首页 > 最新文献

2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence最新文献

英文 中文
Tree structured data processing on GPUs 图形处理器上的树形结构数据处理
Yifan Lu, Lu Yang, V. Bhavsar, Neetesh Kumar
In order to reduce the computing time for processing large tree-structured data sets, parallel processing has been used. Recently, research has been done on parallel computing of tree-structured data on Graphics Processing Units (GPUs). GPU device cannot directly access the tree structured data on hard disks which is commonly stored as objects or linked-lists. So, it is required to copying this tree structured data from hard disk to device memory for the computation and copying tree structured data in its normal structure is very costly because of lots of pointers overhead. Existing tree data structures on GPUs are commonly applied to storing a particular kind of tree, and support limited types of tree traversals. In this work, a tree data structure is proposed to store different kind of trees as a linear data structure (fast in copying). The proposed data structure is applied on general trees and binary trees and supports four common types of tree traversals: pre-order, post-order, in-order and breadth-first traversals. Therefore, most of the tree algorithms can be implemented on GPUs by using this proposed data structure. The results show that the proposed data structure is successfully implemented for all the traversals for binary as well as general trees.
为了减少处理大型树结构数据集的计算时间,采用了并行处理方法。近年来,人们对图形处理器(gpu)上树形结构数据的并行计算进行了研究。GPU设备不能直接访问硬盘上的树状结构数据,这些数据通常以对象或链表的形式存储。因此,需要将这种树状结构的数据从硬盘复制到设备内存中进行计算,并且将树状结构的数据复制到其正常结构中,由于指针开销很大,因此成本非常高。gpu上现有的树数据结构通常用于存储特定类型的树,并支持有限类型的树遍历。在这项工作中,提出了一种树数据结构来存储不同类型的树作为线性数据结构(快速复制)。所提出的数据结构适用于一般树和二叉树,并支持四种常见的树遍历:预顺序、后顺序、顺序和宽度优先遍历。因此,使用这种数据结构,大多数树算法都可以在gpu上实现。结果表明,所提出的数据结构对于二叉树和一般树的所有遍历都是成功实现的。
{"title":"Tree structured data processing on GPUs","authors":"Yifan Lu, Lu Yang, V. Bhavsar, Neetesh Kumar","doi":"10.1109/CONFLUENCE.2017.7943203","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943203","url":null,"abstract":"In order to reduce the computing time for processing large tree-structured data sets, parallel processing has been used. Recently, research has been done on parallel computing of tree-structured data on Graphics Processing Units (GPUs). GPU device cannot directly access the tree structured data on hard disks which is commonly stored as objects or linked-lists. So, it is required to copying this tree structured data from hard disk to device memory for the computation and copying tree structured data in its normal structure is very costly because of lots of pointers overhead. Existing tree data structures on GPUs are commonly applied to storing a particular kind of tree, and support limited types of tree traversals. In this work, a tree data structure is proposed to store different kind of trees as a linear data structure (fast in copying). The proposed data structure is applied on general trees and binary trees and supports four common types of tree traversals: pre-order, post-order, in-order and breadth-first traversals. Therefore, most of the tree algorithms can be implemented on GPUs by using this proposed data structure. The results show that the proposed data structure is successfully implemented for all the traversals for binary as well as general trees.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"178 1","pages":"498-505"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81629568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Neuro signals: A future biomertic approach towards user identification 神经信号:用户识别的未来生物识别方法
Barjinder Kaur, D. Singh
Electroencephalography (EEG) have been receiving a lot of attention due to its recent use in the field of biometrics. Signals traced from the different parts of the brain has become an upsurge area of interest for the researchers. Evidences have been provided by the research communities where the uniqueness of neuro-signals can possibly be used for building a robust biometric identification system. In this paper, we investigate the robustness of EEG signals in two different scenario of data collection, namely, Eyes Open (EO) and Eyes Closed (EC) for building a person identification system. For this, a publicly available EEG signals dataset of 109 users have been used. The EEG signals have been modeled using two different classifier, namely, Support Vector Machine (SVM) and Random Forest (RF). Next, a feature selection approach has been applied to reduce the number of features and results have been computed to find optimal feature dimension. From experiments, person identification rates of 97.64% (EO) and 96.02% (EC) using SVM, and 98.16% (EO) and 97.30% (EC) have been recorded using RF classifiers.
