2018 International Conference on Advancements in Computational Sciences (ICACS)最新文献

筛选
英文 中文
Light-weight depth-based routing for underwater wireless sensor network 水下无线传感器网络的轻型深度路由
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333483
Safia Gul, Sana Hoor Jokhio, I. A. Jokhio
{"title":"Light-weight depth-based routing for underwater wireless sensor network","authors":"Safia Gul, Sana Hoor Jokhio, I. A. Jokhio","doi":"10.1109/ICACS.2018.8333483","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333483","url":null,"abstract":"Underwater wireless sensor networks often employ acoustic channels for communications because radio signals do not work well in water. UWSNs usually have very dynamic topology as sensors moves passively with water current. Some routing protocols have been proposed to the challenging problem in UWSNs. In UWSNs, efficient utilization of energy is one of the major issues. In DBR, routing is based on the depth of the sensor nodes. The nodes having less depth are used as a forward node and consume more energy as compare to the rest of the nodes. In this paper, we propose a light-weight depth-based routing protocol (LDBR). In LDBR, residual energy based approach is used to minimize the energy consumption. Extensive simulations have been designed and conducted to evaluate the proposed method. The results show that the LDBR consumes less energy as compare to its predecessor DBR.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Preeminent risk factor affecting software development 影响软件开发的主要风险因素
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333492
Hafiz Ali Hamza Gondal, S. M. U. Din, Sajida Fayyaz, Muhammad Dahir Zeb, Beenish Nadeem
{"title":"Preeminent risk factor affecting software development","authors":"Hafiz Ali Hamza Gondal, S. M. U. Din, Sajida Fayyaz, Muhammad Dahir Zeb, Beenish Nadeem","doi":"10.1109/ICACS.2018.8333492","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333492","url":null,"abstract":"Software project management has a significant focus on software risk management. The major objective of this study is to identify, analyze and list out the principal vital risk factors within the life cycle of a project. This paper, presents a comprehensive analysis on risk factors that can possibly occur during each phase of SDLC. The risk factors are endorsed by using questionnaires conducted from the employees and employers of various software companies, which handle the day to day challenges efficiently. After collecting data from the pilot study and questionnaires a statistical analysis is performed using SPSS (Statistical package for the social science) to predict the risk impact on cost. The inquisitive analysis can help to develop and foretell the strategies for assessment, control and reduction of the risk factors which will enable to make suitable decisions regarding project success.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124791364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing wireless software defined networks: Appraising threats, defenses & research challenges 保护无线软件定义网络:评估威胁、防御和研究挑战
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333279
Taimur Bakhshi
{"title":"Securing wireless software defined networks: Appraising threats, defenses & research challenges","authors":"Taimur Bakhshi","doi":"10.1109/ICACS.2018.8333279","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333279","url":null,"abstract":"Software defined networking (SDN) separates the network control logic from data forwarding functionality, offering real-time network programmability and granular policy management. Initial successful SDN implementations offering scalability and automated resource provisioning in wired network environments have motivated efforts to bring the paradigm to the wireless domain. Wireless software defined networking (WSDN) formulation in traditional and emerging (IoT, smart grid, vehicular) wireless environments have therefore, raised concerns about the inherent security challenges in WSDN architecture. The wireless medium poses additional security concerns and provides opportunities for attackers to target the control plane, data forwarding elements as well as individual wireless applications. The present paper reviews and classifies the key security threats facing WSDN environments. Furthermore, presently available mitigation techniques and their state-of-the-art adoption in WSDN is discussed. Finally, the paper highlights present and future research challenges that need to be addressed for successful adoption of WSDN in carrier-grade or realistic operations.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power savings in servers infrastructure under backup and availability constraints 在备份和可用性约束下的服务器基础设施节能
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333487
Awais Latif Gouhar, Arshad Ali
