this paper presents result analysis of K-Mediod algorithm, implemented on Hadoop Cluster by using Map-Reduce concept. Map-Reduce are programming models which authorize the managing of huge datasets in parallel, on a l...
详细信息
ISBN:
(纸本)9781538618608
this paper presents result analysis of K-Mediod algorithm, implemented on Hadoop Cluster by using Map-Reduce concept. Map-Reduce are programming models which authorize the managing of huge datasets in parallel, on a large number of devices. It is especially well suited to constant or moderate changing set of data since the implementation point of a position is usually high. MapReduce is supposed to be framework of "big data". the MapReduce model authorizes for systematic and instant organizing of large scale data with a cluster of evaluate nodes. One of the primary affect in Hadoop is how to minimize the completion length (i.e., make span) of a set of MapReduce duty. For various applications like word count, grep, terasort and parallel K-Mediod Clustering Algorithm, it has been observed that as the number of node increases, execution time decreases. In this paper we verified Map Reduce applications and found as the amount of nodes increases the completion time decreases.
this paper presents an optimal Energy Management Strategy (EMS) to optimize Grid / PV / EV hybrid system in Smart Building with a Vehicle-to-Grid (V2G) concept and so bidirectional capability of the vehicle. the aims ...
详细信息
ISBN:
(纸本)9781538659823
this paper presents an optimal Energy Management Strategy (EMS) to optimize Grid / PV / EV hybrid system in Smart Building with a Vehicle-to-Grid (V2G) concept and so bidirectional capability of the vehicle. the aims of the multiobjective optimization are to maximize the selfconsumption of the solar production and to optimal charging the vehicle together. Linear programming method is used to solve the optimization problem. the use cases results show the great economic profitability potential of the studied system.
Intrusion Detection System (IDS) is an essential component of the network security infrastructure. It detects malicious activities by monitoring network traffic. there are two main classes of IDS: the anomaly-based ID...
详细信息
ISBN:
(纸本)9781479987849
Intrusion Detection System (IDS) is an essential component of the network security infrastructure. It detects malicious activities by monitoring network traffic. there are two main classes of IDS: the anomaly-based IDS and signature-based IDS. An important challenge, for signature-based IDS, is automating attack signature writing from traffic logs, which can be very hard to be established for human administrator. In this paper, we propose a solution addressing this challenge. We propose cloud-based signature learning service using Inductive Logic programming (ILP). Learning service generates rule describing properties shared by packets labelled as malicious and that do not cover normal packets. the system uses a background knowledge composed of predicates used to describe network attack signature. the cloud architecture of our IDS enables it to have specialized nodes. Preliminary experimentations show that the proposed system is able to reproduce automatically SNORT signature.
Modeling time series is a well investigated area for a long period. During last years fuzzy cognitive maps have been successfully employed for this purpose. Easy interpretation of relations and dependencies in an info...
详细信息
ISBN:
(纸本)9781538651636
Modeling time series is a well investigated area for a long period. During last years fuzzy cognitive maps have been successfully employed for this purpose. Easy interpretation of relations and dependencies in an information space raised by time series is an important aspect of latest researches, which brought time series processing from an elementary, numerical, level to a space of concepts created by a given time series. In this paper we investigate time series modeling with fuzzy cognitive maps at a concept level. Discussion is focused on constructions of fuzzy cognitive maps for a given time series which is transformed to a level of concepts. Attention is payed on objective functions, which are employed to training and quality evaluating of fuzzy cognitive maps. Several types of objective functions are proposed, discussed and tested. Objective functions studied in this paper are based on mean square error and maximal square error.
Based on credibility theory, this paper reports on the application of fuzzy programming with recourse to strategic planning decisions regarding resource acquisition. To solve the two-stage fuzzy programming problem, a...