脑电图(EEG)近年来在生物识别领域的应用受到了广泛的关注。追踪来自大脑不同部位的信号已经成为研究人员感兴趣的一个高涨的领域。研究团体提供的证据表明,神经信号的独特性可能用于建立一个强大的生物识别系统。在本文中,我们研究了EEG信号在两种不同的数据采集场景下的鲁棒性,即睁眼(EO)和闭眼(EC),以构建一个人识别系统。为此,使用了109个用户的公开脑电图信号数据集。采用支持向量机(SVM)和随机森林(RF)两种不同的分类器对脑电信号进行建模。其次,采用特征选择方法来减少特征数量,并计算结果以找到最优特征维数。实验结果表明,SVM的人识别率分别为97.64% (EO)和96.02% (EC), RF分类器的人识别率分别为98.16% (EO)和97.30% (EC)。
{"title":"Neuro signals: A future biomertic approach towards user identification","authors":"Barjinder Kaur, D. Singh","doi":"10.1109/CONFLUENCE.2017.7943133","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943133","url":null,"abstract":"Electroencephalography (EEG) have been receiving a lot of attention due to its recent use in the field of biometrics. Signals traced from the different parts of the brain has become an upsurge area of interest for the researchers. Evidences have been provided by the research communities where the uniqueness of neuro-signals can possibly be used for building a robust biometric identification system. In this paper, we investigate the robustness of EEG signals in two different scenario of data collection, namely, Eyes Open (EO) and Eyes Closed (EC) for building a person identification system. For this, a publicly available EEG signals dataset of 109 users have been used. The EEG signals have been modeled using two different classifier, namely, Support Vector Machine (SVM) and Random Forest (RF). Next, a feature selection approach has been applied to reduce the number of features and results have been computed to find optimal feature dimension. From experiments, person identification rates of 97.64% (EO) and 96.02% (EC) using SVM, and 98.16% (EO) and 97.30% (EC) have been recorded using RF classifiers.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"21 1","pages":"112-117"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81959302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
IoT based vehicle parking manager 基于物联网的车辆停车管理器
J. Desai, Aditya Bhanje, S. Biradar, Dion Fernandes
The main objective of this project is to design a solution for overcoming the parking issues that exist in public places such as malls, multiplexes etc. especially on weekends. The aim is to achieve this by using the concept of Internet of Things (IoT), wherein an Android Application is created for the customer, whose details are constantly updated by the hardware/server at the location. The features include unique identification for each vehicle, display of avaliable parking slots on the mobile application, possibility of making reservations for the same, maintenance of a database (for the management).
这个项目的主要目标是设计一个解决方案,以克服在公共场所,如商场,多厅等存在的停车问题,特别是在周末。目的是通过使用物联网(IoT)的概念来实现这一目标,其中为客户创建Android应用程序,其详细信息由该位置的硬件/服务器不断更新。这些功能包括每辆车的唯一标识、在移动应用程序上显示可用停车位、预订停车位的可能性、维护数据库(供管理人员使用)。
{"title":"IoT based vehicle parking manager","authors":"J. Desai, Aditya Bhanje, S. Biradar, Dion Fernandes","doi":"10.1109/CONFLUENCE.2017.7943153","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943153","url":null,"abstract":"The main objective of this project is to design a solution for overcoming the parking issues that exist in public places such as malls, multiplexes etc. especially on weekends. The aim is to achieve this by using the concept of Internet of Things (IoT), wherein an Android Application is created for the customer, whose details are constantly updated by the hardware/server at the location. The features include unique identification for each vehicle, display of avaliable parking slots on the mobile application, possibility of making reservations for the same, maintenance of a database (for the management).","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"50 1","pages":"222-225"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87954133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A predictive approach to task scheduling for Big Data in cloud environments using classification algorithms 基于分类算法的云环境下大数据任务调度预测方法
Vidushi Vashishth, Anshuman Chhabra, A. Sood
There have been many recent developments in integrating the Cloud with the Internet of Τhings (IoT) which comprise of up and coming technologies such as Smart Cities and Smart devices. This federation has resulted in research being directed towards further integration of Big Data with the Cloud, as IoT devices consisting of such technologies generate a continuous stream of sensor data. Thus, in this paper, we seek to present a predictive approach to task scheduling with the aim of reducing the overhead incurred when Big Data is processed on the Cloud. Subsequently, we wish to increase both the efficiency and reliability of the Cloud network while handling Big Data. We present a method of using classification in Machine Learning as a tool for scheduling tasks and assigning them to Virtual Machines (VMs) in the Cloud environment. A comparative study is undertaken to observe which brand of classifiers perform optimally in the given scenario. Particle Swarm Optimization (PSO) is used to generate the dataset which is used to train the classifiers. A number of classification algorithms such as Naive Bayes, Random Forest and Κ Nearest Neighbor are then used to predict the VM best suited to a task in the test dataset.
