependent on initial solution, they easily stuck into local optima. The nature inspired population based global search optimization methods offer to be more effective to overcome the deficiencies of the conventional partitional clustering methods as they possess several desired key features like up gradation of the candidate solutions iteratively, decentralization, parallel nature, and self organizing behavior. In this work, we compare the performance of widely applied evolutionary algorithms namely Genetic Algorithm (GA) and Differential Evolution (DE), and swarm intelligence methods namely Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) to find the clustering solutions by evaluating the quality of cluster with internal validity criteria, Sum of Square Error (SSE), which is based on compactness of cluster. Extensive results are compared based on three real and one synthetic data sets.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"6 1","pages":"264-269"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84284094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Constraint Based Cooperative Spectrum Sensing for Cognitive Radio Network 基于约束的认知无线电网络协同频谱感知
S. Deka, Prakash Chauhan, N. Sarma
Cognitive Radio (CR) is a key technology that has been proposed to exploit the unused spectrum holes opportunistically. In CR communication, the issues of shadowing, multipath fading affect performance of spectrum sensing function that impacts the detection performance of secondary users (SUs). Cooperative Spectrum Sensing (CSS) has proven to be an emerging scheme which significantly improves spectrum sensing performance by utilizing spatial diversity of the SUs. This paper proposes a game theory based coalition model. The main contribution of this work is to consider the constraint during cooperation due to cost involved in reporting time and reporting energy. A formulation has been proposed to decide the optimal size of a coalition and a scheme for dynamic selection of coalition head. In the game, the condition to achieve the coalition stability is carried out. Simulation results have shown the efficacy of the proposed model that enhances the sensing performance significantly.
认知无线电(CR)是一种利用未利用的频谱漏洞的关键技术。在CR通信中,阴影、多径衰落等问题会影响频谱感知功能的性能,进而影响二次用户的检测性能。协同频谱感知(CSS)是一种新兴的频谱感知方案,它利用单元的空间多样性显著提高了频谱感知性能。本文提出了一个基于博弈论的联盟模型。本工作的主要贡献在于考虑了合作过程中由于报告时间和报告精力所涉及的成本而产生的约束。提出了一种确定联盟最优规模的公式和联盟首领的动态选择方案。在博弈中,对实现联盟稳定的条件进行了分析。仿真结果表明了该模型的有效性,显著提高了传感性能。
{"title":"Constraint Based Cooperative Spectrum Sensing for Cognitive Radio Network","authors":"S. Deka, Prakash Chauhan, N. Sarma","doi":"10.1109/ICIT.2014.12","DOIUrl":"https://doi.org/10.1109/ICIT.2014.12","url":null,"abstract":"Cognitive Radio (CR) is a key technology that has been proposed to exploit the unused spectrum holes opportunistically. In CR communication, the issues of shadowing, multipath fading affect performance of spectrum sensing function that impacts the detection performance of secondary users (SUs). Cooperative Spectrum Sensing (CSS) has proven to be an emerging scheme which significantly improves spectrum sensing performance by utilizing spatial diversity of the SUs. This paper proposes a game theory based coalition model. The main contribution of this work is to consider the constraint during cooperation due to cost involved in reporting time and reporting energy. A formulation has been proposed to decide the optimal size of a coalition and a scheme for dynamic selection of coalition head. In the game, the condition to achieve the coalition stability is carried out. Simulation results have shown the efficacy of the proposed model that enhances the sensing performance significantly.","PeriodicalId":6486,"journal":{"name":"2014 17th International Conference on Computer and Information Technology (ICCIT)","volume":"8 1","pages":"63-68"},"PeriodicalIF":0.0,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89793031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2014 17th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1