2015 International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
Agent development platforms for bioinformatics 生物信息学代理开发平台
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2015-12-01 DOI: 10.1109/CCCS.2015.7374186
A. Gopee, Geerish Suddul, A. Chikudo, Y. Jaufeerally-Fakim
{"title":"Agent development platforms for bioinformatics","authors":"A. Gopee, Geerish Suddul, A. Chikudo, Y. Jaufeerally-Fakim","doi":"10.1109/CCCS.2015.7374186","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374186","url":null,"abstract":"During the past decade, Molecular Biology wet labs and sequencing activities have been generating a vast amount of data, causing an increase in the adoption of new methods and tools for identification and analysis. In particular, the use of software agent technology in bioinformatics applications has been on the rise, due some of its unique features as autonomy and remote execution capabilities. However, nowadays there exists multiple software agent development platforms, and their potential application to bioinformatics require an assessment based on their inherent features. We therefore present a comparative analysis of the main available platforms focusing on standard compatibility, communication, mobility, security policy, availability, usability and development issues. Our result, based on a scoring system, demonstrate that the JADE platform is the most appropriate and promising one to be used in tackling bioinformatics problems.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132965537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sixsoid: A new paradigm for k-coverage in 3D wireless sensor networks 六体:三维无线传感器网络k-覆盖的新范例
2015 International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2013-12-31 DOI: 10.1109/CCCS.2015.7374124
Manjish Pal, Nabajyoti Medhi
{"title":"Sixsoid: A new paradigm for k-coverage in 3D wireless sensor networks","authors":"Manjish Pal, Nabajyoti Medhi","doi":"10.1109/CCCS.2015.7374124","DOIUrl":"https://doi.org/10.1109/CCCS.2015.7374124","url":null,"abstract":"Coverage in 3D wireless sensor network (WSN) is always a very critical issue to deal with. Coming up with good coverage models implies more energy efficient networks. K-coverage is one model that ensures that every point in a given 3D Field of Interest (FoI) is guaranteed to be covered by k sensors. When it comes to 3D, coming up with a deployment of sensors that gurantees k-coverage becomes much more complicated than in 2D. The basic idea is to come up with a convex body that is guaranteed to be k-covered by taking a specific arrangement of sensors, and then fill the FoI will non-overlapping copies of this body. In this work, we propose a new shape for the 3D scenario which we call a Sixsoid. Prior to this work, the convex body which was proposed for coverage in 3D was the so called Reuleaux Tetrahedron. Our construction is motivated from a construction that can be applied to the 2D version of the problem in which it imples better guarantees over the Reuleaux Triangle. Our contribution in this paper is twofold, firstly we show how Sixsoid gurantees more coverage volume over Reuleaux Tetrahedron, secondly we show how Sixsoid also guarantees a simpler and more pragmatic deployment strategy for 3D wireless sensor networks. In this paper, we show the constuction of Sixsoid, calculate its volume and discuss its implications on the k-coverage in WSN.","PeriodicalId":300052,"journal":{"name":"2015 International Conference on Computing, Communication and Security (ICCCS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123437782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信