最近在将云与Τhings互联网(IoT)集成方面有了许多发展,其中包括智能城市和智能设备等新兴技术。这种联合导致研究的方向是进一步整合大数据与云,因为由这些技术组成的物联网设备会产生连续的传感器数据流。因此,在本文中,我们试图提出一种任务调度的预测方法,目的是减少在云上处理大数据时产生的开销。接下来,我们希望在处理大数据的同时,提高云网络的效率和可靠性。我们提出了一种使用机器学习中的分类作为调度任务并将其分配给云环境中的虚拟机(vm)的工具的方法。进行比较研究,以观察哪种品牌的分类器在给定的情况下表现最佳。采用粒子群算法生成数据集,用于训练分类器。然后使用朴素贝叶斯、随机森林和Κ最近邻等许多分类算法来预测最适合测试数据集中任务的VM。
{"title":"A predictive approach to task scheduling for Big Data in cloud environments using classification algorithms","authors":"Vidushi Vashishth, Anshuman Chhabra, A. Sood","doi":"10.1109/CONFLUENCE.2017.7943147","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943147","url":null,"abstract":"There have been many recent developments in integrating the Cloud with the Internet of Τhings (IoT) which comprise of up and coming technologies such as Smart Cities and Smart devices. This federation has resulted in research being directed towards further integration of Big Data with the Cloud, as IoT devices consisting of such technologies generate a continuous stream of sensor data. Thus, in this paper, we seek to present a predictive approach to task scheduling with the aim of reducing the overhead incurred when Big Data is processed on the Cloud. Subsequently, we wish to increase both the efficiency and reliability of the Cloud network while handling Big Data. We present a method of using classification in Machine Learning as a tool for scheduling tasks and assigning them to Virtual Machines (VMs) in the Cloud environment. A comparative study is undertaken to observe which brand of classifiers perform optimally in the given scenario. Particle Swarm Optimization (PSO) is used to generate the dataset which is used to train the classifiers. A number of classification algorithms such as Naive Bayes, Random Forest and Κ Nearest Neighbor are then used to predict the VM best suited to a task in the test dataset.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"65 1","pages":"188-192"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76519963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
CCTV quality assessment for forensics facial recognition analysis 用于取证面部识别分析的闭路电视质量评估
Mohamad Firham Efendy Md. Senan, S. Abdullah, Wafa’ Mohd Kharudin, Nur Afifah Mohd Saupi
Closed-circuit television (CCTV) is used to perform surveillance recordings, and it is one of the most common digital devices that provide digital evidence for the purpose of forensic analysis. In video forensic analysis, the footage with the target subject or object is extracted out from the CCTV recordings for further analysis. However, the quality of these recordings are often poor due to several factors, such as the type of the camera, the configuration, and also the position of the camera. The results of forensic face recognition depend highly on the quality of the CCTV recordings. Poor quality of CCTV recordings would reduce the confidence level of the face recognition result, thus would not make a strong evidence to be presented in a court of law. The objective of this research is to conceptualise a framework for quality assessment in CCTV evidence to be used in forensic face recognition analysis. The method of this research was divided into two phases. Initial phase covered CCTV evidence testing phase where the experiment was done based on different types of CCTV camera with different resolutions, and distances between the subject and the camera. In the second phase, the face of the subjects were compared to the face taken during the enrolment phase. The score obtained from the forensic face recognition system would be based on the camera resolutions, types of camera, distances, and also the changes of ranking score after applying the enhancement process such as Bicubic to the facial images. The results were analyzed for quality assessment towards these parameters. In general, the evaluation of scoring and ranking decreased as the distance increased. The face also could not be detected by the system when they were taken more than 5 meters distance from the camera. The highest score of 5.95 was obtained by using resolution 1280 × 720 at distance of 3 meters taken by camera model ACTI E62. The Bicubic enhancement method improved the scoring and ranking especially with the camera model that have low resolution modes.
