{"title":"Two Step Clustering Model for K-Means Algorithm","authors":"Narongsak Chayangkoon, A. Srivihok","doi":"10.1145/3033288.3033347","DOIUrl":"https://doi.org/10.1145/3033288.3033347","url":null,"abstract":"In this paper, we propose Two Step Clustering Model for finding the number of clusters for K-Means Algorithm. The Hybrid Model solves the weakness of K-Means Algorithm especially for the general users who will try to find the number of the clusters for cluster analysis by K-Means Algorithm. In this research, we solve the problem by proposing a Hybrid Model. In the experiment, we used 10 datasets from UCI machine learning repository. In addition, for feature selection we used three algorithms. The first used Best First Search and Correction --Based Feature Subset Selection. The second used Ranker and Principal Component Analysis. The third used Best First Search and Wrapper Subset Evaluator, classification used Naïve Bayes Classifier. The determinants of the baseline model didn't use the searching method and feature selection. Moreover, we compared the performance of three algorithms for finding the k value. For the first we used EM, for the second, we used Cascade K-Means, and for the third, we used Canopy. We also evaluated performance testing of the Hybrid Model and we compared the criterion clustering by using the Sum of Squared Errors. Thus, our Hybrid Model includes searching used Ranker, the evaluator uses Principal Component Analysis. For clustering, Expectation Maximization for finding the number of clusters and the cluster analysis uses simple K-mean. Furthermore, our experimental results showed the best Hybrid Model approach achieves a higher performance that the algorithms available in our Hybrid Model had the lowest Sum of Squared Errors.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116960832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Length-bounded Hybrid CPU/GPU Pattern Matching Algorithm for Deep Packet Inspection","authors":"Yi-Shan Lin, Chun-Liang Lee, Yaw-Chung Chen","doi":"10.1145/3033288.3033346","DOIUrl":"https://doi.org/10.1145/3033288.3033346","url":null,"abstract":"Since frequent communication between the applications took place in high speed networks, deep packet inspection (DPI) plays an important role to the network application awareness. The signature-based network intrusion detection system (NIDS) contains the DPI technique that examines the incoming packet payloads by employing the pattern matching algorithm, which dominates the overall inspection performance. Existing studies focused on implementing efficient pattern matching algorithms by parallel programming on software platform because of the advantages of lower cost and higher scalability. Either the central processing unit (CPU) or the graphic processing unit (GPU) was involved. Our studies focused on designing a pattern matching algorithm based on the cooperation between both CPU and GPU. In this paper, we present an enhanced design for our previous work and introduce this novel method, a length-bounded hybrid CPU/GPU pattern matching algorithm (LHPMA). In the preliminary experiment, the performance and comparison with the previous work are displayed, and the results show that the LHPMA achieves higher throughput than other tested algorithms.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127099729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Receiver-Initiated Big Slot Scheduling MAC Protocol for Reducing Collision in Wireless Sensor Networks","authors":"Zhenqiang Wei, H. Oh","doi":"10.1145/3033288.3033342","DOIUrl":"https://doi.org/10.1145/3033288.3033342","url":null,"abstract":"Two basic requirements in designing a MAC protocol for industrial wireless sensor networks (IWSNs) include the timeliness and the reliability of data transmission. For the former, the protocols in general rely on the use of TDMA. For the latter, they have to take into account various interfering factors existent in environment. One approach uses CSMA/CA in data transmission in which a sender acquires a channel using some control messages before sending data and then the receiver replies with an acknowledgement message for the successful reception, while guaranteeing the timeless of data transmission using TDMA. Since the size of control message is relatively big when considering the small size of data in WSNs, it is desirable to reduce the number of control messages. Thus, a receiver-initiated data transmission method is proposed to reduce the number of control messages as well as the number of competing nodes. Since the receiver-initiated approach works well when data transmission can be predicted, it is applied to the BigMAC protocol that uses a level-order transmission in a tree topology. Simulation results indicate that the proposed technique contributes to improving reliability clearly and reducing one round of data gathering time, leading to the reduced energy consumption.