A practical problem that arises in data analysis is to handle missing attribute values in an information system that has suffered degradation, so as to retain its quality. In this paper, we present a new Rough Set (RS...
详细信息
A practical problem that arises in data analysis is to handle missing attribute values in an information system that has suffered degradation, so as to retain its quality. In this paper, we present a new Rough Set (RS) based approach to deal with incomplete data. The core idea is to tap the redundant information garnered from different databases that share common attributes. The attribute suffering missing entries in a deficient database is recast as a decision attribute in another reference database. The tenets of RS theory are then applied to derive rules that predict the missing values. Experimental results on pairs of two different pairs of related databases taken from the UCI repository reveal that our approach could predict missing values with a high degree of accuracy giving an average error of 15.75%.
This paper discusses a new protocol HEED-FL that follows the basic approach of the HEED protocol, but selects the cluster head by using fuzzy logic based on the three parameters: residual energy, degree of node, and d...
详细信息
This paper discusses a new protocol HEED-FL that follows the basic approach of the HEED protocol, but selects the cluster head by using fuzzy logic based on the three parameters: residual energy, degree of node, and distance between a sensor and base station. The HEED-FL protocol performs more than twelve times better than the original HEED protocol. It indeed performs better than many important protocols that have similar kind functionality as that of the HEED protocol.
Electrochemical discharge machining is a process which combines the characteristic of electro-chemical machining and electric-discharge machining and has potential to machine electrically non-conductive materials such...
详细信息
Cloud Computing is a recent developmental paradigm in the field of computing offering huge power to next generation computers. The dynamic provisioning acts as a base for cloud computing facilitating and supporting th...
详细信息
Cloud Computing is a recent developmental paradigm in the field of computing offering huge power to next generation computers. The dynamic provisioning acts as a base for cloud computing facilitating and supporting the network services. It focuses on making the vision of utility computing a reality with pay-as-you-go. It offers immense potential to bloom the world with applications and products focussing on greater resource utilization and scalability. This paper presents the basic cloud computing fundamentals and the concepts of load balancing i.e., scheduling of load in the cloud. It elaborates the existing load scheduling algorithms with their merits/demerits and suitability in the cloud and heterogeneous computing environment and proposes a new perspective for better results as per desired parameters.
Ant Colony Optimization (ACO) is one of the important techniques for solving optimization problems. It has been used to find locations to deploy sensors in a grid environment [12], in which the targets, called point o...
详细信息
Ant Colony Optimization (ACO) is one of the important techniques for solving optimization problems. It has been used to find locations to deploy sensors in a grid environment [12], in which the targets, called point of interest (PoI), are located on grid points in a square grid. The locations of sensors, which are grid points, are determined by considering the sink location as the starting point for deploying sensors. Though that work provides optimum number of sensors to cover all targets with respect to the given sink location, yet it does not provide which sink location provides minimum number of sensors to cover the targets. In this paper, we use ACO technique and find the sink location for which the number of sensors is minimum among all available locations in the grid. In our algorithm, we compute sum of distances of the targets from that sensor, which are in its range. Then we add these sums for all sensors in the grid. This distance corresponds to the given sink location. We repeat same process for computing the distance by changing the sink location in the grid. We choose that sink location for which the distance is minimum and this sink location requires minimum number of sensors to cover all targets. We carry out simulations to demonstrate the effectiveness of our proposed work.
Mining of regular patterns in dynamic networks finds immense application in characterizing the local properties of the networks, like behaviour (friendship relation), event occurrence (football matches). They in then ...
