A Service-based Approach to Situational Correlation and Analyses of Stream Sensor Data

Size: px
Start display at page:

Download "A Service-based Approach to Situational Correlation and Analyses of Stream Sensor Data"

Transcription

1 A Service-based Approach to Situational Correlation and Analyses of Stream Sensor Data Zhongmei Zhang 1,2,3, Xiaohong Li 1, Chen Liu 2,3, Shen Su 2,3, Yanbo Han 1,2,3 1 School of Compute Science and Technology of Tianjin University, Tianjin, China 2 Beijing Key Laboratory on Integration and Analysis of Large-scale Stream Data, North China University of Technology, Beijing China 3 Cloud Computing Research Center, North China University of Technology, Beijing, China gloria_z@126.com, xiaohongli@tju.edu.cn, liuchen@ncut.edu.cn, sushen@ncut.edu.cn, hanyanbo@ncut.edu.cn Abstract IoT service and service composition provide an effective means to develop IoT applications based on correlating multiple sensor data. The change of specific sensor data can cause others changes under uncertain situations. It makes difficult for defining service composition plan in advance to build IoT application. This paper proposes a datadriven service composition method based on our previous proactive data service model. We regard service events frequently happen together with given service event as its situation, and the service events happen next as reacted actions under the situation. We analyze two kinds of correlation among service events via an improved FP-tree algorithm, and realize the service composition at runtime based on the realtime service events. Based on the real sensor data set in a coalfired power plant, a series of experiments demonstrate that our method can effectively detect new service events based on current service events. Keywords- IoT service; service composition; sensor data; data-driven I. INTRODUCTION Today, a growing number of sensors are deployed in physical world with the development of IoT (Internet of Things) applications. IoT service plays a more and more important role for sensor data sharing and analyzing for IoT applications in field of intelligent transportation [1, 2], health-care [3], smart home [4] and equipment monitoring [5]. Following the thought of software-defined sensors, we proposed a novel type of service abstraction, called as proactive data service in our previous works [1, 6]. We can map one or several sensors into proactive data services in the software-level. With proactive data service, the sensor events generated directly by sensor can be transformed into multiple service events which are more meaningful information. The sensors deployed in physical world are not independent from each other. For obtaining more valuable information, many IoT applications demand to correlate multiple sensor data. Service composition based on proactive data service provides an effective means to build valueadded applications via the evolution of service events. When a service event is generated, we can use service composition to generate new service events triggered by it, and eventually generate the required events step by step. The generation of new service events is situational, since the correlations among sensors are quite complicated. Recently, many studies proposed their situation-aware service composition methods to help construct the service composition at runtime. Models for context-awareness service composition [7, 8] or situationawareness service composition [9] have been developed to support the modeling and specification of context/situation requirements. Some works support declarative specification for situation constrains and the requirements for composition [10, 11]. However, the situation of service cannot be modeled statically and specific in advance. As the mapping of sensors in software-level, proactive data services also have complicated relations. Firstly, a situation of one service event can be formed by different service event generated by other services, and keeps changing with the changing of sensor data. For example, an import air pressure under 65 kpa alone may cause a bearing vibration over 0.118mm/s, while an import air pressure under 65 kpa with a valve degree under 30% will cause an electricity under 80A. Secondly, the service events triggered by current service event are also changeable, which cannot be predefined statically. For example, an import air pressure under 65 kpa can cause a bearing vibration over 0.118mm/s, and can also cause a primary air pressure under 62 kpa. In this case, one service should compose with different services in different situations for obtaining new service events. Therefore, we focus on analyzing the correlations of sensor data as a key perspective to compose proactive data services under uncertain situation. In this paper, we aim to provide a data-driven service composition method based on the analyzing of two kinds of correlations of service events. On one hand, we regard service events which frequently happen together with a given service event as its situations, and propose to analyze service events frequently cooccurrence to obtain the situations for given service event. On the other hand, we regard service events happen after specific situation as its reacted actions, and propose to analyze successive service events to obtain potential service events triggered by specific situation. The service composition method can keep composing services and generating new service events proactively based on current service events and its real-time situations.

