Int. J. Next Gener. Comput.最新文献

筛选
英文 中文
A CNN Based Approach for Crowd Anomaly Detection 基于CNN的人群异常检测方法
Int. J. Next Gener. Comput. Pub Date : 2021-04-03 DOI: 10.47164/IJNGC.V12I1.624
K. Joshi, N. Patel
{"title":"A CNN Based Approach for Crowd Anomaly Detection","authors":"K. Joshi, N. Patel","doi":"10.47164/IJNGC.V12I1.624","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I1.624","url":null,"abstract":"Automatic Anomaly detection in a crowd scene is very significant because of more apprehension with people's safety in a public place. Because of usefulness and complexity, currently, it is an open research area. In this work, a new Convolutional Neural Network (CNN) model is proposed to detect crowd anomaly. Experiments are carried out on two publicly available datasets. The performance is measured by Accuracy and Area Under the ROC Curve (AUC). The experimental results determine the efficacy of the proposed model.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116672602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Unified model towards Scalability in Software Defined Networks 面向软件定义网络可扩展性的统一模型
Int. J. Next Gener. Comput. Pub Date : 2021-04-03 DOI: 10.47164/IJNGC.V12I1.690
Amit Nayyer, A. Sharma, L. Awasthi
{"title":"Unified model towards Scalability in Software Defined Networks","authors":"Amit Nayyer, A. Sharma, L. Awasthi","doi":"10.47164/IJNGC.V12I1.690","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I1.690","url":null,"abstract":"Software Defined Network is a paradigm that enables the network administrators to manage and control the network from a centralized location using software programs. The limitations and complexities of the traditional network are handled by separating the control plane from the data plane in this setup. The main idea is to have centralized control over network devices. Scalability is one of the main concerns in such a paradigm. Various independent solutions to improve scalability are available in the literature. In this paper, two approaches for the solutions of scalability are studied and implemented: Topology based solutions and Routing based solutions. Different evaluation parameters are selected for evaluating a framework combined with a specific routing protocol. Frameworks from different categories are implemented along with different routing protocols. Putting the routing protocols one by one in a single framework, nine such models are implemented for evaluation. Results are provided for consideration before network setup for the network administrators. Furthermore, the discussions based on the results are presented regarding the combination of a particular framework with routing solution to get better results in specific conditions.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125406955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Classifier Model for Prediction of COVID-19 新型冠状病毒预测的机器学习分类器模型
Int. J. Next Gener. Comput. Pub Date : 2021-04-03 DOI: 10.47164/IJNGC.V12I1.186
Jhimli Adhikari
{"title":"Machine Learning Classifier Model for Prediction of COVID-19","authors":"Jhimli Adhikari","doi":"10.47164/IJNGC.V12I1.186","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I1.186","url":null,"abstract":"COVID-19 pandemic has become a major threat to the world. In this study a model is designed which can predict the likelihood of COVID-19 patients with maximum accuracy. Therefore three machine learning classification algorithms namely Decision Tree, Naive Bayes and Logistic Regression classifier are used in this experiment to detect Covid-19 disease at an early stage. The models are trained with 75% of the samples and tested with 25% of data. Since the dataset is imbalanced, the performances of all the three algorithms are evaluated on various measures like F-Measure, Accuracy and Matthews Correlation Coefficient. Accuracy is measured over correctly and incorrectly classified instances. All the analyses were performed with the use of Python, version 3.8.2. Receiver Operating Characteristic (ROC) curves are used to verify the result in a proper and systematic manner. This framework can be used, among other considerations, to prioritize testing for COVID-19 when testing resources are limited.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126461422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control and Coordination of Self-Adaptive Traffic Signal Using Deep Reinforcement Learning 基于深度强化学习的自适应交通信号控制与协调
Int. J. Next Gener. Comput. Pub Date : 2021-03-01 DOI: 10.17762/ITII.V9I1.141
Pallavi A. Mandhare, Jyoti Y. Yadav, Vilas Kharat, C. Patil
