2022 3rd International Conference for Emerging Technology (INCET)最新文献

筛选
英文 中文
Transient Analysis of Fog Nodes with Catastrophes 具有突变的雾节点瞬态分析
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824789
Mahmoud Al Ahmad, Saed Alnazer, S. Patra
{"title":"Transient Analysis of Fog Nodes with Catastrophes","authors":"Mahmoud Al Ahmad, Saed Alnazer, S. Patra","doi":"10.1109/incet54531.2022.9824789","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824789","url":null,"abstract":"The networking business has recently seen significant transformations. It also necessitates high-speed operations and the ability to solve difficult problems. The Internet-of-Things (IoT) is being presented as a method to manage these changes from a variety of technical perspectives. Handling such large amounts of network data, as well as its privacy and security, as well as QoS requirements and the variety of underlying networking components, are all issues in IoT implementations. Fog computing is a new technology paradigm that instead of executing in the cloud, delivers a set of networking services closer to the user. In terms of minimising latency, scalability of the networking infrastructure, reliability in networking services, and security in networking devices, fog computing outperforms cloud computing. As a result, fog computing has altered the technical mindset by bringing cloud-based networking services closer to the client level in order to give the highest quality of service. There are numerous scenarios in which fog servers fail. We investigate the model with Markovian queue having heterogeneous VMs and fog server catastrophes in this work. Exact formulas for the transient probabilities of system capacity are obtained for queues with discouraged arrival and infinite VMs.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123105813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the development of complex social systems of characters in a work of literary fiction 分析一部文学小说作品中人物复杂社会系统的发展
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824015
A. Jayakumar, Vedica Rao, A.S. Rohit Kumar, Prithwijit Banerjee, Roopa Ravish
{"title":"Analyzing the development of complex social systems of characters in a work of literary fiction","authors":"A. Jayakumar, Vedica Rao, A.S. Rohit Kumar, Prithwijit Banerjee, Roopa Ravish","doi":"10.1109/incet54531.2022.9824015","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824015","url":null,"abstract":"Studying character interactions and personalities plays an important role in representing and interpreting narratives. Most research work pertaining to the analysis of characters in fictional novels disregard development and assume static relationships and roles of characters. The proposed approach centers on interpreting relationships and personalities as temporally evolving entities with the progress of the novel or narrative. The focus is to model the developing characteristics of literary works as a dynamic and ever-changing network of edges and nodes representing protagonists and their communications with fellow characters, through which we can study the significance and interactions of important characters in various literary texts. The approach also seeks to extract dialogue of characters, identify their personality traits and the personality change or development over the course of the novel. The proposed methodologies are primarily intended to be applied in the fields of literary analysis, with more practical applications to be used by writers and scriptwriters for visualisation and analysis of their work. Extraneously, the work could also be applied to learn desirable personality traits and personality development of influential people through their literary works.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Objective Cuckoo Search Optimization Algorithm for Optimal Resource Allocation in Cloud Environment 云环境下资源优化分配的多目标布谷鸟搜索优化算法
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9823985
Mufeed Ahmed Naji Saif, Vasudha, S. Niranjan, Belal Abdullah Hezam Murshed
{"title":"Multi-Objective Cuckoo Search Optimization Algorithm for Optimal Resource Allocation in Cloud Environment","authors":"Mufeed Ahmed Naji Saif, Vasudha, S. Niranjan, Belal Abdullah Hezam Murshed","doi":"10.1109/incet54531.2022.9823985","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9823985","url":null,"abstract":"Cloud technology refer to a pool of virtualized heterogeneous computational resources which are served to different customers as a service through the internet. These virtualized resources get provisioned to cloud users dynamically based on demand. however, dealing with resources in such a dynamic environment is still a challenging task. Deciding the way, the available cloud computational resources get allocated to the workload requires efficient provisioning and allocation techniques. The clients need to operate their various applications on cloud servers with variant Quality of Service (QoS) requirements based on the workloads and type of application whereas the objective of the cloud providers is effectively reducing the energy consumption by optimizing the CPU and bandwidth utilization and maintaining the Service Level Agreement (SLA). This, however, makes resource provisioning and allocation a very complicated task. This article implements the meta-heuristic Multi-Objective Cuckoo Search Algorithm (MOCSA) for efficient resource allocation to dynamic upcoming user workloads and scheduling user tasks on cloud VMs, which aim at minimizing the energy consumption with efficient utilization of CPU and bandwidth. The implementation and simulation experiments were conducted on the Cloudsim simulation toolkit. The evaluation results proved that MOCSA performed well in terms of performance, energy consumption, CPU utilization, bandwidth utilization, and SLA violation.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"164 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120866335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Containerized MPI Application on InfiniBand based HPC: An Empirical Study 基于ib的高性能计算平台容器化MPI应用的实证研究
