首页 > 最新文献

2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence最新文献

英文 中文
Hindi handwritten character recognition using multiple classifiers 使用多个分类器的印地语手写字符识别
Madhuri Yadav, R. Purwar
Humans can easily recognize handwritten words, after gaining basic knowledge of languages. This knowledge needs to be transferred to computers for automatic character recognition. The work proposed in this paper tries to automate recognition of handwritten hindi isolated characters using multiple classifiers. For feature extraction, it uses histogram of oriented gradients as one feature and profile projection histogram as another feature. The performance of various classifiers has been evaluated using theses features experimentally and quadratic SVM has been found to produce better results.
在获得基本的语言知识之后,人类可以很容易地识别手写的单词。这些知识需要转移到计算机上进行自动字符识别。本文提出的工作试图使用多个分类器自动识别手写印地语孤立字符。在特征提取方面,采用梯度方向直方图作为特征,轮廓投影直方图作为特征。利用这些特征对各种分类器的性能进行了实验评估,发现二次支持向量机产生了更好的结果。
{"title":"Hindi handwritten character recognition using multiple classifiers","authors":"Madhuri Yadav, R. Purwar","doi":"10.1109/CONFLUENCE.2017.7943140","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943140","url":null,"abstract":"Humans can easily recognize handwritten words, after gaining basic knowledge of languages. This knowledge needs to be transferred to computers for automatic character recognition. The work proposed in this paper tries to automate recognition of handwritten hindi isolated characters using multiple classifiers. For feature extraction, it uses histogram of oriented gradients as one feature and profile projection histogram as another feature. The performance of various classifiers has been evaluated using theses features experimentally and quadratic SVM has been found to produce better results.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"57 1","pages":"149-154"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77061677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
License plate localization based on Kapur optimal multilevel threshold 基于Kapur最优多级阈值的车牌定位
Nur Aliyatul Husna Bt Yahya, S. Abdullah, Abbas Salimi Zaini, Mohd Zamri Murah, A. Abdullah, Shariffpudin Basiron
A license plate localization system is useful for many applications. Due to ambient of lighting in three distinct situation which are morning, afternoon and night causing difficulty to search optimum threshold value in each situation. This research uses global thresholding approach by using Kapur entropy multilevel threshold based on Patch-Levy Bees Algorithm (PLBA). As a result, the system properly localize and identify number plate in the image by using proposed segmentation image. From the experiment, proposed method are achieve accuracy rates to 67.68%, 90.71%, 24.34% respectively for morning, afternoon and night dataset.
车牌定位系统在许多应用中都很有用。由于在三种不同情况下的照明环境,即早上,下午和晚上,导致难以在每种情况下搜索最佳阈值。本研究采用基于Patch-Levy Bees算法(PLBA)的Kapur熵多层阈值的全局阈值方法。结果表明,该系统利用所提出的分割图像对图像中的车牌进行了正确的定位和识别。实验结果表明,该方法在早晨、下午和夜间数据集上的准确率分别达到67.68%、90.71%和24.34%。
{"title":"License plate localization based on Kapur optimal multilevel threshold","authors":"Nur Aliyatul Husna Bt Yahya, S. Abdullah, Abbas Salimi Zaini, Mohd Zamri Murah, A. Abdullah, Shariffpudin Basiron","doi":"10.1109/CONFLUENCE.2017.7943127","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943127","url":null,"abstract":"A license plate localization system is useful for many applications. Due to ambient of lighting in three distinct situation which are morning, afternoon and night causing difficulty to search optimum threshold value in each situation. This research uses global thresholding approach by using Kapur entropy multilevel threshold based on Patch-Levy Bees Algorithm (PLBA). As a result, the system properly localize and identify number plate in the image by using proposed segmentation image. From the experiment, proposed method are achieve accuracy rates to 67.68%, 90.71%, 24.34% respectively for morning, afternoon and night dataset.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"10 9 1","pages":"77-81"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80625501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymmetric encryption based secure and efficient data gathering technique in VANET 基于非对称加密的VANET安全高效数据采集技术
A. Malik, Babita Pandey
Data gathering is big challenging problem in Vehicular ad hoc Network (VANET). To overcome this problem, plenty of data gathering techniques have been proposed. None of the technique provides security in the process of gathering of data from vehicles to RSUs. The primary objective of this paper is to propose a secure as well as efficient data gathering technique that provides security and confidentiality to the gathering of data from vehicles to RSUs and vice versa. Performance of the data gathering technique proposed is evaluated by comparing the proposed technique with the existing data gathering techniques on the basis of message delivery ratio (MDR), average delay and computational overhead. Results of simulation assure that the data gathering technique proposed performs better in comparison to existing data gathering technique.
