首页 > 最新文献

IOSR journal of computer engineering最新文献

英文 中文
A Smart IoT Fuzzy Irrigation System 智能物联网模糊灌溉系统
Pub Date : 2017-06-01 DOI: 10.9790/3021-0706011521
G. Kokkonis, Sotirios Kontogiannis, D. Tomtsis
This paper proposes a novel fuzzy computational algorithm for IoT smart irrigation systems. It describes all the possible sensors, actuators and microcontrollers that could be used in the irrigation systems. Based on these sensors a novel system architecture is presented. The irrigation system continuously monitoring air temperature and humidity, and ground moisture. The ground humidity sensors are interspersed all over the field. The measurements are send in a microcontroller that applies a fuzzy computational algorithm and decides whether to open a servo valve or not. All the data collected from the microcontroller are sent to a cloud database for statistical information and processing.
提出了一种新的物联网智能灌溉系统模糊计算算法。它描述了所有可能用于灌溉系统的传感器、执行器和微控制器。基于这些传感器,提出了一种新的系统架构。灌溉系统持续监测空气温度、湿度和地面湿度。地面湿度传感器散布在整个场地。测量结果发送到应用模糊计算算法的微控制器中,并决定是否打开伺服阀。从单片机采集到的所有数据被发送到云数据库进行统计信息和处理。
{"title":"A Smart IoT Fuzzy Irrigation System","authors":"G. Kokkonis, Sotirios Kontogiannis, D. Tomtsis","doi":"10.9790/3021-0706011521","DOIUrl":"https://doi.org/10.9790/3021-0706011521","url":null,"abstract":"This paper proposes a novel fuzzy computational algorithm for IoT smart irrigation systems. It describes all the possible sensors, actuators and microcontrollers that could be used in the irrigation systems. Based on these sensors a novel system architecture is presented. The irrigation system continuously monitoring air temperature and humidity, and ground moisture. The ground humidity sensors are interspersed all over the field. The measurements are send in a microcontroller that applies a fuzzy computational algorithm and decides whether to open a servo valve or not. All the data collected from the microcontroller are sent to a cloud database for statistical information and processing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74948652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Predictive Probabilistic Resource Availability based Cloud Workflow Scheduling (PPRA) 基于预测概率资源可用性的云工作流调度(PPRA)
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904015463
S. Chitra, R. PrashanthCS
Cloud Computing provides access to a shared pool of computing resources such as servers, storage, computer networks and services, which can be rapidly provisioned and released, for the execution of various scientific and business applications. Scheduling scientific workflows modeled by Directed Acyclic Graphs is an NP complete problem. In cloud environment, there are fluctuations in resource availability due to shared resources and vastly varying workloads. The performance variations in virtual machines, have an impact on task execution times and data transfer times. This has a great impact on the performance of scheduling algorithms. Schedulers should map tasks to cloud resources considering the effective utilization of underlying resources. We propose a new static workflow scheduling algorithm called Predictive Probabilistic Resource Availability based Cloud Workflow Scheduling (PPRA) with the objective of minimizing makespan considering the probability of resource availability of cloud resources. This algorithm is compared with existing algorithms which assume full resource availability while making scheduling decisions. The proposed algorithm is found to be more reliable and performing better than existing HEFT and ECTS algorithms, in terms of minimized makespan.