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824366
Mandeep Kumar, Gagandeep Kaur
{"title":"Containerized MPI Application on InfiniBand based HPC: An Empirical Study","authors":"Mandeep Kumar, Gagandeep Kaur","doi":"10.1109/incet54531.2022.9824366","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824366","url":null,"abstract":"Nowadays, containerization techniques for High Performance Computing (HPC) are becoming more prominent with the increase in the features and complexity of scientific applications. Message Passing Interface (MPI) applications have many dependencies in terms of other scientific libraries, new patches, new code versions, and bug fixes to effectively execute scientific workloads. The tasks of updating the version of the code, installing new patches, and troubleshooting build issues are very time-consuming and complicated. These problems are tackled by making MPI applications portable through the use of the containerization concept, which hides system-level dependencies and complexities. This work presents the challenges and approaches for building and executing containerized MPI applications on InfiniBand based HPC. The comprehensive performance evaluation of a containerized MPI application converted from Docker to Singularity is performed on HPC up to 880 MPI ranks using InfiniBand in reference to bare metal. In addition, profiling of MPI applications is done by running them in an isolated container environment on InfiniBand based HPC with 640 MPI ranks.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121003931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Deep learning based Safe Travel Advisory Tool for Covid-19 基于深度学习的Covid-19安全旅行咨询工具
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824039
Haripada Pal, J. Rohith Sundar, Deepanshu, Anamika Chauhan
{"title":"A Deep learning based Safe Travel Advisory Tool for Covid-19","authors":"Haripada Pal, J. Rohith Sundar, Deepanshu, Anamika Chauhan","doi":"10.1109/incet54531.2022.9824039","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824039","url":null,"abstract":"Looking at the massive spread of SARS CoV2(COVID-19), it not only requires medical solutions at this point but different alternatives must also be examined to prevent its contagious nature getting its hands on a large number of individuals. Getting some prior information before its actual cause can help us to prepare ourselves to fight this pandemic better. It can assist authorities and administration to make better decisions in relatively less time to figure out the most suitable solutions. Since it is difficult to devise a permanent solution to this kind of pandemic, such data analysis can be used to strategize ourselves to cope with it. This study focuses on the forecasting of the number of active cases using deep neural networks. The models used in this approach are Multilayer Perceptron(MLP), Convolution Neural Networks(CNN) and Long Short Term Memory(LSTM). The performance of all three models is analyzed and although all of them are reasonably well, the MLP model outperforms the other two. These models can be used to predict the number of cases on a given day and a potential future outbreak.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 5-Bit Rectangular Resonator Array for Biomedical Applications 用于生物医学应用的5位矩形谐振器阵列
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824590
Mandadi Mary Arpitha, Priyabrata Sethy, S. Behera
{"title":"A 5-Bit Rectangular Resonator Array for Biomedical Applications","authors":"Mandadi Mary Arpitha, Priyabrata Sethy, S. Behera","doi":"10.1109/incet54531.2022.9824590","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824590","url":null,"abstract":"Recent studies lay a strong base that chipless RFID technology is going to continue its reign in the radio wireless communications domain because of its cost-effectiveness and flexible printing techniques. These tags facilitate multi-bit storage capacity. In the proposed work a novel design of concentric square ring resonators is presented. An array of four of such resonators separated by a plus-shaped resonator completes the tag design. This complete structure makes the tag resonate at the frequencies of 1.7GHz, 2.4GHz, 3.7 GHz, 5.4GHz, and 9.5 GHz. These resonating frequencies model the tag suitable for ISM band and biomedical applications. The attained frequencies are attested with the RCS plot and the current distribution patterns","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple Multicast Architecture for XMPP based Applications 基于XMPP应用的多组播体系结构
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824745
B. R. Harshitha, Niyati B Mehta, Shivangi Rai, Deepti, S. Sheela, SM Dilip Kumar
{"title":"Multiple Multicast Architecture for XMPP based Applications","authors":"B. R. Harshitha, Niyati B Mehta, Shivangi Rai, Deepti, S. Sheela, SM Dilip Kumar","doi":"10.1109/incet54531.2022.9824745","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824745","url":null,"abstract":"Extensible Messaging Presence Protocol (XMPP) is a real-time information transmission specification protocol that is based on IP technology and Extensible Markup Language supporting publish/subscribe messaging systems. Multicast is the operation that is carried out by a publisher in a publisher-subscriber scenario such that it simultaneously sends data to multiple subscribers. There are many XMPP Extension Protocols (XEPs) available in the literature, that enable the use of XMPP for multicast. This network is made up of publishers who publish messages to multiple subscribers, some of whom may overlap. This is a case of Multiple Multicast (MMC). In this paper, a novel architecture to extend XMPP for multiple multicast has been proposed to cater multiple multicast in a publish subscribe network. In the literature, it was found that multiple multicast was not extensively considered in a mobile, publish subscribe network, hence the architecture proposed to cater to the multiple multicast nature for data exchange between multiple publishers to multiple groups of subscribers. In the considered network of subscribers in publish subscribe scenario, cluster heads help in forwarding the data to nodes connected to it and a cloud storage is used to ensure that message is successfully delivered to all the subscribers from publishers by creating a hierarchical structure to the network. Multilevel cache ensures that overloading does not happen at any cache memory. This paper attempts to reduce the number of replications and other overheads incurred by these replications. Performing multicast dramatically reduces network traffic by delivering a single stream to multiple receivers.