988 results
Search Results
2. ScholatAna: Big Data-Based Academic Social Network User Behavior Preference System
- Author
-
Ma, Wenjie, Lin, Ronghua, Li, Jianguo, Mao, Chengjie, Xu, Qing, Wen, Angjian, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Sun, Yuqing, editor, Liu, Dongning, editor, Liao, Hao, editor, Fan, Hongfei, editor, and Gao, Liping, editor
- Published
- 2021
- Full Text
- View/download PDF
3. Categorical Features Transformation with Compact One-Hot Encoder for Fraud Detection in Distributed Environment
- Author
-
Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon, Barbosa, Simone Diniz Junqueira, Editorial Board Member, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Sivalingam, Krishna M., Founding Editor, Washio, Takashi, Founding Editor, Yuan, Junsong, Founding Editor, Islam, Rafiqul, editor, Koh, Yun Sing, editor, Zhao, Yanchang, editor, Warwick, Graco, editor, Stirling, David, editor, Li, Chang-Tsun, editor, and Islam, Zahidul, editor
- Published
- 2019
- Full Text
- View/download PDF
4. Organization and Protection on the Basis of a Multi-agent System of Distributed Computing in a Computer Network to Reduce the Time for Solving Large-Scale Tasks
- Author
-
Khovanskov, Sergey, Rumyantsev, Konstantin, Khovanskova, Vera, Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Ghosh, Ashish, Series Editor, Singh, Pradeep Kumar, editor, Paprzycki, Marcin, editor, Bhargava, Bharat, editor, Chhabra, Jitender Kumar, editor, Kaushal, Narottam Chand, editor, and Kumar, Yugal, editor
- Published
- 2019
- Full Text
- View/download PDF
5. Analysis of Scheduling Algorithms in Hadoop
- Author
-
Murali, Juliet A., Brindha, T., Barbosa, Simone Diniz Junqueira, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Zelinka, Ivan, editor, Senkerik, Roman, editor, Panda, Ganapati, editor, and Lekshmi Kanthan, Padma Suresh, editor
- Published
- 2018
- Full Text
- View/download PDF
6. Performance Evaluation of a Distributed Clustering Approach for Spatial Datasets
- Author
-
Bendechache, Malika, Le-Khac, Nhien-An, Kechadi, M-Tahar, Barbosa, Simone Diniz Junqueira, Series Editor, Chen, Phoebe, Series Editor, Filipe, Joaquim, Series Editor, Kotenko, Igor, Series Editor, Sivalingam, Krishna M., Series Editor, Washio, Takashi, Series Editor, Yuan, Junsong, Series Editor, Zhou, Lizhu, Series Editor, Boo, Yee Ling, editor, Stirling, David, editor, Chi, Lianhua, editor, Liu, Lin, editor, Ong, Kok-Leong, editor, and Williams, Graham, editor
- Published
- 2018
- Full Text
- View/download PDF
7. A Generalized Data Inconsistency Detection Model for Wireless Sensor Networks
- Author
-
Kung, Tzu-Liang, Chen, Hsing-Chung, Barbosa, Simone Diniz Junqueira, Series editor, Chen, Phoebe, Series editor, Filipe, Joaquim, Series editor, Kotenko, Igor, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Yuan, Junsong, Series editor, Zhou, Lizhu, Series editor, You, Ilsun, editor, Leu, Fang-Yie, editor, and Chen, Hsing-Chung, editor
- Published
- 2018
- Full Text
- View/download PDF
8. Decision Variable Analysis Based on Distributed Computing
- Author
-
Wang, Zhao, Gong, Maoguo, Xie, Tian, Diniz Junqueira Barbosa, Simone, Series editor, Chen, Phoebe, Series editor, Du, Xiaoyong, Series editor, Filipe, Joaquim, Series editor, Kara, Orhun, Series editor, Kotenko, Igor, Series editor, Liu, Ting, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Gong, Maoguo, editor, Pan, Linqiang, editor, Song, Tao, editor, and Zhang, Gexiang, editor
- Published
- 2016
- Full Text
- View/download PDF
9. Rethinking Blockchain and Decentralized Learning: Position Paper
- Author
-
Sandi Rahmadika and Kyung Hyune Rhee
- Subjects
Federated Architecture ,Blockchain ,Training set ,Third party ,Computer science ,Distributed computing ,Computation ,Convergence (routing) ,Latency (audio) ,Position paper - Abstract
Blockchain technology and decentralized learning are attracting growing attention. Most existing methods of machine learning is in the centralized form which relies upon the third party in terms of the raw datasets and mining resources. Blockchain solves world centralization problems that keep the system secure through complex mathematical computations puzzle solved by blockchain miners. Concurrently, decentralized learning such as federated model allows the user to collaboratively access the updated prediction model without revealing the training data to the public. By doing so, it provides less power consumption, lower latency that respects the user’s privacy concern. Therefore, we study the extent to which these two technologies can be applied in the real world for faster convergence without compromising user’s security.
