首页 > 最新文献

2014 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Virtual Coordinates Routing Using VCP-M in Wireless Sensor Network 无线传感器网络中基于VCP-M的虚拟坐标路由
Raj Anwit, Prabhat Kumar, M. Singh
In a short time virtual position based routing has established itself as a potent research area in wireless sensor networks (WSN). Although GPS based routing solution are available but they have the disadvantages of being costly, have limited indoor operation and network unreliability in sensor networks creates significant overhead on geographical routing. Virtual routing protocols provide some remedial measures with desirable trade offs between performances and overhead that occur in the case of geographical routing. In this paper an improved localization method called VCP-M is proposed followed by a greedy routing method. A good localization method in wireless sensor network reduces overhead on nodes in terms of receiving and sending packets. A node in WSN has limited amount of energy, so proper utilization of energy is of utmost importance. The proposed localization method in the protocol reduces the number of packets generated in the network significantly. This results in less overhead on the nodes to process the packet. So energy of the nodes are utilized without much wastage.
在短时间内,基于虚拟位置的路由已经成为无线传感器网络(WSN)的一个强有力的研究领域。虽然基于GPS的路由解决方案是可行的,但它们存在成本高、室内操作受限以及传感器网络中的网络不可靠性等缺点,这给地理路由带来了巨大的开销。虚拟路由协议提供了一些补救措施,在地理路由的情况下,在性能和开销之间进行了理想的权衡。本文提出了一种改进的VCP-M定位方法,并在此基础上提出了贪婪路由方法。在无线传感器网络中,一个好的定位方法可以减少节点在接收和发送数据包方面的开销。无线传感器网络中节点的能量是有限的,因此合理利用能量至关重要。该协议中的定位方法显著减少了网络中产生的数据包数量。这减少了节点处理数据包的开销。因此,节点的能量被充分利用,而不会造成太多的浪费。
{"title":"Virtual Coordinates Routing Using VCP-M in Wireless Sensor Network","authors":"Raj Anwit, Prabhat Kumar, M. Singh","doi":"10.1109/CICN.2014.95","DOIUrl":"https://doi.org/10.1109/CICN.2014.95","url":null,"abstract":"In a short time virtual position based routing has established itself as a potent research area in wireless sensor networks (WSN). Although GPS based routing solution are available but they have the disadvantages of being costly, have limited indoor operation and network unreliability in sensor networks creates significant overhead on geographical routing. Virtual routing protocols provide some remedial measures with desirable trade offs between performances and overhead that occur in the case of geographical routing. In this paper an improved localization method called VCP-M is proposed followed by a greedy routing method. A good localization method in wireless sensor network reduces overhead on nodes in terms of receiving and sending packets. A node in WSN has limited amount of energy, so proper utilization of energy is of utmost importance. The proposed localization method in the protocol reduces the number of packets generated in the network significantly. This results in less overhead on the nodes to process the packet. So energy of the nodes are utilized without much wastage.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79306944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Memristor-Based Chaotic System with Bifurcation Analysis 基于忆阻器的混沌系统及其分岔分析
Xiaofang Hu, Gang Feng, Shukai Duan, W. Yin, Guanrong Chen
This paper proposes and investigates a memristor-based chaotic system by incorporating an HP TiO2 memristor into the canonical Chen's chaotic system. More precisely, a charge-controlled memristor model with some appropriate boundary conditions is introduced. The relationship between the electric charge and the flux passing through the memristor is formulated and then employed as a nonlinear term in the constructed chaotic system. The rich dynamical behaviors of the memristor-based system are demonstrated by calculating the Lyapunov exponent spectrum and Lyapunov dimension, observing the chaotic attractors, analyzing the bifurcations.