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput Performance Evaluation on Wired and Wireless Network Cooperation Quick Recovery System Employing IEEE 802.11 DCF","authors":"K. Maruta, Yu Nakayama, T. Tsutsumi","doi":"10.1145/3033288.3033334","DOIUrl":"https://doi.org/10.1145/3033288.3033334","url":null,"abstract":"This paper investigates achievable MAC level throughput performance of wired and wireless network cooperation (NeCo) system, which realizes quick recover civilian telecommunication services in the aftermath of a catastrophic disaster. The proposed NeCo system should achieve both rapid recovery and high throughput using wireless bypass routes backhauled by wired networks. Moreover, wireless equipment also should be low-cost and energy efficient for emergency use. This paper employs IEEE 802.11ac wireless LAN based bypassing and evaluates its MAC level throughput using event-driven simulator. Results confirm our proposed bypass routing method can enhance system throughput compared to the existing one.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134547637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-Space Relocation to Improve Data Cache Performance for Embedded Multi-threaded Processor Systems","authors":"M. Wickramasinghe, Hui Guo","doi":"10.1145/3033288.3033335","DOIUrl":"https://doi.org/10.1145/3033288.3033335","url":null,"abstract":"Multi-threaded processor execution is a design strategy for performance improvement and energy reduction. With the multi-threaded execution, the processor's idle time of one thread can be hidden by executing other threads so that the overall execution time can be reduced. One typical issue with the multi-threaded processor design is cache. Cache reduces long and power-consuming memory accesses, and has become an essential component in the modern processor system. However, multi-threaded execution can interfere the cache access behavior, potentially causing more cache misses and leading to degraded cache (hence system) performance. This paper presents an off-line thread data-space relocation approach to reduce such cache misses. The approach does not introduce any performance or hardware overhead. The experiments on a set of applications show that with our approach, an average of 13.47% data cache misses can be reduced, and 10.23% performance improvement and 10.91% energy saving can be achieved.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132200888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. K. Budiardjo, E. M. Zamzami, Ganjar Ramadhan, Muh. Nur Musa
{"title":"Ontology-Based Knowledge Management System Model for R3ST Software Maintenance Environment","authors":"E. K. Budiardjo, E. M. Zamzami, Ganjar Ramadhan, Muh. Nur Musa","doi":"10.1145/3033288.3033340","DOIUrl":"https://doi.org/10.1145/3033288.3033340","url":null,"abstract":"Research shows that approximately 40% to 60% of the maintenance effort, devoted to understand the modified software. One of the obstacles founded in software maintenance is the lack of contained knowledge in software. This research proposes a conceptual framework in software maintenance by utilizing knowledge management process and software comprehension using ontology as formal modeling analysis to expliciting the tacit knowledge in software. The topic of software comprehension is an important part for software engineer's effort. This framework is realized by means the Requirements Recovery and Reconstruction (R3) method based Software Tools (R3ST) environment. R3ST bind to domain ontology for increasing the contextual result. It is expected that R3ST would be able to facilitate software developers in software maintenance activities.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Modeling Approach using Genetic Algorithm for Transmission Performance Estimation in Complex Environment","authors":"Qian Cui, K. Shuang","doi":"10.1145/3033288.3033294","DOIUrl":"https://doi.org/10.1145/3033288.3033294","url":null,"abstract":"Much insight into channel modeling for transmission line has been achieved by conducting simulations and experiments. However, accurately equivalent modeling considering complex environment and channel performances derived from the model have not been well investigated. This paper proposes an accurate methodology to estimate crosstalk, considering complex environment, given a set of propagation attenuation. A non-uniform line modal is used to optimize parameters by genetic algorithm and two-norm. The non-uniformities are also available to estimate temperature distribution along a logging cable and marking stratum depth while drilling. The technique is validated through the analysis of a 7-core cable in working conditions. The results show the accuracy and simplification of the algorithm and crosstalk can be determined by optimized parameters. It is hoped that this research will be helpful for channel performance estimation in complex and harsh environment for logging transmission system.