Fog Computing become an emerging technology and majorly adapted to IoT networks. In the IoT network Fog nodes interact directly with edge devices and create easy communication with reliable data transmission to store ...
Fog Computing become an emerging technology and majorly adapted to IoT networks. In the IoT network Fog nodes interact directly with edge devices and create easy communication with reliable data transmission to store in cloud data centers. In this paper we proposed a Cost Function for Delay(CFD) in transmission of data from end devices to cloud data centers by passing through fog devices and other network devices in a multi hop based network. The total data transmission time included with many parameters including delay which occupies small amount of time in total data transmission time. The CFD evaluated for every local device on reach by each hop and at fog device where task offload dynamically. In our proposal we considered the greedy heuristic based approach to derive the solution effectively.
Personalized flight recommendation is useful when a traveler wants to find the most suitable flight ticket efficiently. It is hard to learn latent factors behind personal choices directly from users' preferred fli...
详细信息
Personalized flight recommendation is useful when a traveler wants to find the most suitable flight ticket efficiently. It is hard to learn latent factors behind personal choices directly from users' preferred flight tickets whose features change over time, which leads to the ineffectiveness of traditional recommendation approaches. Therefore, we propose a personalized flight ticket recommendation approach based on paired choice modeling. In this approach, an optimization problem is formulated to maximize a user's choice utility over flight tickets through a paired-choice analysis of users' historical orders. The experiments conducted on a real world dataset show that our approach outperforms other state-of-the-art methods.
In the `safety-critical' computer systems, the present existing methodologies consist of the two-failure State safety assessments that have restrictions. Based on the Markov's chain state explosion problem, Ma...
详细信息
ISBN:
(纸本)9781467394178
In the `safety-critical' computer systems, the present existing methodologies consist of the two-failure State safety assessments that have restrictions. Based on the Markov's chain state explosion problem, Markov chain modeling technique is restricted to design only small size systems. Some imaginary assumptions are also attached to the `safety assessment' in the safety-critical computer systems. Actually to the present existing physical fault parameters, namely, physical fault failure rate and physical fault coverage, additionally design fault failure rate and design fault coverage are being attached, which is used to estimate the parameters safety and MTTUF. Design faults are included to avoid the over-optimistic estimations of safety and MTTUF. The techniques used to estimate the four input parameters are reviewed.
From the last decades, routing protocol is a critical issue in multi-hop network. There are mainly three categorization of routing protocol: unicast, multicast and broadcast. Here, we are focusing on multicast routing...
详细信息
ISBN:
(纸本)9781509012862
From the last decades, routing protocol is a critical issue in multi-hop network. There are mainly three categorization of routing protocol: unicast, multicast and broadcast. Here, we are focusing on multicast routing protocol in mobile ad hoc network. Multicast routing is a communication paradigm between a sender and multiple receiving nodes. Multimedia is the main application of multicast routing. In this paper, we are highlighting some efficient multicast routing algorithms. The considered concept in efficient multicast routing protocol are Genetic Algorithm, MC-TRAC approach, Virtual Force based multicast routing, Zone based multicast routing, Bandwidth Efficient multicast routing, Distance based Angular multicast routing protocol, Greedy zone routing, Ant Colony Optimization based multicast routing, ENB cluster multicast routing and Cluster based Signal Architecture for firefighter supporting audio/video conferencing.
Unified Modelling Language is a widely accepted in software development environment. Elder programs were often complex and large that need a frequent maintenance. To overcome this problem, object oriented analysis &am...
详细信息
ISBN:
(纸本)9781509012862
Unified Modelling Language is a widely accepted in software development environment. Elder programs were often complex and large that need a frequent maintenance. To overcome this problem, object oriented analysis & design paradigm is adapted by many developers. To standardize this concept, object management group introduced Unified Modelling Language (UML). There is a list of growing UML based applications from design architecture of system, coding, testing to maintenance also. Code generation is one of the majorly used applications of UML diagrams. UML diagrams can be broadly divided into structural and behavioural based diagrams. In this paper, we are mainly concentrating on behavioural diagram of unified modelling language for code generation.
In recent years, the research done for developing automated inconsistency checker has proved a boon for many developers and testers. Inconsistency in the code leads to many issues. There is availability of some incons...
详细信息
ISBN:
(纸本)9781509012862
In recent years, the research done for developing automated inconsistency checker has proved a boon for many developers and testers. Inconsistency in the code leads to many issues. There is availability of some inconsistency tools that have been developed to check various kinds of inconsistencies. In this paper, a comparative review on the existing methods/tools available is presented for the inconsistencies detection. The comparative review is based on the types of Semantic, Syntactic inconsistencies and POS (Parts-Of-Speech) tagging. POS is further considered in POS-Phrase basis and POS-Word basis.
Ternary logic has some distinct advantage over binary logic. In this paper we propose a synthesis approach for ternary reversible circuits using ternary reversible gates. Our method takes a boolean function as input. ...
详细信息
Ternary logic has some distinct advantage over binary logic. In this paper we propose a synthesis approach for ternary reversible circuits using ternary reversible gates. Our method takes a boolean function as input. The input is provided as .pla file. The .pla file is first converted into ternary logic function, which can be represented as permutation. The gate library used for synthesis is Ternary Not, Ternary Toffoli and Ternary Toffoli + (N T ,T T ,T T + ). The proposed constructive method, generates 3-cycles from the permutation, and then each 3-cycle is mapped to (N T ,T T ,T T + ) gate library. Experimental results show that the method generates lesser number of gates for some circuits compared to previously reported works.
Multi-document summarization is useful when a user deals with a group of heterogeneous documents and wants to compile the important information present in the collection, or there is a group of homogeneous documents, ...
详细信息
ISBN:
(纸本)9781509016679
Multi-document summarization is useful when a user deals with a group of heterogeneous documents and wants to compile the important information present in the collection, or there is a group of homogeneous documents, taken out from a large corpus as a result of a query. We present an approach to automatic multi-document summarization that depends on clustering and sentence extraction. User provides a query, based on the query;documents that are relevant to the query are extracted from a document corpus containing documents from various domains. An n x n similarity matrix is created among the sentences having sentence level similarity in all extracted documents. Then clusters of similar sentences are formed using Markov clustering algorithm. In each cluster, each sentence is assigned five different weights 1. Chronological weight of sentence (Document level) *** weight of sentence (position of sentence in the document) 3. Sentence weight (based on term weight) 4. Aspect based weight (sentence containing aspect words) and 5. Synonymy and Hyponym Weight. Then top ranked sentences having highest weight are extracted from each cluster and presented to user.
In this paper,we focus on top-down discretization methods and propose a new method for supervised discretization based on class-feature correlation by defining a class-feature contingency *** proposed method takes int...
详细信息
In this paper,we focus on top-down discretization methods and propose a new method for supervised discretization based on class-feature correlation by defining a class-feature contingency *** proposed method takes into consideration the distribution of all samples to generate an ideal discretization *** method maintains a high interdependence between the target class and the discretized attribute,and avoids *** evaluation of seven discretization algorithms on UCI real datasets show that the novel algorithm can yield a better discretization scheme that improves the accuracy of decision tree *** to the execution time of discretization and the number of generated rules,our approach also achieves promising results.
暂无评论