首页 > 最新文献

2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence最新文献

英文 中文
A novel approach for encoding and decoding of high storage capacity color QR code 一种新的高存储容量彩色QR码编码解码方法
Ashwdeep Singh, Vikas Verma, G. Raj
With the enhancement in mobile technology, QR (Quick Response) codes became popular. QR codes are widely used in our daily life from social media websites to cashless shopping wallets, ERP(Enterprise Resource Planning) software implementation to display advertising and digital marketing etc. In this paper we have focused upon one major issue with the QR codes. We have focused upon data various techniques used to increase data storage capacity of QR code. This paper is divided into five subparts. In first part we have introduced about basics of QR codes, their versions, creating and scanning process and its various applications. Then in second part we have written about various features of QR codes, due to them QR code became so popular and we have also discussed about its structure to understand its basic functionality. Thereafter we have compared three different kinds of co des-b ar code, quick response code and color quick response code, on the basis of its storage capacity, error resistance, 360° reading and other factors. Then in fourth part we have reviewed the literature and mentioned various techniques used by researcher to in crease data storage capacity of QR codes. In fifth part of this research paper we have proposed encoding and decoding algorithm, which will result into high storage color QR code. And a t the end, we have discussed about our future directions in order to increase storage capacity of QR codes and make stored information more secure and reliable for the end users.
随着移动技术的提高,QR(快速响应)码开始流行。从社交媒体网站到无现金购物钱包,从ERP(企业资源规划)软件实施到展示广告和数字营销等,QR码被广泛应用于我们的日常生活中。在本文中,我们关注QR码的一个主要问题。我们重点研究了增加二维码数据存储容量的各种技术。本文共分为五个部分。在第一部分中,我们介绍了QR码的基础知识,它们的版本,创建和扫描过程及其各种应用。然后在第二部分,我们写了QR码的各种功能,由于他们QR码变得如此受欢迎,我们也讨论了它的结构,了解它的基本功能。随后,我们根据其存储容量、抗错误性、360°读取等因素,对三种不同的编码码、快速响应码和彩色快速响应码进行了比较。然后在第四部分,我们回顾了文献,并提到了研究人员使用的各种技术来增加二维码的数据存储容量。在论文的第五部分,我们提出了编码和解码算法,从而产生高存储的彩色QR码。最后,我们讨论了未来的发展方向,以提高二维码的存储容量,使存储的信息对终端用户来说更加安全可靠。
{"title":"A novel approach for encoding and decoding of high storage capacity color QR code","authors":"Ashwdeep Singh, Vikas Verma, G. Raj","doi":"10.1109/CONFLUENCE.2017.7943188","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943188","url":null,"abstract":"With the enhancement in mobile technology, QR (Quick Response) codes became popular. QR codes are widely used in our daily life from social media websites to cashless shopping wallets, ERP(Enterprise Resource Planning) software implementation to display advertising and digital marketing etc. In this paper we have focused upon one major issue with the QR codes. We have focused upon data various techniques used to increase data storage capacity of QR code. This paper is divided into five subparts. In first part we have introduced about basics of QR codes, their versions, creating and scanning process and its various applications. Then in second part we have written about various features of QR codes, due to them QR code became so popular and we have also discussed about its structure to understand its basic functionality. Thereafter we have compared three different kinds of co des-b ar code, quick response code and color quick response code, on the basis of its storage capacity, error resistance, 360° reading and other factors. Then in fourth part we have reviewed the literature and mentioned various techniques used by researcher to in crease data storage capacity of QR codes. In fifth part of this research paper we have proposed encoding and decoding algorithm, which will result into high storage color QR code. And a t the end, we have discussed about our future directions in order to increase storage capacity of QR codes and make stored information more secure and reliable for the end users.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"23 1","pages":"425-430"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87356555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
UIDC: Cloud based UID application UIDC:基于云的UID应用
Shubham Gupta, R. Johari
The paper explains the benefits of a distributed computed based, very resourceful technology ‘cloud computing’. The paper explains how cloud computing is changing the way the data is obtained, shared and used effectively through the unique identification number (UID) application which has been designed and developed keeping in mind the power of cloud computing. This proposed UID application has never been used by any other individual or an organization. It has been discussed and successfully implemented for the first time. It involves combining the different identity proofs of an individual to get an UID number which would contain information about all the other identity proofs. Visual studio and ANEKA platform are the tools which have been used to make this application possible.