闭路电视(CCTV)用于监控录像,是为法医分析提供数字证据的最常见的数字设备之一。在视频取证分析中,从闭路电视录像中提取出具有目标主体或客体的片段进行进一步分析。然而,由于摄像机的类型、配置以及摄像机的位置等因素,这些记录的质量往往很差。法医人脸识别的结果在很大程度上取决于监控录像的质量。低质量的闭路电视录像会降低人脸识别结果的置信度,因此不会成为在法庭上提出的有力证据。本研究的目的是概念化一个用于法医面部识别分析的闭路电视证据质量评估框架。本研究方法分为两个阶段。初始阶段为闭路电视证据测试阶段,实验采用不同型号、不同分辨率的闭路电视摄像机,受试者与摄像机之间的距离。在第二阶段,将受试者的面部与入学阶段拍摄的面部进行比较。法医人脸识别系统得到的分数是基于相机分辨率、相机类型、距离以及对面部图像进行双立方等增强处理后排名分数的变化。对结果进行分析,对这些参数进行质量评价。总体而言,评分和排名的评价随距离的增加而降低。当拍摄距离相机超过5米时,系统也无法检测到人脸。ACTI E62型相机在3米距离上以1280 × 720分辨率拍摄,获得了5.95分的最高分。双三次增强方法提高了评分和排序,特别是对于低分辨率模式的相机模型。
{"title":"CCTV quality assessment for forensics facial recognition analysis","authors":"Mohamad Firham Efendy Md. Senan, S. Abdullah, Wafa’ Mohd Kharudin, Nur Afifah Mohd Saupi","doi":"10.1109/CONFLUENCE.2017.7943232","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943232","url":null,"abstract":"Closed-circuit television (CCTV) is used to perform surveillance recordings, and it is one of the most common digital devices that provide digital evidence for the purpose of forensic analysis. In video forensic analysis, the footage with the target subject or object is extracted out from the CCTV recordings for further analysis. However, the quality of these recordings are often poor due to several factors, such as the type of the camera, the configuration, and also the position of the camera. The results of forensic face recognition depend highly on the quality of the CCTV recordings. Poor quality of CCTV recordings would reduce the confidence level of the face recognition result, thus would not make a strong evidence to be presented in a court of law. The objective of this research is to conceptualise a framework for quality assessment in CCTV evidence to be used in forensic face recognition analysis. The method of this research was divided into two phases. Initial phase covered CCTV evidence testing phase where the experiment was done based on different types of CCTV camera with different resolutions, and distances between the subject and the camera. In the second phase, the face of the subjects were compared to the face taken during the enrolment phase. The score obtained from the forensic face recognition system would be based on the camera resolutions, types of camera, distances, and also the changes of ranking score after applying the enhancement process such as Bicubic to the facial images. The results were analyzed for quality assessment towards these parameters. In general, the evaluation of scoring and ranking decreased as the distance increased. The face also could not be detected by the system when they were taken more than 5 meters distance from the camera. The highest score of 5.95 was obtained by using resolution 1280 × 720 at distance of 3 meters taken by camera model ACTI E62. The Bicubic enhancement method improved the scoring and ranking especially with the camera model that have low resolution modes.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"10 1","pages":"649-655"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75735227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid object detection using improved three frame differencing and background subtraction 采用改进的三帧差分和背景减法的混合目标检测
N. Srivastav, S. Agrwal, S. Gupta, Saurabh R. Srivastava, Blessy Chacko, Hema Sharma
Object Detection and Tracking in video has applied in robotics, video-surveillance; human-computer interaction etc. and different approach of object detection e.g. Background subtraction, frame differencing. Motion based recognition is one of the methods to detect objects in sequence of image. In this method, a video sequence containing a large number of images is used to extract motion information. Two frame differencing is very easy but there is problem of holes. Three frame differencing and background subtraction have solved the problem of holes of two frames till a limit. Background subtraction is used for stable background video but Dynamic Background subtraction is capable to detect object in video with gradual background changes. So there is scope of work such that holes problem should be reduced more and object should be detected better in dynamic changes in background. In this paper, the proposed technique is able to reduce the holes problem in dynamic background updating video.