本文提出并研究了一种基于忆阻器的混沌系统,该系统将HP TiO2忆阻器集成到正则Chen混沌系统中。更精确地说,引入了一种带有适当边界条件的电荷控制忆阻器模型。建立了电荷与通过忆阻器的磁通之间的关系,并将其作为非线性项应用于所构建的混沌系统。通过计算李雅普诺夫指数谱和李雅普诺夫维数,观察混沌吸引子,分析分岔,证明了基于忆阻器的系统具有丰富的动力学行为。
{"title":"A Memristor-Based Chaotic System with Bifurcation Analysis","authors":"Xiaofang Hu, Gang Feng, Shukai Duan, W. Yin, Guanrong Chen","doi":"10.1109/CICN.2014.81","DOIUrl":"https://doi.org/10.1109/CICN.2014.81","url":null,"abstract":"This paper proposes and investigates a memristor-based chaotic system by incorporating an HP TiO2 memristor into the canonical Chen's chaotic system. More precisely, a charge-controlled memristor model with some appropriate boundary conditions is introduced. The relationship between the electric charge and the flux passing through the memristor is formulated and then employed as a nonlinear term in the constructed chaotic system. The rich dynamical behaviors of the memristor-based system are demonstrated by calculating the Lyapunov exponent spectrum and Lyapunov dimension, observing the chaotic attractors, analyzing the bifurcations.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84792252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative Attack Model at Physical Layer of Mobile WiMAX Network 移动WiMAX网络物理层协同攻击模型
V. Jatav, Vrijendra Singh
Since last few years, users have been paying significant attention and interest towards the WiMAX Internet technology because of the salient features i.e. Higher data rate, broad coverage, quality of service (QoS), scalability, security, and mobility support to the subscribers. Mobile WiMAX (IEEE 802.16e) supports the handover process and mobility of subscriber stations. WiMAX network security is a vital requirement to increase the reliability and to prevent from the various attacks. Implementation of top level security is highly required to lessen the vulnerabilities. Jamming attack, scrambling attack and water-torture attack are among the most severe threats to the physical layer of mobile WiMAX. This paper presents a collaborative attack model based on the combination of scrambling and water-torture attacks. Analysis of the paper shows that the cooperation of two or more attacks/attackers may be more devastating for the network security.
近年来,由于WiMAX具有更高的数据速率、广泛的覆盖范围、服务质量(QoS)、可扩展性、安全性和对用户的移动性支持等显著特性,用户对其产生了极大的关注和兴趣。移动WiMAX (IEEE 802.16e)支持用户站的切换过程和移动性。WiMAX网络的安全性是提高网络可靠性和防范各种攻击的重要要求。为了减少漏洞,高度需要实现顶级安全。干扰攻击、加扰攻击和水刑攻击是移动WiMAX物理层面临的最严重威胁。提出了一种基于置乱攻击和水刑攻击相结合的协同攻击模型。本文的分析表明,两个或多个攻击者的合作可能对网络安全具有更大的破坏性。
{"title":"Collaborative Attack Model at Physical Layer of Mobile WiMAX Network","authors":"V. Jatav, Vrijendra Singh","doi":"10.1109/CICN.2014.169","DOIUrl":"https://doi.org/10.1109/CICN.2014.169","url":null,"abstract":"Since last few years, users have been paying significant attention and interest towards the WiMAX Internet technology because of the salient features i.e. Higher data rate, broad coverage, quality of service (QoS), scalability, security, and mobility support to the subscribers. Mobile WiMAX (IEEE 802.16e) supports the handover process and mobility of subscriber stations. WiMAX network security is a vital requirement to increase the reliability and to prevent from the various attacks. Implementation of top level security is highly required to lessen the vulnerabilities. Jamming attack, scrambling attack and water-torture attack are among the most severe threats to the physical layer of mobile WiMAX. This paper presents a collaborative attack model based on the combination of scrambling and water-torture attacks. Analysis of the paper shows that the cooperation of two or more attacks/attackers may be more devastating for the network security.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85082326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Communication for Cluster Based Wireless Sensor Network 基于集群的无线传感器网络安全通信
Koushik Banerjee, H. Sharma, B. Chaurasia
Secure communication is a critical issue in wireless sensor network (WSN). Sensor networks are comprised of a huge number of battery operated general purpose sensor nodes with a small number gateway nodes or base stations. Gateways are more authoritative than ordinary sensor nodes. In this paper, an intensive hashing and symmetric key cryptography based approach is proposed to secure data communication in WSN to achieve preservation of data integrity and confidentiality. Results indicate that using this approach there is very small energy consumption in cluster based WSN.