这篇论文解释了基于分布式计算的、资源丰富的技术“云计算”的好处。本文解释了云计算如何通过唯一标识号(UID)应用程序改变数据获取、共享和有效使用的方式,该应用程序是在考虑到云计算的强大功能的情况下设计和开发的。这个建议的UID应用程序从未被任何其他个人或组织使用过。本文首次对其进行了讨论并成功实施。它涉及组合个人的不同身份证明以获得UID号码,该号码将包含有关所有其他身份证明的信息。Visual studio和ANEKA平台是使这个应用程序成为可能的工具。
{"title":"UIDC: Cloud based UID application","authors":"Shubham Gupta, R. Johari","doi":"10.1109/CONFLUENCE.2017.7943169","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943169","url":null,"abstract":"The paper explains the benefits of a distributed computed based, very resourceful technology ‘cloud computing’. The paper explains how cloud computing is changing the way the data is obtained, shared and used effectively through the unique identification number (UID) application which has been designed and developed keeping in mind the power of cloud computing. This proposed UID application has never been used by any other individual or an organization. It has been discussed and successfully implemented for the first time. It involves combining the different identity proofs of an individual to get an UID number which would contain information about all the other identity proofs. Visual studio and ANEKA platform are the tools which have been used to make this application possible.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"11 1","pages":"319-324"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85420965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Architectural scheme for future embedded systems involving large number of processing cores 未来涉及大量处理核心的嵌入式系统的体系结构方案
S. Jafar, Pankaj Kumar, Ranjana Rajnish, Minsa Jafar
Embedded system design is the core for many time constraint application designs like avionics and railways. These systems employ multi core architecture for faster and time critical applications. Use of multi cores as the processing part is ever challenging due to the complexities involved in their designs, memory architecture, issues related to synchronization between the cores and problems like deadlock between the executing cores. Also as per the Moore's Law, number of cores on as ingle processing element increase exponentially becoming double after every 18 months. In the face of such fast increasing cores the time is not far when there will be 100 or 1000 of cores on a single chip. Then there will be bigger challenges of dealing with problems like heat dissipation, concurrency control and speedy communication between the cores, without compromising the performance and outcome of embedded systems employing these multiple cores. In this paper we have studied some of the pre existing protocols and technologies for handling concurrency in large number of multi core systems and have proposed a framework for concurrency control with a routing protocol for multi core system employing 64 cores. Then we have proposed to scale this system for higher number of cores leading to up to 100 cores and w ill study the performance on an embedded system.
