首页 > 最新文献

2021 RIVF International Conference on Computing and Communication Technologies (RIVF)最新文献

英文 中文
A limelight on routing techniques in Wireless Sensor Networks with node mobility 具有节点移动性的无线传感器网络中的路由技术
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066711
M. Ramana Rao, T. Adilakshmi
Routing in Wireless Sensor Networks (WSNs) is an emerging research area. This paper presents a survey of routing techniques in WSNs which support node mobility. In recent years, advancement in WSNs lead to the development of many routing protocols specifically designed for WSNs. The routing protocols discussed in this paper in general can be four main category such as Network structure, Communication model, Topology based and reliable routing. Existing routing protocols in WSNs mostly addresses static nodes. This paper presents routing protocols which support Node mobility and compares them with certain criteria. Finally, the paper concludes with future research related to network layer issues such as routing with node mobility.
无线传感器网络中的路由是一个新兴的研究领域。本文综述了支持节点移动的无线传感器网络中的路由技术。近年来,随着无线传感器网络的发展,出现了许多专门为无线传感器网络设计的路由协议。本文所讨论的路由协议大致可以分为网络结构、通信模型、基于拓扑和可靠路由四大类。现有的无线传感器网络路由协议主要针对静态节点。本文提出了支持节点移动的路由协议,并与一定的标准进行了比较。最后,对节点移动路由等网络层相关问题的未来研究进行了总结。
{"title":"A limelight on routing techniques in Wireless Sensor Networks with node mobility","authors":"M. Ramana Rao, T. Adilakshmi","doi":"10.1109/ICCCT2.2014.7066711","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066711","url":null,"abstract":"Routing in Wireless Sensor Networks (WSNs) is an emerging research area. This paper presents a survey of routing techniques in WSNs which support node mobility. In recent years, advancement in WSNs lead to the development of many routing protocols specifically designed for WSNs. The routing protocols discussed in this paper in general can be four main category such as Network structure, Communication model, Topology based and reliable routing. Existing routing protocols in WSNs mostly addresses static nodes. This paper presents routing protocols which support Node mobility and compares them with certain criteria. Finally, the paper concludes with future research related to network layer issues such as routing with node mobility.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"44 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76905591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach to identify unobvious entities from real time and offline video streaming 一种从实时和离线视频流中识别不明显实体的新方法
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066728
N. Pujari, M. Kothari
Security and its related ecosystem have always been given priority in the form of procedures, policies, technology and research. Technology as an assisting component in case of security plays a major role in identifying lapses, loopholes and thus prevent situations to turn into catastrophes. Video surveillance these days has gained significant importance for keeping any place secure. Video cameras are being installed in public places such as malls, theatres, railway stations, super markets, airports and so on. Security personnel monitor these camera feeds from the control centre to observe unobvious entities and manually label the suspected frames. This sometimes turn into lapses due to oversight, fatigue, and negligence because of manual surveillance. This work carried out attempts to overcome these limitations by automating identification of unobvious entities from real time and offline video streams by using the proposed computer vision algorithm. It also proposes to indicate the relative suspicious activity in each frame on a scale of 1 to 10 using the concept of suspectMeter. In addition this algorithm also proposes to reduce the space required for storing suspected frame(s).