安全通信是无线传感器网络中的一个关键问题。传感器网络由大量电池供电的通用传感器节点和少量网关节点或基站组成。网关比普通传感器节点更权威。本文提出了一种基于密集哈希和对称密钥加密的无线传感器网络数据通信安全方法,以保证数据的完整性和保密性。结果表明,该方法在基于聚类的WSN中具有很小的能量消耗。
{"title":"Secure Communication for Cluster Based Wireless Sensor Network","authors":"Koushik Banerjee, H. Sharma, B. Chaurasia","doi":"10.1109/CICN.2014.183","DOIUrl":"https://doi.org/10.1109/CICN.2014.183","url":null,"abstract":"Secure communication is a critical issue in wireless sensor network (WSN). Sensor networks are comprised of a huge number of battery operated general purpose sensor nodes with a small number gateway nodes or base stations. Gateways are more authoritative than ordinary sensor nodes. In this paper, an intensive hashing and symmetric key cryptography based approach is proposed to secure data communication in WSN to achieve preservation of data integrity and confidentiality. Results indicate that using this approach there is very small energy consumption in cluster based WSN.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81807801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Development of CIMS in Foreign Linguistics Teaching for Higher Education CIMS在高校外语语言学教学中的发展
Wei Wei
CIMS is short for the computer information management system, which has been widely applied to the field of modern teaching since 2004s. Teaching industry is the area of strong planning. Especially in the depressed study environment and the fierce competition among the education departments, how to use modern tools, allocate the multimedia technology and seek for benefit is one of the measures which every education department has to take. Based on our university's actual application condition, this paper briefly describes the application of CIMS in the foreign linguistics teaching for higher education.
CIMS是计算机信息管理系统的简称,自2004年以来在现代教学领域得到了广泛的应用。教学产业是规划力度较大的领域。特别是在学习环境低迷,教育部门竞争激烈的情况下,如何利用现代化工具,合理配置多媒体技术,谋求效益,是每个教育部门必须采取的措施之一。本文结合我校的实际应用情况,简述了CIMS在高等外语教学中的应用。
{"title":"The Development of CIMS in Foreign Linguistics Teaching for Higher Education","authors":"Wei Wei","doi":"10.1109/CICN.2014.234","DOIUrl":"https://doi.org/10.1109/CICN.2014.234","url":null,"abstract":"CIMS is short for the computer information management system, which has been widely applied to the field of modern teaching since 2004s. Teaching industry is the area of strong planning. Especially in the depressed study environment and the fierce competition among the education departments, how to use modern tools, allocate the multimedia technology and seek for benefit is one of the measures which every education department has to take. Based on our university's actual application condition, this paper briefly describes the application of CIMS in the foreign linguistics teaching for higher education.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80478699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Detection System for Malicious URLs 实时检测系统的恶意url
Nupur S. Gawale, N. Patil
Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get connected with each other and share their every day's happenings through it. In this paper we consider twitter as such a social networking site to experiment. Twitter is extremely popular for micro-blogging where people post short messages of 140 characters called as tweets. It has over 200 million active users who post approximately 300 million tweets everyday on the walls. Hackers or attackers have started using Twitter as a medium to spread virus as the available information is quite vast and scattered. Also it is very easy to spread and posting URLs on twitter wall. Our experiment shows the detection of Malicious URLs on Twitter in real-time. We test such a method to discover correlated URL redirect chains using the frequently shared URLs. We used the collection of tweets from which we extract features based on URL redirection. Then we find entry points of correlated URLs. Crawler browser marks the suspicious URL. The system shows the expected results of detection of malicious URLs.