云计算提供了对服务器、存储、计算机网络和服务等共享计算资源池的访问,这些资源可以快速配置和发布,用于执行各种科学和商业应用程序。用有向无环图建模的科学工作流调度是一个NP完全问题。在云环境中,由于共享资源和工作负载的巨大差异,资源可用性存在波动。虚拟机的性能变化会影响任务执行时间和数据传输时间。这对调度算法的性能有很大的影响。调度器应该考虑到底层资源的有效利用,将任务映射到云资源。本文提出了一种新的基于预测概率资源可用性的静态工作流调度算法——基于预测概率资源可用性的云工作流调度(PPRA),该算法的目标是在考虑云资源可用性概率的情况下最小化完工时间。将该算法与现有算法在进行调度决策时假设资源完全可用进行了比较。在最小化完工时间方面,该算法比现有的HEFT和ECTS算法更可靠,性能更好。
{"title":"Predictive Probabilistic Resource Availability based Cloud Workflow Scheduling (PPRA)","authors":"S. Chitra, R. PrashanthCS","doi":"10.9790/0661-1904015463","DOIUrl":"https://doi.org/10.9790/0661-1904015463","url":null,"abstract":"Cloud Computing provides access to a shared pool of computing resources such as servers, storage, computer networks and services, which can be rapidly provisioned and released, for the execution of various scientific and business applications. Scheduling scientific workflows modeled by Directed Acyclic Graphs is an NP complete problem. In cloud environment, there are fluctuations in resource availability due to shared resources and vastly varying workloads. The performance variations in virtual machines, have an impact on task execution times and data transfer times. This has a great impact on the performance of scheduling algorithms. Schedulers should map tasks to cloud resources considering the effective utilization of underlying resources. We propose a new static workflow scheduling algorithm called Predictive Probabilistic Resource Availability based Cloud Workflow Scheduling (PPRA) with the objective of minimizing makespan considering the probability of resource availability of cloud resources. This algorithm is compared with existing algorithms which assume full resource availability while making scheduling decisions. The proposed algorithm is found to be more reliable and performing better than existing HEFT and ECTS algorithms, in terms of minimized makespan.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84233357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Micro-ATMs and POS Terminals Authentication System Using AdvancedBiometric Techniques 利用先进的生物识别技术改进微型atm和POS终端认证系统
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904017477
Priya Tawde, G. Lakshmi
Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of microATM device.The current authentication system uses fingerprint authentication or PIN based authentication method.Biometric features are unique for every individual and hence can be widely used in fusion for enhancing the security system for micro-ATMS and POS terminals.
销售点(POS)终端上的大多数交易都是通过信用卡或借记卡进行支付的。许多大银行都借助微型atm机开展了上门银行业务。目前的认证系统主要采用指纹认证或基于PIN码的认证方式。每个人的生物特征都是独一无二的,因此可以广泛应用于融合,以增强微型atm和POS终端的安全系统。
{"title":"Enhancing Micro-ATMs and POS Terminals Authentication System Using AdvancedBiometric Techniques","authors":"Priya Tawde, G. Lakshmi","doi":"10.9790/0661-1904017477","DOIUrl":"https://doi.org/10.9790/0661-1904017477","url":null,"abstract":"Most of the transactions at the Point of Sale (POS) terminals are carried out by payments through Credit or Debit cards.Many leading banks have started the door step banking service with the help of microATM device.The current authentication system uses fingerprint authentication or PIN based authentication method.Biometric features are unique for every individual and hence can be widely used in fusion for enhancing the security system for micro-ATMS and POS terminals.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83082648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Compressed Sensing Method for Wireless Sensor Networks with Evolution Model Based on KH-SVM 基于KH-SVM进化模型的无线传感器网络压缩感知方法
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903062126
Pengxi Liu
Wireless sensor networks are able to provide crucial and real time information in many scenarios of crisis response and management. Sensor node localization is one of research hotspots in the applications of wireless sensor networks (WSNs) field. A localization algorithm based on improved Support Vector Machine (SVM) for WSNs is proposed in this paper. SVM classification accuracy is the key to the localization accuracy. The selection of parameters is the important factor that influences the performance of SVM. Therefore, this paper proposes a parameter optimization algorithm based on Krill-herd algorithm (KH-SVM). The experimental results show that KH-SVM algorithm has better searching optimization ability compared with other optimization algorithms. In order to improve the fault tolerance against both random attacks and deliberate attacks for wireless sensor networks, this paper proposes a evolution model.We present an efficient seismic data sensing scheme in wireless sensor networks based on the promising compressed sensing technology to mitigate wireless communication load, data processing and caching complexity on nodes.