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating Test Cases from UML Activity Diagram Based on Business Flow Constraints","authors":"Walaithip Thanakorncharuwit, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn","doi":"10.1145/3033288.3033311","DOIUrl":"https://doi.org/10.1145/3033288.3033311","url":null,"abstract":"Test case generation is the most important part of software testing. More than 50 percent of the cost and time are spent on testing the software development. Currently, researchers have used the UML activity for test case generation. However, finding a test case set from an activity diagram is a terrible task. Because the presence of loop and concurrent activities in the activity diagram result in path explosion and practically, it is not feasible to consider all execution paths for testing. In this paper, we proposed a novel approach to generate test cases using a modified DFS with tester specification to avoid the path explosion. Tester specifications follow the business flow constraints. In order to evaluate the quality of test cases, activity coverage, transition coverage, and key path coverage are measured. The proposed approach shows that the result paths of an activity diagram cover both true and false values of loop condition and helps to avoid generating all possible concurrent activity paths as it only returns one representative path.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117250009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Target Discovery: Using MUSIC with Optimized Angle-of-Arrival and Signal-Time-of-Flight","authors":"A. Akbar, Zhuchuang Shao, Dong Wang","doi":"10.1145/3033288.3033333","DOIUrl":"https://doi.org/10.1145/3033288.3033333","url":null,"abstract":"In this paper, the proposed target discovery system with optimized Angle-of-Arrival (AOA) enhances the potential of commodity WiFi access point to locate a target within tens of centimeter. However, with the change of environment the trickiest issue in indoor localization is, to identify the phase of the received signal with different angle-of-arrival in multiple paths. In this paper, an inimitable algorithm has been anticipated for estimating the angle-of-arrival and signal-time-of-flight (STOF) with a basic principle, but different in phase approach. The proposed algorithm pronounces the performance of the estimation procedure, which can be enhanced by conveying values for each path. Reliant on how conceivable the precise path is the direct path. The simulation work demonstrates that Target Discovery Using MUSIC (TDUM) with Optimized Angle-of-Arrival (AOA) is comparable to state-of-the-art localization systems, which uses four to five access points with high stability of indoor positioning system. The predictable results show a comparable efficiency of the proposed algorithm.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122017130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shengyingjie Liu, Jianwen Sun, Zhi Liu, Xian Peng, Sanya Liu
{"title":"Query-Directed Probing LSH for Cosine Similarity","authors":"Shengyingjie Liu, Jianwen Sun, Zhi Liu, Xian Peng, Sanya Liu","doi":"10.1145/3033288.3033318","DOIUrl":"https://doi.org/10.1145/3033288.3033318","url":null,"abstract":"Locality-sensitive hashing (LSH) considered as an efficient algorithm for large-scale similarity search has become increasingly popular. Recently, many of its variants have been applied widely in high-dimensional similarity search. To overcome the drawback of requirement for a large number of hash tables, researchers proposed the famous Multi-Probe LSH (MP-LSH). It has been used to improve the utilization of hash tables. There are two major probing sequences mentioned in MP-LSH, i.e., Step-Wise Probing (SWP) sequence and Query-Directed Probing (QDP) sequence. It is verified that QDP sequence is better than SWP sequence in number of probes and query time. However, the proposed QDP sequence is based on the E2LSH. It means that the method is only adopted for Euclidean distance. For cosine similarity, SWP sequence is still the only feasible method to perform Multi-Probe LSH.\u0000 This paper proposes an approach based on QDP sequence for cosine similarity search. Moreover, we give a set of complete theories and the corresponding proof for our method. Several experiments are performed on two types of open data sets. The experiments demonstrate our algorithm requires a small amount of probes and less time to achieve a high query quality than SWP sequence for cosine similarity.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127446522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}