Int. J. Adv. Pervasive Ubiquitous Comput.最新文献

筛选
英文 中文
Hindi and Punjabi Continuous Speech Recognition Using CNSVM 基于CNSVM的印地语和旁遮普语连续语音识别
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-10-01 DOI: 10.4018/ijapuc.2019100101
Vishal Passricha, Shubhanshi Singhal
{"title":"Hindi and Punjabi Continuous Speech Recognition Using CNSVM","authors":"Vishal Passricha, Shubhanshi Singhal","doi":"10.4018/ijapuc.2019100101","DOIUrl":"https://doi.org/10.4018/ijapuc.2019100101","url":null,"abstract":"CNNs are playing a vital role in the field of automatic speech recognition. Most CNNs employ a softmax activation layer to minimize cross-entropy loss. This layer generates the posterior probability in object classification tasks. SVMs are also offering promising results in the field of ASR. In this article, two different approaches: CNNs and SVMs, are combined together to propose a new hybrid architecture. This model replaces the softmax layer, i.e. the last layer of CNN by SVMs to effectively deal with high dimensional features. This model should be interpreted as a special form of structured SVM and named the Convolutional Neural SVM. (CNSVM). CNSVMs incorporate the characteristics of both models which CNNs learn features from the speech signal and SVMs classify these features into corresponding text. The parameters of CNNs and SVMs are trained jointly using a sequence level max-margin and sMBR criterion. The performance achieved by CNSVM on Hindi and Punjabi speech corpus for word error rate is 13.43% and 15.86%, respectively, which is a significant improvement on CNNs.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125689728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local and Remote Recovery of Cloud Services Using Backward Atomic Backup Recovery Technique for High Availability in Strongly Consistent Cloud Service: Recovery of Cloud Service for High Availability 在强一致性云服务中使用向后原子备份恢复技术实现云服务的本地和远程高可用性恢复:云服务的高可用性恢复
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-10-01 DOI: 10.4018/ijapuc.2019100102
Praveen S. Challagidad, M. N. Birje
{"title":"Local and Remote Recovery of Cloud Services Using Backward Atomic Backup Recovery Technique for High Availability in Strongly Consistent Cloud Service: Recovery of Cloud Service for High Availability","authors":"Praveen S. Challagidad, M. N. Birje","doi":"10.4018/ijapuc.2019100102","DOIUrl":"https://doi.org/10.4018/ijapuc.2019100102","url":null,"abstract":"Data loss occurs due to crashing, correlated failure, logical failure, power outages and security threats. Several techniques (e.g. NoBackup, WARBackup and LocalRecovery) are being used to recover data locally. And, strongly consistent Cloud services (SCCS) must provide good performance and high availability. However, conventional strong consistency replication methods have the limitation of availability of replicated services when recovering huge amount of data across wide area links. There is a need for remote recovery mechanisms for high availability of service/data, because distributed nature of cloud infrastructures. To address these issues, the article proposes a hierarchical system architecture for replication across a data center, and employs the backward atomic backup recovery technique (BABRT) for local recovery and remote recovery for high availability of the cloud services/data. A mathematical model for BABRT is described. Simulation results show that BABRT reduces the storage consumption, recovery time, window of vulnerability and failure rates, compared to other recovery models.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115033817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Predicting Resident Intentions Using Contextual Modalities in Smart Home 智能家居中使用情境模式预测居民意图的研究
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-10-01 DOI: 10.4018/ijapuc.2019100104
Rakshith M.D. Hegde, H. Kenchannavar
{"title":"A Survey on Predicting Resident Intentions Using Contextual Modalities in Smart Home","authors":"Rakshith M.D. Hegde, H. Kenchannavar","doi":"10.4018/ijapuc.2019100104","DOIUrl":"https://doi.org/10.4018/ijapuc.2019100104","url":null,"abstract":"The Smart Home is an environment that enables the resident to interact with home appliances which provide resident intended services. In recent years, predicting resident intention based on the contextual modalities like activity, speech, emotion, object affordances, and physiological parameters have increased importance in the field of pervasive computing. Contextual modality is the feature through which resident interacts with the home appliances like TVs, lights, doors, fans, etc. These modalities assist the appliances in predicting the resident intentions making them recommend resident intended services like opening and closing doors, turning on and off televisions, lights, and fans. Resident-appliance interaction can be achieved by embedding artificial intelligence-based machine learning algorithms into the appliances. Recent research works on the contextual modalities and associated machine learning algorithms which are required to build resident intention prediction system have been surveyed in this article. A classification taxonomy of contextual modalities is also discussed.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134045384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Workflow Engine Based on Relational Structures 基于关系结构的工作流引擎设计