安全及其相关生态系统一直以程序、政策、技术和研究的形式得到优先考虑。技术作为安全方面的辅助组成部分,在识别失误和漏洞,从而防止局势变成灾难方面发挥着重要作用。如今,视频监控对于保证任何地方的安全都具有重要意义。摄像机被安装在公共场所,如商场、剧院、火车站、超市、机场等。安全人员从控制中心监控这些摄像头的馈送,观察不明显的实体,并手动标记可疑的帧。这有时会由于疏忽、疲劳和人工监督的疏忽而导致失误。这项工作试图通过使用所提出的计算机视觉算法自动识别实时和离线视频流中的不明显实体来克服这些限制。它还建议使用怀疑计量的概念在1到10的范围内表示每帧中的相对可疑活动。此外,该算法还提出减少存储可疑帧所需的空间。
{"title":"A novel approach to identify unobvious entities from real time and offline video streaming","authors":"N. Pujari, M. Kothari","doi":"10.1109/ICCCT2.2014.7066728","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066728","url":null,"abstract":"Security and its related ecosystem have always been given priority in the form of procedures, policies, technology and research. Technology as an assisting component in case of security plays a major role in identifying lapses, loopholes and thus prevent situations to turn into catastrophes. Video surveillance these days has gained significant importance for keeping any place secure. Video cameras are being installed in public places such as malls, theatres, railway stations, super markets, airports and so on. Security personnel monitor these camera feeds from the control centre to observe unobvious entities and manually label the suspected frames. This sometimes turn into lapses due to oversight, fatigue, and negligence because of manual surveillance. This work carried out attempts to overcome these limitations by automating identification of unobvious entities from real time and offline video streams by using the proposed computer vision algorithm. It also proposes to indicate the relative suspicious activity in each frame on a scale of 1 to 10 using the concept of suspectMeter. In addition this algorithm also proposes to reduce the space required for storing suspected frame(s).","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"68 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90955060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combined censoring and weighted fusion based spectrum sensing with improved energy detector 基于改进能量检测器的联合滤波和加权融合频谱传感
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066710
S. Nallagonda, Mahendar Gajula, Sanjay Dhar Roy, S. Kundu
In the present article, the cooperative spectrum sensing with a weighted fusion (WCSS) scheme has been analyzed in Rayleigh fading. Cognitive radio (CR) uses an improved energy detector (IED) with several antennas. Antenna selection diversity combining (SC) is performed at each CR on the basis of the values of decision statistics measured from different antennas at IED. Every CR takes 1-bit decision regarding primary user (PU) and sends its decision to fusion center (FC) with binary phase shift keying (BPSK) signaling if FC selects that CR to send. The FC estimates weight factors of selected CRs with the help of a profile of average SNRs and incorporated with decisions of each selected CR. The missed detection performance is evaluated for different values of improved detector parameter with different number of antennas, average SNRs of sensing (S) and reporting (R) channels. WCSS with censoring performance is also analyzed for perfect and imperfect estimation cases. Combined censoring and weighted fusion significantly improves the spectrum sensing performance.
本文分析了基于加权融合的瑞利衰落协同频谱感知方案。认知无线电(CR)使用一种改进的带有多个天线的能量探测器(IED)。天线选择分集组合(Antenna selection diversity combine, SC)是基于IED中不同天线的决策统计量进行的。每个CR对主用户(PU)进行1位决策,如果FC选择发送该CR,则通过二进制相移键控(BPSK)信令将其决策发送给融合中心(FC)。FC利用平均信噪比曲线估计所选CR的权重因子,并结合每个所选CR的决策,对不同天线数、感知(S)和报告(R)通道的平均信噪比下改进的检测器参数的不同值进行漏检性能评估。同时分析了具有过滤性能的WCSS的完美估计和不完美估计情况。结合滤波和加权融合,显著提高了频谱感知性能。
{"title":"Combined censoring and weighted fusion based spectrum sensing with improved energy detector","authors":"S. Nallagonda, Mahendar Gajula, Sanjay Dhar Roy, S. Kundu","doi":"10.1109/ICCCT2.2014.7066710","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066710","url":null,"abstract":"In the present article, the cooperative spectrum sensing with a weighted fusion (WCSS) scheme has been analyzed in Rayleigh fading. Cognitive radio (CR) uses an improved energy detector (IED) with several antennas. Antenna selection diversity combining (SC) is performed at each CR on the basis of the values of decision statistics measured from different antennas at IED. Every CR takes 1-bit decision regarding primary user (PU) and sends its decision to fusion center (FC) with binary phase shift keying (BPSK) signaling if FC selects that CR to send. The FC estimates weight factors of selected CRs with the help of a profile of average SNRs and incorporated with decisions of each selected CR. The missed detection performance is evaluated for different values of improved detector parameter with different number of antennas, average SNRs of sensing (S) and reporting (R) channels. WCSS with censoring performance is also analyzed for perfect and imperfect estimation cases. Combined censoring and weighted fusion significantly improves the spectrum sensing performance.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91345085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User Web Usage Mining for navigation improvisation using semantic related frequent patterns 利用语义相关的频繁模式挖掘用户网络使用即兴导航
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066697
N. P. Jilhedar, S. Shirgave
Web sites have abundant web usage log which provides useful information that can be used for user navigation improvisation. Traditional web site does not use this rich web usage data for any investigation. It can be used to generate efficient frequent patterns which can support in user navigation improvisation. It can also be help in re-organizing web site for efficient navigation. In this paper we propose a frequent pattern generation approach using semantic relations with user web usage data. The quality of web usage pattern generated is measured with standards methods for evaluation. Experiment results show that more precise presentation using user pattern generation can improve user navigation measures.