数据采集是车载自组织网络(VANET)中的一大难题。为了克服这个问题,人们提出了许多数据收集技术。在从车辆到rsu的数据收集过程中,这些技术都没有提供安全性。本文的主要目标是提出一种安全有效的数据收集技术,为从车辆到rsu的数据收集提供安全性和保密性,反之亦然。基于消息传递比(MDR)、平均延迟和计算开销,将所提出的数据采集技术与现有的数据采集技术进行比较,对所提出的数据采集技术的性能进行了评价。仿真结果表明,与现有的数据采集技术相比,所提出的数据采集技术具有更好的性能。
{"title":"Asymmetric encryption based secure and efficient data gathering technique in VANET","authors":"A. Malik, Babita Pandey","doi":"10.1109/CONFLUENCE.2017.7943177","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943177","url":null,"abstract":"Data gathering is big challenging problem in Vehicular ad hoc Network (VANET). To overcome this problem, plenty of data gathering techniques have been proposed. None of the technique provides security in the process of gathering of data from vehicles to RSUs. The primary objective of this paper is to propose a secure as well as efficient data gathering technique that provides security and confidentiality to the gathering of data from vehicles to RSUs and vice versa. Performance of the data gathering technique proposed is evaluated by comparing the proposed technique with the existing data gathering techniques on the basis of message delivery ratio (MDR), average delay and computational overhead. Results of simulation assure that the data gathering technique proposed performs better in comparison to existing data gathering technique.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"94 1","pages":"369-372"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79589824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A survey: Cloud hosted website protection using soft computing techniques 一项调查:使用软计算技术的云托管网站保护
S. Bhingarkar, D. Shah
Several vendors opt for Cloud based website hosting nowadays, as it is very trustworthy, easily scalable and reasonable hosting solution than traditional website hosting in various aspects. The most common attacks carried out currently against web application are SQL injection. Cross Site Scripting (XSS), Distributed Denial of Service (DDoS) and Cross Site Request Forgery (CSRF). Distributed Denial-of-service (DDoS) attack is one of the major web security attacks to the cloud hosted websites. Hence, this paper mainly concentrates upon soft computing techniques used so far against such attack. The most straightforward way to carry out the attack is through botnet. The malicious HTTP traffic generated by an attacker imitates to be genuine and hence go undetected. Nowadays, different soft computing techniques are used as a tool to detect malicious traffic. This paper presents a review of these techniques implemented so far that differentiate between genuine and malicious traffic. Economic Denial of Sustainability (EDoS) is a special sort ο f DDoS attack that exploits cloud's pay-as-you-go model. The attacker generates anomalous HTTP requests that cause up scaling of the architecture and this puts financial burden over website owner. This paper tries to realize whether existing techniques can be used for defending EDoS attack and it also points out research directions in this field.