{"title":"Power savings in servers infrastructure under backup and availability constraints","authors":"Awais Latif Gouhar, Arshad Ali","doi":"10.1109/ICACS.2018.8333487","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333487","url":null,"abstract":"A global challenging task is to optimize energy consumption in the field of computing, research community is not only focusing on finding ways for reduction of energy cost and maintaining profitability, but also working on reduction of environment effects of global warming. In this work, we aim to provide a mechanism for data centers with the motive of savings in power consumption by allowing servers to go into sleep mode without compromising on Quality of Services (QOS) in terms of availability and performance in terms of delay that occurs in activation from sleep mode when a job (or a request for a service) arrives at server. Our main focus is on backup servers (whose availability is high) and data recovery servers. Our objective is to propose a simple Dynamic Power Management (DPM) scheme for putting the server in sleep mode based on traffic load which resulted in significant power savings in server infrastructure of data centers. We applied a job scheduling method for backup servers, i.e., force sleep mode. We obtained results in a real time environment to evaluate the impact of our scheme.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126873633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ontology based syndrome diagnostic system: (OBSDS) 基于本体的证候诊断系统(OBSDS)
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333274
Haya Majid Qureshi, Maliha Qureshi
{"title":"Ontology based syndrome diagnostic system: (OBSDS)","authors":"Haya Majid Qureshi, Maliha Qureshi","doi":"10.1109/ICACS.2018.8333274","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333274","url":null,"abstract":"Disease Diagnosis is a process of assessment of all possible grounds for a set of symptoms to identify the disease in order to recommend treatment carried out by the physician all over the world. But, one of the major problems faced by medical experts in this process is in possessing a diverse amount of knowledge for better disease diagnosis. In the Past few years the use of Ontologies in Medical domain is basically focused on the representation of the Medical terminologies. Furthermore small number of Ontologies can be found in the domain of Syndrome. A syndrome can refer to the group of symptoms that suggest the presence of syndrome disease. There exist dependencies among causes and symptoms of syndrome diseases. We have proposed a Syndrome ontology model for disease diagnosis. We have done model formalization in Web Ontology language (OWL) and have handled reasoning upon ontology using SPARQL Query. Then apply evaluation matrices on these queries to evaluate the performance of our system. Ontology is developed in Protégé and use SPARQL interface which support various output formats. We use Apache Tomcat 7.0 since it is an online System. This system offer support for better medical decision in Syndrome Diagnosing.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"41 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards bearing health prognosis using generative adversarial networks: Modeling bearing degradation 基于生成对抗网络的轴承健康预测:轴承退化建模
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333495
S. Khan, Alexander E. Prosvirin, Jong-Myon Kim
{"title":"Towards bearing health prognosis using generative adversarial networks: Modeling bearing degradation","authors":"S. Khan, Alexander E. Prosvirin, Jong-Myon Kim","doi":"10.1109/ICACS.2018.8333495","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333495","url":null,"abstract":"Condition based maintenance of rotary machines is centered on bearings, as they are the leading source of breakdowns in induction motors used in the industry. The health prognosis of bearings primarily involves the estimation of its remaining useful life (RUL). The accurate modeling of a bearing's degradation is key to correctly estimating its RUL. This paper investigates using generative adversarial networks (GANs) for modeling the degradation behavior of a bearing. GANs are used to estimate generative models, which can be sampled directly to generate the future trajectory of a bearing's health indicator. In the GAN framework, two artificial neural networks, a generator network G and a discriminator network D, engage in a game, where the network G tries to fool the network D by generating samples of data that resemble real data. The training process of GANs finds the Nash equilibrium to this game. The proposed approach for generating future trajectories of a bearing's health indicator is tested using publicly available run-to-failure test data. The results of this preliminary study indicate that the GAN framework is effective in modeling the degradation behavior of bearings.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Trust-based situation awareness: Agent-based versus population-based modeling a comparative study 基于信任的情境感知:基于主体与基于群体的建模比较研究
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333494
Zara Nasar, S. W. Jaffry
{"title":"Trust-based situation awareness: Agent-based versus population-based modeling a comparative study","authors":"Zara Nasar, S. W. Jaffry","doi":"10.1109/ICACS.2018.8333494","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333494","url":null,"abstract":"Trust based situation awareness represents the flow of information regarding a situation within a group of agents based on their mutual trust. Situation Awareness (SA) in general is regarded as basis for efficient group decision making while trust based situation awareness is of utmost importance in safety critical systems as the trust is a key factor that tend to affect the beliefs of agents that are collaborating in an environment. In this study an existing model of situation awareness is extended to incorporate mutual trust of the participating agents. The proposed model is analyzed using two different paradigms of computational modeling techniques namely Agent Based Modeling (ABM) and Population Based Modeling (PBM). Various experiments are conducted using variety of populations. Results show that with incorporation of trust factor, both approaches show similar patterns with large population size. In addition to that, relation between SA and trust is analyzed and the results show that SA gets affected by the inter-agent trust.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122305932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A parametric performance evaluation of SMDBRP and AEDGRP routing protocols in underwater wireless sensor network for data transmission 水下无线传感器网络中SMDBRP和AEDGRP路由协议的参数性能评价