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-10-01 DOI: 10.4018/ijapuc.2019100103
Song Ji, Weifang Zhai, Yiran Jiang
{"title":"Design of Workflow Engine Based on Relational Structures","authors":"Song Ji, Weifang Zhai, Yiran Jiang","doi":"10.4018/ijapuc.2019100103","DOIUrl":"https://doi.org/10.4018/ijapuc.2019100103","url":null,"abstract":"Workflow technology is the core technology to realize business process modeling, process operation, monitoring and management, and ultimately realize business process automation. Workflow-based office automation system can separate code writing and the operation mode. When business processes need to be changed, there is no need to modify the program. Users only need to customize the workflow through the visual process customization mode. The workflow engine is the core of the whole workflow management system and the control center of the whole system. This article designs a workflow engine based on a relational structure, including the design of workflow engine class, functional component, interface and database. Finally, a flexible office automation system with customizable business processes is implemented.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129247874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Search Intent Based on In-Search Context for Exploratory Search 基于搜索上下文的探索性搜索意图预测
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-07-01 DOI: 10.4018/IJAPUC.2019070104
Vikram Singh
{"title":"Predicting Search Intent Based on In-Search Context for Exploratory Search","authors":"Vikram Singh","doi":"10.4018/IJAPUC.2019070104","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019070104","url":null,"abstract":"Modern information systems are expected to assist users with diverse goals, via exploiting the topical dimension (‘what' the user is searching for) of information needs. However, the intent dimension (‘why' the user is searching) has preferred relatively lesser for the same intention. Traditionally, the intent is an ‘immediate reason, purpose, or goal' that motivates the user search, and captured in search contexts (Pre-search, In-search, Pro-Search), an ideal information system would be able to use. This article proposes a novel intent estimation strategy; based on the intuition that captured intent, and proactively extracts likely results. The captured ‘Pre-search' context adapts query term proximities within matched results beside document-term statistics and pseudo-relevance feedback with user-relevance feedback for In-search. The assessment asserts the superior performance of the proposed strategy over the equivalent on tradeoffs, e.g., novelty, diversity (coverage, topicality), retrieval (precision, recall, F-measure) and exploitation vs exploration.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RFID Tag Collision Problem in Supply Chain Management 供应链管理中的RFID标签碰撞问题
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-07-01 DOI: 10.4018/IJAPUC.2019070101
Kamalendu Pal
{"title":"RFID Tag Collision Problem in Supply Chain Management","authors":"Kamalendu Pal","doi":"10.4018/IJAPUC.2019070101","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019070101","url":null,"abstract":"The use of Radio Frequency Identification (RFID) technology has attracted a huge attention from the supply chain business community. This is due to the use of RFID technology wide range of applications in the fields of logistics and supply chain management. This paper presents a brief overview of a simple industrial RFID system and then describe the basic concept of tag collision problem. Despite many useful applications, the RFID tag collision creates a major problem for fast tag identification process. There are different algorithmic solutions available to overcome tag collision problem in industrial supply chains. Based on binary search algorithm (BSA) of dynamic and backtracking, two variations of binary anti-collision search algorithms for tag identification processes are described in this paper. Simulation-based experimental results on the performance of these algorithms are evaluated when handling multiple RFID tags simultaneously. The backtracking binary search algorithm has obvious advantages in terms of tag identification process compared to the other two algorithms.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121467201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing 基于属性的云计算加密方案访问控制机制综述
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-07-01 DOI: 10.4018/IJAPUC.2019070103
L. B. Bhajantri, T. Mujawar