- Published
- 2021
10. Attribute Based Storage Mechanism with De-duplication Filter: A Review Paper
- Author
-
Amarja Hanumant Bhosale and Amrita A. Manjrekar
- Subjects
Filter (video) ,business.industry ,Computer science ,Distributed computing ,Key (cryptography) ,Data deduplication ,Cloud computing ,Coherence (statistics) ,Attribute-based encryption ,Encryption ,business ,Data compression - Abstract
Cloud computing relies on sharing of resources to achieve coherence and economy of scale, similar to a utility. In existing system ABE (attribute based encryption) is used to maintain security. Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the cipher-text are dependent upon attributes. In computing, data de-duplication is a specialized data compression technique for eliminating duplicate copies of repeating data. Related and somewhat synonymous terms are intelligent compression and single-instance storage. In this paper we studied the different attribute storage mechanisms as well as de-duplication system.
- Published
- 2018
11. Load Balancing Task Scheduling Based on Variants of Genetic Algorithms: Review Paper
- Author
-
Ayushi Harkawat, Poorva Pharkya, Shilpa Kumari, and Deepak Garg
- Subjects
education.field_of_study ,Job shop scheduling ,Computer science ,business.industry ,Distributed computing ,Population ,Cloud computing ,Load balancing (computing) ,Scheduling (computing) ,Genetic algorithm ,Least cost ,business ,education ,Hill climbing - Abstract
In the cloud platform, basic aim of task scheduling based algorithm is to reduce the makespan of the task and to minimize the load on resources. Users are working on large amount and the resources to be used are not up to the requirements. So, to fulfill global performance, cloud computing is used. Stated problem has been improved up to some extent by variant of genetic algorithm like JLGA (Job Spanning Time and Load Balancing and GA) and MPGA. Therefore, here it reviewed variant of genetic algorithm and did comparison among them. Furthermore, this paper proposed HJLGA (Hybridization of good features of JLGA and MPGA) which uses min-min algorithm to initialize population and also brings the concept of hill climbing to find the best fitted value. HJLGA satisfied the requirements of load balancing, least cost and minimum makespan of nodes.
- Published
- 2017
12. Futuristic View of Internet of Things and Applications with Prospective Scope
- Author
-
Prasad, M., Vijay, T. K., Sreenivasu, Morukurthi, Agajyelew, Bekele Worku, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Reddy, V. Sivakumar, editor, Prasad, V. Kamakshi, editor, Wang, Jiacun, editor, and Reddy, K.T.V., editor
- Published
- 2022
- Full Text
- View/download PDF
13. Cloud Computing in a Distributed Environment Implemented with Networking Technologies
- Author
-
Reddy, S. Sai Satyanarayana, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Fong, Simon, editor, Dey, Nilanjan, editor, and Joshi, Amit, editor
- Published
- 2022
- Full Text
- View/download PDF
14. Image Data Handling in a Multinode Environment Using MPI
- Author
-
Shreya, Ray, Himadri Sekhar, Mukherjee, Nandini, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Chaki, Rituparna, editor, Chaki, Nabendu, editor, Cortesi, Agostino, editor, and Saeed, Khalid, editor
- Published
- 2022
- Full Text
- View/download PDF
15. Cloud Computing Overview of Wireless Sensor Network (WSN)
- Author
-
Nath, Mahendra Prasad, Priyadarshini, Sushree Bibhuprada B., Mishra, Debahuti, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Gupta, Deepak, editor, Khanna, Ashish, editor, Kansal, Vineet, editor, Fortino, Giancarlo, editor, and Hassanien, Aboul Ella, editor
- Published
- 2022
- Full Text
- View/download PDF
16. Parallel and Distributed Computing Approaches for Evolutionary Algorithms—A Review
- Author
-
Raghul, S., Jeyakumar, G., Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Sharma, Tarun K., editor, Ahn, Chang Wook, editor, Verma, Om Prakash, editor, and Panigrahi, Bijaya Ketan, editor
- Published
- 2022
- Full Text
- View/download PDF
17. Lightweight urban computation interchange (LUCI): a system to couple heterogeneous simulations and views
- Author
-
Treyer, Lukas, Klein, Bernhard, König, Reinhard, and Meixner, Christine
- Published
- 2016
- Full Text
- View/download PDF
18. Survey of Blockchain Applications in Database Security
- Author
-
Singh, Vedant, Yadav, Vrinda, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Tripathy, Asis Kumar, editor, Sarkar, Mahasweta, editor, Sahoo, Jyoti Prakash, editor, Li, Kuan-Ching, editor, and Chinara, Suchismita, editor
- Published
- 2021
- Full Text
- View/download PDF
19. Harnessing Remote Sensing for Civil Engineering: Then, Now, and Tomorrow
- Author
-
Laefer, Debra F., di Prisco, Marco, Series Editor, Chen, Sheng-Hong, Series Editor, Vayas, Ioannis, Series Editor, Kumar Shukla, Sanjay, Series Editor, Sharma, Anuj, Series Editor, Kumar, Nagesh, Series Editor, Wang, Chien Ming, Series Editor, Ghosh, Jayanta Kumar, editor, and da Silva, Irineu, editor
- Published
- 2020
- Full Text
- View/download PDF
20. Research on Computer Network Information Security and Protection Countermeasure in Big Data Era
- Author
-
He, Jiyan, He, Yanbin, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Huang, Chuanchao, editor, Chan, Yu-Wei, editor, and Yen, Neil, editor
- Published
- 2020
- Full Text
- View/download PDF
21. Optimum Parallelism in Spark Framework on Hadoop YARN for Maximum Cluster Resource Utilization
- Author
-
Janardhanan, P. S., Samuel, Philip, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Luhach, Ashish Kumar, editor, Kosa, Janos Arpad, editor, Poonia, Ramesh Chandra, editor, Gao, Xiao-Zhi, editor, and Singh, Dharm, editor
- Published
- 2020
- Full Text
- View/download PDF
22. Optimize Performance Load Balancing Techniques Using Binary Vote Assignment Grid Quorum (BVAGQ): A Systematic Review
- Author
-
Fairuzullah, A., Noraziah, Ahmad, Arshah, Ruzaini Abdullah, Herawan, Tutut, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martin, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Abawajy, Jemal H., editor, Othman, Mohamed, editor, Ghazali, Rozaida, editor, Deris, Mustafa Mat, editor, Mahdin, Hairulnizam, editor, and Herawan, Tutut, editor
- Published
- 2019
- Full Text
- View/download PDF
23. A Multi-Objective Deadline-Constrained Task Scheduling Algorithm with Guaranteed Performance in Load Balancing on Heterogeneous Networks
- Author
-
Chatterjee, Moumita and Setua, S. K.