2 In summary, the contributions of this paper are as follows: (1) We propose a data-driven method to compose situational services oriented to IoT applications. We obtain real-time situations of given service event through the analyses of co-occurrence service events, advise service composition based on the correlations of successive service events. (2) We realize the data-driven service composition method with two phases. We firstly utilize a modified FP-tree algorithm to mine frequently cooccurrence service event sets with their subsequent events. Then we realize the service composition at runtime based on service events generated in realtime. (3) We verify our method based on a real sensor data set from a coal-fired power plant. Through a series of experiments, we verify the effectiveness of our method. The remainder of the paper is organized as follows. In section II, we describe a motivation scenario and define the problem. In section III, we introduce our service composition method based on the analyses of sensor data. In section IV, we present our evaluations. In section V, we introduce the related work. Finally, in section VI, we draw conclusions and discuss future work. II. MOTIVATION SCENARIO The motivation example of this paper is a real-time anomaly detection application for coal-fired power plant. There are over ten thousands of sensors deployed on hundreds of equipment in a coal-fired power plant. These sensors can reflect running indicators for equipment and affect the changes of each other, such as the increase of temperature will cause an increase of pressure. The affection can be further transmitted from sensors to sensors and eventually expose specific anomaly. The anomaly detection application expects to alert relevant staff in real-time once the sensors expose any anomaly. Figure 1 shows some potential anomalies in specific equipment, i.e. the Primary Air Fan (PAF) and the Coal Mill (CM). In practice, anomaly detection in coal-fired power plant generally relies on specifying threshold for each sensor or conditions for multiple sensors. For example, specify the maximum of valve degree as 80%, or specify sensors air pressure, bearing vibration and motor electricity in PAF with conditions when the air pressure is under 88kPa, and bearing vibration is over 0.125mm/s, and the motor electricity is less than 65A, trigger a fan stall anomaly. However, as showed in the upper part of Figure 1, the correlations among sensors are much more complicated in practice. For one sensor, one change of its sensor data can cause the change of different sensor data under different situations, and eventually expose different anomalies. Take air pressure under 88 kpa as an example, it can cause a motor electricity under 70A under the situation of valve degree over 60%, and eventually expose a fan stall anomaly. And it can also cause a primary volume under 1.5t in different equipment under the situation of valve degree over 60% and import air volume under 1.8t, and eventually expose a coal block anomaly in CM. The situation of certain sensor is quiet complex, because it can be formed by different sensor data generated by different sensors. What s more, the situation of certain sensor and the sensors affected by it are both changeable since the sensor data is keep changing. pressure under 88 kpa valve degree import air pressure motor temperature bearing vibration motor electricity export air pressure fan stall fan stall fan surge import air volume primary air volume_cm import coal volume_cm export pressure_cm coal block 08:01:25 30% 08:02:45 30% valve degree control valve air inlet 08:04:03 60% 08:02: kpa air outlet 08:04: kpa air pressure 08:05: kpa primary air inlet coal inlet pulverized coal outlet fore bearing rear bearing primary air fan electric motor 08:02:25 88 A coal mill 08:04:45 08:06:03 86 A 80 A electricity_c Figure 1. Partial Anomaly Detection in Partial Equipment of Coal-fired Power Plant.