{"title":"A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud Computing","authors":"L. B. Bhajantri, T. Mujawar","doi":"10.4018/IJAPUC.2019070103","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019070103","url":null,"abstract":"Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to share large-scale and confidential data on cloud has been increased. Though cloud computing provides many benefits, ensuring security of the data stored in cloud is the biggest challenge. The security concern about the data becomes main barrier for adoption of cloud. One of the important security aspects is fine grained access control mechanism. The most widely used and efficient access control scheme for cloud computing is Attribute Based Encryption (ABE). The Attribute Based Encryption (ABE) scheme provides a new technique for embedding access policies cryptographically into encryption process. The article presents an overview of various existing attribute-based encryption schemes and traditional access control models. Also, the comparison of existing ABE schemes for cloud computing, on basis of various criteria is presented in the article.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Literature Survey on Risk Assessment for Unix Operating System: Risk Assessment on UNIX OS Unix操作系统风险评估的文献综述:Unix操作系统风险评估
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-07-01 DOI: 10.4018/IJAPUC.2019070102
P. Pradhan
{"title":"A Literature Survey on Risk Assessment for Unix Operating System: Risk Assessment on UNIX OS","authors":"P. Pradhan","doi":"10.4018/IJAPUC.2019070102","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019070102","url":null,"abstract":"This proposed literature survey provides basic data regarding the first step of risk identification and analysis to achieve a secured infrastructure. The demand and risk are two parts of the same coin. The demand is directly proportional to the risk, but preventive control is inversely proportional to risk. The necessity of preventive control in any organization has increased because of the changes in logic, structure, and the type of technology applied to services that generate risks. Finally, the business increases along with technology, which creates risks and spreads over its infrastructure. We have to focus on protecting, detecting, correcting, verifying and validating the Unix file system. This survey article proposes and resolves the Unix file system by applying a hardening, re-configuration and access control mechanism up to the highest level of preventive control.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131925480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Application of Data Mining Algorithms in Intelligent Transportation 数据挖掘算法在智能交通中的应用研究
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-04-01 DOI: 10.4018/IJAPUC.2019040101
Weifang Zhai, Yiran Jiang, Song Ji
{"title":"Research on the Application of Data Mining Algorithms in Intelligent Transportation","authors":"Weifang Zhai, Yiran Jiang, Song Ji","doi":"10.4018/IJAPUC.2019040101","DOIUrl":"https://doi.org/10.4018/IJAPUC.2019040101","url":null,"abstract":"Nowadays, in the field of intelligent transportation, data mining technology has been applied more and more widely. Data mining technology can find valuable data from amongst massive traffic data and analyze traffic conditions according to actual traffic conditions. In order to improve the management and control level of ITMS, effective information can be queried from various query conditions, models suitable for various traffic situations can be found, analyzed and predicted, and accurate information can be provided to traffic managers for decision-making. This article mainly studies the data mining algorithm in intelligent transportation, in order to provide practical reference for the application and research of urban traffic big data technology.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134589295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Rise of Robotics Data for Real-Time Management Based on New NoSQL Solution 基于新的NoSQL解决方案的机器人数据实时管理的兴起
Int. J. Adv. Pervasive Ubiquitous Comput. Pub Date : 2019-04-01 DOI: 10.4018/ijapuc.2019040102
Afef Gueidi, H. Gharsellaoui, S. Ahmed
{"title":"The Rise of Robotics Data for Real-Time Management Based on New NoSQL Solution","authors":"Afef Gueidi, H. Gharsellaoui, S. Ahmed","doi":"10.4018/ijapuc.2019040102","DOIUrl":"https://doi.org/10.4018/ijapuc.2019040102","url":null,"abstract":"In the face of the rapid growth of data, the authors note the birth of new computer systems leading the management of databases. To ensure reliable handling of data which is bulky and heterogeneous, new systems of basic management data are differentiated from traditional ones by their linear scalability to store and manage data in parallel. Those systems are called NoSQL DB. Robotics database management systems are increasing. These systems ensure good storage of data and with big data analytics, a new approach demands new structures and methods for collecting, recording, and analyzing enterprise data. This journal article deals with the NoSQL DB which are the secret of the continual progression data that new data management solutions have emerged. The implementation of NoSQL for Robotics wrestles all data they acquire into a usable form because with the ordinary type of Robotics, people are facing big limits to find the best decision in real-time. The authors' proposed approach was based on a combination of some experimental studies in the same area.","PeriodicalId":145240,"journal":{"name":"Int. J. Adv. Pervasive Ubiquitous Comput.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127492717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信