一些供应商选择基于云的网站托管,因为它是非常值得信赖的,易于扩展和合理的托管解决方案比传统的网站托管在各个方面。目前针对web应用程序的最常见的攻击是SQL注入。跨站脚本(XSS),分布式拒绝服务(DDoS)和跨站请求伪造(CSRF)。分布式拒绝服务(DDoS)攻击是针对云托管网站的主要网络安全攻击之一。因此,本文主要侧重于迄今为止针对此类攻击所使用的软计算技术。最直接的攻击方式是通过僵尸网络。攻击者生成的恶意HTTP流量被伪装成真实流量,因此无法被检测到。目前,各种软计算技术被用作检测恶意流量的工具。本文介绍了迄今为止实现的这些区分真实和恶意流量的技术。经济可持续性拒绝(EDoS)是一种特殊类型的DDoS攻击,它利用了云的即用即付模式。攻击者生成异常的HTTP请求,导致架构的扩展,这给网站所有者带来了经济负担。本文试图了解现有技术是否可以用于防御dos攻击,并指出了该领域的研究方向。
{"title":"A survey: Cloud hosted website protection using soft computing techniques","authors":"S. Bhingarkar, D. Shah","doi":"10.1109/CONFLUENCE.2017.7943170","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943170","url":null,"abstract":"Several vendors opt for Cloud based website hosting nowadays, as it is very trustworthy, easily scalable and reasonable hosting solution than traditional website hosting in various aspects. The most common attacks carried out currently against web application are SQL injection. Cross Site Scripting (XSS), Distributed Denial of Service (DDoS) and Cross Site Request Forgery (CSRF). Distributed Denial-of-service (DDoS) attack is one of the major web security attacks to the cloud hosted websites. Hence, this paper mainly concentrates upon soft computing techniques used so far against such attack. The most straightforward way to carry out the attack is through botnet. The malicious HTTP traffic generated by an attacker imitates to be genuine and hence go undetected. Nowadays, different soft computing techniques are used as a tool to detect malicious traffic. This paper presents a review of these techniques implemented so far that differentiate between genuine and malicious traffic. Economic Denial of Sustainability (EDoS) is a special sort ο f DDoS attack that exploits cloud's pay-as-you-go model. The attacker generates anomalous HTTP requests that cause up scaling of the architecture and this puts financial burden over website owner. This paper tries to realize whether existing techniques can be used for defending EDoS attack and it also points out research directions in this field.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"25 1","pages":"325-330"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82227621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey on secure gateway discovery in MANET MANET中安全网关发现技术综述
Jaweria Usmani, Rakesh Kumar, J. Prakash
Mobile adhoc network (MANET) is a collection of mobile node that can communicate with each other via radio or infra without any fixed infrastructure. MANET is a wireless network so to connect with internet any interface is needed that is called gateway which provide route to the internet. Due to dynamic topology packets are loss which degrades network operation. So to achieved high throughput security scheme are applied on internet gateway which helps to out from adversarial environment. There are some security goal is discussed (confidentiality, integrity, authentication and non-repudiation) which enhanced adhoc network operation. In this paper we survey on the gateway discovery scheme with security and without security on the basis of various performance parameter like packet delivery ratio, end to end delay, routing overhead and throughput and then conclude which one is better.
移动自组织网络(MANET)是一种移动节点的集合,它可以在没有任何固定基础设施的情况下通过无线电或基础设施相互通信。MANET是一种无线网络,因此要与互联网连接,需要任何被称为网关的接口,它提供到互联网的路由。由于动态拓扑导致报文丢失,影响网络的正常运行。因此,为了实现高吞吐量,在互联网网关上应用了安全方案,有助于从敌对环境中脱离出来。讨论了一些安全目标(保密性、完整性、认证和不可抵赖性),增强了自组网的运行。本文从数据包传输率、端到端延迟、路由开销和吞吐量等性能参数出发,对安全网关发现方案和不安全网关发现方案进行了比较,得出了哪种方案更好。
{"title":"A survey on secure gateway discovery in MANET","authors":"Jaweria Usmani, Rakesh Kumar, J. Prakash","doi":"10.1109/CONFLUENCE.2017.7943176","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943176","url":null,"abstract":"Mobile adhoc network (MANET) is a collection of mobile node that can communicate with each other via radio or infra without any fixed infrastructure. MANET is a wireless network so to connect with internet any interface is needed that is called gateway which provide route to the internet. Due to dynamic topology packets are loss which degrades network operation. So to achieved high throughput security scheme are applied on internet gateway which helps to out from adversarial environment. There are some security goal is discussed (confidentiality, integrity, authentication and non-repudiation) which enhanced adhoc network operation. In this paper we survey on the gateway discovery scheme with security and without security on the basis of various performance parameter like packet delivery ratio, end to end delay, routing overhead and throughput and then conclude which one is better.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"4 1","pages":"362-368"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82440570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Handling non-functional requirements for big data and IOT projects in Scrum 在Scrum中处理大数据和物联网项目的非功能需求
Vaibhav Sachdeva, L. Chung
Agile methodologies are gaining popularity at a lightning pace in the software industry. Prominent agile methodologies, such as Scrum and Extreme Programming (XP), help quickly deliver a system that meets Functional Requirements (FRs), while adapting to the changes in the customer requirements and feedback. However, Non-Functional Requirements (NFRs) by and large have been either mostly ignored or introduced and retrofit late in the software development cycle, oftentimes leading to project failures. With the recent, increasing shifts towards cloud and emphasis in big data in the software industry, NFRs, such as security and performance, have become more critical than ever before. This research proposes a novel approach to handling security and performance NFRs for projects involving big data and cloud, using Scrum. An industrial case study, conducted over a span of 9 months, shows that the approach helps deal with security and performance requirements individually as well as conflicts between them in an agile methodology.
