Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control最新文献

筛选
英文 中文
An l1-Norm Regularized Copula Based Feature Selection 基于11范数正则Copula的特征选择
Snehalika Lall, S. Bandyopadhyay
{"title":"An l1-Norm Regularized Copula Based Feature Selection","authors":"Snehalika Lall, S. Bandyopadhyay","doi":"10.1145/3386164.3386177","DOIUrl":"https://doi.org/10.1145/3386164.3386177","url":null,"abstract":"In this paper, we develop a novel feature selection method called RCFS (Regularized Copula based Feature Selection) based on regularized copula. We use l1 regularization, as it penalizes the redundant co-efficient of features and makes them zero, resulting in non-redundant effective features set. Scale-invariant property of copula ensures good performance in noisy data, thereby improving the stability of the method. Three different forms of copula viz., Gaussian copula, Empirical copula, and Archimedean copula are used with l1 regularization. Results prove a significant improvement in the accuracy of the prediction model than any non regularized feature selection method. The number of optimal features to achieve a fixed accuracy value is also less than any other non regularized feature selection techniques.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116691519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Epidemic System Conversion on Industry 4.0's Perspective Under Dynamic Network Condition 动态网络条件下工业4.0视角下流行病系统转换
P. Poonpakdee, J. Koiwanit, C. Yuangyai
{"title":"Epidemic System Conversion on Industry 4.0's Perspective Under Dynamic Network Condition","authors":"P. Poonpakdee, J. Koiwanit, C. Yuangyai","doi":"10.1145/3386164.3386180","DOIUrl":"https://doi.org/10.1145/3386164.3386180","url":null,"abstract":"In large-scale manufacturing operations with increasing global competition, success depends on a reliable network system to complete a value chain transformation. The use of the Industry 4.0 paradigm is increasingly evolving in many areas of different industries to ensure significant increases in factory productivity, flexibility, and efficiency. Consequently, the system transformation requires a shift from single automated node to a fully integrated system. However, selected methodology and results require study to fully understand the digital transformation as well as its characteristics. This investigation presents a system conversion study, between centralized and decentralized systems, using the concept of epidemic membership protocols in the context of Industry 4.0. This paper proposes the method based on membership protocols focusing on the system conversion methodology under dynamic network condition. The experimental results show that the proposed method provides an ability to rewrite the structure of the network topology with optimal accuracy of epidemic application.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124830088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Naming Anonymous Processes with Test-and-Set Registers 使用测试-设置寄存器命名匿名进程
Layla S. Aldawsari
{"title":"Naming Anonymous Processes with Test-and-Set Registers","authors":"Layla S. Aldawsari","doi":"10.1145/3386164.3386182","DOIUrl":"https://doi.org/10.1145/3386164.3386182","url":null,"abstract":"A system of anonymous processes that have no names assigned to them is considered in both synchronous and asynchronous communication models. The processes are fault free and can only communicate using test-and-set (TAS) registers. The aim of the paper is to assign unique names to all processes using a distributed algorithm. The naming of anonymous processes is studied in eight new problem models based on two categories; the number of TAS registers available, and the knowledge of the number of processes. In this paper, two distributed naming algorithms are developed that can assign unique names to anonymous processes. One is deterministic and the other is randomized. The developed algorithms are optimal in time complexity and namespace size. The Sequential Lookup algorithm, which is a deterministic algorithm, has a time complexity of 0(n2) steps, whereas the Random Lookup algorithm, which is a randomized algorithm, has a time complexity of 0(n log n) steps. Proof of the correctness of each naming algorithm is presented for all categories of the problem model where the number of processes is known. The Random Lookup algorithm has a better time complexity compared to the Sequential Lookup algorithm due to the use of randomness in accessing TAS registers.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126738499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A General Architecture for a Real-Time Monitoring System Based on the Internet of Things 一种基于物联网的实时监控系统通用架构
Nilakantha Paudel, R. Neupane