{"title":"Control and Coordination of Self-Adaptive Traffic Signal Using Deep Reinforcement Learning","authors":"Pallavi A. Mandhare, Jyoti Y. Yadav, Vilas Kharat, C. Patil","doi":"10.17762/ITII.V9I1.141","DOIUrl":"https://doi.org/10.17762/ITII.V9I1.141","url":null,"abstract":"The most observable obstacle to sustainable mobility is traffic congestions. These congestions cannot effectively be fixed by traditional control of traffic signals. Safe and smooth movement of traffic is ensured by a self-controlled traffic signal. As such, to coordinate the traffic flow it is necessary to implement dynamic traffic signal subsequences. Primarily, Traffic Signal Controllers (TSC) provides sophisticated control and coordination of vehicles. The control and coordination of traffic signal control systems can be effectively achieved by implementing the Deep Reinforcement Learning (DRL) approaches. \u0000The decision-making capabilities at intersections are improved by having variations of traffic signal timing using an adaptive TSC. Alternatively, the actual traffic demand is nothing but managing the traffic systems. It analyses the incoming number and type of vehicles and gives a real-time response at intersection geometrics and controls the traffic signals accordingly. \u0000The proposed DRL algorithm observes traffic data and operates optimum management plans for the regulation of the traffic flow. Furthermore, an existing traffic simulator is used to help provide a realistic environment to support the proposed algorithm. \u0000 ","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130258708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Level Fuzzy Cluster Based Trust Estimation for Hierarchical Wireless Sensor Networks 基于多级模糊聚类的分层无线传感器网络信任估计
Int. J. Next Gener. Comput. Pub Date : 2020-12-22 DOI: 10.47164/IJNGC.V11I3.661
Rahul Das, M. Dwivedi
{"title":"Multi-Level Fuzzy Cluster Based Trust Estimation for Hierarchical Wireless Sensor Networks","authors":"Rahul Das, M. Dwivedi","doi":"10.47164/IJNGC.V11I3.661","DOIUrl":"https://doi.org/10.47164/IJNGC.V11I3.661","url":null,"abstract":"In Hierarchical Wireless Sensor Network (HWSN), the energy transmission of data packets belongs to the distance between source and destination, vulnerable to various malicious attacks. Thus clustering of HWSN reduces energy consumption, achieves scalability, and reduces network traffic. Therefore in this paper, a Multi-level Fuzzy Cluster Trust Estimation (MFCTE) logic model is used for clustering nodes and select trustworthy Cluster Head (CH) from clustered nodes. For this, the proposed method uses five attributes to become a trust-based CH. The following attributes given as input to fuzzy are Density of the other sensor nodes near to CH, Compaction of the surrounding nodes, Distance from the base station, Residual energy of the sensor nodes, and Packet integrity. MFCTE detects malicious nodes and ensures security in CH by automatically adjusting a load of direct trust, indirect trust, and parameters of update mechanism. The simulation results indicate that the proposed technique is energy efficient in terms of energy consumption, network lifetime for different network sizes, and better at defining malicious attacks.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121741332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Logic Based Detection of SLA Violation in Cloud Computing - A Predictive Approach 云计算中基于模糊逻辑的SLA违规检测——一种预测方法
Int. J. Next Gener. Comput. Pub Date : 2020-12-22 DOI: 10.47164/IJNGC.V11I3.560
P. K. Upadhyay, A. Pandita, Nisheeth Joshi
{"title":"Fuzzy Logic Based Detection of SLA Violation in Cloud Computing - A Predictive Approach","authors":"P. K. Upadhyay, A. Pandita, Nisheeth Joshi","doi":"10.47164/IJNGC.V11I3.560","DOIUrl":"https://doi.org/10.47164/IJNGC.V11I3.560","url":null,"abstract":"Scheduling of a large number of submitted tasks is a central operation in cloud computing. Efficient scheduling and resource allocation for the submitted tasks ensures that Service-Level-Agreements (SLA) violations are minimized. We present a fuzzy logic-based approach for predicting submitted tasks which are likely to encounter SLA violations. It may help Cloud Service Providers (CSPs) to design corrective interventions in terms of additional resource allocation to prevent SLA violations. The proposed mechanism assists in reducing SLA violations and improves the end-user quality-of-service experience along with enhancement of CSP revenues. The appropriate selection of performance metrics has enabled the proposed model to achieve the highest classification accuracy of 92.6% in predicting SLA violation.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128837827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hexagonal Picture Languages Generated By Assembling Hexagonal Tiles 六边形拼贴生成的六边形图片语言
Int. J. Next Gener. Comput. Pub Date : 2020-12-22 DOI: 10.47164/IJNGC.V11I3.608
P. Anitha
{"title":"Hexagonal Picture Languages Generated By Assembling Hexagonal Tiles","authors":"P. Anitha","doi":"10.47164/IJNGC.V11I3.608","DOIUrl":"https://doi.org/10.47164/IJNGC.V11I3.608","url":null,"abstract":"We propose a new formalism for generating hexagonal picture languages based on assembling of hexagonal tiles and hexagonal dominos that uses rules having two sites namely context site and a replacement site. More briefly a hexagonal picture can be generated from a finite set of initial hexagonal picture by iteratively applying the rules from a given set of rule sequences called a Hexagonal Tiling Rule System (HRTS). We claim that this HRTS system have a greater generative capacity than Hexagonal Tiling System (HTS), even in the case of one letter alphabet. This is possible due to the repeated use of replacement site.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123179698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Analysis of Threshold Techniques for identifying Faulty Classes 故障类识别的阈值技术实证分析