如今,在在线社交媒体的背景下,黑客开始使用Twitter、Facebook、Google+等社交网络进行未经授权的活动。这些都是非常受欢迎的社交网站,许多人使用它们相互联系,并通过它分享他们每天发生的事情。在本文中,我们将twitter作为这样一个社交网站来进行实验。Twitter在微博上非常受欢迎,人们在这里发布140个字符的短消息,称为tweet。它有超过2亿的活跃用户,每天在墙上发布大约3亿条推文。黑客或攻击者开始利用Twitter作为传播病毒的媒介,因为可用的信息非常庞大和分散。它也很容易传播和张贴url在推特墙上。我们的实验展示了实时检测Twitter上的恶意url。我们测试了这种方法,使用频繁共享的URL来发现相关的URL重定向链。我们使用了基于URL重定向提取特征的tweet集合。然后我们找到相关url的入口点。爬虫浏览器标记可疑的URL。系统显示了恶意url检测的预期结果。
{"title":"Real Time Detection System for Malicious URLs","authors":"Nupur S. Gawale, N. Patil","doi":"10.1109/CICN.2014.181","DOIUrl":"https://doi.org/10.1109/CICN.2014.181","url":null,"abstract":"Now a days in context of online social media, hackers have started using social networks like Twitter, Facebook Google+ etc for their unauthorized activities. These are very popular social networking sites which are used by numerous people to get connected with each other and share their every day's happenings through it. In this paper we consider twitter as such a social networking site to experiment. Twitter is extremely popular for micro-blogging where people post short messages of 140 characters called as tweets. It has over 200 million active users who post approximately 300 million tweets everyday on the walls. Hackers or attackers have started using Twitter as a medium to spread virus as the available information is quite vast and scattered. Also it is very easy to spread and posting URLs on twitter wall. Our experiment shows the detection of Malicious URLs on Twitter in real-time. We test such a method to discover correlated URL redirect chains using the frequently shared URLs. We used the collection of tweets from which we extract features based on URL redirection. Then we find entry points of correlated URLs. Crawler browser marks the suspicious URL. The system shows the expected results of detection of malicious URLs.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80757216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Wideband Circular Patch Antenna with Low Pass Filter on a Same Substrate for Rectenna Application 带低通滤波器的宽带圆形贴片天线在整流天线中的应用
T. Kumar, Mithilesh Kumar
In this paper, a wideband circular micro strip patch antenna design is proposed and it will be suitable for wireless communication for GPS, GSM, CDMA, 3G, 4G, Wi-Fi, W-MAX, Bluetooth, and W-LAN. This antenna is designed on dielectric substrate that having the dielectric constant 3.2 and height of substrate is 0.762mm. The proposed structure of the antenna is simulated on CST simulation software and the simulated return loss is less than-10dB for the frequency range 1.6 - 15 GHz and higher frequencies. A circular micro strip antenna is a narrow band but with the modified ground plane, this antenna shows the wideband response because it's Q (Quality factor) and bandwidth is inversely proportional to Q, therefore a narrowband circular patch work as a wideband antenna. The proposed antenna can be used for GSM, GPS, PCS, Bluetooth, W-LAN and UWB spectrum.
本文提出了一种适用于GPS、GSM、CDMA、3G、4G、Wi-Fi、W-MAX、蓝牙和W-LAN无线通信的宽带圆形微带贴片天线设计方案。该天线设计在介电常数为3.2,基板高度为0.762mm的介质基板上。在CST仿真软件上对所提出的天线结构进行了仿真,在1.6 ~ 15ghz及更高频率范围内,模拟回波损耗小于10db。圆形微带天线是窄带的,但是经过修改的地平面,这种天线显示宽带响应,因为它的Q(质量因子)和带宽与Q成反比,因此窄带圆形贴片作为宽带天线工作。该天线可用于GSM、GPS、pc、蓝牙、W-LAN和UWB频谱。
{"title":"A Wideband Circular Patch Antenna with Low Pass Filter on a Same Substrate for Rectenna Application","authors":"T. Kumar, Mithilesh Kumar","doi":"10.1109/CICN.2014.15","DOIUrl":"https://doi.org/10.1109/CICN.2014.15","url":null,"abstract":"In this paper, a wideband circular micro strip patch antenna design is proposed and it will be suitable for wireless communication for GPS, GSM, CDMA, 3G, 4G, Wi-Fi, W-MAX, Bluetooth, and W-LAN. This antenna is designed on dielectric substrate that having the dielectric constant 3.2 and height of substrate is 0.762mm. The proposed structure of the antenna is simulated on CST simulation software and the simulated return loss is less than-10dB for the frequency range 1.6 - 15 GHz and higher frequencies. A circular micro strip antenna is a narrow band but with the modified ground plane, this antenna shows the wideband response because it's Q (Quality factor) and bandwidth is inversely proportional to Q, therefore a narrowband circular patch work as a wideband antenna. The proposed antenna can be used for GSM, GPS, PCS, Bluetooth, W-LAN and UWB spectrum.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81328354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Study of SEP and DEC Hierarchical Clustering Algorithm for Heterogeneous WSN 异构WSN中SEP和DEC分层聚类算法的性能研究
M. Tewari, K. S. Vaisla
Wireless Sensor Network consists of power-constrained sensing devices known as sensing nodes. The difference between WSN and other networks lies in the fact that senor nodes are energy constrained devices. In order to efficiently utilize the energy consumption of the sensor network various clustering algorithms are proposed. In this paper we have focused on two hierarchical clustering based routing protocol which are efficient clustering algorithms helps in extending the lifetime of the network. SEP and DEC are some proposed algorithms to achieve energy efficiency. In this paper, we will simulate the above algorithms in mat lab and analyse their results on various performance parameters, stability region, instable region, network lifetime throughput and reliability.