视频中的目标检测与跟踪已应用于机器人、视频监控等领域;人机交互等以及不同的目标检测方法,如背景减法、帧差。基于运动的识别是在图像序列中检测物体的方法之一。该方法利用包含大量图像的视频序列提取运动信息。两帧差是很容易的,但有孔的问题。三帧差分和背景减法在一定程度上解决了两帧的孔洞问题。背景减法用于稳定的背景视频,而动态背景减法能够检测背景逐渐变化的视频中的目标。因此,在动态变化的背景下,需要进一步减少孔洞问题,更好地检测出目标。本文提出的方法能够有效地解决动态背景更新视频中的孔洞问题。
{"title":"Hybrid object detection using improved three frame differencing and background subtraction","authors":"N. Srivastav, S. Agrwal, S. Gupta, Saurabh R. Srivastava, Blessy Chacko, Hema Sharma","doi":"10.1109/CONFLUENCE.2017.7943225","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943225","url":null,"abstract":"Object Detection and Tracking in video has applied in robotics, video-surveillance; human-computer interaction etc. and different approach of object detection e.g. Background subtraction, frame differencing. Motion based recognition is one of the methods to detect objects in sequence of image. In this method, a video sequence containing a large number of images is used to extract motion information. Two frame differencing is very easy but there is problem of holes. Three frame differencing and background subtraction have solved the problem of holes of two frames till a limit. Background subtraction is used for stable background video but Dynamic Background subtraction is capable to detect object in video with gradual background changes. So there is scope of work such that holes problem should be reduced more and object should be detected better in dynamic changes in background. In this paper, the proposed technique is able to reduce the holes problem in dynamic background updating video.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"4 1","pages":"613-617"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81198726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Novel IDS security against attacker routing misbehavior of packet dropping in MANET 针对MANET中攻击者路由错误丢包行为的新型IDS安全性
Rohit Chourasia, R. Boghey
The MANET that is Mobile Ad hoc Network are forming a group of many nodes. They can interact with each other in limited area. All the Malicious nodes present in the MANET always disturb the usual performance of routing and that cause the degradation of dynamic performance of the network. Nodes which are malicious continuously try to stump the neighbor nodes during the process of routing as all neighbor nodes in the network merely forward the reply and response of neighboring. The intermediate nodes work is very responsible in routing procedure with continuous movement. During the work we have recommended one security scheme against the attack of packet dropping by malicious node in the network. The scheme which is recommended here will work to find attacker by using the concept of detection of link to forward the data or information between sender and receiver. The packet dropping on link, through node is detected and prevented by IDS security system. The scheme not only works to identify the nodes performing malicious activity however prevent them also. The identification of attacker is noticed by dropping of data packets in excsssessive quantity. The prevention of it can be done via choosing the alternate route somewhere the attacker performing malicious activity not available among the senders to receivers. The neighbor nodes or intermediary identify the malicious activity performer by the way of reply of malicious nodes which is confirmed. The recommended IDS system secures the network and also increases the performance after blocking malicious nodes that perform malicious activity in the network. The network performance measures in the presence of attack and secure IDS with the help of performance metrics like PDR, throughput etc. Planned secure routing improves data receiving and minimizes dropping data in network.