无线传感器网络能够在许多危机响应和管理场景中提供关键的实时信息。传感器节点定位是无线传感器网络应用领域的研究热点之一。提出了一种基于改进支持向量机的无线传感器网络定位算法。支持向量机的分类精度是定位精度的关键。参数的选择是影响支持向量机性能的重要因素。为此,本文提出了一种基于Krill-herd算法(KH-SVM)的参数优化算法。实验结果表明,与其他优化算法相比,KH-SVM算法具有更好的搜索优化能力。为了提高无线传感器网络对随机攻击和故意攻击的容错能力,提出了一种进化模型。基于压缩感知技术,提出了一种有效的无线传感器网络地震数据感知方案,以减轻无线通信负载、数据处理和节点缓存的复杂性。
{"title":"A Compressed Sensing Method for Wireless Sensor Networks with Evolution Model Based on KH-SVM","authors":"Pengxi Liu","doi":"10.9790/0661-1903062126","DOIUrl":"https://doi.org/10.9790/0661-1903062126","url":null,"abstract":"Wireless sensor networks are able to provide crucial and real time information in many scenarios of crisis response and management. Sensor node localization is one of research hotspots in the applications of wireless sensor networks (WSNs) field. A localization algorithm based on improved Support Vector Machine (SVM) for WSNs is proposed in this paper. SVM classification accuracy is the key to the localization accuracy. The selection of parameters is the important factor that influences the performance of SVM. Therefore, this paper proposes a parameter optimization algorithm based on Krill-herd algorithm (KH-SVM). The experimental results show that KH-SVM algorithm has better searching optimization ability compared with other optimization algorithms. In order to improve the fault tolerance against both random attacks and deliberate attacks for wireless sensor networks, this paper proposes a evolution model.We present an efficient seismic data sensing scheme in wireless sensor networks based on the promising compressed sensing technology to mitigate wireless communication load, data processing and caching complexity on nodes.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86327834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Competitive Intelligence framework to support decisionmaking based on Rough Set Theory 基于粗糙集理论的竞争情报框架支持决策
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903061520
Fatima-Zzahra Cheffah, Mostafa Hanoune
Given the increasing complexity of the economic context, it is important for each company to master information and build a robust strategic planning process. Competitive Intelligence (CI) is important for companies to manage their information. CI identifies opportunities and determinants of success, anticipates threats and prevents risks. CI becomes an imperative for any company wishing to sustain its growth and innovation sustainably. In addition, decision-makers have a key role to play when making decisions, some of which can have a significant impact and therefore justify the effort to reflect and deliberate on possible options before making a decision. Strategic decisions can be defined as important and far-reaching decisions in terms of actions taken, resources committed, number of actors involved and impact on all future operations. Our answer to this challenge is an approach that uses Rough set theory. Our approach is designed to support decisionmaking and respects the characteristics of strategic decision support in complex, uncertain and evolving situations. Rough set theory can effectively process data and information in complex system. In this article, we propose a CI approach where we used the rough set theory to generate rules in order to help decision makers make a decision in a complex and multi-criteria situation and under a context of uncertainty. We applied our model on the choice of implementation of an Enterprise Resource Planning (ERP) within the company.
