{"title":"Recommendation framework for Service-Oriented Grid","authors":"N. Nagarathna, M. Indiramma","doi":"10.1109/ICOAC.2012.6416842","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416842","url":null,"abstract":"Grid computing systems provide a virtual framework for sharing resources across organizational boundaries. The merging of Service Oriented Architecture (SOA) with the original Grid technology has resulted in the emergence of the Service Oriented Grid (SOG). The resources from various virtual organizations (VO) are packaged as “services” and offered to users in the form of Grid services. With the increasing use of SOG, service user is in a fix when having to make a choice from a set of services offering the same functionality. Hence service selection is one of the challenges to be addressed in Service Oriented Grid. In this paper we propose a framework for a recommendation system based on trust, reputation and QoS for the SOG with multi-VOs. This novel approach uses computation of trustworthiness of services by the mechanism of taking feedback directly from the service consumers and recommendations from other service providers.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131337047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of high utility itemset mining in service oriented computing: Deployment of knowledge as a service in E-commerce","authors":"S. Kannimuthu, K. Premalatha, S. Shankar","doi":"10.1109/ICOAC.2012.6416812","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416812","url":null,"abstract":"In this paper, we explore a Service Oriented Computing (SOC) paradigm which provides knowledge as a service that makes use of utility mining approach. The basic idea of providing knowledge is done via the web services in which we use a knowledge server to answer the queries of the consumers. A web service is a single entity which comprises of cluster of functionalities and is made available at the heart of the network and the knowledge data are entitled to be used by the knowledge consumers in a standardized manner to maintain transparency. Here, we have proposed an architecture called Knowledge as a Service (KaaS) where we use utility mining algorithms for extracting the knowledge data from the data owners when the knowledge consumers are in need of a particular knowledge data. The main motive behind proposing architecture is to provide Utility Mining as a service in a distributed computing environment which can be applied in business such as cross selling approach. This novel architectural based approach is experimented in online shopping cart system.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"18 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132791723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object monitoring by prediction and localisation of nodes by using Ant Colony Optimization in Sensor Networks","authors":"S. Niranchana, E. Dinesh","doi":"10.1109/ICOAC.2012.6416828","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416828","url":null,"abstract":"Wireless sensor network (WSN) consists of tiny sensor nodes with sensing, computation and wireless communication capabilities. Now days, it is finding wide applicability and increasing deployment, as it enables reliable monitoring and analysis of environment. The design of routing protocols for WSN is influenced by many challenging factors like fault tolerance, energy efficiency, scalability, latency, power consumption and network topology. Mobile Sensor Networks (MSN) is networks composed of a large number of wireless devices having sensing, processing, communication, and movement capabilities. In WSN, the coverage of the large area can be improved by the moving the sensor nodes. Coverage in a wireless sensor network can be thought of as how well the wireless sensor network is able to monitor a particular field of interest. In this paper the problem of object monitoring in Mobile Sensor Networks can be identified. The proposed system consists of estimating the position of nodes and then the estimated positions are used to predict the location of nodes. Once the object is determined, the mobile node moves to cover the particular object. If the Target cannot be defined then the set of new nodes are located and each node is assigned a position to minimize the total travelled distance. The estimation and prediction of nodes are done by Interval Theory and the Relocation of Nodes is done by using Ant Colony Optimization. ACO is the Localization of Sensor Nodes which Tracks the Targets. In this proposed paper the simulation results are compared to object monitoring methods considered for networks with static nodes.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121152428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Sathish, M. Sivachitra, R. Savitha, S. Vijayachitra
{"title":"Wind profile prediction using a Meta-cognitive Fully Complex-valued neural network","authors":"E. Sathish, M. Sivachitra, R. Savitha, S. Vijayachitra","doi":"10.1109/ICOAC.2012.6416850","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416850","url":null,"abstract":"This paper applies the recently developed Meta-cognitive Fully Complex-valued Radial Basis Function (Mc-FCRBF) network for predicting the speed and direction of wind. Mc-FCRBF network contains two components: a cognitive component and a meta-cognitive component. A Fully Complex-valued Radial Basis Function (FC-RBF) network is the cognitive component and a self-regulatory learning mechanism is its meta-cognitive component. In each epoch of the training, when the sample is presented to the Mc-FCRBF network, the meta-cognitive component decides what to learn, when to learn, and how to learn based on the knowledge acquired by the FC-RBF network and the new information contained in the sample. Performance comparison of the meta-cognitive fully complex-valued RBF network (Mc-FCRBF) applied for wind speed prediction shows better prediction of wind profile (Speed) characteristics when compared to a real-valued extreme learning machine and FC-RBF network.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115499519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using differential evolution in the prediction of software effort","authors":"I. Thamarai, S. Murugavalli","doi":"10.1109/ICOAC.2012.6416816","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416816","url":null,"abstract":"Estimation of software is a very important and crucial task in the software development process. Due to the intangible nature of software, it is difficult to predict the effort correctly. There are number of options available to predict the software effort such as algorithmic models, non-algorithmic models etc. Estimation of Analogy has been proved to be most effective method. In this, the estimation is based on the similar projects that have been successfully completed already. If the parameters of the current project, matches well with the past project then it is easy to calculate the effort for current project. The success rate of the effort prediction largely depends on finding the most similar past projects. For finding the most relevant past project in estimation by analogy method, the computational intelligence tools have already been used. The use of Artificial Neural Networks, Genetic Algorithm has not fully solved the problem of selection of relevant projects. The main problems faced are Feature Selection and Similarity Measure between the projects. This can be achieved by using Differential Evolution. This is a population based search strategy. The Differential Evolution is used to compare the key attributes between the two projects. Thus we can get most optimal projects which can be used for the estimation of effort using analogy method.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127229758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rajeswari, P. Maheswari, S. Bhuvaneshwari, S. Gowri
