2018 International Conference on Computing Sciences and Engineering (ICCSE)最新文献

筛选
英文 中文
A Novel Quasi-Oppositional Jaya Algorithm for Optimal Power Flow Solution 一种新的拟对立Jaya算法求解最优潮流
2018 International Conference on Computing Sciences and Engineering (ICCSE) Pub Date : 2018-03-01 DOI: 10.1109/ICCSE1.2018.8373995
W. Warid, H. Hizam, N. Mariun, N. A. Abdul Wahab
{"title":"A Novel Quasi-Oppositional Jaya Algorithm for Optimal Power Flow Solution","authors":"W. Warid, H. Hizam, N. Mariun, N. A. Abdul Wahab","doi":"10.1109/ICCSE1.2018.8373995","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8373995","url":null,"abstract":"This article introduces a new meta-heuristic algorithm, namely quasi-oppositional Jaya (QOJaya) algorithm for solving the optimal power flow (OPF) problem. In this approach, an intelligence strategy, namely quasi-oppositional based learning (QOBL) is integrated into the original Jaya algorithm to enhance its convergence rapidity and solution optimality. The suggested QOJaya algorithm to deal with single objective OPF problem is scrutinized and validated using the IEEE 30-bus test network. The obtained results reveal the supremacy of the proposed QOJaya algorithm over the basic Jaya algorithm in terms of solution quality and execution time. In addition, the results show the superiority of the proposed QOJaya algorithm over many existing heuristics optimization algorithms introduced in the literature in terms of solution feasibility and optimality.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132045524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Big Data Storage and Its Future 大数据存储及其未来
2018 International Conference on Computing Sciences and Engineering (ICCSE) Pub Date : 2018-03-01 DOI: 10.1109/ICCSE1.2018.8374206
Azzah Al Ghamdi, Thomas Thomson
{"title":"Big Data Storage and Its Future","authors":"Azzah Al Ghamdi, Thomas Thomson","doi":"10.1109/ICCSE1.2018.8374206","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8374206","url":null,"abstract":"The age of big data has emerged. These data are generated from online transactions, emails, posts, videos, search queries, etc. People also produce data by using the Internet of Things (IoT) applications and devices. Storing these massive quantities of data has become one of the most important and critical issues for big companies like Google, LinkedIn, Yahoo, and for the digital society in general. Traditional data storage methods such as Relational Database Management Systems (RDBMSs) are coming under increase pressure due to their capability limitations. However, many of new technical solutions have proved their efficiency in storing big data for large companies; some examples of these solutions include NetApp, Hadoop, SAN, the cloud, data centres, etc. The storage, accessibility, and security of big data issues are not only a computer science concern; it has become a topic of interest in many fields such as healthcare, E- commerce, and business in general. This project is investigating the data storage methods and future requirements for one of the largest oil companies in the world, Saudi SA Oil Company. A survey was carried out to understand current storage problems, and collect requirements to implement effective storage methodologies that overcome most of SA's storage difficulties.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Probabilistic Image Authentication Methodbased on Universal Hash Function for Rgb Images 一种基于通用哈希函数的Rgb图像概率认证方法
2018 International Conference on Computing Sciences and Engineering (ICCSE) Pub Date : 2018-03-01 DOI: 10.1109/ICCSE1.2018.8373994
Fatih Ozyurt, T. Tuncer, E. Avci
{"title":"A Novel Probabilistic Image Authentication Methodbased on Universal Hash Function for Rgb Images","authors":"Fatih Ozyurt, T. Tuncer, E. Avci","doi":"10.1109/ICCSE1.2018.8373994","DOIUrl":"https://doi.org/10.1109/ICCSE1.2018.8373994","url":null,"abstract":"In this paper, a novel hash based image authentication for RGB (Red, Green, Blue) images is proposed. Firstly, universal hash function is modified according to R, G and B layers and 3 different function is obtained to watermarking generation then, watermark generation is performed by using these equations. In this method, one layer is used for watermark embedding. Modulo based data hiding method is used for watermark embedding. To provide confidentiality of the proposed method, chaotic random number generator that is logistic map is used. The embedding layer and watermark generation function are selected by using logistic map. In watermark extraction, modulo operator is used. Watermark generation step is repeated for tamper detection. The extracted watermark and generated watermark are compared with each other. If these watermarks are equal, image is authenticated, otherwise tamper detection is detected. In the proposed method, DWT (Discrete Wavelet Transform) and SVD (Singular Value Decomposition) are used for generating perceptual hash of images and recovering images. Experimental result showed that the proposed method achieved high image authentication ability with minimum distortion.","PeriodicalId":383579,"journal":{"name":"2018 International Conference on Computing Sciences and Engineering (ICCSE)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134377517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信