3 Service composition is an effective means to expose the affection of sensors and detect anomalies. Based on our proactive data service model, we can create one proactive data service for each indicator. For example, an air pressure service can be created with sensor data generate by air pressure sensor. To obtain new service events triggered by current service event, the service composition method needs to detect the situation of current service event and compose relative services to generate new service events at runtime. Based on the above analyses, the situation of certain service events and its reacted service events keep changing dynamically, it is practically impossible to predefine the situations and the actions caused by them. Hence, the analysis of sensor data is required to advise the detection of real-time situations and the composition next at runtime. III. DATA-DRIVEN METHOD FOR SERVICE COMPOSITION A. Overview of Service Composition Method We propose a data-driven service composition method based on the analyses of sensor data. We regard service events which frequently happen together with specific event as its situations and service events happen next as the reacted actions. The real-time situation and the correlations between situations and services are the major bases for our method. Figure 2 shows the process of our service composition method. Each proactive service is mapped by certain set of sensor though receiving sensor event streams as inputs. There are two kinds of correlations of service events that can advise the service composition when any new service event is generated by one service. For any current service event, the correlations among co-occurrence service events can advise the finding of situations, and then if any situation is satisfied, the correlations among successive service events can indicate the services to compose and the new service events to generate. The sensor data-driven service composition method includes two major steps: 1) generate the two kinds of correlations among service events to obtain the situations for given service event and reacted service events for satisfied situations, and 2) composite services based on the real-time service event and its situations. In this paper, we obtain correlations among service events based on the periodical analysis and mining of history sensor data. We discretize each sensor data in to different classes, and the values in the same class are regard as belonging to the same service event. We adopt FP-tree algorithm [12], a common algorithm for frequent items mining, to generate the frequent cooccurrence service event sets with their followed service events. Different from traditional FP-tree algorithm, in this paper the transactions contain two parts, i.e. the situation and reacted service event. We modify the FP-tree algorithm and realize it in parallel. B. Core Definitions In our previous works [6], we introduced event mechanism in service model and gave some basic definitions. We classified event in our model as sensor event and service event. Service event generated by service is transformation of sensor event. In this paper, we use the correlation of service events to advise the service composition at runtime. Follows give the definition of two kind correlations of service events and introduce their utility in our method. Definition 1. (Co-occurrence Service Event Correlation): co-occurrence service event correlation is the correlation among service events E si happen in the same moment. We use frequency of co-occurrence to measure the correlation of service events. The co-occurrence frequency of a set of service event can be calculated as follow: in which, m is the co-occurrence times of the service events, and n is the total moments. For a given service event, we regard the set of service events as its situation if, in which is their cooccurrence frequency and is a given threshold. Figure 3 shows an example. Suppose there are four services {S 1, S 2, S 3, S 4 },, and the total number of moments as 10. For service event E 11 generated by service S 1, its situation can be formed by {E 22, E 42 }. time service t 1 t 2 t 3 t i t i+1 t k t k+1 t m t m+1 S1 E11 E11 E11 E11 E11 E13 E12 E11 E12 S2 E21 E24 S3 E31 E31 E33 E32 E33 E33 E32 E34 E33 S4 E43 Figure 3. Example for Service Event Correlations. Definition 2. (Successive Service Event Correlation): successive service event correlation is the correlation between service event set E si(t) and E si(t+1) happen in two successive moments, in which E si(t) and E si(t+1) satisfy ( ) ( ). Figure 2. Overview of Data-driven Service Composition Method.