网站有丰富的网站使用日志,为用户的即兴导航提供了有用的信息。传统网站不使用这些丰富的网络使用数据进行任何调查。它可以用来生成有效的频繁模式,支持用户的即兴导航。它也可以帮助重新组织网站的有效导航。本文提出了一种基于用户网络使用数据语义关系的频繁模式生成方法。用标准的评价方法对生成的网络使用模式的质量进行了测量。实验结果表明,利用用户模式生成技术实现更精确的呈现,可以提高用户导航性能。
{"title":"User Web Usage Mining for navigation improvisation using semantic related frequent patterns","authors":"N. P. Jilhedar, S. Shirgave","doi":"10.1109/ICCCT2.2014.7066697","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066697","url":null,"abstract":"Web sites have abundant web usage log which provides useful information that can be used for user navigation improvisation. Traditional web site does not use this rich web usage data for any investigation. It can be used to generate efficient frequent patterns which can support in user navigation improvisation. It can also be help in re-organizing web site for efficient navigation. In this paper we propose a frequent pattern generation approach using semantic relations with user web usage data. The quality of web usage pattern generated is measured with standards methods for evaluation. Experiment results show that more precise presentation using user pattern generation can improve user navigation measures.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"46 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79101824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining of negative association rules using improved frequent pattern tree 利用改进的频繁模式树挖掘负关联规则
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066748
E. B. Krishna, B. Rama, A. Nagaraju
Extraction of interesting negative association rules from large data sets is measured as a key feature of data mining. Many researchers discovered numerous algorithms and methods to find out negative and positive association rules. From the existing approaches, the frequent pattern growth (FP-Growth) approach is well-organized and capable method for finding the item sets which are frequent, without the generation of candidate item sets. The drawback of FP-Growth is it discovers a huge amount of conditional FP-Tree. We propose a novel, improved FP-Tree for extracting negative association rules without generating conditional FP-Tree.
从大型数据集中提取有趣的负关联规则是数据挖掘的一个关键特征。许多研究人员发现了许多算法和方法来发现负关联规则和正关联规则。从现有的方法来看,频繁模式增长(FP-Growth)方法是一种组织良好、功能强大的方法,可以在不生成候选项目集的情况下找到频繁的项目集。FP-Growth的缺点是发现了大量的条件FP-Tree。我们提出了一种新的,改进的FP-Tree来提取负关联规则,而不生成条件FP-Tree。
{"title":"Mining of negative association rules using improved frequent pattern tree","authors":"E. B. Krishna, B. Rama, A. Nagaraju","doi":"10.1109/ICCCT2.2014.7066748","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066748","url":null,"abstract":"Extraction of interesting negative association rules from large data sets is measured as a key feature of data mining. Many researchers discovered numerous algorithms and methods to find out negative and positive association rules. From the existing approaches, the frequent pattern growth (FP-Growth) approach is well-organized and capable method for finding the item sets which are frequent, without the generation of candidate item sets. The drawback of FP-Growth is it discovers a huge amount of conditional FP-Tree. We propose a novel, improved FP-Tree for extracting negative association rules without generating conditional FP-Tree.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73315748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security analysis of ‘A novel copyright protection scheme using Visual Cryptography’ “一种新的基于视觉密码的版权保护方案”的安全性分析
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066723
B. Surekha, B. Ravi, G. Swamy
Digital image copyright protection techniques have drawn substantial interest from the research community for the last two decades. In particular, Copyright Protection schemes based on Visual Cryptography (CPVC) are designed to protect sensitive images without degrading the quality of host images. In this paper, the security of one such CPVC scheme proposed by A. Nag et al. is analyzed. We demonstrate that this technique is insecure as it leads to high ambiguity in detecting the right owner. This is proved by means of theoretical analysis and by conducting false positive tests.