移动自组网(MANET)是由多个节点组成的一组网络。它们可以在有限的区域内相互作用。MANET中存在的各种恶意节点经常干扰路由的正常性能,导致网络动态性能的下降。恶意节点在路由过程中不断地尝试树桩攻击邻居节点,因为网络中的所有邻居节点只是转发邻居的回复和响应。中间节点在连续运动的路由过程中起着非常重要的作用。在工作过程中,我们推荐了一种针对网络中恶意节点丢包攻击的安全方案。这里推荐的方案将通过使用链接检测的概念在发送方和接收方之间转发数据或信息来查找攻击者。IDS安全系统对链路、节点上的丢包行为进行检测和阻止。该方案不仅可以识别执行恶意活动的节点,还可以阻止它们。通过大量丢弃数据包来识别攻击者。可以通过选择替代路由来防止攻击者在发送者和接收者之间执行恶意活动。邻居节点或中介通过恶意节点的确认回复来识别恶意活动执行者。推荐的IDS系统不仅可以保护网络,还可以在阻断网络中执行恶意活动的恶意节点后提高性能。在攻击和安全IDS存在的情况下,网络性能通过PDR、吞吐量等性能指标来衡量。规划好的安全路由可以提高数据接收能力,减少网络中的数据丢失。
{"title":"Novel IDS security against attacker routing misbehavior of packet dropping in MANET","authors":"Rohit Chourasia, R. Boghey","doi":"10.1109/CONFLUENCE.2017.7943194","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943194","url":null,"abstract":"The MANET that is Mobile Ad hoc Network are forming a group of many nodes. They can interact with each other in limited area. All the Malicious nodes present in the MANET always disturb the usual performance of routing and that cause the degradation of dynamic performance of the network. Nodes which are malicious continuously try to stump the neighbor nodes during the process of routing as all neighbor nodes in the network merely forward the reply and response of neighboring. The intermediate nodes work is very responsible in routing procedure with continuous movement. During the work we have recommended one security scheme against the attack of packet dropping by malicious node in the network. The scheme which is recommended here will work to find attacker by using the concept of detection of link to forward the data or information between sender and receiver. The packet dropping on link, through node is detected and prevented by IDS security system. The scheme not only works to identify the nodes performing malicious activity however prevent them also. The identification of attacker is noticed by dropping of data packets in excsssessive quantity. The prevention of it can be done via choosing the alternate route somewhere the attacker performing malicious activity not available among the senders to receivers. The neighbor nodes or intermediary identify the malicious activity performer by the way of reply of malicious nodes which is confirmed. The recommended IDS system secures the network and also increases the performance after blocking malicious nodes that perform malicious activity in the network. The network performance measures in the presence of attack and secure IDS with the help of performance metrics like PDR, throughput etc. Planned secure routing improves data receiving and minimizes dropping data in network.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"35 1","pages":"456-460"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80319633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Niche modelling of endangered philippine birds using GARP and MAXENT 利用GARP和MAXENT建立菲律宾濒危鸟类生态位模型
Chuchi Montenegro, Lorraine Allie Solitario, Samantha Faye Manglar, Daphne Danica Guinto
Researches in the area of environmental niche modeling has been using climatic parameters in modeling niches of bird species. However, local experts believe that human activity is a great cont ributor to the birds' habitat status — a condition not often tested on niche model accuracy. Genetic Algorithm for Rule-set Production (GARP) and Maximum Entropy (MaxEnt) are two of the most commonly used and efficient methods in niche modeling using climatic data. In conjunction, this study aims to test the accuracy of the bird niche models produced by both GARP and MaxEnt when dealing with human-related parameters. Bird sightings of six endangered Philippine bird species found in Negros were used for the study. Niche models/prediction models from GARP and MaxEnt underwent partial-area ROC analysis for model evaluation. Results of the tests show that the prediction models of the two niche modeling algorithms are mostly good and positive predictions with GARP showing more accurate results than MaxEnt. In addition, GARP showed lower accuracy results when human-related parameters were introduced as compared to having no human-related parameters during the modeling phase. MaxEnt, on the other hand, showed accuracy improvements when the parameters were used. MaxEnt was also proven to be an ideal algorithm than GARP in dealing with species with very few occurrences.
