Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing最新文献

筛选
英文 中文
Optimized Forex Trading using Ensemble of Deep Q-Learning Agents 利用深度q -学习代理集合优化外汇交易
Bagesh Kumar, Aadharsh Roshan, Ayush Baranwal, Sankalp Rajendran, Sahil Sharma, Amritansh Mishra, O. P. Vyas
{"title":"Optimized Forex Trading using Ensemble of Deep Q-Learning Agents","authors":"Bagesh Kumar, Aadharsh Roshan, Ayush Baranwal, Sankalp Rajendran, Sahil Sharma, Amritansh Mishra, O. P. Vyas","doi":"10.1145/3549206.3549280","DOIUrl":"https://doi.org/10.1145/3549206.3549280","url":null,"abstract":"Foreign exchange market is a fast paced market influenced by a wide variety of factors, which requires the careful study of data to take an advantageous position. There are many AI based approaches, chief among them being the use of single RL agent based systems trained on a specific time period. We have proposed the use of a Deep Q Learning based algorithm consisting of multiple agents trained(run) on different epochs on the dataset. Different feature extraction techniques like CNN, LSTM and their combinations have been tried to ascertain the better technique for our usecase. Decisions taken on each day are logged during validation and testing. An ensembling technique is used on these decisions to get the final decision and profit. It was observed that the combination of CNN and LSTM layers performed better than when each of the layers where tested in isolation from one another, howoever they result in overfitting. LSTM was found to be better overall and using an agreement threshold of 60% provided best results.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133894125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing reliable communication to improve network lifetime in Wireless Sensor Networks by Displacement and Direction Conscious Adhoc On-Demand Multipath Distance Vector routing protocol 基于位移和方向感知的Adhoc按需多径距离矢量路由协议增强无线传感器网络的可靠通信,提高网络寿命
T.M.Saravanan, S. Saravanakumar
{"title":"Enhancing reliable communication to improve network lifetime in Wireless Sensor Networks by Displacement and Direction Conscious Adhoc On-Demand Multipath Distance Vector routing protocol","authors":"T.M.Saravanan, S. Saravanakumar","doi":"10.1145/3549206.3549327","DOIUrl":"https://doi.org/10.1145/3549206.3549327","url":null,"abstract":"Wireless sensor networks are become an important part of our daily lives. Because of its simplicity, flexibility, and effectiveness, wireless communication is favored for many sensing applications. Sensors for sensing environmental factors are now diverse and wirelessly transmit data to a central location. Sequence numbers and acknowledgement in a reliable mode provide trustworthy information transfer between source and destination nodes. In this paper, the Displacement and Direction Conscious Adhoc On-Demand Multipath Distance Vector Routing (DDC-AOMDV) is used to calculate the weighted factor of the transmission path and effective data collection for gateways, and the advanced agglomerative Hierarchical Clustering algorithm is used to form the cluster and cluster head in an efficient manner. The network lifespan is increased when this strategy is used. The outcomes of the experiments outperform the current routing method.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114865710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Block Chain Application for E-Voting Process Using ML for South Asian Continent 南亚大陆使用ML的电子投票过程的区块链应用
R. Rastogi, Y. Rastogi, Saransh Chauhan
{"title":"Block Chain Application for E-Voting Process Using ML for South Asian Continent","authors":"R. Rastogi, Y. Rastogi, Saransh Chauhan","doi":"10.1145/3549206.3549292","DOIUrl":"https://doi.org/10.1145/3549206.3549292","url":null,"abstract":"A digital voting system which allows people to vote sitting at their home based on their face recognition. The votes will be counted and saved in a blockchain, based structure which is secure and immutable, thus giving availability with security in a system. The traditional voting system does not allow people to vote sitting at their home. Considering the situation of covid everything is going digital. Questions on EVM from losing parties regarding some malfunctioning. Digital, secure, reliable, user friendly and a low-cost system. Standing in long queues during voting is a tiring and time-consuming process. DDoS assaults, polling booth capturing, vote tampering and manipulation, malware attacks, and other security issues are all present in today's voting systems. The voting process may be made safer, more transparent, immutable, and dependable by utilizing blockchain technology. Our current voting system is questioned by a variety of stakeholders, including political parties and ordinary citizens, because votes are manipulated, citizens find voting a time-consuming task, and, most importantly, the current pandemic situation has digitized almost all areas of interest in our county. As a result, to resolve the issue produced by the physical voting system.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Energy Efficient Routing in Wireless Sensor Network using Machine Learning 基于机器学习的无线传感器网络安全节能路由
Meenakshi Pundir, Jasminder Kaur Sandhu, Puneet Kumar, Prateek Srivastava