考虑到日益复杂的经济环境,对于每个公司来说,掌握信息并建立一个强大的战略规划过程是很重要的。竞争情报(CI)对于公司管理其信息非常重要。CI识别机会和成功的决定因素,预测威胁并预防风险。CI对于任何希望持续增长和创新的公司来说都是必不可少的。此外,决策者在作出决定时可以发挥关键作用,其中一些决定可以产生重大影响,因此,在作出决定之前,有必要对可能的选择进行反思和审议。战略决策可以定义为在采取的行动、投入的资源、参与的行为者数量和对所有未来行动的影响方面的重要和深远的决定。我们对这一挑战的回答是使用粗糙集理论的方法。我们的方法旨在支持决策,并尊重复杂、不确定和不断变化的情况下战略决策支持的特点。粗糙集理论可以有效地处理复杂系统中的数据和信息。在本文中,我们提出了一种CI方法,其中我们使用粗糙集理论来生成规则,以帮助决策者在复杂和多标准的情况下以及在不确定的背景下做出决策。我们将我们的模型应用于公司内部企业资源规划(ERP)实施的选择。
{"title":"A Competitive Intelligence framework to support decisionmaking based on Rough Set Theory","authors":"Fatima-Zzahra Cheffah, Mostafa Hanoune","doi":"10.9790/0661-1903061520","DOIUrl":"https://doi.org/10.9790/0661-1903061520","url":null,"abstract":"Given the increasing complexity of the economic context, it is important for each company to master information and build a robust strategic planning process. Competitive Intelligence (CI) is important for companies to manage their information. CI identifies opportunities and determinants of success, anticipates threats and prevents risks. CI becomes an imperative for any company wishing to sustain its growth and innovation sustainably. In addition, decision-makers have a key role to play when making decisions, some of which can have a significant impact and therefore justify the effort to reflect and deliberate on possible options before making a decision. Strategic decisions can be defined as important and far-reaching decisions in terms of actions taken, resources committed, number of actors involved and impact on all future operations. Our answer to this challenge is an approach that uses Rough set theory. Our approach is designed to support decisionmaking and respects the characteristics of strategic decision support in complex, uncertain and evolving situations. Rough set theory can effectively process data and information in complex system. In this article, we propose a CI approach where we used the rough set theory to generate rules in order to help decision makers make a decision in a complex and multi-criteria situation and under a context of uncertainty. We applied our model on the choice of implementation of an Enterprise Resource Planning (ERP) within the company.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88602422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Spacecraft Center of Mass Stabilization Accuracy 提高航天器质量中心稳定精度
Pub Date : 2017-06-01 DOI: 10.9790/3021-0706010714
N. Zosimovych
The publication suggests how to significantly improve the spacecraft center of mass movement stabilization accuracy in the active phases of trajectory correction during interplanetary and transfer flights, which in some cases provides for high navigation accuracy, when rigid trajectory control method is used.
提出了当采用刚性轨迹控制方法时,如何在行星际飞行和转移飞行的轨迹修正主动阶段显著提高航天器质心运动稳定精度,从而在某些情况下提供较高的导航精度。
{"title":"Improving the Spacecraft Center of Mass Stabilization Accuracy","authors":"N. Zosimovych","doi":"10.9790/3021-0706010714","DOIUrl":"https://doi.org/10.9790/3021-0706010714","url":null,"abstract":"The publication suggests how to significantly improve the spacecraft center of mass movement stabilization accuracy in the active phases of trajectory correction during interplanetary and transfer flights, which in some cases provides for high navigation accuracy, when rigid trajectory control method is used.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85247040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Total Bondage Number Of A Butterfly Graph 蝴蝶图的总束缚数
Pub Date : 2017-06-01 DOI: 10.9790/3021-0706010106
P. Jyothi
Domination Theory is an important branch of Graph Theory that has wide range of applications to various branches of Science and Technology. A new family of graphs called Butterfly Graphs is introduced recently and study of its parameters is under progress. Butterfly Graphs are undirected graphs and are widely used in interconnection networks. Let S be a subset of the set E of edges of G. Then the total bondage number bt(G) of G, is the minimum cardinality among all sets S such that γt(G S) > γt(G). In this paper the values for total bondage number of butterfly graph of dimension n are presented.