利用气候参数对鸟类生态位进行建模是环境生态位建模领域的研究成果。然而,当地专家认为,人类活动是鸟类栖息地状况的一个重要因素,而这种情况通常不会在生态位模型的准确性上进行测试。规则集生成遗传算法(GARP)和最大熵算法(MaxEnt)是气候数据生态位建模中最常用和最有效的两种方法。同时,本研究旨在验证GARP和MaxEnt所建立的鸟类生态位模型在处理人类相关参数时的准确性。研究使用了在内格罗斯发现的六种濒临灭绝的菲律宾鸟类。GARP和MaxEnt的生态位模型/预测模型采用部分面积ROC分析进行模型评价。实验结果表明,两种生态位建模算法的预测模型大多是良好的、积极的,GARP的预测结果比MaxEnt更准确。此外,在建模阶段,与不引入人相关参数相比,引入人相关参数时GARP的精度结果较低。另一方面,当使用这些参数时,MaxEnt显示出准确性的提高。在处理出现次数很少的物种时,MaxEnt也被证明是比GARP更理想的算法。
{"title":"Niche modelling of endangered philippine birds using GARP and MAXENT","authors":"Chuchi Montenegro, Lorraine Allie Solitario, Samantha Faye Manglar, Daphne Danica Guinto","doi":"10.1109/CONFLUENCE.2017.7943211","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943211","url":null,"abstract":"Researches in the area of environmental niche modeling has been using climatic parameters in modeling niches of bird species. However, local experts believe that human activity is a great cont ributor to the birds' habitat status — a condition not often tested on niche model accuracy. Genetic Algorithm for Rule-set Production (GARP) and Maximum Entropy (MaxEnt) are two of the most commonly used and efficient methods in niche modeling using climatic data. In conjunction, this study aims to test the accuracy of the bird niche models produced by both GARP and MaxEnt when dealing with human-related parameters. Bird sightings of six endangered Philippine bird species found in Negros were used for the study. Niche models/prediction models from GARP and MaxEnt underwent partial-area ROC analysis for model evaluation. Results of the tests show that the prediction models of the two niche modeling algorithms are mostly good and positive predictions with GARP showing more accurate results than MaxEnt. In addition, GARP showed lower accuracy results when human-related parameters were introduced as compared to having no human-related parameters during the modeling phase. MaxEnt, on the other hand, showed accuracy improvements when the parameters were used. MaxEnt was also proven to be an ideal algorithm than GARP in dealing with species with very few occurrences.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"169 1","pages":"547-551"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77933587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of various task scheduling algorithms in cloud environment: Review 云环境下各种任务调度算法分析:综述
N. Panwar, M. Rauthan
Cloud computing is an advanced and nascent technology, which permits convenient access to data, software and IT services over the web. It allows users to pay on the basis of use and has the high performance. Virtualization technology segregates the elementary functions of computers from the hardware resources and the physical infrastructure. Virtualization technology considered principal characteristic of cloud computing. Cloud computing is a conglomerate system which uses more than one kind of system processors and grasps large volume of application data. With the increasing number of cloud users, it becomes difficult to schedule user tasks effectively. The performance of cloud depends on the task scheduling algorithms. Since cloud computing systems have an abundance of uncertainty with respect to network bandwidth and resource availability, scheduling algorithms which are being used in cloud computing environment should consolidate the dormancy caused by uncertain resource availability. The task scheduling problem can be specified as the process of fin ding an ideal mapping amongst subtasks of different tasks and available set of resources, with the intention of achieving the desired objectives. This paper is aimed to perform comparative study of different existing task scheduling algorithms by categorizing each into the different scheduling techniques, i.e., Heuristic, Deadline, Priority and Optimization based in order to find their suitability, feasibility and adaptability.