嵌入式系统设计是航空、铁路等时间约束型应用设计的核心。这些系统采用多核架构,用于更快和时间关键的应用程序。使用多核作为处理部分是具有挑战性的,因为它们的设计、内存架构、核之间的同步以及执行核之间的死锁等问题都涉及到复杂性。此外,根据摩尔定律,单个处理元件上的核心数量每18个月增加一倍。面对如此快速增长的核心,一个芯片上有100或1000个核心的时间已经不远了。然后,在不影响使用这些多核的嵌入式系统的性能和结果的情况下,处理诸如散热、并发控制和内核之间的快速通信等问题将面临更大的挑战。本文研究了现有的用于处理大量多核系统并发性的协议和技术,并提出了一个64核多核系统并发控制的框架和路由协议。然后,我们建议将该系统扩展到更高数量的内核,最多可达100个内核,我们将研究嵌入式系统的性能。
{"title":"Architectural scheme for future embedded systems involving large number of processing cores","authors":"S. Jafar, Pankaj Kumar, Ranjana Rajnish, Minsa Jafar","doi":"10.1109/CONFLUENCE.2017.7943181","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943181","url":null,"abstract":"Embedded system design is the core for many time constraint application designs like avionics and railways. These systems employ multi core architecture for faster and time critical applications. Use of multi cores as the processing part is ever challenging due to the complexities involved in their designs, memory architecture, issues related to synchronization between the cores and problems like deadlock between the executing cores. Also as per the Moore's Law, number of cores on as ingle processing element increase exponentially becoming double after every 18 months. In the face of such fast increasing cores the time is not far when there will be 100 or 1000 of cores on a single chip. Then there will be bigger challenges of dealing with problems like heat dissipation, concurrency control and speedy communication between the cores, without compromising the performance and outcome of embedded systems employing these multiple cores. In this paper we have studied some of the pre existing protocols and technologies for handling concurrency in large number of multi core systems and have proposed a framework for concurrency control with a routing protocol for multi core system employing 64 cores. Then we have proposed to scale this system for higher number of cores leading to up to 100 cores and w ill study the performance on an embedded system.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"174 1","pages":"392-396"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79628557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software defect prediction analysis using machine learning algorithms 利用机器学习算法进行软件缺陷预测分析
Praman Deep Singh, A. Chug
Software Quality is the most important aspect of a software. Software Defect Prediction can directly affect quality and has achieved significant popularity in last few years. Defective software modules have a massive impact over software's quality leading to cost overruns, delayed timelines and much higher maintenance costs. In this paper we have analyzed the most popular and widely used Machine Learning algorithms — ANN (Artificial Neural Network), PSO(P article Swarm Optimization), DT (Decision Trees), NB(Naive Bayes) and LC (Linear classifier). The five algorithms were analyzed using KEEL tool and validated using k-fold cross validation technique. Datasets used in this research were obtained from open source NASA Promise dataset repository. Seven datasets were selected for defect prediction analysis. Classification was performed on these 7 datasets and validated using 10 fold cross validation. The results demonstrated the dominance of Linear Classifier over other algorithms in terms of defect prediction accuracy.
软件质量是软件最重要的方面。软件缺陷预测可以直接影响质量,并且在过去几年中已经取得了显著的普及。有缺陷的软件模块对软件质量有巨大的影响,导致成本超支、时间延迟和更高的维护成本。在本文中,我们分析了最流行和广泛使用的机器学习算法- ANN(人工神经网络),PSO(P文章群优化),DT(决策树),NB(朴素贝叶斯)和LC(线性分类器)。使用KEEL工具对五种算法进行分析,并使用k-fold交叉验证技术进行验证。本研究中使用的数据集来自开源的NASA承诺数据库。选取7个数据集进行缺陷预测分析。对这7个数据集进行分类,并使用10倍交叉验证进行验证。结果表明,线性分类器在缺陷预测精度方面优于其他算法。
{"title":"Software defect prediction analysis using machine learning algorithms","authors":"Praman Deep Singh, A. Chug","doi":"10.1109/CONFLUENCE.2017.7943255","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943255","url":null,"abstract":"Software Quality is the most important aspect of a software. Software Defect Prediction can directly affect quality and has achieved significant popularity in last few years. Defective software modules have a massive impact over software's quality leading to cost overruns, delayed timelines and much higher maintenance costs. In this paper we have analyzed the most popular and widely used Machine Learning algorithms — ANN (Artificial Neural Network), PSO(P article Swarm Optimization), DT (Decision Trees), NB(Naive Bayes) and LC (Linear classifier). The five algorithms were analyzed using KEEL tool and validated using k-fold cross validation technique. Datasets used in this research were obtained from open source NASA Promise dataset repository. Seven datasets were selected for defect prediction analysis. Classification was performed on these 7 datasets and validated using 10 fold cross validation. The results demonstrated the dominance of Linear Classifier over other algorithms in terms of defect prediction accuracy.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"83 1","pages":"775-781"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83398437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Hyper spectral image classification using multilayer perceptron neural network & functional link ANN 基于多层感知器神经网络和功能链接神经网络的超光谱图像分类