4 We use the confidence ratio to measure the correlation of successive service events. The confidence ratio of service events happen next E si(t+1) can be calculated as follow: In which, k is the happen times of E si(t+1) together with E si(t), and m is the total happen times of E si(t). For a specific situation E si(t) of given service event E s, we regard E si(t) is the reacted actions if, in which is their confidence ratio and is a given threshold. Based on the mapping of sensors and proactive data services, E si(t) can indicate the services to compose under real-time situation of given service event. In the example shown in Figure 3, suppose that. For E 11, service events {E 33 } are the reacted action under situation {E 22, E 42 }. C. Generation of Correlations among Service Events In this paper, we utilize an FP-tree algorithm to generate the two kind correlations among service events according to the above definitions. There are mainly three procedures, i.e. the transformation of transactions, the pre-processing of transactions, and the generation of correlations between frequent service event sets and their subsequent service events. 1) Transformation of transactions We firstly transform the history sensor data into transactions by regarding values of history sensor data in two successive moments as one transaction. Table 1 shows some transaction instances. The former part of the transaction is used to generate the co-occurrence service event correlation, and the latter part is used to generate the successive service event correlation. tid TABLE I. EXAMPLES OF TRANSACTIONS transaction {valve degree = 10, air pressure = 88.3, vibration = 0.125, time = 08:00} {valve degree = 10, air pressure = 87.5, vibration = 0.124, time = 08:03} {valve degree = 10, air pressure = 87.5, vibration = 0.125, time = 08:03} {valve degree = 10, air pressure = 86.5, vibration = 0.123, time = 08:06} {valve degree = 10, air pressure = 86.8, vibration = 0.123, time = 08:06} {valve degree = 10, air pressure = 84.5, vibration = 0.121, time = 08:09} {valve degree = 10, air pressure = 84.5, vibration = 0.121, time = 08:09} {valve degree = 10, air pressure = 82.5, vibration = 0.112, time = 08:12} It is observed that the value of sensor data is very discrete. It is difficult to found the laws between sensor data and mining corresponding correlations. Hence, a pre-process is needed to classify discrete value into meaningful data range. We adopt a K-means algorithm to decentralize sensor data into 4-8 data ranges referred to experts advices. Table II shows some examples of sensor data division. The data ranges can be represented by sensor events, and values belong to the same data range can be represented by the same service events. Table III shows the transactions examples after the discretization. TABLE II. EXAMPLES OF SENSOR DATA DIVISION sensor cid data range unit d1 (0 30] valve d2 (30 60] degree d3 (60 100) % p1 (0 69] p2 (69 85] air p3 ( ] pressure p4 ( ] kpa p5 (107 + ) v1 ( ] vibration v2 ( ] v3 ( ] mm/s v4 ( ) TABLE III. tid EXAMPLES OF TRANSACTIONS AFTER DISCRETIZATION transaction {valve degree d1, air pressure p3, vibration v3, time = 08:00} {valve degree d1, air pressure p3, vibration v3, time = 08:03} {valve degree d1, air pressure p3, vibration v3, time = 08:03} {valve degree d1, air pressure p3, vibration v3, time = 08:06} {valve degree d1, air pressure p3, vibration v3, time = 08:06} {valve degree d1, air pressure p2, vibration v3, time = 08:09} {valve degree d1, air pressure p2, vibration v3, time = 08:09} {valve degree d1, air pressure p2, vibration v2, time = 08:12} As showed in table III, a transaction can be transformed as: ( ) ( ) In which, ( ) is the service events generated in moment t, and ( )is the service events generated in the next moment (t+1). 2) Pre-processing of transactions After the obtaining of the transactions, we can adopt the FP-tree algorithm to generate the frequently co-occurrence service event sets and their subsequent service events. However, there are two problems when we directly utilize the FP-tree algorithm. Firstly, as showed in table III, ( )and ( ) in one transaction may be the same or contain the same service events. With this kind of transaction, meaningless successive service event correlations will be generated, because the reacted service events and the frequent service event set will contain the same events. And there is no need to trigger corresponding services to generate these events because they are already being generated. Secondly, if both parts of transaction contain service events transformed by all the sensor data, the frequent service event set and its reacted service events may contain events generated by uncorrelated sensors. It will eventually affect the effectiveness of the correlations among service events. What s more, if the event s number in each transaction is double of the number of sensor data, which will increase the computational complexity with plentiful sensors. Hence, we need to preprocess the transactions before the mining of correlations. We firstly delete the redundant transactions by removing the transactions which have the same service events, and delete the repetitive events from the

5 latter events. Then we divide the each transaction into different partitions based on the relativity of sensors, and generate corresponding association rules for each partition. In this paper, we also utilize a K-means to divide the sensors into different groups, and the measurement to clustering is refer to Pearson Correlation Coefficient (PCC) [12], which is common method to measure the relativity of two variables. With the pre-processing of the transactions, we will obtain more effective correlations. 3) Generation of Correlations Then we adopt FP-tree algorithm to mine the frequent subsets of service event ( ) and the correlations between service event ( )and service event ( ). According to the Definition 1 and Definition 2, we set the minimal frequency degree for the former events in transactions for generating co-occurrence service event correlations, and set the minimal confidence ratio and for the latter part of transactions for generating successive service event correlations. We firstly compute the frequency degree for each event in the former part of all transactions and delete events whose frequency are smaller than the minimal frequency degree. Then we scan all the transactions to construct a FP-tree, in which each transaction can add to the FP-tree by add a new path or add count for existing node. And lastly, for each path in the FP-tree, we calculate the confidence ratio of the service events in the latter part and delete the service events whose confidence ratios are smaller than the minimal confidence ratio. Each path in the FP-tree can represent the successive service event correlations, and the former part of the path can represent the co-occurrence service event correlations. Algorithm 1 shows the preudocode of our algorithm. Algorithm 1: FPTreeBuilding Input: Output: T={ t 1, t 2,, t n },the transaction set;, the minimal frequency degree;, the minimal confidence ratio FP-tree, the FP-tree contains all the correlations; 1. FES= Ø; 2. root=new Node(); 3. FP-tree.root=root; 4. for each e ij in each t i in T 5. if FES.contains(e ij) 6. e ij.count++; 7. else if e ij belong to t i.former 8. FES.former.add(e ij.); 9. e ij.count=1; 10. else if e ij belong to t i.latter 11. FES.latter.add(e j.); 12. e ij.count=1; 13. end if 14. end for 15. for each e i in FES.former 16. fre= e i.count/t.n; 17. if e i. fre < 18. FES.delete(e i); 19. end if 20. end for 21. sort FES.former & FES.latter in desc order by e.count; 22. for each transaction t in T 23. for each e i in t.former 24. if!fes.former.contains(e i) 25. delete e i; 26. end if 27. end for 28. sort t.former& t.latter in desc order by e.count 29. insertfptree(t, root); 30. end for 31. for each path p in FP-tree 32. m is the count of the last service event in the former part of p; 33. for each service event e i in the latter part of p 34. if e i.count/m< 35. delete e i; 36. end if 37. end for 38. end for 39. return FP-tree; In Algorithm 1, we firstly generate the frequent event set (line 4-20), which contains two parts as the same as the transactions. We calculate the count for each events (line 4-14), and calculate the support degree of events in the former events and delete ones whose support degree is lower than given minimal support degree (line 15-20). We sort the two parts of frequent event set in order of the count of events respectively (line 21). Then we delete the infrequent events in the former events for each transaction (23-27) and sort both events in each transaction in order of the count of events, too (line 28). Lastly, we insert each processed transaction into the FP-tree via algorithm insertfptree (line 29). For each event in transaction, we either add the count of existing node or insert a new node into the FP-tree. At last, we prune the FP-tree through calculating the confidence ratio of latter service events (line 31-38). D. Realization of Service Composition After generating the FP-Tree based on the analysis of sensor data, for a given service event, its situations and reacted service events can be obtained from the path of FPtree. Based on the real-time situation and its reacted service events, we can realize our service composition method in real time. Each proactive service will be set to generate specific service events when it is created. When a service event is generated, our method searches the path of FP-tree whose former parts contain the service event, and obtains the situations of the service. If any situation is satisfied, the latter part of the path can indicate the services to compose next and new service events to generate. The preudo-code of our algorithm is showed as followed:

6 Algorithm 2: servicecomposition Input: Output: S, the proactive data service set; FP-tree, the FP-tree contains all the association rules; E, the current service even; null; 1. PATH = FP-tree.getPathContains(E); 2. if PATH!=null 3. for each path i in PATH 4. C i = path i.former- E; 5. if C i is stratified 6. E i = path.latter; 7. for each E ij in E i 8. find S for E i from S; 9. send E to S 10. S.triggerOperations(E i); 11. end for 12. end if 13. end for 14. end if In Algorithm 2, for the current service event, we firstly find all the paths from the FP-tree whose former parts contain it (line 1), then we obtain the situation for the service event from each path through taking the service event away from the former part of the path (line 4). If the situation is satisfied, we obtain the service events contained in the latter part of the path as service events happen next (line 6). For each service event, we find service to generate it based on the mapping of sensors and services and trigger corresponding operations to generate the service events (line 9, 10). IV. EVALUATION In this section, we will verify the effectiveness our service composition method through a set of experiments. We compare our modified FP-tree algorithm (with the preprocessing of transactions) with traditional FP-tree algorithm to verify that our method can compose service and generate new service events with higher precision and recall. A. Experiment Setup 1) Data set The datasets used in our experiment is the real sensor data from a coal-fired power plant. We select sensor data from 5 systems of the plant. There are 1751 sensors and each sensor generated one value per 3 minutes from :00:00 to :59:59. 2) Environment We implemented our method in a cluster consisting of 5 nodes, and the nodes are running in virtual machines with CentOS release 6.4, four Intel Core i CPUs 3.10G Hz and 4.00 GB RAM. All the algorithms are implemented in Java with JDK ) Experiment method We random select 10 different days data and simulate stream data for each sensor strictly according to the real sensor data s timestamp. And we use the data before as training data to generate the correlations among service events. To verify the effectiveness of our method we design following criterion: (1) Precision: the precision of our method can be calculated as follow: (2) Recall: the recall of our method can be calculated as follow: In which L={l 1, l 2,, l m } be the list of service events which are expected to generate by service composition, C = {c 1, c 2,, c n } be the service events happened in practice. B. Effectiveness Evaluation Figure 4 (a) shows the numbers of co-occurrence service event correlations generated with different minimal frequency degree, and Figure 4 (b) shows the numbers of successive service event correlations generated with different (a) the numbers of co-corrence service event correlations (b) the numbers of successive service event correlations (c) the precision and recall with different parameters Figure 4. The Result of Experiment with Different Parameters.