敏捷方法在软件行业正以闪电般的速度流行起来。突出的敏捷方法,如Scrum和极限编程(XP),有助于快速交付满足功能需求(FRs)的系统,同时适应客户需求和反馈的变化。然而,总的来说,非功能需求(NFRs)要么被忽略,要么在软件开发周期的后期被引入和改造,这常常导致项目失败。随着近年来软件行业越来越多地转向云计算和强调大数据,安全和性能等nfr变得比以往任何时候都更加重要。这项研究提出了一种新的方法来处理涉及大数据和云的项目的安全性和性能nfr,使用Scrum。一个为期9个月的工业案例研究表明,该方法有助于在敏捷方法中分别处理安全性和性能需求,以及它们之间的冲突。
{"title":"Handling non-functional requirements for big data and IOT projects in Scrum","authors":"Vaibhav Sachdeva, L. Chung","doi":"10.1109/CONFLUENCE.2017.7943152","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943152","url":null,"abstract":"Agile methodologies are gaining popularity at a lightning pace in the software industry. Prominent agile methodologies, such as Scrum and Extreme Programming (XP), help quickly deliver a system that meets Functional Requirements (FRs), while adapting to the changes in the customer requirements and feedback. However, Non-Functional Requirements (NFRs) by and large have been either mostly ignored or introduced and retrofit late in the software development cycle, oftentimes leading to project failures. With the recent, increasing shifts towards cloud and emphasis in big data in the software industry, NFRs, such as security and performance, have become more critical than ever before. This research proposes a novel approach to handling security and performance NFRs for projects involving big data and cloud, using Scrum. An industrial case study, conducted over a span of 9 months, shows that the approach helps deal with security and performance requirements individually as well as conflicts between them in an agile methodology.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"1965 1","pages":"216-221"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82730052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Contrastive study of Simple PageRank, HITS and Weighted PageRank algorithms: Review 简单PageRank、HITS和加权PageRank算法的对比研究
T. Sen, D. K. Chaudhary
Web mining is a very important research subject. It's basically an application of data mining to find concealed information on web. Internet has been providing us with boundless source of information according to our need. In recent times search tools have emerged as one of the requisite tools for person who do navigation on net or rely on web. But with expanding usage of net, it is stretching hastily in its material. With this reckless augmentation in information material, there comes a daunting task in organizing the information according to people's demands. The plight is like “drowning in data but starving for knowledge”. So to avoid the challenging scenario we have techniques to extract or filter information which have great relevance to user's query. This paper actually deals with some of those algorithms and their comparative exploration based on various parameters which will succeed in removing difficulty in ranking appropriate content to user. Techniques that has been discussed here with apt example are Simple PageRank which is based on link structure mainly forward links mainly followed by Google after that Weighted PageRank has been explained which also based on link approach but here both backward and forward links are used to rank the pages, finally HITS (Hypertext Induced Topic Search) has been scrutinized which work on both content and link structure ofweb.