- Published
- 2021
- Full Text
- View/download PDF
24. Hybrid IT and Multi Cloud an Emerging Trend and Improved Performance in Cloud Computing
- Author
-
Gundu, Srinivasa Rao, Panem, Charan Arur, and Thimmapuram, Anuradha
- Published
- 2020
- Full Text
- View/download PDF
25. Review of City Pricing System Analysis Based on Big Data
- Author
-
Khan, Md. Nasfikur R., Tasnim, Farzana, Yesmin, Sarmila, Abedin, Mohammad Zoynul, Bansal, Jagdish Chand, Series Editor, Deep, Kusum, Series Editor, Nagar, Atulya K., Series Editor, Jacob, I. Jeena, editor, Kolandapalayam Shanmugam, Selvanayaki, editor, and Bestak, Robert, editor
- Published
- 2022
- Full Text
- View/download PDF
26. Data Security in Cloud Computing Using an Improved Attribute-Based Encryption
- Author
-
Mane, Ashwini Subodhan, Sonaje, Megha, Tadge, Pratiksha, Bansal, Jagdish Chand, Series Editor, Deep, Kusum, Series Editor, Nagar, Atulya K., Series Editor, Jacob, I. Jeena, editor, Kolandapalayam Shanmugam, Selvanayaki, editor, and Bestak, Robert, editor
- Published
- 2022
- Full Text
- View/download PDF
27. Resource Allocation and Power Management in Cloud Servers Using Deep Reinforcement Learning
- Author
-
Sushil Shakya and Subarna Shakya
- Subjects
Power management ,Computer science ,business.industry ,Distributed computing ,Latency (audio) ,Resource allocation ,Reinforcement learning ,Cloud computing ,business ,Power (physics) ,Scheduling (computing) ,Task (project management) - Abstract
Resource allocation and power management have become challenging tasks in cloud computing. Since workloads change over time, dynamic cloud resource allocation and power management solutions are needed, that can intrinsically adapt to the demand of the resources. This paper demonstrates the use of deep reinforcement learning algorithms for the task dispatching and power management in the simulated Alibaba cluster environment with the goal of achieving better power and latency management than traditional task scheduling algorithms. In this paper, we propose a hierarchical RL model for resource allocation and power management which obtains better results in terms of latency as well as power usage, than traditional task scheduling.
- Published
- 2021
28. Formation Control for Second-Order Multi-agent System with Collision Avoidance and Communication Maintenance
- Author
-
Yaxin Li and Zhuo Wang
- Subjects
Basis (linear algebra) ,Computer science ,Distributed computing ,Multi-agent system ,Control (management) ,Topology (electrical circuits) ,Graph theory ,Link (geometry) ,Laplacian matrix ,Collision avoidance - Abstract
This paper provides a strategy for formation control of second-order multi-agent systems. On the basis of using graph theory to describe the topology of measurement information and communication information between multi-agents, the distributed coordinated movement formation control strategy based on graph Laplacian is studied, and obstacles that may be encountered in complex application scenarios, or there may be collisions between the main bodies, or unpredictable situations such as the disconnection of the link between the main bodies due to the limited detection radius of the sensor, respectively. The formation control method with collision avoidance and communication maintenance is proposed in this paper. The simulation result proves the effectiveness of the method.
- Published
- 2021
29. Analysis of Key Technologies of Cloud Computing Security Based on Trust Model
- Author
-
Shuai Li, Han Liu, Weijian Zhang, and Fangfang Dang
- Subjects
Ideal point ,Consumption (economics) ,Flexibility (engineering) ,Service (systems architecture) ,Cloud computing security ,business.industry ,Computer science ,Distributed computing ,Scalability ,Key (cryptography) ,Cloud computing ,business - Abstract
With the development of cloud computing, cloud computing provides more and more computing services. In today's fiercely competitive environment, the service flexibility and choice provided by this highly scalable technology are becoming more and more attractive to enterprises. However, behind the rapid development of cloud computing, its security and trust issues have become increasingly unignorable. The purpose of this paper is to analyze the key technologies of cloud computing security based on the trust model (TM). This paper first proposes a subjective and objective TM based on the ideal point method for the trust problem in the cloud environment, and verifies the performance of the model through experiments. This paper proposes a decentralized TM based on blockchain, and verifies the effectiveness of the model through experiments. This paper starts from the current problems of cloud computing, and on the basis of understanding the shortcomings of traditional security technologies, proposes a key technology of cloud computing security based on the TM. The solution proposed in this paper has a minimum average time consumption of 0.12 ms in the copy + label generation stage, while the minimum average time consumption of a traditional PDP is 16.3 ms. It is obvious that this solution has great advantages.