支配论是图论的一个重要分支,在科学技术的各个领域有着广泛的应用。最近引入了一种新的图族,称为蝴蝶图,其参数的研究正在进行中。蝴蝶图是一种无向图,广泛应用于互连网络中。设S是G的边集合E的一个子集,则G的总束缚数bt(G),是所有集合S中使γt(G) > γt(G)的最小基数。给出了n维蝴蝶图的总束缚数的取值。
{"title":"Total Bondage Number Of A Butterfly Graph","authors":"P. Jyothi","doi":"10.9790/3021-0706010106","DOIUrl":"https://doi.org/10.9790/3021-0706010106","url":null,"abstract":"Domination Theory is an important branch of Graph Theory that has wide range of applications to various branches of Science and Technology. A new family of graphs called Butterfly Graphs is introduced recently and study of its parameters is under progress. Butterfly Graphs are undirected graphs and are widely used in interconnection networks. Let S be a subset of the set E of edges of G. Then the total bondage number bt(G) of G, is the minimum cardinality among all sets S such that γt(G S) > γt(G). In this paper the values for total bondage number of butterfly graph of dimension n are presented.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87523141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Operations Research on Computer Science 运筹学对计算机科学的影响
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904015053
M. Ahmad
Operations research on computers interact in numerous logical fields of imperative significance to our society. These incorporate, among others, transportation, financial matters, speculation procedure, stock control, co ordinations, wellbeing, dependability, urban arranging, and ecology. Computers and Operations Research (COR) gives a global discussion to the application of computers and operations research techniques to issues in these and related fields. The field of mathematics plays essential part in various fields. One of the important areas in mathematics is Operations research which is utilized as a part of basic models. This basic course of action of different articles or technologies prompt new innovations and adjustments in the current condition for upgrade in those fields. This paper gives a review of the utilizations of Operations research in heterogeneous fields to some degree yet predominantly concentrates on the computer science application that utilizes Operations research ideas. Various papers in light of Operations research have been concentrated identified with booking ideas, computer science applications and an outline has been presented here.
计算机运筹学在许多逻辑领域中相互作用,对我们的社会具有重要意义。其中包括交通、金融、投机程序、库存控制、协调、福利、可靠性、城市规划和生态。计算机与运筹学(COR)对计算机和运筹学技术在这些和相关领域的应用进行了全面的讨论。数学领域在各个领域都起着至关重要的作用。数学中的一个重要领域是运筹学,它被用作基本模型的一部分。不同物品或技术的这一基本行动方针促使在当前条件下进行新的革新和调整,以提高这些领域的水平。本文对运筹学在异构领域的应用进行了一定程度的回顾,但主要集中在利用运筹学思想的计算机科学应用。在运筹学的基础上,各种各样的论文都集中在订票思想、计算机科学应用方面,并在这里提出了一个大纲。
{"title":"Impact of Operations Research on Computer Science","authors":"M. Ahmad","doi":"10.9790/0661-1904015053","DOIUrl":"https://doi.org/10.9790/0661-1904015053","url":null,"abstract":"Operations research on computers interact in numerous logical fields of imperative significance to our society. These incorporate, among others, transportation, financial matters, speculation procedure, stock control, co ordinations, wellbeing, dependability, urban arranging, and ecology. Computers and Operations Research (COR) gives a global discussion to the application of computers and operations research techniques to issues in these and related fields. The field of mathematics plays essential part in various fields. One of the important areas in mathematics is Operations research which is utilized as a part of basic models. This basic course of action of different articles or technologies prompt new innovations and adjustments in the current condition for upgrade in those fields. This paper gives a review of the utilizations of Operations research in heterogeneous fields to some degree yet predominantly concentrates on the computer science application that utilizes Operations research ideas. Various papers in light of Operations research have been concentrated identified with booking ideas, computer science applications and an outline has been presented here.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82378615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Moving Pedestrian Identification Based on Bayesian Classifier 基于贝叶斯分类器的运动行人识别研究
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903044147
Wu Hua-zhi
Pedestrian identification systemplays an important role in vehicle safetyassistant driving technology. In order toidentify the movement of pedestriansmore quickly and easily, motion pedestrian identification is carried out based on the Bayesian classifier. The identificationprocess was realized in two steps. Firstly, Bayesian classifier is designed based on the HOG feature. Secondly, the image captured by the camera is processed by taking the five-frame difference methodto extract the identification target from the pre-processed images and the HOG feature of the identification target is extracted as the input of the classifier to identify the target. The results show that this method can achieve the goal of identifying pedestrians quickly and simply.