Anita Thakur, Deepak Mishra
The human eye can perceive information from the visible light in terms of bands of three colors (red, green, blue), so generally images store in the digital are made up of three dimensions i.e., R, G and B. But hyper spectral imaging perceives information from across the electromagnetic spectrum; the process of spectral imaging further splits the spectrum into more bands. This process of changing images into bands can be even in the invisible spectrum. Hence the hyper spectral images can be considered as n-dimensional matrices and each pixel can be regarded as n-dimens ional vector. These images contain various areas with similar characteristics like crop fields, forest area and deserts. To classify such regions one has look for certain features among the captured images. Some similarity measures should be undertaken to make clusters of areas having similar characteristics from the images. Finding the relative similarities in terms of numerical score can be carried out with the help of some standard algorithm. So, feature classification on basis of relative similarities pixel is robust method. In this paper proposing classification of hyper spectral images using Multilayer Perceptron Artificial Neural Network (MLPANN) and Functional Link Artificial Neural Network (FLANN) and their performance is compare in term of accuracy rate.
人眼可以从可见光中感知到三种颜色(红、绿、蓝)的波段信息,因此通常存储在数字图像中的图像由三个维度组成,即R、G和b。但高光谱成像从整个电磁频谱中感知信息;光谱成像的过程进一步将光谱分割成更多的波段。这种将图像转换成波段的过程甚至可以在不可见的光谱中进行。因此,高光谱图像可以看作是n维矩阵,每个像素可以看作是n维向量。这些图像包含了各种具有相似特征的区域,如农田、森林和沙漠。为了对这些区域进行分类,人们必须在捕获的图像中寻找某些特征。应该采取一些相似性措施,使图像中具有相似特征的区域集群。在一些标准算法的帮助下,可以找到数值得分方面的相对相似性。因此,基于相对相似像素的特征分类是一种鲁棒的方法。本文提出了利用多层感知器人工神经网络(MLPANN)和功能链接人工神经网络(FLANN)对高光谱图像进行分类,并比较了两者的准确率。
{"title":"Hyper spectral image classification using multilayer perceptron neural network & functional link ANN","authors":"Anita Thakur, Deepak Mishra","doi":"10.1109/CONFLUENCE.2017.7943230","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943230","url":null,"abstract":"The human eye can perceive information from the visible light in terms of bands of three colors (red, green, blue), so generally images store in the digital are made up of three dimensions i.e., R, G and B. But hyper spectral imaging perceives information from across the electromagnetic spectrum; the process of spectral imaging further splits the spectrum into more bands. This process of changing images into bands can be even in the invisible spectrum. Hence the hyper spectral images can be considered as n-dimensional matrices and each pixel can be regarded as n-dimens ional vector. These images contain various areas with similar characteristics like crop fields, forest area and deserts. To classify such regions one has look for certain features among the captured images. Some similarity measures should be undertaken to make clusters of areas having similar characteristics from the images. Finding the relative similarities in terms of numerical score can be carried out with the help of some standard algorithm. So, feature classification on basis of relative similarities pixel is robust method. In this paper proposing classification of hyper spectral images using Multilayer Perceptron Artificial Neural Network (MLPANN) and Functional Link Artificial Neural Network (FLANN) and their performance is compare in term of accuracy rate.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"27 1","pages":"639-642"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74062008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Device independent activity monitoring using smart handhelds 使用智能手持设备进行设备独立活动监控
Jayita Saha, C. Chowdhury, Supama Biswas
Sensors embedded in smartphones, tabs can be extremely useful in providing reliable information on people's activities and behaviors, thereby ensuring a safe and sound living environment. Activity monitoring through posture identification is increasingly used for medical, surveillance and entertainment (gaming) applications. Major challenges for this task include making the task device independent, use of minimal number of sensors, position of the device, efficient feature extraction etc. Existing works mostly uses one or m ore specific devices for activity monitoring and does not focus on device independence. Ensuring energy efficiency through inexpensive feature extraction technique is another motivation. Consequently, in this paper, a machine learning based activity monitoring framework is proposed that provides device independence using inexpensive time domain features. Implementation of the framework with real devices indicates 96% accuracy with logistic regression when time domain features are used.