- Published
- 2021
30. Distribution Automation and Energy Management System in Smart Grid
- Author
-
Devki Nandan Gupta, Deepak Verma, and Abhishek Sharma
- Subjects
Energy management system ,Electric power system ,Smart grid ,Work (electrical) ,Interfacing ,business.industry ,Computer science ,Distributed computing ,Electric potential energy ,Interface (computing) ,business ,Automation - Abstract
The conventional energy system dependent on exhaustible resources which use single-way interfacing between the source and the consumer via generation, transmission, distribution and consumption is inefficient, unsustainable and non-reliable due to the high energy needs of the digital society. A new system must be defined which overcomes all the above disadvantages and is self-reliable and manageable. The objective of this paper is to compare the conventional electricity grid system with the modern (smart grid) system, to define the smart grid, its components and their impact on the future of the electrical system. There is a need to use electrical energy in a more efficient and sustainable manner. The aim is to define a system that will be cyber secured and a two-way interface between the supplier and customers. This system will work on real-time data and also integrate it with technologies, tools and techniques to identify faults and reconfigure them automatically based on proper diagnostics. Also, several new components such as distribution generators and mini-grids will be introduced which will run the system uninterruptedly during the outages. This paper gives a brief about the distribution automation and energy management system post comparing conventional grid system with the smart grid system.
- Published
- 2021
31. Parallel and Distributed Computing Approaches for Evolutionary Algorithms—A Review
- Author
-
G. Jeyakumar and S. Raghul
- Subjects
Divide and conquer algorithms ,Decision variables ,Optimization problem ,Optimization algorithm ,Computer science ,Distributed computing ,ComputingMethodologies_MISCELLANEOUS ,Evolutionary algorithm ,Evolutionary computation ,Variety (cybernetics) ,Domain (software engineering) - Abstract
The evolutionary computing (EC) domain provides variety of optimization algorithms to the computer science community. The increase of large-scale real-world optimization problems which consists of thousands of decision variable has given rise to different challenges EC algorithms (popularly known as evolutionary algorithms (EAs)). However, these challenges are addressed by the research community of EC domain integrating the parallel and distribute computing paradigms to design novel EA frameworks for solving complex large-scale optimization problems. The parallel and distributed EA frameworks have received global attention over the past two decades. This paper summarizes various commonly followed algorithm models for parallel and distributed EAs. This paper also comprehensively reviews the research attempts in the literature relating these algorithmic models with different EAs and different optimization problems.
- Published
- 2021
32. Wireless Motes Outlier Detection Taxonomy Using ML-Based Techniques
- Author
-
Isha Pant and Ashish Joshi
- Subjects
business.industry ,Computer science ,media_common.quotation_subject ,Distributed computing ,Field (computer science) ,Domain (software engineering) ,Outlier ,Wireless ,Quality (business) ,Anomaly detection ,business ,Wireless sensor network ,media_common ,Efficient energy use - Abstract
WSNs have enthused resurgence in research on machine learning-based approaches with the intent of overcoming the physical restraints of sensors. Although resource constrained in nature, WSNs domain has tremendous potential for building powerful applications, each with its own individual characteristics and requirements. This fascinating field of WSNs although comprises of various research issues and challenges, viz. energy efficiency, localization, etc., which needs to rectified. One such prominent challenge is detection of outliers whose chore is to preclude any kind of malicious attacks in the network or lessen the noisy error prone data in millions of wireless sensor networks. To do so, the methodologies developed needs to take care of inherent limits of sensor networks so that the energy intake of motes is minimum and lifespan of the motes is maximized. Consequently, the quality of data must be thoroughly patterned as any kind of outlier in the sensed network may degrade the quality of the data and hence affect the final decision. Thus, it becomes imperious to retain the quality of the data. Numerous ML-based methodologies have been used by several researchers over the time to detect any form of outliers or anomaly present in the network. In this paper, some machine learning methodologies have been discussed which have proved their mettle in outlier detection for sensor networks. This paper presents a brief survey on outlier detection in WSNs data using various ML-based techniques.
- Published
- 2021
33. Exploring the Volatility of Large-Scale Shared Distributed Computing Resources
- Author
-
Hossain, Md Azam, Al-athwari, Baseem, Kim, Jik-soo, Hwang, Soonwook, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Pattnaik, Prasant Kumar, editor, Sain, Mangal, editor, Al-Absi, Ahmed A., editor, and Kumar, Pardeep, editor
- Published
- 2021
- Full Text
- View/download PDF
34. Special Purpose Network Simulator for Transport Protocol Analysis
- Author
-
Gábor Hosszú, Dávid Tegze, and Ferenc Kovács
- Subjects
Network congestion ,Computer science ,Distributed computing ,Transport layer ,Computer Science::Networking and Internet Architecture ,Protocol analysis ,Network topology ,Communications protocol ,Protocol (object-oriented programming) ,Network simulation ,Communication channel - Abstract
This paper presents a tool for evaluating transport layer congestion control schemes, including various TCP variants. In real computer networks, it is difficult to obtain detailed information about the internal state and operation of network protocols without disturbing protocol behavior. This is especially true for transport layer protocols where timing plays an important role. For deep analysis of protocol mechanisms, network simulation plays an essential role. This paper demonstrates a network simulator tool channel SimCast. This simulator focuses on the congestion control methods of the transport layer. Using this special purpose simulator, the effects of network topology and loss models can be investigated in detail. This paper presents a comparison of simulation results from SimCast to the output of other network simulators and real network measurements.