在过去的二十年里,数字图像版权保护技术已经引起了研究界的极大兴趣。特别是,基于视觉加密(CPVC)的版权保护方案旨在保护敏感图像而不降低主机图像的质量。本文分析了A. Nag等人提出的一种CPVC方案的安全性。我们证明了这种技术是不安全的,因为它在检测正确的所有者时导致高度模糊。这是通过理论分析和假阳性试验来证明的。
{"title":"Security analysis of ‘A novel copyright protection scheme using Visual Cryptography’","authors":"B. Surekha, B. Ravi, G. Swamy","doi":"10.1109/ICCCT2.2014.7066723","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066723","url":null,"abstract":"Digital image copyright protection techniques have drawn substantial interest from the research community for the last two decades. In particular, Copyright Protection schemes based on Visual Cryptography (CPVC) are designed to protect sensitive images without degrading the quality of host images. In this paper, the security of one such CPVC scheme proposed by A. Nag et al. is analyzed. We demonstrate that this technique is insecure as it leads to high ambiguity in detecting the right owner. This is proved by means of theoretical analysis and by conducting false positive tests.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"11 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80278090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and implementation of area and delay optimized carry tree adders using FPGA 利用FPGA设计和实现面积和延迟优化进位树加法器
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066707
Kartheek Boddireddy, B. P. Kumar, C. Paidimarry
Adders play an important role in digital circuits. Logarithmic adders are efficient in delay reduction of carry generation/propagation in contrary to linear adders. It is found from simulations that even logarithmic adders suffer from delay, chip area over head and additional latches in the presence of ripple carry adders at the time of FPGA realization. The main motive of this work is to design and develop optimizeddelay free adders by introducing the proposed leaf adder module. In this work, we propose optimized Kogge-Stone and Spanning tree adders based on carry-tree architecture. Our designs are simulated using Verilog HDL and implemented on Xilinx Virtex-5 FPGA for real time verification. Performance metrics such as delay and chip area are evaluated using our numerical simulations. It is shown from results that our optimized Kogge-Stone and Spanning tree adders achieve 13.9% and 1.5 % reduction in delay: 24% and26.5% in LUT reduction; and 25.9% and 23.8% in slice reduction respectively, compared to existing tree adders.
加法器在数字电路中起着重要的作用。与线性加法器相比,对数加法器在减少进位产生/传播的延迟方面是有效的。仿真发现,在FPGA实现时,即使是对数加法器也会受到延迟、芯片头顶面积和附加锁存器的影响。本文的主要目的是通过引入叶加法器模块来设计和开发优化的无延迟加法器。在这项工作中,我们提出了基于carry-tree架构的优化Kogge-Stone和生成树加法器。我们的设计使用Verilog HDL进行仿真,并在Xilinx Virtex-5 FPGA上实现以进行实时验证。性能指标,如延迟和芯片面积评估使用我们的数值模拟。结果表明,优化后的Kogge-Stone加法器和生成树加法器延迟分别降低了13.9%和1.5%,LUT降低了24%和26.5%;与现有的树加法器相比,切片减少率分别为25.9%和23.8%。
{"title":"Design and implementation of area and delay optimized carry tree adders using FPGA","authors":"Kartheek Boddireddy, B. P. Kumar, C. Paidimarry","doi":"10.1109/ICCCT2.2014.7066707","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066707","url":null,"abstract":"Adders play an important role in digital circuits. Logarithmic adders are efficient in delay reduction of carry generation/propagation in contrary to linear adders. It is found from simulations that even logarithmic adders suffer from delay, chip area over head and additional latches in the presence of ripple carry adders at the time of FPGA realization. The main motive of this work is to design and develop optimizeddelay free adders by introducing the proposed leaf adder module. In this work, we propose optimized Kogge-Stone and Spanning tree adders based on carry-tree architecture. Our designs are simulated using Verilog HDL and implemented on Xilinx Virtex-5 FPGA for real time verification. Performance metrics such as delay and chip area are evaluated using our numerical simulations. It is shown from results that our optimized Kogge-Stone and Spanning tree adders achieve 13.9% and 1.5 % reduction in delay: 24% and26.5% in LUT reduction; and 25.9% and 23.8% in slice reduction respectively, compared to existing tree adders.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"22 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85819465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An approach for optimization of resource management in Hadoop 一种优化Hadoop资源管理的方法
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066747
R. Raj, G. Raju
Many tools and frameworks have been developed to process data on distributed data centers. MapReduce most prominent among such frameworks has emerged as a popular distributed data processing model for processing vast amount of data in parallel on large clusters of commodity machines. The JobTracker in MapReduce framework is responsible for both managing the cluster's resources and executing the MapReduce jobs, a constraint that limits scalability, resource utilization. YARN the next-generation execution layer for Hadoop splits processing and resource management capabilities of JobTracker into separate entities and eliminates the dependency of Hadoop on MapReduce. This new model is more isolated and scalable compared to MapReduce, providing improved features and functionality. This paper discusses the design of YARN and significant advantages over traditional MapReduce.