详细信息
ISBN:
(纸本)9781424420957
Based on credibility theory, this paper reports on the application of fuzzy programming with recourse to strategic planning decisions regarding resource acquisition. To solve the two-stage fuzzy programming problem, a heuristic solution method which combines approximating method (AM), tabu search (TS) and neural network (NN), is proposed. At the end of the paper, we provide one numerical example to illustrate the feasibility and effectiveness of the designed algorithm.
the proceedings contain 56 papers. the topics discussed include: what�s wrong with APL?;SIAL/74 - an APLSV analog-logical block-diagram simulator;a formal definition of APL statement syntax;a portable APL translator;l...
the proceedings contain 56 papers. the topics discussed include: what�s wrong with APL?;SIAL/74 - an APLSV analog-logical block-diagram simulator;a formal definition of APL statement syntax;a portable APL translator;large scale gymnastics championships: an on-line interactive collection and analysis of scores;content analysis of APL defined functions;APL authorization processing;APLSV access to indexed sequential files;APL as a statutory language;systems programming tools;and APL functions for precision control in floating-point computations.
this paper highlights the Application of Linear programming in determining the optimized allocation. the Focus of this study is maximizing the efficiency of the eCustomer Care Service for the year 2019 by determining ...
详细信息
Contingency screening and ranking are one of the most important issues for security assessment in the field of power system operation. the objective of contingency ranking is to quickly and accurately select the short...
详细信息
ISBN:
(纸本)9781538617892
Contingency screening and ranking are one of the most important issues for security assessment in the field of power system operation. the objective of contingency ranking is to quickly and accurately select the short list of critical contingencies from the large list of potential contingencies and rank them according to the severity. Contingency ranking is done on basis of calculation of Performance Index (PI), which measures the system deviation from the normal or steady state by identifying transmission line overloads as well as voltage limit violations at buses. In electric power systems, assignment of weighting factors to each bus and transmission line depends on the importance of specific bus and transmission line during power system operation. However, it is observed that while using weighted performance index, the weighting factor is assumed to be equal for all transmission lines, and generator outages, which leads to mis-ranking of potential contingencies. In this paper, an attempt is undertaken to adjust the appropriate and unequal weighting factors, in order to provide more accurate and realistic contingency ranking. Optimization of weighting factor is done using Quadratic programming for IEEE 14 and 30 bus systems.
In this study, the authors produced self-instructional video materials for a first-year programming course based on two methods;the first method was a monologue-based captured slideshow presentation, whereas the other...
详细信息
ISBN:
(纸本)9781450366397
In this study, the authors produced self-instructional video materials for a first-year programming course based on two methods;the first method was a monologue-based captured slideshow presentation, whereas the other method was a dialogue-based video involving two puppets. We created ten videos for each of these methods and used these videos in the course to examine the manners of students who watched them and whether the trend of watching varied according to their academic performance level. the results denoted that the audience rate of the slideshow presentation video gradually increased as the lessons continued, whereas that of the videos involving puppets exhibited the opposite trend. the questionnaires that were collected from the students indicated that they watched the videos involving puppets, especially in the beginning. thus, the videos involving puppets exhibited efficacy, especially for beginners. Meanwhile, the slideshow video was effective for (re) confirming the important points.
the evolution of Web sites towards very dynamic applications makes it necessary to reconsider current Web programming technologies. We believe that Web development would benefit greatly from more abstract paradigms an...
详细信息
ISBN:
(纸本)9781605583327
the evolution of Web sites towards very dynamic applications makes it necessary to reconsider current Web programming technologies. We believe that Web development would benefit greatly from more abstract paradigms and that a more semantical approach would result in huge gains in expressiveness. In particular, functionalprogramming provides a really elegant solution to some important Web interaction problems, but few frameworks take advantage of it. the Ocsigen project is an attempt to provide global solutions to these needs. We present our experience in designing this general framework for Web programming, written in Objective Caml. It provides a fully featured Web server and a framework for programming Web applications, withthe aim of improving expressiveness and safety. this is done by taking advantage of functionalprogramming and static typing as much as possible.
暂无评论