- Published
- 2021
35. Network Data Processing Based on Cloud Computing Platform
- Author
-
Dapeng Zhou and Yong Zhu
- Subjects
Data set ,Data processing ,Software ,Data model ,Computer science ,business.industry ,Distributed computing ,Process (computing) ,Cloud computing ,Information repository ,business ,Cluster analysis - Abstract
Traditional data mining technology is based on data repository and related data to calculate data, and find data relationship and data model. Therefore, when processing cloud computing platform network data, it will consume a lot of storage resources and computer resources, which not only has low mining efficiency, but also has high material and software costs, which to a certain extent limits the development of cloud computing platform, traditional data processing technology has been unable to adapt to the current era of large amount of information. Based on this, this paper studies the network data processing based on cloud computing platform. This paper designs k-means clustering algorithm to process network data, and selects 32G, 16G, 8G, 4G, 2G, 1G and other data groups to test the performance of clustering algorithm for network data processing. The experimental results show that with the increase of the size of the data set, the acceleration efficiency of the algorithm will also be improved.
- Published
- 2021
36. Software Defined Network: A Clustering Approach Using Delay and Flow to the Controller Placement Problem
- Author
-
Karan Verma, Pranay Ranjan, and Anilkumar Goudar
- Subjects
Maxima and minima ,Control theory ,Computer science ,Network packet ,Distributed computing ,Forwarding plane ,Table (database) ,Load balancing (computing) ,Cluster analysis ,Software-defined networking - Abstract
Software Defined Network (SDN) is the most significant model for the administration of large-scale complex systems, which may require reconfigurations occasionally. It involves the separation of the network control plane and the forwarding plane, where a control plane controls many devices. In this way, the switches forwards packets by the rules defined in the flow table by the controller. Despite the fact, SDN is a new area, it has pulled in a lot of consideration from both the scholar world and industry. This paper investigates the multi-controller placement problem from the viewpoint of cost and load balance factors. The paper proposes an algorithm named Load Balancing with ECP-LL that places controllers by using clustering. The algorithm uses Shannon entropy which avoids poor local minima problems.
- Published
- 2021
37. A Composite Chain Structure Blockchain Storage Method Based on Blockchain Technology
- Author
-
Wenyuan Ma, Junlu Wang, and Su Li
- Subjects
050101 languages & linguistics ,Blockchain ,business.industry ,Computer science ,Distributed computing ,05 social sciences ,02 engineering and technology ,Storage efficiency ,Chain structure ,Chain (algebraic topology) ,Data association ,Computer data storage ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,business - Abstract
Blockchain is an effective means to store data securely. Existing blockchain systems mostly adopt the equal mining mode, and all bookkeepers (entities) record ledger books on a single main chain, resulting in random data storage in the whole blockchain. Moreover, in complex or classification scenarios, data in a single main chain cannot be correlated or regularly stored, resulting in low storage efficiency. To solve these problems, this paper proposes a composite chain structure blockchain storage method based on blockchain technology. This method firstly proposes the blockchain model of composite chain structure, then constructs the private chain and alliance chain respectively, and finally realizes the adaptive data association storage in complex or classified scenarios. The experimental results show that a composite chain structure blockchain storage method based on blockchain technology proposed in this paper has great advantages in storage efficiency, storage overhead, security performance, availability and other aspects.
- Published
- 2021
38. Analytical Modeling and Optimal Control of Cold Storage System with Large-Scale Implementation Using IoT
- Author
-
Deepak Kumar Gupta, Abu Nasar Ghazali, Bhargav Appasani, and Amitkumar Vidyakant Jha
- Subjects
Computer science ,Control theory ,Software deployment ,Scale (chemistry) ,Distributed computing ,Control (management) ,PID controller ,Particle swarm optimization ,Cold storage ,Optimal control - Abstract
Warehouses and cold storage mechanisms are integral and important components for the storage of the agricultural products beyond their intended life-period. Configurability and self-adaptability can greatly enhance the functional efficiency of these systems and minimize wastage of resources. This paper explores the technical glitches faced by the cold storage system and proposes a novel design for a new and advanced automated cold storage system (ACSS). To analyze the performance of ACSS, a mathematical representation of the model is presented. Two performance metrics, namely, temperature and humidity, are considered which play a vital role in any cold storage system. This paper also proposes efficient methods to monitor and control these performance metrics of the cold storage system. The self-adaptable capabilities are provided by using proportional-integral-derivative (PID) controller whose parameter are tuned using particle swarm optimization (PSO) algorithm. The performance of the designed cold storages system is evaluated using MATLAB simulation. Also, to provide the intelligence capability, the ubiquitous Internet of Things (IoT) implementation of ACSS has been proposed in this paper along with the deployment strategy which further improves the efficacy of cold storage system due to its seamless reconfigurable and self-adaptable capabilities.