{"title":"A General Architecture for a Real-Time Monitoring System Based on the Internet of Things","authors":"Nilakantha Paudel, R. Neupane","doi":"10.1145/3386164.3387295","DOIUrl":"https://doi.org/10.1145/3386164.3387295","url":null,"abstract":"Recently there has been significant progress in the real-time monitoring system based on the Internet of Things (IoT). The use rate of IoT has been increasing exponentially because of its enormous application in different areas, with many of them are yet to be explored. This paper explains how to design an IoT system and describes its working mechanism. We present a general architecture of the real-time monitoring system using IoT and related services. We successfully implement our proposed architecture for a single domain. Then, we describe how to use the proposed architecture to monitor the different real-time contextual domains. Also, we present ideas on how to plug the data from a third-party application into the proposed architecture.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129332916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Octree-Based Hierarchical 3D Pathfinding Optimization of Three-Dimensional Pathfinding 基于八叉树的三维分层寻路优化
Timur Muratov, A. Zagarskikh
{"title":"Octree-Based Hierarchical 3D Pathfinding Optimization of Three-Dimensional Pathfinding","authors":"Timur Muratov, A. Zagarskikh","doi":"10.1145/3386164.3386181","DOIUrl":"https://doi.org/10.1145/3386164.3386181","url":null,"abstract":"Despite the fact that the problem of pathfinding exists for quite a while, most of the related work is focused on methods that are applicable only in 2D environment. However, there is a demand for methods that can provide a solution for pathfinding tasks in 3D working space. These tasks mostly come from area of robotics and game development, where it is often required to get a solution in real-time. The main problem, besides the lack of appropriate methods, is that in 3D environment the working space size increases greatly in comparison with 2D case, and it becomes harder to construct a precise representation of this space while maintaining low size of search graph. To overcome this, methods that lower graph size, whether explicitly or implicitly, are used. This paper provides a brief review on some of existing approaches, comparison of their effectiveness and presentation a new method of real-time pathfinding in 3D environment that can be helpful in real-time calculations (i.e. game development area). This brief review will be referred to when comparing proposed method with existing ones. A proposed method combines advantages of using octree structure as search graph (such as sparce free space representation) and hierarchical path planning (effective reduction of graph size by clustering). Thus, an appreciable speed-up is achieved.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud-Based Battery Digital Twin Middleware Using Model-Based Development 基于模型开发的云电池数字孪生中间件
Lukas Merkle
{"title":"Cloud-Based Battery Digital Twin Middleware Using Model-Based Development","authors":"Lukas Merkle","doi":"10.1145/3386164.3387296","DOIUrl":"https://doi.org/10.1145/3386164.3387296","url":null,"abstract":"Following the trends of electrification, the energy storage of vehicles is gaining importance as the most expensive part of an electric car. Since lithium-ion batteries are perishable goods and underlie e. g. aging effects, environmental and operating conditions during manufacturing and car usage need close supervision. With regard to the paradigm of digital twins, data from various life cycle phases needs to be collected and processed to improve the general quality of the system. To achieve this complex task, a suitable framework is needed in order to operate the fleet of digital twins during manufacturing processes, the automotive usage and a potential second life. Based on a literature review, we formulate requirements for a digital twin framework in the field of battery systems. We propose a framework to develop and operate a fleet of digital twins during all life cycle phases. Results feature a case study in which we implement the stated framework in a cloud-computing environment using early stages of battery system production as test a bed. With the help of a self-discharge model of li-ion cells, the system can estimate the SOC of battery modules and provide this information to the arrival testing procedures.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"482 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Machine Learning Techniques for Classification of Spambase Dataset: A Hybrid Approach 垃圾数据集分类的机器学习技术:一种混合方法
Shikha Verma, A. Gautam
{"title":"Machine Learning Techniques for Classification of Spambase Dataset: A Hybrid Approach","authors":"Shikha Verma, A. Gautam","doi":"10.1145/3386164.3389089","DOIUrl":"https://doi.org/10.1145/3386164.3389089","url":null,"abstract":"Email has become a necessity for this new generation for official communication purposes. As the use of Internet is becoming more and more the risk of being caught into its darker side is so common. The major concern is spam, which is growing exponentially, and the users are becoming victim of it on daily basis. This paper proposes a hybrid machine learning classification model for the spam classification on the spambase dataset. This model uses the four classification algorithms namely Ensemble Classification, Decision Tree, Random Forest and Support Vector Machine (SVM). There are two phases; First phase deals with the classification of spambase dataset in two classes i.e. spam and ham with Decision Tree machine learning algorithm and the second phase comprises of classification improvisation of the output produced by phase one with four machine learning algorithms i.e. Decision Tree, Random Forest, Support Vector Machine (SVM) and Ensemble Learning. The experiment shows a very promising result with improvised accuracy in second phase.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"78 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128102761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Meta-Heuristic Computation Offloading Strategy for IoT Applications in an Edge-Cloud Framework 边缘云框架下物联网应用的元启发式计算卸载策略