无线传感器网络由功率受限的传感设备组成,称为传感节点。WSN与其他网络的区别在于,传感器节点是能量受限的设备。为了有效地利用传感器网络的能量消耗,提出了各种聚类算法。本文重点研究了两种基于分层聚类的路由协议,这两种有效的聚类算法有助于延长网络的生存期。SEP和DEC是一些被提出的实现能效的算法。在本文中,我们将在matlab实验室中对上述算法进行仿真,并从各种性能参数、稳定区域、不稳定区域、网络生命周期吞吐量和可靠性等方面分析其结果。
{"title":"Performance Study of SEP and DEC Hierarchical Clustering Algorithm for Heterogeneous WSN","authors":"M. Tewari, K. S. Vaisla","doi":"10.1109/CICN.2014.92","DOIUrl":"https://doi.org/10.1109/CICN.2014.92","url":null,"abstract":"Wireless Sensor Network consists of power-constrained sensing devices known as sensing nodes. The difference between WSN and other networks lies in the fact that senor nodes are energy constrained devices. In order to efficiently utilize the energy consumption of the sensor network various clustering algorithms are proposed. In this paper we have focused on two hierarchical clustering based routing protocol which are efficient clustering algorithms helps in extending the lifetime of the network. SEP and DEC are some proposed algorithms to achieve energy efficiency. In this paper, we will simulate the above algorithms in mat lab and analyse their results on various performance parameters, stability region, instable region, network lifetime throughput and reliability.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91262014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cost Based Scalable Clustering in MANET 基于成本的MANET可扩展聚类
S. K. Gupta, P. Khatri, Prerna Agrawal
Clustering can be used in MANET to enhance the network performance parameters such as its throughput and delay in the case when the number of hosts are in substantial quantity and are mobile. In this work, we demonstrate a clustering strategy that reduces the delay of the network and enhances the throughput using the cost based analysis. It also runs a re-clustering algorithm periodically where a new cluster is formed and helps in managing the scalable networks. Algorithms for clustering can be accomplished at routing stage or at higher levels. Formation of dynamic clusters assists in slenderizing overhead of a data packet, convolution of a node and Power Utilzation. Cost based Scalable Clustering is basically exploited to minimize network overhead. This work dispends an efficacious algorithm to volutes a cluster and its maintenance in Mobile ad-hoc networks by implementing Cost based Scalable Clustering.
