2015 International Conference on Computing and Communications Technologies (ICCCT)最新文献

筛选
英文 中文
Effective data stream mining using ensemble on cloud with load balancing (E2CL) 基于负载平衡(E2CL)的集成云有效数据流挖掘
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292780
Jagadheeswaran Kathirvel, E. Parasuraman
{"title":"Effective data stream mining using ensemble on cloud with load balancing (E2CL)","authors":"Jagadheeswaran Kathirvel, E. Parasuraman","doi":"10.1109/ICCCT2.2015.7292780","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292780","url":null,"abstract":"Data stream is generated everywhere with ever increasing speed. There is a need for efficient stream processing systems and optimal algorithms to mine all items of these streams to accurately predict the knowledge in limited time. In the existing approaches, there are some limitations like one-pass, sampling and load shedding on processing the streams which trade-off in accuracy. There are some approaches which use the distributed computing, grid computing and cloud computing technologies to deal with these challenges. This paper proposes a new approach to reduce the overhead of processing the already processed items. In this approach there will be a central system called model aggregator that will pull the learnt knowledge from all the stream processing systems, combine those knowledge and then will push to all the cloud processing systems in certain time interval. Having this combined knowledge, the participating stream processing systems' overhead is reduced that will increase the availability of the systems to handle the additional streams. Also since the cloud systems can be provisioned in advance or on-demand when the peak streaming occurs, the window dropping can be avoided.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128101005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient scheduling of independent tasks using modified heuristics 使用改进启发式的独立任务高效调度
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292778
M. Atique
{"title":"Efficient scheduling of independent tasks using modified heuristics","authors":"M. Atique","doi":"10.1109/ICCCT2.2015.7292778","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292778","url":null,"abstract":"In heterogeneous computing systems MinMin and MaxMin are widely used in assigning independent tasks to processors. For N tasks to be assigned to N processors these approaches are known to run in O (KN2) time. An algorithmic improvement that asymptotically decreases the running time complexity of MinMin to O(KN logN) without affecting its solution quality is proposed in [1]. The newly proposed MinMin algorithm is combined with MaxMin, resulting in two hybrid algorithms [1]. The first hybrid algorithm address the drawback of MaxMin in solving problem instances with highly skewed cost distributions while also improving the running time performance of MaxMin. The second hybrid algorithm improves the running time performance without degrading its solution quality. The proposed algorithms are easy to implement. For the large datasets used in the various experiments, MinMin and MaxMin, as well as recent state-of-the-art heuristics, require days, weeks, or even months to produce a solution, whereas the proposed algorithms in this paper produce solutions within only two or three minutes. The new modified algorithms namely MinMax and MinMax+ are proposed and implemented. These algorithms are compared with the existing algorithms MinMin and MaxMin on single objective cases.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124338881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying deceptive reviews using networking parameters 使用网络参数识别欺骗性评论
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-02-01 DOI: 10.1109/ICCCT2.2015.7292769
Tanya Gera, Deepak Thakur, Jaiteg Singh
{"title":"Identifying deceptive reviews using networking parameters","authors":"Tanya Gera, Deepak Thakur, Jaiteg Singh","doi":"10.1109/ICCCT2.2015.7292769","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292769","url":null,"abstract":"Nowadays, client likes to take suggestions before spending on a new product. For this they go to online item review Web page for perusing other's encounters and saying for that item. A real issue which was disregarded so far is the investigation of review spammers. However, numerous scientists gave their productive commitment in this field of exploration from 2007. The situation now asks for, conspicuous verification and ID of fake reviews and fake reviewers; as this has transformed into a colossal social issue. Those studies have the limit perceive certain sorts of spammers, e.g., the people who post various practically identical reviews around one target component. In any case, in fact, there are distinctive sorts of spammers who can control their practices to act much the same as certified users. This has transformed into a gigantic social issue. From various years, email spam and Web spam were the two essential highlighted social issues. In the meantime nowadays, on account of reputation of customers' energy to Web shopping and their dependence on the online reviews, it transformed into a true center for review spammers to misdirect customers by making sham overviews for target things. To the best of our insight, very little study is accounted for in regards to this issue reliability of online reviews. To begin with paper was distributed in 2007 by Nitin Jindal & Bing Liu in regards to review Spam detection. In the past few years, variety of techniques has been recommended by researchers to accord with this trouble. This paper intends to identify suspicious review, review spammers and their group using rule based classification methods along with networking parameters.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133209013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing a Bio-Capsule secure authentication system 生物胶囊安全认证系统的设计
2015 International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2015-01-12 DOI: 10.1109/ICCCT2.2015.7292740
R. Logeshwari, K. Karthikayani, A. Sindhuja, D. Ashok
{"title":"Designing a Bio-Capsule secure authentication system","authors":"R. Logeshwari, K. Karthikayani, A. Sindhuja, D. Ashok","doi":"10.1109/ICCCT2.2015.7292740","DOIUrl":"https://doi.org/10.1109/ICCCT2.2015.7292740","url":null,"abstract":"In this modern world, especially on the Internet, user might have more and more usernames or IDs and passwords, which contains his/her private information. There are too many for a user to remember and it is unsafe to write them down on the notebook. To solve this problem, this paper proposes a novel design of User data Management System (UMS), by which user can manage his/her private information's efficiently. With the fast evolution in sensor technology biometric authentication system becomes more popular in daily lives. The biometrics is improving the capability to recognize the persons. The construction of Bio-Capsule from biometrics is used generally to secure the system. The biometrics used in this paper is fingerprint and iris. These two features are combined with the help of fusion algorithm. From the combined features, Bio-Capsule is generated which used for authenticating User data Management Systems.","PeriodicalId":410045,"journal":{"name":"2015 International Conference on Computing and Communications Technologies (ICCCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信