详细信息
Mining of regular patterns in dynamic networks finds immense application in characterizing the local properties of the networks, like behaviour (friendship relation), event occurrence (football matches). They in then are used to predict their future trends. But if they do not entail weight and direction aspects of the dynamic network, there can be loss of several significant details, such as strength of a relationship or event, specification of the person responsible for it in a relationship, winning or losing in case of events. To the best of our knowledge, no work has been reported yet to extract regular patterns that take into account weight and direction aspects of dynamic networks. We thus propose a novel method to mine regular patterns in weighted and directed networks. In the proposed method, different snapshots of the dynamic network are taken, and through the concept of Regular Expression, we obtain repetition rule for each of: occurrence sequence, weight sequence, direction sequence and weight-direction sequence. For each of these four categories, edges having same rule are grouped to obtain evolution patterns. To ensure the practical feasibility of the approach, experimental evaluation is done on the real world dataset of Enron emails. The results obtained show that, 2.39%, 6.92%, 9.96% and 1.81% of the edges are found to be regular on weight, direction, occurrence and weight-direction respectively.
We confer a four stage heterogeneous energy efficient network model to defines the stage-one, stage-two, stage-three, and stage-four, heterogeneity, in this work. We consider a stable election protocol (SEP) to estima...
详细信息
We confer a four stage heterogeneous energy efficient network model to defines the stage-one, stage-two, stage-three, and stage-four, heterogeneity, in this work. We consider a stable election protocol (SEP) to estimate the network lifetime and accordingly call its implementations as HSEP-1, HSEP-2, HSEP-3, and HSEP-4. The HSEP-1 is the original SEP protocol in which the network contains the same energy for all nodes. The HSEP-2, HSEP-3, and HSEP-4, contain two, three, and four stage of energy, respectively. Increasing the stage of energy, the network lifetime increases considerably. The HSEP-2, HSEP-3 and HSEP-4 increase the network lifetime by 49.42%, 110.29%, and 248.64% corresponding to the increase in the network energy by 38.58%, 72.58%, and 169.40% with respect to the HSEP-1.
In this paper, we propose an email based high capacity text steganography method using combinatorial compression. The method makes use of forward email platform to hide the secret data in email addresses. We use the c...
详细信息
In this paper, we propose an email based high capacity text steganography method using combinatorial compression. The method makes use of forward email platform to hide the secret data in email addresses. We use the combination of BWT + MTF + LZW coding algorithm to increase the hiding capacity, as it is proved that this combination increases the compression ratio. To further increase the capacity, the numbers of characters of email id are also used to refer the secret data bits. Furthermore, the method adds some random characters just before the `@' symbol of email ids to increase the randomness. Experimental results show that our method performs better than the some important existing methods in terms of hiding capacity.
Cloud computing enables users to conveniently share computing resources at anytime and from anywhere. With the increasing usage of mobile devices, MANETs have gained more interest. The various cloud computing framewor...
详细信息
Cloud computing enables users to conveniently share computing resources at anytime and from anywhere. With the increasing usage of mobile devices, MANETs have gained more interest. The various cloud computing frameworks for wired networks, wireless networks, cellular networks or pico nets cannot be mapped as such in Ad hoc networks as they have additional constraints of multi-hop communication, limited bandwidth, limited battery and mobility. In this paper, we explore the feasibility of a “Multi-hop Mobile Ad hoc cloud (MMADC) computing framework” to harness the full potential of local resources in the network such as processing capabilities, memory space, battery life, etc. We outline the major implementation challenges and propose an approach to tackle them. A prototype is developed to enable the quantitative analysis. Simulation is conducted and a relative comparison is provided based on the throughput and overheads in the network. The proposed framework shows better performance for different workloads, network sizes & network densities.
In recent years, integration among research field of Software engineering and Semantic Technologies took place due to the presence of vendors at different geographical and virtual locations. This integration also resu...
详细信息
In recent years, integration among research field of Software engineering and Semantic Technologies took place due to the presence of vendors at different geographical and virtual locations. This integration also resulted in various issues and challenges that are still need to be addressed. Issues and challenges, which will keep this collaborated field dynamic and lively for years to come. Among such issues, one is to automate the process of detection and updation of requirements specifications using ontologies during maintenance phase. This paper presents a framework approach for the above issue. Further it provides a metric suite that can be used to evaluate effectiveness of the approach.
暂无评论