- Published
- 2021
39. Research on Operation and Management of Decentralized Dispatching Agency for Multi-energy System Based on Block Chain Technology
- Author
-
Xing Ji, Wang Yong, Yi Liang, Tianmeng Yang, and Fangyuan Yang
- Subjects
business.industry ,Computer science ,Node (networking) ,Distributed computing ,Thermal power station ,The Internet ,Transparency (human–computer interaction) ,Electric power ,business ,Database transaction ,Energy (signal processing) ,Block (data storage) - Abstract
The integration of multi-energy systems is an important feature of energy internet system. The traditional energy systems, such as electric power, thermal power, gas and other energy systems, are operating separately. All kinds of energy systems have been separated and self-made in a long time. They are managed by different departments, and it is difficult to set up a centralized dispatching agency for operation management, which restricts the development of energy internet system greatly. Block chain technology has the main characteristics of decentralization and transparency. Therefore, a decentralization dispatching and operation control mechanism based on block chain technology for multi-energy fusion system is proposed in this paper. Through the establishment of decentralized dispatching agencies for operation management, it is proposed to share the information of energy supply and demand relationship between different energy systems and different regions in multiple energy systems. An optimal operation model of self-dispatching decision-making is established to obtain the results of energy self-dispatching transaction of each energy demand node. Finally, a simulation is conducted of a multi-energy system, and the calculation results verify the effectiveness and feasibility of the self-scheduling decision-making optimization model proposed in this paper.
- Published
- 2021
40. Working with Uncertainties: An Adaptive Fabrication Workflow for Bamboo Structures
- Author
-
Achim Menges, Hans Jakob Wagner, Alexander Verl, Benjamin Kaiser, Yue Qi, Ruqing Zhong, and Long Nguyen
- Subjects
Bamboo ,Process (engineering) ,Computer science ,Distributed computing ,Scale (chemistry) ,0211 other engineering and technologies ,Full scale ,02 engineering and technology ,Bamboo construction ,Task (project management) ,020303 mechanical engineering & transports ,Workflow ,0203 mechanical engineering ,021105 building & construction ,Joint (building) - Abstract
This paper presents and investigates a cyber-physical fabrication workflow, which can respond to the deviations between built- and designed form in real-time with vision augmentation. We apply this method for large scale structures built from natural bamboo poles. Raw bamboo poles obtain evolutionarily optimized fibrous layouts ideally suitable for lightweight and sustainable building construction. Nevertheless, their intrinsically imprecise geometries pose a challenge for reliable, automated construction processes. Despite recent digital advancements, building with bamboo poles is still a labor-intensive task and restricted to building typologies where accuracy is of minor importance. The integration of structural bamboo poles with other building layers is often limited by tolerance issues at the interfaces, especially for large scale structures where deviations accumulate incrementally. To address these challenges, an adaptive fabrication process is developed, in which existing deviations can be compensated by changing the geometry of subsequent joints to iteratively correct the pose of further elements. A vision-based sensing system is employed to three-dimensionally scan the bamboo elements before and during construction. Computer vision algorithms are used to process and interpret the sensory data. The updated conditions are streamed to the computational model which computes tailor-made bending stiff joint geometries that can then be directly fabricated on-the-fly. In this paper, we contextualize our research and investigate the performance domains of the proposed workflow through initial fabrication tests. Several application scenarios are further proposed for full scale vision-augmented bamboo construction systems.
- Published
- 2021
41. Comprehensive Survey for Energy-Efficient Routing Protocols on WSNs Based IoT Applications Enhancing Fog Computing Paradigm
- Author
-
Rajbir Kaur and Loveleen Kaur
- Subjects
Routing protocol ,Computer science ,business.industry ,Fog computing ,Distributed computing ,Key (cryptography) ,Energy consumption ,Internet of Things ,business ,Field (computer science) ,Domain (software engineering) ,Efficient energy use - Abstract
In the modern era of the world, WSNs and IoT are managing the improvements in the research of the current environments. All sciences and technologies are searching for efficient and cost-effective moves toward that reveal new strategies and ideas in the planned field. Overview of survey gives efficient and broad access to these ideas in the proposed domain. However, this inspiration as a key concern and an idea about the energy-efficient routing protocols on controlling and overseeing energy utilization of WSNs. Moreover, to minimize energy consumption and maximize the lifetime of the network, they are the key necessities to design the energy-efficient routing protocols. In this research paper, energy-efficient routing protocols of WSNs and IoT are presented with their methods and performance metrics. This paper also surveys the fog computing techniques and highlights their key features and performance metrics. This study can be valuable for researchers as the beginning stage for a fast comprehension of weaknesses and inadequacies in this field to help out advance research in the future.