嵌入智能手机和标签中的传感器可以非常有用地提供有关人们活动和行为的可靠信息,从而确保安全和健康的生活环境。通过姿势识别的活动监测越来越多地用于医疗、监视和娱乐(游戏)应用。该任务的主要挑战包括使任务设备独立,使用最少数量的传感器,设备的位置,高效的特征提取等。现有的工作大多使用一个或多个特定的设备进行活动监控,而不关注设备的独立性。通过廉价的特征提取技术确保能源效率是另一个动机。因此,本文提出了一种基于机器学习的活动监测框架,该框架使用廉价的时域特征提供设备独立性。该框架在实际设备上的实现表明,当使用时域特征时,逻辑回归的准确率为96%。
{"title":"Device independent activity monitoring using smart handhelds","authors":"Jayita Saha, C. Chowdhury, Supama Biswas","doi":"10.1109/CONFLUENCE.2017.7943184","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943184","url":null,"abstract":"Sensors embedded in smartphones, tabs can be extremely useful in providing reliable information on people's activities and behaviors, thereby ensuring a safe and sound living environment. Activity monitoring through posture identification is increasingly used for medical, surveillance and entertainment (gaming) applications. Major challenges for this task include making the task device independent, use of minimal number of sensors, position of the device, efficient feature extraction etc. Existing works mostly uses one or m ore specific devices for activity monitoring and does not focus on device independence. Ensuring energy efficiency through inexpensive feature extraction technique is another motivation. Consequently, in this paper, a machine learning based activity monitoring framework is proposed that provides device independence using inexpensive time domain features. Implementation of the framework with real devices indicates 96% accuracy with logistic regression when time domain features are used.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"85 1","pages":"406-411"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79325248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Experimental study of IP spoofing attack in 6LoWPAN network 6LoWPAN网络中IP欺骗攻击实验研究
Monali Mavani, Krishna Asawa
6L0WPAN is a communication protocol for Internet of Things. 6LoWPAN is IPv6 protocol modified for low power and lossy personal area networks. 6LoWPAN inherits threats from its predecessors IPv4 and IPv6. IP spoofing is a known attack prevalent in IPv4 and IPv6 networks but there are new vulnerabilities which creates new paths, leading to the attack. This study performs the experimental study to check the feasibility of performing IP spoofing attack on 6LoWPAN Network. Intruder misuses 6LoWPAN control messages which results into wrong IPv6-MAC binding in router. Attack is also simulated in cooja simulator. Simulated results are analyzed for finding cost to the attacker in terms of energy and memory consumption.