Web挖掘是一个非常重要的研究课题。它基本上是一种数据挖掘的应用,用于发现网络上隐藏的信息。互联网已经根据我们的需要为我们提供了无限的信息来源。近年来,搜索工具已经成为人们在网络上导航或依赖网络的必备工具之一。但随着网的使用范围的扩大,网的材质也在急速拉伸。随着信息材料的大量增加,根据人们的需求来组织信息的任务是艰巨的。这种困境就像“淹没在数据中,却渴望知识”。因此,为了避免具有挑战性的场景,我们有技术来提取或过滤与用户查询有很大相关性的信息。本文对其中的一些算法进行了实际的研究,并基于各种参数对它们进行了比较探索,从而成功地消除了对用户进行合适内容排序的困难。这里用恰当的例子讨论的技术是基于链接结构的简单PageRank,主要是转发链接,其次是谷歌,加权PageRank已经解释了,也是基于链接方法,但这里向后和向前链接都用来对页面进行排名,最后HITS(超文本诱导主题搜索)已经被仔细审查,它对网页的内容和链接结构都有效。
{"title":"Contrastive study of Simple PageRank, HITS and Weighted PageRank algorithms: Review","authors":"T. Sen, D. K. Chaudhary","doi":"10.1109/CONFLUENCE.2017.7943245","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943245","url":null,"abstract":"Web mining is a very important research subject. It's basically an application of data mining to find concealed information on web. Internet has been providing us with boundless source of information according to our need. In recent times search tools have emerged as one of the requisite tools for person who do navigation on net or rely on web. But with expanding usage of net, it is stretching hastily in its material. With this reckless augmentation in information material, there comes a daunting task in organizing the information according to people's demands. The plight is like “drowning in data but starving for knowledge”. So to avoid the challenging scenario we have techniques to extract or filter information which have great relevance to user's query. This paper actually deals with some of those algorithms and their comparative exploration based on various parameters which will succeed in removing difficulty in ranking appropriate content to user. Techniques that has been discussed here with apt example are Simple PageRank which is based on link structure mainly forward links mainly followed by Google after that Weighted PageRank has been explained which also based on link approach but here both backward and forward links are used to rank the pages, finally HITS (Hypertext Induced Topic Search) has been scrutinized which work on both content and link structure ofweb.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"20 1","pages":"721-727"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83331604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rural communication enhancement using mobile ad-hoc network 利用移动自组网增强农村通信
K. K. Paliwal, Surjeet Singh, Suman Bajaj
Mobile Ad hoc network(MANET) are group of devices which are equipped with tiny processor, transreceiver and small power supply battery. Mobile nodes are capable to communicate to another mobile node through single hope communication or multihop communication via relay nodes. In rural area the coverage of network is very poor. There are lot of problems in rural area for robust and secure communication. To reduce this problem of poor communication increase the radio frequency range and design an algorithm for shortest path multihop communication. If the distance of mobile devices increases from the base station then mobile devices consumes more energy because energy consumption is directly proportional to distance. For overcome the power supply problem in rural area design an appropriate algorithm for maximizing the network life time of backbone infrastructure network. The base station maintains the level of energy of all mobile devices and using the information of all the device base station is capable of predict the shortest path among the mobile devices.
移动自组网(MANET)是一组配备微型处理器、收发器和小型电源电池的设备。移动节点能够通过通过中继节点的单希望通信或多跳通信与另一移动节点通信。在农村地区,网络的覆盖率很低。在农村地区,通信的鲁棒性和安全性还存在很多问题。为了减少这种通信不良的问题,增加了无线电频率范围,并设计了一种最短路径多跳通信算法。如果移动设备与基站的距离增加,那么移动设备消耗的能量就会增加,因为能量消耗与距离成正比。为解决农村地区的供电问题,设计一种合理的算法,使骨干基础设施网络的网络寿命最大化。基站维持所有移动设备的能量水平,利用所有设备的信息基站能够预测移动设备之间的最短路径。
{"title":"Rural communication enhancement using mobile ad-hoc network","authors":"K. K. Paliwal, Surjeet Singh, Suman Bajaj","doi":"10.1109/CONFLUENCE.2017.7943180","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943180","url":null,"abstract":"Mobile Ad hoc network(MANET) are group of devices which are equipped with tiny processor, transreceiver and small power supply battery. Mobile nodes are capable to communicate to another mobile node through single hope communication or multihop communication via relay nodes. In rural area the coverage of network is very poor. There are lot of problems in rural area for robust and secure communication. To reduce this problem of poor communication increase the radio frequency range and design an algorithm for shortest path multihop communication. If the distance of mobile devices increases from the base station then mobile devices consumes more energy because energy consumption is directly proportional to distance. For overcome the power supply problem in rural area design an appropriate algorithm for maximizing the network life time of backbone infrastructure network. The base station maintains the level of energy of all mobile devices and using the information of all the device base station is capable of predict the shortest path among the mobile devices.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"30 1","pages":"387-391"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89424801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effect of thickness of substrate on antenna design for advance communication 基板厚度对超前通信天线设计的影响
S. Dwivedi
Present paper is fully dedicated for antenna design for advance communication systems. Substrate thickness has been taken as key role for antenna performance characteristics. Rectangular microstrip antenna with fractal over the patch is considered with height of substrate, and compared with thickness for improve return loss and efficiency. Results obtained with the help of commercial software CST microwave studio for frequency range 2–4 GHz. Improvement in return loss is found −46.8 dB and VSWR 1.005 dB as compared to −45.7 dB and 1.008 dB.