Xuezhen Huang, Yang Yang, Xinglu Wu
{"title":"A Meta-Heuristic Computation Offloading Strategy for IoT Applications in an Edge-Cloud Framework","authors":"Xuezhen Huang, Yang Yang, Xinglu Wu","doi":"10.1145/3386164.3390513","DOIUrl":"https://doi.org/10.1145/3386164.3390513","url":null,"abstract":"Edge-cloud computing provides performance guarantees for IoT applications which are real-time or security sensitive. The new placement of edge-cloud services leverages resources both in Cloud Data Centers (CDC) and at the edge of the network. A computation task can be divided into subtasks and offloaded to different edge/cloud servers, which are donated as offloading destinations. Offloading destination heterogeneity and different architecture of Edge Data Center (EDC) and CDC bring challenges to computation offloading. One critical issue in edge-cloud computing is energy consumption in computation offloading. The existing computation offloading strategies either ignored energy consumption or ignored delay and/or security constraints. Meta-heuristic strategies have been used widely to design heuristic resource allocation algorithms in CDC. This paper aims to explore meta-heuristic energy-efficient computation offloading (EE-CO) approaches with the objective to meet the delay and security constraints, while minimizing energy consumption. To achieve the goal, we investigated the performance of the Ant-Colony-Optimization (ACO) strategies combining with mixed integer programming (MIP). We propose an ACO-based computation offloading strategy, which including two algorithms, called EA-OMIP and EA-RMIP, respectively. The only difference of them is the construction method of integer programming models. Simulations are carried out to value the performance of proposed two algorithms. We also give an analysis of the experimental results in terms of the subtask acceptance ratio, revenue of the cloud service provider (CSP), and the resource utilization.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130763723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Robotic Grasp Pose Estimation Oriented Deep Learning Algorithm Based on Residual Network 基于残差网络的机器人抓取姿势估计深度学习算法
Fan Bai, Renjie Yao, Maoning Chen, Zhexin Cui
{"title":"Robotic Grasp Pose Estimation Oriented Deep Learning Algorithm Based on Residual Network","authors":"Fan Bai, Renjie Yao, Maoning Chen, Zhexin Cui","doi":"10.1145/3386164.3389081","DOIUrl":"https://doi.org/10.1145/3386164.3389081","url":null,"abstract":"Autonomous manipulator grasp is an important issue in robotics research. To obtain the optimal grasp pose, we combine manipulator vision and deep learning to realize the artificial intelligence of the manipulator grasp. We adopt the idea of using residual network to improve the generative grasping convolutional neural network (GG-CNN). Firstly, we build a convolution residual module. By piling multi-layer of residual modules, we can build the residual network and deepen the depth of the convolutional neural network, which is used as the main part to improve GG-CNN. Improved GG-CNN based on deep residual network enhances the accuracy of the optimal grasping pose generation of the manipulator. Experimental results show that the accuracy of the improved GG-CNN model based on residual network reaches 88%, which is much higher than the original model's accuracy of 72%. It significantly improves the accuracy of the model to predict the optimal grasp pose of the manipulator.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130820369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Recognition for Attendance System Using Neural Networks Technique 基于神经网络技术的考勤系统人脸识别
D. Prangchumpol
{"title":"Face Recognition for Attendance System Using Neural Networks Technique","authors":"D. Prangchumpol","doi":"10.1145/3386164.3389102","DOIUrl":"https://doi.org/10.1145/3386164.3389102","url":null,"abstract":"Face recognition have come from considering various aspects of this specialized perception problem such as apply for help checking attendant. In order to solve this problem, many systems have been completely changed due to this evolve to achieve more accurate results. This research aims to develop the facing attendant system to be more effective and the mechanic of the system, which students can easily verify. The cloud storage was used for Attendance System. The experiment of this research is to find the way to recognize the face by using the technique of Neural Networks, which can correctly recognize up to 95%. This model can apply with school and university.","PeriodicalId":231209,"journal":{"name":"Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131119411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信