One of the key issues in unban public space design is how to establish an evaluation system for its usage. The modernization for urban public space management cannot be achieved without the decision support service by...
详细信息
ISBN:
(纸本)9781538628133
One of the key issues in unban public space design is how to establish an evaluation system for its usage. The modernization for urban public space management cannot be achieved without the decision support service by intelligent evaluation system. In the 21st century, more attention has been paid to human activities and needs in public space design, and with the development of mobile information technology, it become possible to have access to a large number of network data (social network, theme website, or search engines etc.), reflecting urban space quality and people's behavior characteristics. Based on the idea of Big Data, which uses cloud computing, this paper attempts to establish an intelligent evaluation method for urban public space by means of mobile information devices such as GPS, intelligent phone, social network, IC card and RFID communication technology.
Software Defect Prediction (SDP) models are used to identify the defect prone artifacts in a project to assist testing experts and better resource utilization. It is simple to build a SDP model for a project having hi...
详细信息
In the ICT era the need of depth investigation and analysis is required on network traffic. The analysis should focus on detecting DDoS attacks. In the 21st century the use of communication or transactions arc complet...
详细信息
ISBN:
(纸本)9781538611449
In the ICT era the need of depth investigation and analysis is required on network traffic. The analysis should focus on detecting DDoS attacks. In the 21st century the use of communication or transactions arc completely doing through online, the political activists, and international cyber terrorists are choosing the DDoS attacks as a powerful weapon for their illegal an un ethical activities. It is impossible to the human being to identify all these unethical activities, hence the need of machine based algorithms are required. In this paper we used GLM, GBM, NN, RF regression algorithms for detection and prediction of DDoS attacks, and also proved that by using regression algorithms we observed more accurate result than using KNN SVM algorithm.
The optimal power flow has been considered as the important issue in the power system network. There are many ways to optimize the power flow out of which power loss minimization and voltage profile improvement are co...
详细信息
ISBN:
(纸本)9789811016752;9789811016745
The optimal power flow has been considered as the important issue in the power system network. There are many ways to optimize the power flow out of which power loss minimization and voltage profile improvement are considered as the efficient ways. The power loss minimization for distributed system has been performed with particle swarm optimization (PSO) algorithm and the results are compared with forward/backward load flow method. The analysis is also performed with and without addition of renewable sources. The results show that the inclusion of DG at various buses reduces the power loss and improves the voltage magnitude profile
This paper focuses on the research of all kinds of data in the power grid business system, and carries on the research of intelligent analysis technology. It focuses on breaking the technical difficulties of intellige...
详细信息
ISBN:
(纸本)9781450354301
This paper focuses on the research of all kinds of data in the power grid business system, and carries on the research of intelligent analysis technology. It focuses on breaking the technical difficulties of intelligent and efficient analysis and mining, distributed multi-stream real-time processing, developing large-scale stock data for power and high-frequency incremental data efficient analysis system prototype, for wide-area distributed multi-stream real-time computing, from the data quick access to valuable information to solve the problems in the grid business system to improve the overall business performance, to achieve support power Data real-time processing and other technology applications.
Cloud computing and big data analytics are, without a doubt, two of the most important technologies to enter the mainstream IT industry in recent years. Surprisingly, the two technologies are coming together to delive...
详细信息
Cloud computing and big data analytics are, without a doubt, two of the most important technologies to enter the mainstream IT industry in recent years. Surprisingly, the two technologies are coming together to deliver powerful results and benefits for businesses. Cloud computing is already changing the way IT services are provided by so called cloud companies and how businesses and users interact with IT resources. Big Data is a data analysis methodology enables by recent advances in information and communications technology. However, big data analysis requires a huge amount of computing resources making adoption costs of big data technology is not affordable for many small to medium enterprises. In this paper, we outline the the benefits and challenges involved in deploying big data analytics through cloud computing. We argue that cloud computing can support the storage and computing requirements of big data analytics. We discuss how the consolidation of these two dominant technologies can enhance the process of big data mining enabling businesses to improve decision-making processes. We also highlight the issues and risks that should be addressed when using a so called CLaaS, cloud-based service model. (C) 2017 The Authors. Published by Elsevier B.V.
Wireless sensor network (WSN) is all time researched area as well as new concepts are introduced frequently. Here we will consider the hierarchical clustering routing protocol called LEACH and its variant as E-LEACH (...
详细信息
ISBN:
(纸本)9789811027505;9789811027499
Wireless sensor network (WSN) is all time researched area as well as new concepts are introduced frequently. Here we will consider the hierarchical clustering routing protocol called LEACH and its variant as E-LEACH (energy leach). There may be a case in E-LEACH that selected cluster heads may be accumulated in certain specific area (or not distributed) due the consideration of only residual energy. Our proposed method includes the consideration of residual energy as well as selected cluster heads to be distributed in the entire wireless network. This balance load and increase the network life time.
Nowadays, intelligent Transportation Systems (ITS) aim to reduce accidents, fuel consumption and roads congestion, for this reason Vehicular Ad-hoc Networks (VANETs) technology as special case of ITS represent the fut...
详细信息
ISBN:
(纸本)9783319529417;9783319529400
Nowadays, intelligent Transportation Systems (ITS) aim to reduce accidents, fuel consumption and roads congestion, for this reason Vehicular Ad-hoc Networks (VANETs) technology as special case of ITS represent the future of the smart vehicles, the use of this one in order to improve road traffic safety will be great challenge. As can be seen, the number of cars worldwide is growing day after day. The deployment of VANETs technology which is composed of several types of communications has interested many researchers. So that to stabilize and handle this number of vehicles, we have focused our search on Quality of Service (QoS) and increased packet delivery ratio between vehicles by implementing Clustering scheme. This paper describes a new distributed algorithm connectivity-based to form stable clusters. To evaluate our proposal scheme, we have conducted various simulations in OMNeT++ and SUMO simulators. The obtained results are promising in terms of packet delivery ratio and overhead.
Throughput is a valuable parameter for mobile ad hoc network (MANET), it is defined as a number of successfully received packets in a unit interval of time. In wireless communication for the extension of coverage as w...
详细信息
ISBN:
(纸本)9789811016752;9789811016745
Throughput is a valuable parameter for mobile ad hoc network (MANET), it is defined as a number of successfully received packets in a unit interval of time. In wireless communication for the extension of coverage as well as capacity MANET is used. In this paper cross-layer is designed between physical and network layer using received signal strength (RSS) as a cross-layer interaction parameter. The given technique proposes strong route formation in ad hoc on-demand distance vector (AODV) through cross-layer design (CLD), distributed space-time coding (DstC), and particle swarm optimization (PSO) in MANET. The simulation results show the improvement in performance of MANET.
Content-based routing, which is under a category of sophisticated routing protocol, is used to propose a routing protocol that can replace Internet protocol. Content-based routing is used to querying, fetching, and fi...
详细信息
ISBN:
(纸本)9789811016783;9789811016776
Content-based routing, which is under a category of sophisticated routing protocol, is used to propose a routing protocol that can replace Internet protocol. Content-based routing is used to querying, fetching, and finding desired information where in the other routing based system;they forwarded the packets on DNS or data senses. Main issues with the past were constraints of the storage. We have seen in some papers that name-based routing is feasible to achieve content-based routing.
暂无评论