本文主要研究先进通信系统的天线设计。基片厚度是影响天线性能的关键因素。考虑了矩形微带天线在贴片上的分形,并将其与衬底的厚度进行了比较,以提高回波损耗和效率。在商业软件CST微波工作室的帮助下,频率范围为2-4 GHz。与- 45.7 dB和1.008 dB相比,回波损耗和VSWR分别改善了- 46.8 dB和1.005 dB。
{"title":"Effect of thickness of substrate on antenna design for advance communication","authors":"S. Dwivedi","doi":"10.1109/CONFLUENCE.2017.7943254","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943254","url":null,"abstract":"Present paper is fully dedicated for antenna design for advance communication systems. Substrate thickness has been taken as key role for antenna performance characteristics. Rectangular microstrip antenna with fractal over the patch is considered with height of substrate, and compared with thickness for improve return loss and efficiency. Results obtained with the help of commercial software CST microwave studio for frequency range 2–4 GHz. Improvement in return loss is found −46.8 dB and VSWR 1.005 dB as compared to −45.7 dB and 1.008 dB.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"6 1","pages":"770-774"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73884188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Crowdsourced software development: Exploring the motivational and inhibiting factors of the South African crowd 众包软件开发:探索南非人群的激励和抑制因素
Floyd Moodley, J. Van Belle, Nitasha Hasteer
This research paper explores what factors contribute to software developers in South Africa taking part in crowdsourced software development. These factors include motivations as well as challenges and this research takes an in depth look at what incentives affect the different motives to participate in crowdsourcing. To explore these factors, the Motives, Incentives, Activation, and Behaviour (MIAB) research has been adapted to investigate what incentives contribute to the motivations of money, pleasure, self-efficacy, and altruism. The research analyses data from respondents that are either software developers or work in software development and comes to the conclusion that there are various incentives that contribute to the different motives for taking part in crowdsourced software development, however, for developers in South Africa, pleasure, self-efficacy, and altruism seem to be more important than that of receiving income for crowdsourcing tasks.
这篇研究论文探讨了促使南非软件开发人员参与众包软件开发的因素。这些因素包括动机和挑战,本研究深入探讨了是什么激励因素影响了参与众包的不同动机。为了探索这些因素,动机、激励、激活和行为(MIAB)研究被用于调查是什么激励因素促成了金钱、快乐、自我效能和利他主义的动机。该研究分析了来自软件开发人员或从事软件开发工作的受访者的数据,得出的结论是,参与众包软件开发的不同动机有各种各样的激励因素,然而,对于南非的开发人员来说,快乐、自我效能和利他主义似乎比通过众包任务获得收入更重要。
{"title":"Crowdsourced software development: Exploring the motivational and inhibiting factors of the South African crowd","authors":"Floyd Moodley, J. Van Belle, Nitasha Hasteer","doi":"10.1109/CONFLUENCE.2017.7943233","DOIUrl":"https://doi.org/10.1109/CONFLUENCE.2017.7943233","url":null,"abstract":"This research paper explores what factors contribute to software developers in South Africa taking part in crowdsourced software development. These factors include motivations as well as challenges and this research takes an in depth look at what incentives affect the different motives to participate in crowdsourcing. To explore these factors, the Motives, Incentives, Activation, and Behaviour (MIAB) research has been adapted to investigate what incentives contribute to the motivations of money, pleasure, self-efficacy, and altruism. The research analyses data from respondents that are either software developers or work in software development and comes to the conclusion that there are various incentives that contribute to the different motives for taking part in crowdsourced software development, however, for developers in South Africa, pleasure, self-efficacy, and altruism seem to be more important than that of receiving income for crowdsourcing tasks.","PeriodicalId":6651,"journal":{"name":"2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence","volume":"16 1","pages":"656-661"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72754922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1