行人识别系统是车辆安全辅助驾驶技术的重要组成部分。为了更快速、方便地识别行人的运动,基于贝叶斯分类器进行了运动行人识别。识别过程分两步实现。首先,基于HOG特征设计贝叶斯分类器。其次,对摄像机捕获的图像进行处理,采用五帧差分法从预处理图像中提取识别目标,提取识别目标的HOG特征作为分类器识别目标的输入;结果表明,该方法可以达到快速、简便地识别行人的目的。
{"title":"Research on Moving Pedestrian Identification Based on Bayesian Classifier","authors":"Wu Hua-zhi","doi":"10.9790/0661-1903044147","DOIUrl":"https://doi.org/10.9790/0661-1903044147","url":null,"abstract":"Pedestrian identification systemplays an important role in vehicle safetyassistant driving technology. In order toidentify the movement of pedestriansmore quickly and easily, motion pedestrian identification is carried out based on the Bayesian classifier. The identificationprocess was realized in two steps. Firstly, Bayesian classifier is designed based on the HOG feature. Secondly, the image captured by the camera is processed by taking the five-frame difference methodto extract the identification target from the pre-processed images and the HOG feature of the identification target is extracted as the input of the classifier to identify the target. The results show that this method can achieve the goal of identifying pedestrians quickly and simply.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81773456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection and Defense Implementation (IDDI) in Cuckoo Hashing 杜鹃哈希中的入侵检测与防御实现(IDDI)
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903064952
D. Seethalakshmi, Dr.G.M. Nasira
The cuckoo hashing methodology completely avoids hash collisions. An insertion of a new item causes a failure and an endless loop when there are collisions in all probed positions till achieving the timeout status. To interrupt the countless loops, an intuitive manner is to carry out a complete rehash if this uncommon incident takes place. In practice, the high priced overhead of acting a rehashing operation can be dramatically decreased by using taking benefit of a very small extra regular-size space. In our proposed paper hashing involve collisions in which the stored buckets with one item will be reduced to probe the hash collision and query about the buckets. The enumerator that allocates each hash bucket will reduce the endless loops. As an accession we include intrusion detection and defense implementation (IDDI) that scrutinizes the hash and cache memory utilization efficiently. Cuckoo hashing is more prone to intrusion attack for which we alleviate such attacks by avoiding loops in buckets. Through detection and avoidance mechanism of intrusion we enhance the transmission in cuckoo hashing simultaneously by providing strong security towards its data.
布谷鸟哈希方法完全避免了哈希冲突。当所有探测位置都存在冲突时,插入新项会导致失败和无限循环,直到达到超时状态。为了中断无数的循环,一种直观的方式是,如果发生这种不寻常的事件,就进行一次完全的重列。在实践中,通过利用非常小的额外规则大小的空间,可以显著降低执行散列操作的高昂开销。在我们提出的论文中,哈希涉及到碰撞,其中存储的具有一个项目的桶将被减少以探测哈希碰撞并查询桶。分配每个哈希桶的枚举器将减少无限循环。作为附加,我们包括入侵检测和防御实现(IDDI),它可以有效地检查哈希和缓存内存的使用情况。布谷鸟哈希法更容易受到入侵攻击,我们通过避免桶内循环来减轻这种攻击。通过检测和避免入侵的机制,同时增强了布谷鸟哈希算法的传输能力,为其数据提供了强大的安全性。
{"title":"Intrusion Detection and Defense Implementation (IDDI) in Cuckoo Hashing","authors":"D. Seethalakshmi, Dr.G.M. Nasira","doi":"10.9790/0661-1903064952","DOIUrl":"https://doi.org/10.9790/0661-1903064952","url":null,"abstract":"The cuckoo hashing methodology completely avoids hash collisions. An insertion of a new item causes a failure and an endless loop when there are collisions in all probed positions till achieving the timeout status. To interrupt the countless loops, an intuitive manner is to carry out a complete rehash if this uncommon incident takes place. In practice, the high priced overhead of acting a rehashing operation can be dramatically decreased by using taking benefit of a very small extra regular-size space. In our proposed paper hashing involve collisions in which the stored buckets with one item will be reduced to probe the hash collision and query about the buckets. The enumerator that allocates each hash bucket will reduce the endless loops. As an accession we include intrusion detection and defense implementation (IDDI) that scrutinizes the hash and cache memory utilization efficiently. Cuckoo hashing is more prone to intrusion attack for which we alleviate such attacks by avoiding loops in buckets. Through detection and avoidance mechanism of intrusion we enhance the transmission in cuckoo hashing simultaneously by providing strong security towards its data.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80754528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IOSR journal of computer engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1