在主机数量较多且具有移动性的情况下,在MANET中采用聚类技术可以提高网络的吞吐量和时延等性能参数。在这项工作中,我们展示了一种聚类策略,该策略使用基于成本的分析来减少网络延迟并提高吞吐量。它还定期在形成新集群时运行重新集群算法,并有助于管理可扩展网络。聚类算法可以在路由阶段或更高级别完成。动态集群的形成有助于延长数据包的开销、节点的卷积和功率利用率。基于成本的可伸缩集群主要用于最小化网络开销。本文通过实现基于成本的可扩展集群,为移动自组网中的集群及其维护提供了一种有效的算法。
{"title":"Cost Based Scalable Clustering in MANET","authors":"S. K. Gupta, P. Khatri, Prerna Agrawal","doi":"10.1109/CICN.2014.103","DOIUrl":"https://doi.org/10.1109/CICN.2014.103","url":null,"abstract":"Clustering can be used in MANET to enhance the network performance parameters such as its throughput and delay in the case when the number of hosts are in substantial quantity and are mobile. In this work, we demonstrate a clustering strategy that reduces the delay of the network and enhances the throughput using the cost based analysis. It also runs a re-clustering algorithm periodically where a new cluster is formed and helps in managing the scalable networks. Algorithms for clustering can be accomplished at routing stage or at higher levels. Formation of dynamic clusters assists in slenderizing overhead of a data packet, convolution of a node and Power Utilzation. Cost based Scalable Clustering is basically exploited to minimize network overhead. This work dispends an efficacious algorithm to volutes a cluster and its maintenance in Mobile ad-hoc networks by implementing Cost based Scalable Clustering.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89357654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Enhancement in Clustering for Sequential Pattern Mining through Neural Algorithm Using Web Logs 基于Web日志的神经算法增强序列模式挖掘的聚类
Sheetal Sahu, P. Saurabh, Sandeep Rai
An Organization need to understand their customers' behavior, preferences and future needs which depend upon past behavior. Web Usage Mining is an active research topic in which customers session clustering is done to understand the customers activities. This paper investigates the problem of mining frequent pattern and especially focuses on reducing the number of scans of the database and reflecting the importance of pages. In the present work a novel method of pattern mining is presented to solve the problem through FSTSOM. In this Paper, the proposed method is an improvement to the web log mining method and to the online navigational pattern forecasting. Here, Neural based approach i.e. Self Organizing Map (SOM) is used for clustering of sessions as a trend analysis. SOM depends on the clustering performance with the number of requests. In the proposed method, using the SOM algorithm for Frequent Sequential Traversal Pattern Mining called FSTSOM. In this method, first using SOM algorithm and getting some cluster of web-logs. Then loading that web-log cluster, which is nearly related to frequent pattern. After that applying Min-Max Weight of Page in Sequential Traversal Pattern. Finally, established good prediction with the number of data and the excellence of the results.
组织需要了解顾客的行为、偏好和未来的需求,这些都取决于顾客过去的行为。Web使用挖掘是一个活跃的研究课题,它通过客户会话聚类来了解客户的活动。本文研究了频繁模式的挖掘问题,重点研究了减少数据库扫描次数和反映页面重要性的问题。本文提出了一种新的模式挖掘方法,通过FSTSOM来解决这一问题。本文提出的方法是对网络日志挖掘方法和在线导航模式预测方法的改进。在这里,基于神经的方法即自组织映射(SOM)被用于会话聚类作为趋势分析。SOM取决于请求数量的集群性能。在提出的方法中,使用SOM算法进行频繁顺序遍历模式挖掘(FSTSOM)。该方法首先采用SOM算法,对网络日志进行聚类。然后加载web日志集群,这几乎与频繁模式相关。然后在顺序遍历模式中应用页面的最小-最大权重。最后,通过数据量和结果的优化,建立了良好的预测。
{"title":"An Enhancement in Clustering for Sequential Pattern Mining through Neural Algorithm Using Web Logs","authors":"Sheetal Sahu, P. Saurabh, Sandeep Rai","doi":"10.1109/CICN.2014.164","DOIUrl":"https://doi.org/10.1109/CICN.2014.164","url":null,"abstract":"An Organization need to understand their customers' behavior, preferences and future needs which depend upon past behavior. Web Usage Mining is an active research topic in which customers session clustering is done to understand the customers activities. This paper investigates the problem of mining frequent pattern and especially focuses on reducing the number of scans of the database and reflecting the importance of pages. In the present work a novel method of pattern mining is presented to solve the problem through FSTSOM. In this Paper, the proposed method is an improvement to the web log mining method and to the online navigational pattern forecasting. Here, Neural based approach i.e. Self Organizing Map (SOM) is used for clustering of sessions as a trend analysis. SOM depends on the clustering performance with the number of requests. In the proposed method, using the SOM algorithm for Frequent Sequential Traversal Pattern Mining called FSTSOM. In this method, first using SOM algorithm and getting some cluster of web-logs. Then loading that web-log cluster, which is nearly related to frequent pattern. After that applying Min-Max Weight of Page in Sequential Traversal Pattern. Finally, established good prediction with the number of data and the excellence of the results.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86766022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1