- Published
- 2021
42. Efficient Information Flow Based on Graphical Network Characteristics
- Author
-
Atul Kumar Verma, Mahipal Jadeja, and Rahul Saxena
- Subjects
Connected component ,Strongly connected component ,Computer science ,Node (networking) ,Distributed computing ,Information flow (information theory) ,Graphical model ,Degree distribution ,Average path length ,Network analysis - Abstract
In today’s environment of rapid information generation, getting precise information about an event is not only sufficient but getting that information in time (or as early as possible) is rather more important. Further, in certain situations, it may also be equally important to put a control to a sort of outbreak in the network. This calls for the processes and techniques which can be developed to make the information to flow from one source to another as per the desired necessities. Social networks, VANETs, electrical circuit networks, etc. are prime examples where channelized information flow is required to accomplish the desired task. For this, we need to map or mimic the real information flow scenario to some simulative environment or model. In this paper, basic graph theory concepts have been used to model various scenarios of these suggested networks to depict how network characteristics can play a vital role to make the information flow happen in a more systematic and optimized way so that the desired task can be accomplished. The paper takes into consideration degree distribution of the graph, PageRank scores, strongly connected components, weakly connected components, average path length, etc. and other desired characteristics that will guide node to node information flow so that various parameters remain optimized like path length, no. of nodes visited, etc. The graphical model will be mimicked using Stanford Network Analysis Platform (SNAP) to evaluate these basic measure’s characteristics and help us propose different algorithms depending upon the scenarios. Finally, the paper will be concluded with an insight that how the algorithms can be worked out to already existing framework using these network characteristics.
- Published
- 2021
43. Design Method of Human-Computer Interactive Interface of MTS Based on DCS of Nuclear Power Plant
- Author
-
Li-Jun Dang, Jun Huang, and Qi Ye
- Subjects
Communication design ,business.industry ,Computer science ,media_common.quotation_subject ,Interactive design ,Interface (computing) ,Distributed computing ,Interaction design ,Application software ,computer.software_genre ,Software ,Debugging ,business ,Engineering design process ,computer ,media_common - Abstract
MTS (maintenance and test software), as an important human-computer interactive tool in DCS of nuclear power plant, plays a crucial role in configuration and management of the engineering applied data, engineering design, system debugging and operational maintenance. With the advent of information age, industrial designers pay more and more attention to interactive design, and user attaches increasing importance to the human-machine interactive experience of products, which puts forward new requirements for the human-machine interactive interface of MTS. This paper takes the human-computer interaction visual design of MTS as the core, through analyzing the human-computer interaction model and requirements of MTS, formulates the overall design scheme of the human-computer interaction system of MTS. According to the overall scheme, a set of human-computer interaction visual design method applied to MTS of DCS in nuclear power plant is proposed. The method and criterion of human-computer interaction design proposed in this paper is very important for the design human-computer interaction of nuclear power plant application software, and also points out the direction of human-computer interaction optimization of MTS mentioned in this paper.
- Published
- 2021
44. Graph Computing System and Application Based on Large-Scale Information Network
- Author
-
Weibin Zeng, Jiaming Huang, Zhao Li, and Jingbo Xu
- Subjects
Social network ,business.industry ,Software deployment ,Computer science ,Learning curve ,Face (geometry) ,Distributed computing ,Graph (abstract data type) ,Usability ,Link (geometry) ,business ,Spatial analysis - Abstract
Graph computing is more and more widely used in various fields such as spatial information network and social network. However, the existing graph computing systems have some problems like complex programming and steep learning curve. This paper introduces GRAPE, a distributed large-scale GRAPh Engine, which has the unique features of solid theoretical guarantee, ease of use, auto-parallelization and high performance. The paper also introduces several typical scenarios of graph computing, including entity resolution, link prediction, community detection and graph mining of spatial information network. In these scenarios, various problems have been encountered in the existing systems, such as failure to compute over large-scale data due to the high computation complexity, loss of accuracy due to the cropping of original data and too long execution time. In the face of these challenges, GRAPE is easy to support these computing scenarios with a series of technical improvements. With the deployment of GRAPE in Alibaba, both effectiveness and efficiency of graph computing have been greatly improved.
- Published
- 2021
45. Metaheuristic Optimization Using Hybrid Algorithm in Cloud-Based Big Data Analytics
- Author
-
G. Pradeepini and Amitkumar Manekar
- Subjects
business.industry ,Computer science ,Distributed computing ,Genetic algorithm ,Big data ,Resource allocation ,Particle swarm optimization ,Cloud computing ,business ,Hybrid algorithm ,Scheduling (computing) ,Task (project management) - Abstract
Task Scheduling is a prominent research topic in cloud computing. There are several objectives associated with Optimise Task Scheduling and Resource allocation as cloud computing systems are more complex than the traditional distributed system. There are several challenges such as resolving the task mapped to the node on which task to be executed. Modelling deadline or make spam parameter, task reliability, various task allocation strategies, etc. A simplified but near-optimal proposed nature-inspired algorithms are focus in this paper. In this paper, a basic idea about optimisation, reliability, and complexity is considered while designing a modern BDA solution (Big Data Application). In this paper, we focused on Dragonfly algorithm and Sea lion algorithms which are nature-inspired algorithms. These algorithms are efficient for optimisation purposes for solving task scheduling and resource allocation problem. Finally, the performance of the DA algorithm and Sea lion is compared with the Genetic Algorithm (GA) and Particle Swarm Optimisation (PSO) for modern BDA such as Hadoop Map reduce. Simulation results prove the efficacy of the suggested algorithms
- Published
- 2021
46. A Novel Agent-Based Methodology for Job Scheduling in Cyber Physical Systems
- Author
-
P. Deepan Babu, Swamynathan Ramakrishnan, and T. Amudha
- Subjects
Job scheduler ,business.industry ,Computer science ,Distributed computing ,Cyber-physical system ,Cloud computing ,computer.software_genre ,Scheduling (computing) ,Intelligent agent ,Software agent ,The Internet ,business ,computer ,Computer technology - Abstract
Cyber physical systems (CPS) is the most extensive inventions in the field of information and computer technology. CPS utilizes the computers to perform tasks efficiently in connection to physical world. CPS can be expressed as an association of computers and networks with the physical process, also tightly integrated with internet and uses cloud for storage and computation. This paper proposes a software agent architecture for efficient job request scheduling in a cloud and improved response in a CPS environment. Intelligent agent architecture for scheduling interconnects various software agents and work without any human interference; acts on behalf of others to make the cyber physical system operate in an intelligent fashion. As it is well known that cloud is an essential paradigm widely used all over the world to handle multiple concurrent jobs and also to bring down their computational and operational expenditure, there is always a need for a highly functional scheduling architecture aimed at timely job completion, which is detailed in this paper.