已经开发了许多工具和框架来处理分布式数据中心上的数据。MapReduce是这些框架中最突出的一个,它已经成为一种流行的分布式数据处理模型,用于在大型商用机器集群上并行处理大量数据。MapReduce框架中的JobTracker负责管理集群的资源和执行MapReduce作业,这是一个限制可伸缩性和资源利用率的约束。YARN是Hadoop的下一代执行层,它将JobTracker的处理和资源管理能力拆分为独立的实体,消除了Hadoop对MapReduce的依赖。与MapReduce相比,这个新模型更加独立和可扩展,提供了改进的特性和功能。本文讨论了YARN的设计及其相对于传统MapReduce的显著优势。
{"title":"An approach for optimization of resource management in Hadoop","authors":"R. Raj, G. Raju","doi":"10.1109/ICCCT2.2014.7066747","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066747","url":null,"abstract":"Many tools and frameworks have been developed to process data on distributed data centers. MapReduce most prominent among such frameworks has emerged as a popular distributed data processing model for processing vast amount of data in parallel on large clusters of commodity machines. The JobTracker in MapReduce framework is responsible for both managing the cluster's resources and executing the MapReduce jobs, a constraint that limits scalability, resource utilization. YARN the next-generation execution layer for Hadoop splits processing and resource management capabilities of JobTracker into separate entities and eliminates the dependency of Hadoop on MapReduce. This new model is more isolated and scalable compared to MapReduce, providing improved features and functionality. This paper discusses the design of YARN and significant advantages over traditional MapReduce.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88772235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Rare association rule mining for data stream 数据流稀有关联规则挖掘
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066696
Sunitha Vanamala, L. P. Sree, S. Bhavani
The immense volumes of data is populated into repositories from various applications. More over data arrives into the repositories continuously i.e. stream of data that cannot be stored into repository due to its varying characteristics. Frequent itemset mining is thoroughly studied by many researchers but important rare items are not discovered by these algorithms. In many cases, the contradictions or exceptions also offers useful associations. In the recent past the researchers started to focus on the discovery of such kind of associations called rare associations. Rare itemsets can be obtained by setting low support but generates huge number of rules. The rare association rule mining is a challenging area of research on data streams. In this paper we proposed an idea to analyze the data stream to identify interesting rare association rules. Rare association rule mining is the process of identifying associations that are having low support but occurs with high confidence. The rare association rules are useful for many applications such as fraudulent credit card usage, anomaly detection in networks, detection of network failures, educational data, medical diagnosis etc. The proposed rare association rule mining algorithm for data stream is implemented using sliding window technique over a stream of data, data is represented in vertical bit sequence format. The advantage of proposed algorithm is that it requires single scan to discover all rare associations. The proposed algorithm outperforms both in terms of memory and time.