7 minimal confidence ratio. The higher threshold is set, the less number of correlations will be generated. This is because more service events will be filtered out as the infrequent items, so there will be fewer the frequent service event sets. Figure 4(c) shows the precision and recall of new service events generated by service composition with different minimal confidence ratio. We randomly select 100 service events from 10 days data as current service events, and calculate the average precision and recall. The precision and recall are both decreased with the increasing of minimal confidence ratio. Although the smaller minimal frequency degree and minimal confidence ratio will obtain higher precision and recall, the number of correlations will be increased. And it will bring burden for the updating and searching of correlations. For balancing the number of correlations and the precision and recall of generated service events, we set the minimal frequency degree as 0.05 and the minimal confidence ratio as 0.4. Then we set the training data size as 1 week, 2 weeks, 3 weeks, 4 weeks and 5 weeks, and calculated the precision and recall for our improved FP-tree algorithm with or without the pre-processing of transactions. Figure 5 shows the comparison of the precision and recall of different FP-tree algorithm with different training data size. As showed in Figure 5, the highest of precision of our method is 81% and the highest recall is 67%. And the precision and recall for our method are higher than FP-tree algorithm without the pre-processing of transactions with different training data size. That is because through the preprocessing, we removed the redundant events from the transactions and divided them into different partitions, in (a) the precision with different data size (b) the recall with different data size Figure 5. The Result of Experiment with Different Data Size. which service events in the same partition are relative and service events in different partitions are irrelative. Therefore the generated correlations are much more effective and can obtain higher precision and recall than that without the preprocessing. V. RELATED WORK Service composition is one of the hottest research problems in service-oriented computing [14]. Several approaches have been proposed in recent years regarding situational service composition. Most of these works can be classified into two kinds, data-driven and situation modeling. In our previous works [15, 16], we proposed an end-user supported exploratory service composition method oriented to application in research collaboration, telemedicine and emergency areas. This method can recommend to users available services at runtime based two manners. One is to do semantic label for the input and output of service, the other is to utilize the existing composition plans. Liu et al [17] presents a systematic data-driven approach to assisting situational application development through extracting useful information from multiple sources to abstract service capabilities with a set of tag. Besides the above work, many researchers proposed situation-aware approaches based on their situation/context model. Bai et al. [7] considered the context of user when mining the history composition plan, which can support the individual service composition. Doulkeridis et al. [18, 19] firstly classified the services, and use the same dimensionality to describe the context of services in the same class. It aimed to help user to select one service from a class based on current context. Driver et al. [20] presented an application framework for mobile, context-aware trails-based application development. The framework supports trail generation through context-based activity set reduction and trail reconfiguration point identification through identification of significant context events. However, it unpractical to predefine unified and centralized situational model, we need to define different model rely on the application characteristic from different domain. Most of current works focus on static data source, while sensor data in IoT applications are typical stream data and the situation keeps changing with the change of sensor data. Because of the dynamical of IoT applications, history composition plans are not always effective for new service composition. Azadeh et al. [21, 22] propose a new framework for composing sensor-cloud services based on dynamic features in spatio-temporal aspects. Different from the above works, this paper aims to propose a sensor datadriven service composition method facing the dynamic and uncertain situations. VI. CONCLUSION AND FUTURE WORK In this paper, we proposed a data-driven service composition method based on our previous proactive data service model to handle the uncertain and dynamic situations in IoT environment. We regard service events that frequently happen together with specific service event as its situations, and service events happen next as reacted actions. We utilize