- Published
- 2021
47. Implementation of Blockchain Based Distributed Architecture for Enhancing Security and Privacy in Peer-To-Peer Networks
- Author
-
Kriti Patidar and Swapnil Jain
- Subjects
Blockchain ,Leverage (negotiation) ,Computer science ,Distributed computing ,Use case ,Peer-to-peer ,computer.software_genre ,computer ,Popularity - Abstract
Blockchain technology has gained maximum popularity in recent years as compared to the other latest technologies. It works as immutable ledger in which the transactions are done in decentralized way. It has started spreading its wings now as it is not only used in financial applications but many other companies in the industry are trying to leverage the benefits offered by blockchain in their projects. As industries are committing towards blockchain based projects, there is a need of blockchain implementation and associated development. This paper introduces the basic requirements of blockchain development and proposes a generic blockchain that can be considered as a mould for implementation in different use cases. In this paper a distributed architecture is implemented using blockchain with improved security and privacy. The expected contribution of this paper is to provide an overview for researchers and developers to build applications utilizing the blockchain as a basis.
- Published
- 2021
48. Optimal Defense Resource Allocation and Geographically Feasible Hexagonal Topology Construction for Power Grid Security
- Author
-
Long Cheng and Yifa Liu
- Subjects
Attack model ,Electric power system ,Topology construction ,Hexagonal crystal system ,Order (exchange) ,Computer science ,Distributed computing ,Optimal allocation ,Resource allocation ,Power grid - Abstract
Power system faces thousands of physical and cyber attacks which seriously threaten its security. It is noted that most defense methods are only suitable for specific cyber attacks and are not applicable to physical attacks. This paper provides a generic method regardless of different attack types through topological efforts to reduce potential loss of the power grid. In this paper, a proportional loss model is proposed depending on the different attack-defense resource allocations. The optimal allocation strategy can be converted into the solution to a \(\min \max \) problem. In order to further improve the security of the power grid, by taking the geographical feasibility into consideration, a hexagonal construction method is proposed to provide a cost-affordable and geographically-feasible solution for new power grid construction.
- Published
- 2021
49. A Review on Load Balancing Methods for Cloud Computing Based on Ant Colony Optimization, Honey-Bee and Genetic Algorithm
- Author
-
Banani Das, Sanjoy Goswami, and Trishna Bhowmik
- Subjects
Computer science ,business.industry ,Server ,Distributed computing ,Ant colony optimization algorithms ,Genetic algorithm ,Cloud computing ,Overall performance ,Honey bee ,Load balancing (computing) ,business - Abstract
The load balancing is an important aspect of systematized operations in distributed environments. As cloud computing is emerging expeditiously and clients are claiming more facilities and improved results, load balancing for the cloud environment has become a very fascinating and crucial research area. Load balancing in cloud computing is defined as the method of splitting workloads and other computing properties among different computers, networks or servers in a cloud computing environment. Researchers have proposed many approaches to provide cloud load balancing with the aim to intensify the overall performance of the cloud computing. In this paper, the different cloud load balancing methods with the three most efficient approaches have been investigated. The three approaches that are reviewed in this paper are the ant colony optimization method, the honey-bee algorithm, and genetic algorithm. This research paper summarized the methods for cloud load balancing based on these three mentioned approaches.
- Published
- 2021
50. State-of-the-Art Review on Microgrid Control Strategies and Power Management with Distributed Energy Resources
- Author
-
Nada Ali and Deepak Kumar
- Subjects
Power management ,Electricity generation ,business.industry ,Computer science ,Distributed generation ,Distributed computing ,Automatic frequency control ,Microgrid ,Grid ,business ,Decentralised system ,Renewable energy - Abstract
The conceptualization of microgrid has led to various technological advances in power generation and consumption as it facilitates the integration of environment-friendly renewable energy sources. Microgrid generally comprises of several distributed energy resources interfaced with the utility grid through power converters. The system’s frequency and voltage are sustained in order that the microgrid’s operation is secure and reliable. This paper encompasses futuristic control strategies defining the functioning of the microgrid when connected to the grid and likewise in stand-alone mode. Primary level of control, secondary level of control and tertiary level of control form the three hierarchical control structures for the microgrid. A comparative analysis of various controls has also been shown in this paper.
- Published
- 2021
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.