{"title":"Secure and Energy Efficient Routing in Wireless Sensor Network using Machine Learning","authors":"Meenakshi Pundir, Jasminder Kaur Sandhu, Puneet Kumar, Prateek Srivastava","doi":"10.1145/3549206.3549299","DOIUrl":"https://doi.org/10.1145/3549206.3549299","url":null,"abstract":"Security and energy efficiency are significant issues in Wireless Sensor Network (WSN). It is a critical task to provide reliability during data transmission in routing. Due to the presence of routing attacks in the network layer, security of the network degrades. A secured and energy-efficient path is necessary to transmit information from the source node to the destination node. It motivates the authors to propose a novel solution that improve the performance of the network This paper is mainly emphasizing an energy-efficient and secure routing mechanism. An optimum cluster head helps to save energy in multi-hop communication. The selection of cluster head depends on the trust factor evaluated through machine learning. The decision tree algorithm is applied to the input variables such as degree of mobility, vulnerability index, residual battery energy and node's distance from cluster centroid. Class acts as a target variable which helps to determine the optimal cluster head. This efficient cluster head determines the shortest path across the network. Security of routing path is enhanced through intrusion detection and removal mechanism. Node mobility mechanism is used for the removal of the malicious node.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116191641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shifted Delta Cepstral Coefficients with RNN to Improve the Detection of Parkinson’s Disease from the Speech 用RNN变换倒谱δ系数改进语音帕金森病的检测
Anshul Lahoti, K. Gurugubelli, J. Orozco-Arroyave, A. Vuppala
{"title":"Shifted Delta Cepstral Coefficients with RNN to Improve the Detection of Parkinson’s Disease from the Speech","authors":"Anshul Lahoti, K. Gurugubelli, J. Orozco-Arroyave, A. Vuppala","doi":"10.1145/3549206.3549258","DOIUrl":"https://doi.org/10.1145/3549206.3549258","url":null,"abstract":"Parkinson’s disease (PD) is a progressive neurodegenerative disorder of the central nervous system identified by motor and non-motor activities abnormalities. PD affects respiration, laryngeal, articulation, resonance, and prosodic aspects of speech production. Detection of PD from speech is a non-invasive approach useful for automatic screening. Perceptual attributes of speech due to PD are manifested as temporal variations in speech. In this regard, current work investigated the use of LSTM and BiLSTM networks with shifted delta cepstral (SDC) features to detect PD from speech. Further in BiLSTM networks, a multi-head attention mechanism is introduced, assuming that each head captures distinct information to detect PD. SDC features obtained from MFCCs, and SFFCCs are used for developing the PD detection system. The performance of the experiments is validated using the PC-GITA database. The experimental results revealed that BiLSTM networks give a relative improvement of 4-5% over the LSTM networks. The use of a multi-head attention mechanism further improved the detection accuracy of the PD detection system, showing that it can capture various discriminative features.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solving basic and advanced human activities using LSTM 用LSTM解决基本和高级的人类活动
N. Bansal, Satish Chandra
{"title":"Solving basic and advanced human activities using LSTM","authors":"N. Bansal, Satish Chandra","doi":"10.1145/3549206.3549244","DOIUrl":"https://doi.org/10.1145/3549206.3549244","url":null,"abstract":"Because of the increasing use of numerous sensors, human activity recognition has grown popular in a variety of fields. It has been noticed that when the requirement for protection, defense, and human activity classification and recognition grows, more research in these areas becomes necessary. Such technologies are capable of detecting terrorists and assisting in disaster relief. The goal of this research study is to look at human activity recognition systems that use deep learning. In addition, the integration of such deep learning mechanisms has been assessed. It has been seen that in previous studies, data augmentation mechanisms have been utilized to perform human activity recognition, which has resulted in a significant increase in accuracy. This accuracy can be obtained with the support of multilayer LSTM network. An approach for assessing individual activity based on electro-magnetic radiation and deep learning algorithms has been reported in a number of papers. Time and space complexity are two major hurdles in such study. As a result, the goal of this analysis review is to research the technological and economic practicability of applying deep-learning for human action recognition systems. In this study, LSTM is applied for basic and advanced human activities identification.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131857560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cluster Formation and Cluster Head Selection to Increase the Lifetime of Heterogeneous Wireless Sensor Network 提高异构无线传感器网络寿命的簇形成和簇头选择
Kumari Ritika, A. Pandey, S. Shukla