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126769197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and Addressal of Knowledge Gaps in Students 学生知识差距的识别与解决
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824483
N. Kumar, Rithik Mali, A. Ratnam, Vibha Kurpad, Harichandana Magapu
{"title":"Identification and Addressal of Knowledge Gaps in Students","authors":"N. Kumar, Rithik Mali, A. Ratnam, Vibha Kurpad, Harichandana Magapu","doi":"10.1109/incet54531.2022.9824483","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824483","url":null,"abstract":"According to a survey study titled the Annual Status of Education Report (ASER), more than half of fifth-grade children in rural schools cannot read a second-grade textbook or answer simple mathematics problems. This figure hints at some fundamental problems plaguing the rural education system. Whether it is the lack of pocket-friendly schools, inadequate structure, or merely the teaching methodology, we have understood the underlying causes and created software that can help students learn more clearly and identify knowledge gaps. It can also be used as a learning tool to address the inadequacies in the current rural education system. Our application uses the available educational content and develops questions to test the students’ understanding of the fundamental concepts presented. Once students attempt to answer these questions, we assess their weaknesses by analysing their answers. Alongside the questions, we have used gamification to improve engagement with the app. We used the BERT Summarizer to extract and summarise the content. We then generate questions and use the Word2vec model to generate distractors. Multiple models were tried out, but the best results were achieved using the BERT summariser in conjunction with the Word2vec model. Metrics used to compute the results were answerability and BERT scores.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Threaded Topology-Transparent Scheduling Protocol for Wireless Networks 一种新的无线网络线程拓扑透明调度协议
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824446
Dipti Dash
{"title":"A Novel Threaded Topology-Transparent Scheduling Protocol for Wireless Networks","authors":"Dipti Dash","doi":"10.1109/incet54531.2022.9824446","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824446","url":null,"abstract":"A topology-transparent scheduling algorithm is created without requiring changes to existing schedules when network topology changes in highly volatile mobile networks. It uses only the maximum number and degree of nodes of the network, therefore no changes are required to existing schedules. However, it is often difficult to estimate a priori the maximum nodal degree. Also, the nodal degree may vary significantly within the network. In this paper, we present a threaded topology-transparent scheduling protocol that is composed of a throughput optimal topology-transparent scheduling algorithm. While maintaining the advantages of the component algorithm, it does not rely on the maximum nodal degree.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115047634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Analysis of End to End Inventory Management System for Perishable Goods 易腐品端到端库存管理系统的预测分析
2022 3rd International Conference for Emerging Technology (INCET) Pub Date : 2022-05-27 DOI: 10.1109/incet54531.2022.9824831
Kaustubh V. Sakhare, I. Kulkarni
{"title":"Predictive Analysis of End to End Inventory Management System for Perishable Goods","authors":"Kaustubh V. Sakhare, I. Kulkarni","doi":"10.1109/incet54531.2022.9824831","DOIUrl":"https://doi.org/10.1109/incet54531.2022.9824831","url":null,"abstract":"Perishable items are the ones that quickly become spoiled or unsafe for consumption and usage. They are the core of supply chain management due to the limited shelf-life. There are many forms of perishable items viz fresh food products like fruits and vegetables, dairy, poultry, frozen or processed foods, commodities like cosmetics, health care products like medicines, oxygen and lifesaving items like blood. The paper addresses issues of the order management system in the estimation of the demands of the essential perishable items based on its fluctuating demands. The prevalent work was not able to correctly estimate the demands of the items labeled as essential goods. This article describes the identification of the most relevant features to estimate the replenishment policies. The work carried out contemplates the feature importance, exceptionally taking into account the effect of calamities or celebrations and festivities. The novelty of the work lies in comparing the complex two-step models using linear programming and reinforcement learning. The proposed model with simple machine learning algorithms is seen more effective for small scale businesses. The devised model focuses on accurately predicting the order estimate of perishable product under dynamically impacting factors in the supply chain management.","PeriodicalId":194665,"journal":{"name":"2022 3rd International Conference for Emerging Technology (INCET)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信