云计算是一种先进的新兴技术,它允许通过网络方便地访问数据、软件和IT服务。它允许用户根据使用情况付费,并且具有高性能。虚拟化技术将计算机的基本功能从硬件资源和物理基础设施中分离出来。虚拟化技术被认为是云计算的主要特征。云计算是一个使用多种系统处理器并掌握大量应用数据的综合系统。随着云用户数量的不断增加,有效地调度用户任务变得越来越困难。云的性能取决于任务调度算法。由于云计算系统在网络带宽和资源可用性方面具有丰富的不确定性,因此在云计算环境中使用的调度算法应该整合由资源可用性不确定引起的休眠。任务调度问题可以定义为在不同任务和可用资源集的子任务之间寻找理想映射的过程,目的是实现预期目标。本文的目的是对现有的不同任务调度算法进行比较研究,将它们分为启发式、截止日期、优先级和基于优化的不同调度技术,以找出它们的适用性、可行性和适应性。
{"title":"Analysis of various task scheduling algorithms in cloud environment: Review","authors":"N. Panwar, M. Rauthan","doi":"10.1109/CONFLUENCE.2017.7943159","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943159","url":null,"abstract":"Cloud computing is an advanced and nascent technology, which permits convenient access to data, software and IT services over the web. It allows users to pay on the basis of use and has the high performance. Virtualization technology segregates the elementary functions of computers from the hardware resources and the physical infrastructure. Virtualization technology considered principal characteristic of cloud computing. Cloud computing is a conglomerate system which uses more than one kind of system processors and grasps large volume of application data. With the increasing number of cloud users, it becomes difficult to schedule user tasks effectively. The performance of cloud depends on the task scheduling algorithms. Since cloud computing systems have an abundance of uncertainty with respect to network bandwidth and resource availability, scheduling algorithms which are being used in cloud computing environment should consolidate the dormancy caused by uncertain resource availability. The task scheduling problem can be specified as the process of fin ding an ideal mapping amongst subtasks of different tasks and available set of resources, with the intention of achieving the desired objectives. This paper is aimed to perform comparative study of different existing task scheduling algorithms by categorizing each into the different scheduling techniques, i.e., Heuristic, Deadline, Priority and Optimization based in order to find their suitability, feasibility and adaptability.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"114 1","pages":"255-261"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88130694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient coordinator guided particle swarm optimization for real-parameter optimization 面向实参数优化的高效协调器引导粒子群优化
P. Agarwalla, S. Mukhopadhyay
Particle swarm optimization (PSO) is a stochastic optimization algorithm which usually suffers from local confinement losing its diversity. In this paper, we have proposed an efficient coordinator guided PSO (ECG-PSO), which provides a good diversity to the swarms maintaining good convergence speed and hence improves the fitness and robustness of the technique. We comprehensively evaluate the performance of the ECG-PSO by applying it on real-parameter benchmark optimization functions. Again, the result of comparison shows that ECG-PSO is more efficient compared to other PSO variants for solving complex problems.
粒子群优化算法(PSO)是一种随机优化算法,常因局部约束而失去多样性。本文提出了一种高效的协调器引导粒子群优化算法(ECG-PSO),该算法在保持良好收敛速度的同时具有良好的种群多样性,从而提高了算法的适应度和鲁棒性。将ECG-PSO应用于实参数基准优化函数,对其性能进行了综合评价。对比结果再次表明,ECG-PSO在解决复杂问题时比其他PSO变体更有效。
{"title":"Efficient coordinator guided particle swarm optimization for real-parameter optimization","authors":"P. Agarwalla, S. Mukhopadhyay","doi":"10.1109/CONFLUENCE.2017.7943134","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943134","url":null,"abstract":"Particle swarm optimization (PSO) is a stochastic optimization algorithm which usually suffers from local confinement losing its diversity. In this paper, we have proposed an efficient coordinator guided PSO (ECG-PSO), which provides a good diversity to the swarms maintaining good convergence speed and hence improves the fitness and robustness of the technique. We comprehensively evaluate the performance of the ECG-PSO by applying it on real-parameter benchmark optimization functions. Again, the result of comparison shows that ECG-PSO is more efficient compared to other PSO variants for solving complex problems.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"15 1","pages":"118-123"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84327169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1