{"title":"Cluster Formation and Cluster Head Selection to Increase the Lifetime of Heterogeneous Wireless Sensor Network","authors":"Kumari Ritika, A. Pandey, S. Shukla","doi":"10.1145/3549206.3549311","DOIUrl":"https://doi.org/10.1145/3549206.3549311","url":null,"abstract":"A WSN consists of a group of interconnected, compact sensor nodes that are capable of communication and data sharing. Although WSN applications are numerous, they are nevertheless severely constrained by the multiple drawbacks of a sensor network. The limited lifespan of WSN sensor nodes is caused by the limited power supply (i.e. battery). Controlling the energy that WSN uses is vital to increase its lifespan. The Major issue of reduction in energy consumption in energy limited sensor nodes and increase in network lifetime is considered in the paper. The authors of this manuscript have developed and implemented a method for cluster formation and cluster head election that is energy-efficient. In the proposed protocol, Base station (BS) is placed in the center of the network. The sensor node senses the data from the target area, sends sensory information to the cluster head, and then sends the aggregate message to the BS. In cluster-based WSN, each SN has a unique Id. Authors compare a propound protocol to LEACH and DDEEC protocols and the performance in terms of alive node per round, dead node per round, packet delivered to BS and the maximum number of cluster heads. The authors have presented a novel approach to increasing the network lifetime of heterogeneous WSN, taking numerous considerations into account.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129111870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparing the Performance of TCP/IP with Named Data Networking Using ns-3 基于ns-3的TCP/IP与命名数据网络性能比较
N. Kumar, Naveen Gupta
{"title":"Comparing the Performance of TCP/IP with Named Data Networking Using ns-3","authors":"N. Kumar, Naveen Gupta","doi":"10.1145/3549206.3549302","DOIUrl":"https://doi.org/10.1145/3549206.3549302","url":null,"abstract":"NDN is a futuristic networking model developed to overcome the limitation of TCP/IP. NDN uses the name of the content rather than user ID (such as IP address) for forwarding and routing. In this work, we have tried to compare the performance of NDN based network with the TCP/IP-based network using the ns-3 simulator. Two topologies, i.e., simple topology and XC topology, are used for the simulation, and a comparison has been made based on the average delay","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128733733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Software Test Case Minimization 软件测试用例最小化研究综述
Syed Rizwan, Md. Shazzad Ali Sobuj, Mostafijur Rahman Akhond
{"title":"A Survey on Software Test Case Minimization","authors":"Syed Rizwan, Md. Shazzad Ali Sobuj, Mostafijur Rahman Akhond","doi":"10.1145/3549206.3549319","DOIUrl":"https://doi.org/10.1145/3549206.3549319","url":null,"abstract":"Software testing consumes the most time and resource-intensive phase of software testing. Test case minimization techniques are used to reduce the test suite which in turn saves time and resources. The main purpose of test case minimization is to eliminate the ineffective test cases in a way that the remaining test cases satisfy all the requirements as before. Many techniques are used for test case minimization. The use of a convoluted neural net, a nature-inspired algorithm like fire algorithm, data mining technique, and coverage-based and hybrid techniques has been reviewed in this paper. In this study, a few of the most recent takes on test case minimization has been summarized and sorted depending on their approach. This is a survey paper that reviews the way each paper handled their problem, which dataset they used, their accuracy on the respective dataset, and the shortcomings.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cost-Variant Renewable Energy-Based Scheduling Algorithm for Cloud Computing 一种基于成本变量的云计算可再生能源调度算法
Manas Kumar Mishra, S. K. Panda
{"title":"A Cost-Variant Renewable Energy-Based Scheduling Algorithm for Cloud Computing","authors":"Manas Kumar Mishra, S. K. Panda","doi":"10.1145/3549206.3549225","DOIUrl":"https://doi.org/10.1145/3549206.3549225","url":null,"abstract":"The global growth of cloud computing services is rising abruptly due to a large variety of services like computing, storage, network, etc. It expresses cloud service providers (CSPs) for better usage of existing datacenter resources, increasing agility, and reducing the need for unanticipated datacenter growth. These datacenters use a lot of energy generated from fossil fuels (i.e., non-renewable energy (NRE) sources) and omit a lot of nitrous oxide and carbon dioxide, which cause the greenhouse effect and are harmful to the environment. Moreover, NRE sources are limited in supply and cannot be sustained over a long period. As a circumstance, CSPs are moving towards renewable energy (RE) sources, such as solar, wind, hydro, and biomass, to decarbonize datacenters even though these resources are not available round the clock. Therefore, recent studies focus on using both RE and NRE sources to avoid any interruption of the datacenter services. However, these studies consider the equal cost for all the RE sources and do not consider the categorization among user requests (URs). This paper considers the different costs for RE sources and two categories of URs, namely critical and non-critical, and introduces a cost-variant RE-based scheduling (CRES) algorithm for cloud computing. Here, the critical UR does not depend on the RE resources due to the unpredictability of RE sources. On the other hand, the non-critical UR can be accommodated by both RE and NRE resources. We simulate the proposed algorithm by considering 20 to 100 URs and 5 to 25 datacenters and compare the performance with the future-aware best fit (FABEF) and highest available renewable first (HAREF) algorithms in terms of cost and usage count of RE resources to show its usefulness.","PeriodicalId":199675,"journal":{"name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126478240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信