{"title":"Performance analysis of AODV, DSR, TORA and OLSR to achieve group communication in MANET","authors":"M. Rajeswari, P. Maheswari, S. Bhuvaneshwari, S. Gowri","doi":"10.1109/ICOAC.2012.6416834","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416834","url":null,"abstract":"Secure group communication is a challenging task with respect to MANET's. Since its introduction as a communication medium, wireless technology found broad application on the battlefield. Robust and reliable group communication plays a major role in developing distributed mobile application in which unannounced disconnections will occur frequently due to the mobility of the nodes which take part in mobile applications. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. The main objective here is to achieve robust and reliable group communication in mobile ad hoc network. Performance of the group communication is compared with the given protocols through simulation in NS-2. The analysis is made with respect to the throughput, packet transmission between source and destination. We propose four Ad hoc Routing Protocols AODV, DSR, TORA and OLSR.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124908234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning very simple k-Equal Matrix Grammar from positive data","authors":"P. Grace, J. D. Emerald, D. G. Thomas","doi":"10.1109/ICOAC.2012.6416794","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416794","url":null,"abstract":"Siromoney[1] introduced a notion of an Equal matrix grammar which is a kind of a parallel re-writing system and which includes the class of regular languages. Yokomori [4] introduced very simple grammars and studied the problem of identifying this class in the limit from positive data. In this paper, we combine them and introduced a new grammar called Very Simple k-Equal Matrix Grammar. We also study certain properties of the grammar, compare this class with other known classes of languages and show that this class is polynomial time identifiable in the limit from positive data.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123532482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Region based reconstruction from the axial view of the brain for inverse EEG problem","authors":"M. Arivazhagan, N. Mira","doi":"10.1109/ICOAC.2012.6416820","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416820","url":null,"abstract":"This paper presents a new method for reconstruction of current sources from the axial view of the brain for inverse EEG problem, which produce reconstructed sources that are confined to brain regions. The method involves partitioning the gray matter into a set of regions (active regions), and a simple linear model is constructed for the potentials produced by feasible source configurations inside each one of these regions. The proposed method computes the solution in two stages: in the first one, the active regions for experiment is found so that the harvested potentials approximate the measured potential data. In the second stage, a detailed distribution of the current sources inside each active region is performed. The scheme proposed is more compatible when comparing with other methods which produce the standardized localization strategy.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Naive Bayes dichotomizer supported with expected risk and discriminant functions in clinical decisions — Case study","authors":"A. Pratap, C. Kanimozhiselvi","doi":"10.1109/ICOAC.2012.6416811","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416811","url":null,"abstract":"In this paper, a case study on the application of Naïve Bayes dichotomizer in clinical decision supporting systems is described. The case study is about the diagnosis of the possibility of having Pervasive Developmental Disorder (PDD) in a child. The age group selected for the study is in between 2 and 3 years. Pervasive developmental Disorder is a neuro disorder that affects the social functioning, behavioural functioning and communication in a child. Conventional diagnosis is based on the scores obtained on checklists like DSM-IV Criteria. As Bayesian reasoning uses probability inferences, it is usually applied on decision making systems. Here for the study a Naive Bayes probabilistic dichotomizer was implemented. This dichotomizer calculates the most probable output depending on the inputs given to it, by applying the Bayes rule. Since the classifier is considering only two classes, the classifier is called as dichotomizer. The minimum expected risk and positive discriminant functions are also calculated, which again supports the decision of Naive Bayes dichotomizer. Implementation of Maximum A Priori Hypothesis and Maximum Likelihood Hypothesis are also discussing on the case study for a comparison. The main goal of this research work was to study the application of some probabilistic reasoning techniques in clinical decision supporting systems, where classification is more important. Based on the implementation of our case study, the findings shown that Naive Bayes dichitomizer supported with minimum expected risk and positive discriminant function, classifies correctly in clinical decision supporting systems.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129994809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surface defect detection and classification in mandarin fruits using fuzzy image thresholding, binary wavelet transform and linear classifier model","authors":"Anandhanarayanan Kamalakannan, G. Rajamanickam","doi":"10.1109/ICOAC.2012.6416829","DOIUrl":"https://doi.org/10.1109/ICOAC.2012.6416829","url":null,"abstract":"Machine vision systems with effective image processing methods are used in quality grading of agricultural products. A pattern recognition technique was developed to detect and classify surface defects such as pitting, splitting and stem-end rot found in images of mandarin fruits. The developed technique employs fuzzy thresholding for image segmentation, binary wavelet transform (BWT) for feature extraction and a rule based linear classifier model for detection and classification of the defects. The moment invariants computed from the detail subimage of BWT were taken as feature values. This paper in detail describes about the pattern recognition algorithm and its implementation. The detection and classification results obtained from the algorithm are reported and discussed.","PeriodicalId":286985,"journal":{"name":"2012 Fourth International Conference on Advanced Computing (ICoAC)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132453113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}