6LoWPAN是一种针对物联网的通信协议,是针对低功耗和有损的个人局域网修改的IPv6协议。6LoWPAN继承了其前身IPv4和IPv6的威胁。IP欺骗是IPv4和IPv6网络中普遍存在的一种已知攻击,但存在新的漏洞,这些漏洞会创建新的路径,从而导致攻击。为了验证在6LoWPAN网络上进行IP欺骗攻击的可行性,本研究进行了实验研究。入侵者误用6LoWPAN控制报文,导致路由器IPv6-MAC绑定错误。在cooja模拟器中也模拟了攻击。对仿真结果进行分析,找出攻击者在能量和内存消耗方面的代价。
{"title":"Experimental study of IP spoofing attack in 6LoWPAN network","authors":"Monali Mavani, Krishna Asawa","doi":"10.1109/CONFLUENCE.2017.7943192","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943192","url":null,"abstract":"6L0WPAN is a communication protocol for Internet of Things. 6LoWPAN is IPv6 protocol modified for low power and lossy personal area networks. 6LoWPAN inherits threats from its predecessors IPv4 and IPv6. IP spoofing is a known attack prevalent in IPv4 and IPv6 networks but there are new vulnerabilities which creates new paths, leading to the attack. This study performs the experimental study to check the feasibility of performing IP spoofing attack on 6LoWPAN Network. Intruder misuses 6LoWPAN control messages which results into wrong IPv6-MAC binding in router. Attack is also simulated in cooja simulator. Simulated results are analyzed for finding cost to the attacker in terms of energy and memory consumption.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"54 1","pages":"445-449"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75198727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Post-disaster relief distribution using a two phase bounded heuristic approach 基于两阶段有界启发式方法的灾后救援分配
B. Mishra, K. Dahal, Zeeshan Pervez
Relief logistics distribution to disaster affected areas is crucial that needs quick and effective action. Logistics distribution through an efficient method is essential for easing the impact of the disaster in the affected areas. Disaster is non-deterministic, highly composite and uncertain in nature, therefore, the relief logistics distribution becomes a challenging task. Relief items can be distributed either from a single node or from multiple distributed nodes. Resources available at distributed nodes are not utilized when only single node logistics distribution is used. This paper presents a two-phase bounded heuristic approach for logistics distribution as a response to the post-disaster relief operation. The proposed approach is focused on two major objectives: minimization of unmet demand and travel distance. Simulated disaster scenario is synthesized as a case study for the distribution of relief items. The results indicate that the proposed approach is effective in logistic scheduling. It improves the relief logistics distribution systems in the disasters affected areas by utilizing the resources available at distributed nodes hence leads to decline in unmet demands level with minimum travel time.
救灾物资配送到受灾地区至关重要,需要迅速有效的行动。通过高效的物流配送方式,对缓解受灾地区的灾害影响至关重要。灾害具有不确定性、高度复合性和不确定性,救灾物流配送成为一项具有挑战性的任务。救济项目可以从单个节点分发,也可以从多个分布式节点分发。当只使用单节点物流配送时,分布式节点上可用的资源没有被利用。本文提出了一种两阶段有界启发式方法,用于响应灾后救援行动的物流配送。建议的方法侧重于两个主要目标:最大限度地减少未满足的需求和旅行距离。综合模拟灾害情景,作为救灾物资分配的案例研究。结果表明,该方法在物流调度中是有效的。它通过利用分布式节点的可用资源,改善受灾地区的救灾物流配送系统,从而以最小的出行时间降低未满足的需求水平。
{"title":"Post-disaster relief distribution using a two phase bounded heuristic approach","authors":"B. Mishra, K. Dahal, Zeeshan Pervez","doi":"10.1109/CONFLUENCE.2017.7943139","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943139","url":null,"abstract":"Relief logistics distribution to disaster affected areas is crucial that needs quick and effective action. Logistics distribution through an efficient method is essential for easing the impact of the disaster in the affected areas. Disaster is non-deterministic, highly composite and uncertain in nature, therefore, the relief logistics distribution becomes a challenging task. Relief items can be distributed either from a single node or from multiple distributed nodes. Resources available at distributed nodes are not utilized when only single node logistics distribution is used. This paper presents a two-phase bounded heuristic approach for logistics distribution as a response to the post-disaster relief operation. The proposed approach is focused on two major objectives: minimization of unmet demand and travel distance. Simulated disaster scenario is synthesized as a case study for the distribution of relief items. The results indicate that the proposed approach is effective in logistic scheduling. It improves the relief logistics distribution systems in the disasters affected areas by utilizing the resources available at distributed nodes hence leads to decline in unmet demands level with minimum travel time.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"49 1","pages":"143-148"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75212224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis of frequency domain based feature extraction techniques for facial expression recognition 基于频域特征提取技术的面部表情识别性能分析
Neha Janu, Pratistha Mathur, S. Gupta, S. Agrwal
Facial Expression Recognition is a vital topic for research in current scenario which has many applications as machine based HR interviews and human-machine interaction. Facial Expression recognition is applied for identification of person using face of a person. Researchers have proposed many research techniques for facial expression recognition but still accuracy, illumination and occlusion are the research issues which have to improve. Key Research issue of facial expression is improving the accuracy of system which is measured in term of recognition rate. Feature extraction is the main stage on which accuracy depends for facial expression recognition. In this paper we have analyzed different feature extraction technique in frequency domain as Discrete Wavelet Transform, Discrete Cosine Transform feature extraction technique, Gabor filter and different feature reduction technique developed so far and future aspects.