海量的数据被从不同的应用程序填充到存储库中。越来越多的数据连续地进入存储库,即由于其不同的特征而无法存储到存储库中的数据流。频繁项集挖掘已经被许多研究者进行了深入的研究,但这些算法并没有发现重要的稀有项。在许多情况下,矛盾或例外也提供了有用的关联。在最近的过去,研究人员开始专注于发现这种被称为罕见关联的关联。稀有道具集可以通过设置低支持而获得,但会生成大量规则。罕见的关联规则挖掘是数据流研究的一个具有挑战性的领域。本文提出了一种分析数据流以识别有趣的稀有关联规则的方法。稀有关联规则挖掘是识别支持度低但置信度高的关联的过程。罕见的关联规则在信用卡欺诈使用、网络异常检测、网络故障检测、教育数据、医疗诊断等应用中都很有用。提出的数据流稀有关联规则挖掘算法在数据流上使用滑动窗口技术实现,数据以垂直位序列格式表示。该算法的优点是只需一次扫描即可发现所有罕见关联。该算法在内存和时间方面都优于传统算法。
{"title":"Rare association rule mining for data stream","authors":"Sunitha Vanamala, L. P. Sree, S. Bhavani","doi":"10.1109/ICCCT2.2014.7066696","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066696","url":null,"abstract":"The immense volumes of data is populated into repositories from various applications. More over data arrives into the repositories continuously i.e. stream of data that cannot be stored into repository due to its varying characteristics. Frequent itemset mining is thoroughly studied by many researchers but important rare items are not discovered by these algorithms. In many cases, the contradictions or exceptions also offers useful associations. In the recent past the researchers started to focus on the discovery of such kind of associations called rare associations. Rare itemsets can be obtained by setting low support but generates huge number of rules. The rare association rule mining is a challenging area of research on data streams. In this paper we proposed an idea to analyze the data stream to identify interesting rare association rules. Rare association rule mining is the process of identifying associations that are having low support but occurs with high confidence. The rare association rules are useful for many applications such as fraudulent credit card usage, anomaly detection in networks, detection of network failures, educational data, medical diagnosis etc. The proposed rare association rule mining algorithm for data stream is implemented using sliding window technique over a stream of data, data is represented in vertical bit sequence format. The advantage of proposed algorithm is that it requires single scan to discover all rare associations. The proposed algorithm outperforms both in terms of memory and time.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91013614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
R&D Plan-Informatics in the era of big data 研发计划——大数据时代的信息学
Pub Date : 2014-12-01 DOI: 10.1109/ICCCT2.2014.7066724
K. Shreedhar, D. Bhukya, Shubham Hariom
The focus on R&D planning is gaining importance due to the ever increasing investments made in the sector as realisation has dawned upon the decision makers that investments are bound to generate benefits at a later stage. For better R&D planning, it is imperative that tools and mechanisms, particularly with the explosion of data due to the advancement in information and communication technologies (ICT), need to be developed and adopted, systematically. This paper aims to introduce Plan-Informatics approach to R&D planning that would help a nation in devising a framework for evidence based planning in R&D .The proposed Plan-Informatics approach would be more suitable in the era of big data and data centric `fourth paradigm' of scientific discovery. The Plan-Informatics will capture, accurate, analyse and visualise the big data and provide an approach towards holistic decision making and action for a long-term R&D plan of a nation.The paper also attempts to develop a Plan-Informatics framework for government sector to better utilise big data and near to real time data for effective decision making.
由于对该领域的投资不断增加,决策者已经意识到投资必然会在后期产生效益,因此对研发计划的关注正变得越来越重要。为了更好地进行研发规划,必须系统地开发和采用工具和机制,特别是在信息和通信技术(ICT)进步导致数据爆炸式增长的情况下。本文旨在将计划信息学方法引入研发规划,帮助国家设计基于证据的研发规划框架,提出的计划信息学方法更适合大数据时代和以数据为中心的科学发现“第四范式”。计划信息学将捕获、准确、分析和可视化大数据,并为一个国家的长期研发计划提供全面决策和行动的方法。本文还试图为政府部门开发一个计划信息学框架,以便更好地利用大数据和接近实时的数据进行有效的决策。
{"title":"R&D Plan-Informatics in the era of big data","authors":"K. Shreedhar, D. Bhukya, Shubham Hariom","doi":"10.1109/ICCCT2.2014.7066724","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066724","url":null,"abstract":"The focus on R&D planning is gaining importance due to the ever increasing investments made in the sector as realisation has dawned upon the decision makers that investments are bound to generate benefits at a later stage. For better R&D planning, it is imperative that tools and mechanisms, particularly with the explosion of data due to the advancement in information and communication technologies (ICT), need to be developed and adopted, systematically. This paper aims to introduce Plan-Informatics approach to R&D planning that would help a nation in devising a framework for evidence based planning in R&D .The proposed Plan-Informatics approach would be more suitable in the era of big data and data centric `fourth paradigm' of scientific discovery. The Plan-Informatics will capture, accurate, analyse and visualise the big data and provide an approach towards holistic decision making and action for a long-term R&D plan of a nation.The paper also attempts to develop a Plan-Informatics framework for government sector to better utilise big data and near to real time data for effective decision making.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82894298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 RIVF International Conference on Computing and Communication Technologies (RIVF)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1