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333484
U. Draz, Tariq Ali, S. Yasin, Noman Naseer, Umair Waqas
{"title":"A parametric performance evaluation of SMDBRP and AEDGRP routing protocols in underwater wireless sensor network for data transmission","authors":"U. Draz, Tariq Ali, S. Yasin, Noman Naseer, Umair Waqas","doi":"10.1109/ICACS.2018.8333484","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333484","url":null,"abstract":"More than seventy percent of the earth is sheltered by the water. Water region is not explored and not known what the condition of the earth in water. Underwater Research was limited due to the wired connection in last. Underwater wireless sensor networks (UWSNs) are a powerful discipline to explore and monitor the area of aquatic, rivers and submarine at-large place. UWSNs with hundreds of sensors information received from different locations and transmit the collected data to a particular user or hub, depending on the application and its requirements. There are different routing protocols that directly deploy the underwater environment which is used for data transmission between nodes. These routing protocols are: sink mobility depth based routing protocol (SMDBRP), aided efficient data gathering routing protocol (AEDGRP). For deep and shallow water, the node density plays a vital role in data transmission. Performance evaluation of routing protocols which are based on node density is depended upon these parameters: data delivery ratio, an end to end delay and data packet losses in communication. Network simulator NS-2 is used for this purpose. Our simulation results show that which routing protocol is best for data transmission in the respect of throughputs, data packet loss, and propagation delay. The result shows that the SMDBRP is preeminent work in the different situations.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128121847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Voice morphing: An illusion or reality 声音变形:一种幻觉或现实
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333282
Ijaz Ahmed, A. Sadiq, Muhammad Atif, M. Naseer, Muhammad Adnan
{"title":"Voice morphing: An illusion or reality","authors":"Ijaz Ahmed, A. Sadiq, Muhammad Atif, M. Naseer, Muhammad Adnan","doi":"10.1109/ICACS.2018.8333282","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333282","url":null,"abstract":"Voice morphing is an emerging technology that gained popularity in industry, particularly in entertainment industry to enhance the quality of voice, from the last few decades. However, the voice morphing tools are also being used by predators to deceive people. Therefore, it poses a great challenge to public to determine whether a voice is morphed or not. Voice morphing is a technique to algorithmically change one person's voice into another person's voice. In this paper, we conduct a case study that evaluates the hypothesis that do voice morphing tools/techniques create a successful illusion in a listener mind. To evaluate, our hypothesis we propose an elementary voice morphing technique, based on a set of mask vectors; then we implement the said technique as a voice morphing tool in a visual language Pure Data; and finally we evaluate this technique by designing a test bed. Our results indicate that voice morphing technology may create an illusion in a listener mind, effectively.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic mapping study on success factors of implementing measurement processes in SMEs 中小企业实施测量过程成功因素的系统映射研究
2018 International Conference on Advancements in Computational Sciences (ICACS) Pub Date : 2018-02-01 DOI: 10.1109/ICACS.2018.8333491
M. Noman, Touseef Tahir, G. Rasool
{"title":"A systematic mapping study on success factors of implementing measurement processes in SMEs","authors":"M. Noman, Touseef Tahir, G. Rasool","doi":"10.1109/ICACS.2018.8333491","DOIUrl":"https://doi.org/10.1109/ICACS.2018.8333491","url":null,"abstract":"Software measurement processes are crucial to plan, organize, monitor, control and improve software processes, products and resources. However, the successful implementation of software measurement processes is a challenging task in small and medium enterprises (SMEs). This paper presents a systematic mapping study to identify the significant factors and challenges of successful implementation of measurement processes. In total, 24 primary studies are analyzed after applying the mapping process. The most important success factors are measurement planning, measurement maturity, and budget allocation to implement a measurement process. This study aims to help SMEs to conduct a feasibility study before planning a measurement process.","PeriodicalId":128949,"journal":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信