面部表情识别是当前场景下的一个重要研究课题,在基于机器的人力资源面试和人机交互等领域有着广泛的应用。面部表情识别是一种利用人脸识别人的方法。研究人员提出了许多面部表情识别的研究方法,但准确性、光照和遮挡等仍是有待提高的研究问题。面部表情的研究重点是提高系统的准确率,以识别率为衡量标准。特征提取是人脸表情识别的主要环节,其准确性取决于特征提取的准确性。本文分析了频域上不同的特征提取技术,如离散小波变换、离散余弦变换特征提取技术、Gabor滤波器和目前发展起来的各种特征约简技术以及未来的发展方向。
{"title":"Performance analysis of frequency domain based feature extraction techniques for facial expression recognition","authors":"Neha Janu, Pratistha Mathur, S. Gupta, S. Agrwal","doi":"10.1109/CONFLUENCE.2017.7943220","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943220","url":null,"abstract":"Facial Expression Recognition is a vital topic for research in current scenario which has many applications as machine based HR interviews and human-machine interaction. Facial Expression recognition is applied for identification of person using face of a person. Researchers have proposed many research techniques for facial expression recognition but still accuracy, illumination and occlusion are the research issues which have to improve. Key Research issue of facial expression is improving the accuracy of system which is measured in term of recognition rate. Feature extraction is the main stage on which accuracy depends for facial expression recognition. In this paper we have analyzed different feature extraction technique in frequency domain as Discrete Wavelet Transform, Discrete Cosine Transform feature extraction technique, Gabor filter and different feature reduction technique developed so far and future aspects.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"44 1","pages":"591-594"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73788181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementation of K-means clustering in ECB framework of cloud computing environment 云计算环境下ECB框架中K-means聚类的实现
Stobak Dutta, S. Sengupta
In today's scenario Cloud computing technology has emerged to manage large data sets efficiently. Large amount of data is created everyday now a days hence there is a demand of running data mining algorithm on very large data sets. As there is recent fast increase in number of clouds and their services Cloud computing technology has gained more importance. To perform data mining it is required to merge distributed data and perform mining algorithm in it. This paper presents a way to implement K-Means clustering algorithm for service discovery in the Enterprise Cloud Bus architecture.
在今天的场景中,云计算技术的出现是为了有效地管理大型数据集。现在每天都有大量的数据产生,因此需要在非常大的数据集上运行数据挖掘算法。随着近年来云计算及其服务数量的快速增长,云计算技术变得越来越重要。为了进行数据挖掘,需要对分布式数据进行合并,并在其中执行挖掘算法。本文提出了一种在企业云总线架构中实现K-Means聚类算法用于服务发现的方法。
{"title":"Implementation of K-means clustering in ECB framework of cloud computing environment","authors":"Stobak Dutta, S. Sengupta","doi":"10.1109/CONFLUENCE.2017.7943165","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943165","url":null,"abstract":"In today's scenario Cloud computing technology has emerged to manage large data sets efficiently. Large amount of data is created everyday now a days hence there is a demand of running data mining algorithm on very large data sets. As there is recent fast increase in number of clouds and their services Cloud computing technology has gained more importance. To perform data mining it is required to merge distributed data and perform mining algorithm in it. This paper presents a way to implement K-Means clustering algorithm for service discovery in the Enterprise Cloud Bus architecture.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"9 1","pages":"293-297"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82303852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1