Int. J. Next Gener. Comput. Pub Date : 2020-12-22 DOI: 10.47164/IJNGC.V11I3.642
N. Kaur, Hardeep Singh
{"title":"An Empirical Analysis of Threshold Techniques for identifying Faulty Classes","authors":"N. Kaur, Hardeep Singh","doi":"10.47164/IJNGC.V11I3.642","DOIUrl":"https://doi.org/10.47164/IJNGC.V11I3.642","url":null,"abstract":"The experimental validation of the proficiency of the proposed techniques is a mandatory task in the research regime. The existing literature has proved the presence of extensive work attained the statistical validation of software metrics by utilizing them in the development of fault prediction models, where, both statistical and machine learning techniques were engaged into the construction of the models being capable of identifying faulty and non-faulty classes. On the contrary, the research area involving the investigation of threshold concept has not gained sufficient maturity. An effective threshold technique can assist in the identification of optimal cut-off value in software metric which can discriminate the faulty from non-faulty classes with minimal misclassification rate. The idea of threshold calculation can make the applicability of the existing metrics in software industries, a much easier task. As the developers only need to know the cut-off values which can help them to concentrate on the specific classes that exceeds the computed thresholds. Also, the presence of peculiarity in the software metric index can alert the testers and in turn helps them to disburse the resources systematically. The current study empirically validated and compared the discriminating strength of two threshold techniques, i.e., ROC curve and Alves Rankings, on the public dataset. This study selected twenty Object Oriented (OO) measures for the process of threshold calculation. Besides, the widely addressed metric suite proposed by Chidamber and Kemerer, this study also considered other fourteen OO measures for the experiment. Furthermore, Wilcoxon signed ranks test was used to enquire the classification difference between the aforementioned threshold techniques. The outcome from the statistical analysis revealed the better predictive capability of ROC curve than the Alves Rankings.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Source Routing Protocol for Mobile Ad Hoc Networks 移动自组织网络的安全源路由协议
Int. J. Next Gener. Comput. Pub Date : 2020-12-22 DOI: 10.47164/IJNGC.V11I3.647
Baban A. Mahmood, D. Manivannan
{"title":"A Secure Source Routing Protocol for Mobile Ad Hoc Networks","authors":"Baban A. Mahmood, D. Manivannan","doi":"10.47164/IJNGC.V11I3.647","DOIUrl":"https://doi.org/10.47164/IJNGC.V11I3.647","url":null,"abstract":"Routing protocols for Mobile Ad Hoc Networks (MANETs) have been \u0000extensively studied. Some of the well-known \u0000source routing protocols presented in the literature that claim to \u0000establish secure routes are susceptible to hidden channel attacks. In this \u0000paper, we address this issue and present a novel secure routing \u0000protocol, based on sanitizable signatures, that is not susceptible to \u0000hidden channel attacks.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytics Dashboard on Talent search Examination Data using Structure of Intellect Model 基于智力模型结构的人才招聘考试数据分析仪表板
Int. J. Next Gener. Comput. Pub Date : 2020-11-26 DOI: 10.47164/IJNGC.V12I2.766
V. Munde, Binod Kumar, Anagha Vaidya, S. Shirwaikar
{"title":"Analytics Dashboard on Talent search Examination Data using Structure of Intellect Model","authors":"V. Munde, Binod Kumar, Anagha Vaidya, S. Shirwaikar","doi":"10.47164/IJNGC.V12I2.766","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.766","url":null,"abstract":"The potential of Analytics and Data mining methodologies, that extract useful and actionable information from \u0000large data-sets, has transformed one field of scientific inquiry after another. Analytics has been widely applied \u0000in Business Organizations as Business Analytics and when applied to education, these methodologies are referred \u0000to as Learning Analytics and Educational Data mining. Learning Analytics proposes to collect, measure and \u0000analyze data in learning environments to improve teaching and learning process. Educational Data mining (EDM) \u0000thrives on existing data collected by learning management systems. The applicability of Learning Analytics and \u0000Educational Data mining can be extended to traditional learning processes by suitably combining data collected \u0000from technology enabled processes such as Admission and Assessment with data generated from analysis of learning \u0000interactions. The intellectual performance of the students can be analyzed using some well known Learning \u0000Frameworks. This paper demonstrates the Complete Analytics process from data collection, measurement to \u0000Analysis using Guilford’s structure of intellect model. An analytic dashboard provides the necessary information \u0000in concise and visual form and in an interactive mode. The analytic process presented on talent examination data \u0000can be generalized to similar examinations in traditional educational setup.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信