8 a modified FP-tree algorithm to generate two kind service event correlations, i.e. co-occurrence service event correlation and successive service event correlation. Then we utilize these correlations to realize our service composition method, which can detect the real-time situation for current service event and automatically compose service and generate new service events next. The experiments demonstrate that the effectiveness of our method. In the future, we plan to further refine our method by considering more complex situations, such as situations that contain service events with temporal relations. ACKNOWLEDGMENT This work was supported in part by a grant from the National Natural Science Foundation of China (Grant No ), Beijing Natural Science Foundation (Grant No ), The Program for Youth Backbone Individual, supported by Beijing Municipal Party Committee Organization Department, Research of Instant Fusion of Multi-Source and Large-scale Sensor Data. REFERENCES [1] Han Y, Wang G, Yu J, et al. A Service-Based Approach to Traffic Sensor Data Integration and Analysis to Support Community-Wide Green Commute in China[J]. IEEE Transactions on Intelligent Transportation Systems, 2016:1-10. [2] Chu V W, Wong R K, Liu W, et al. Traffic Analysis as a Service via a Unified Model[C]// IEEE International Conference on Services Computing. IEEE, 2014: [3] Zhang J, Radia N, Li Z, et al. An Infrastructure Supporting Considerate Sensor Service Provisioning[C]// The 6th IEEE International Conference on Service Oriented Computing and Applications (SOCA). 2013: [4] Guilly T L, Olsen P, Ravn A P, et al. HomePort: Middleware for heterogeneous home automation networks[c]// IEEE International Conference on Pervasive Computing and Communications Workshops. 2013: [5] Pinto J, Martins R, Sousa J B. Towards a REST-style architecture for networked vehicles and sensors[c]// IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, 2010: [6] Han YB, Liu C, Su S, et al. A Decentralized and Service-based Apporach to Proactively Correlating Stream Data[C]//.International Conference on Internet of Things, [7] Bai L, Wei J, Huang X, Ye D, Huang T. An exploratory service composition approach for mobile application[j]. Ruan Jian Xue Bao/Journal of Software, 2015,26(9): [8] Sheng QZ, Benatallah B. ContextUML: a UML-based modeling language for model-driven development of context-aware Web services development [C]//. Proc. of Int'l Conf. on Mobile Business, [9] Yau SS, Liu J. Incorporating situation awareness in service specifications [C]//. Proc. of 9th IEEE Int'l Symp. on Object and Component-Oriented Real-Time Distributed Computing [10] Yau SS, Yao Y, Yan M. Development and runtime support for situation-aware security in autonomic computing [C]//. Proc. of 3rd Int'l Conf. on Autonomic and Trusted Computing [11] Yau SS, Davulcu H, Mukhopadhyay S, Gong H, Huang D, Singh P, Gelgi F. Automated situation-aware service composition in serviceoriented computing [J]. Int'l Journal on Web Services Research, 2007, 4(4): [12] Han J, Pei J, Yin Y. Mining frequent patterns without candidate generation[c]// ACM SIGMOD International Conference on Management of Data. ACM, 2000:1-12. [13] Nahler G. Pearson correlation coefficient[j]. Springer Topics in Signal Processing, 2009, 2:1-4. [14] Medjahed B, Bouguettaya A, Elmagarmid A K. Composing Web services on the Semantic Web[J]. The VLDB Journal, 2003, 12(4): [15] Han YB, Wang GL, Ji G, et al. Situational data integration with data services and nested table[j]. Service Oriented Computing and Applications, 2013, 7(2): [16] Han YB, Wang HC, Wang JW, Yan SY, Zhang C. An end-useroriented approach to exploratory service composition [J]. Journal of Computer Research and Development, 2006,43(11): [17] Liu X, Ma Y, Huang G, et al. Data-Driven Composition for Service- Oriented Situational Web Applications[J]. Services Computing IEEE Transactions on, 2015, 8(1):2-16. [18] Doulkeridis C, Vazirgiannis M. CASD: Management of a contextaware service directory[j]. Pervasive Mobile Computing, 2008,4(5): [19] Doulkeridis C, Vazirgiannis M. Querying and updating a contextaware service directory in mobile environments[c]// 2004 IEEE/WIC/ACM Int l Conf. on Web Intelligence (WI 2004). Washington: IEEE Computer Society, [20] Driver C, Clarke S. An application framework for mobile, contextaware trails[j]. Pervasive Mobile Computing, 2008,4(5): [21] Neiat A G, Bouguettaya A, Sellis T. Spatio-Temporal Composition of Crowdsourced Services[M]// Service-Oriented Computing. Springer Berlin Heidelberg, [22] Neiat A G, Bouguettaya A, Sellis T, et al. Spatio-temporal Composition of Sensor Cloud Services[C]// IEEE International Conference on Web Services. 2014:

Association Rule Mining. Entscheidungsunterstützungssysteme SS 18

Association Rule Mining. Entscheidungsunterstützungssysteme SS 18 Association Rule Mining Entscheidungsunterstützungssysteme SS 18 Frequent Pattern Analysis Frequent pattern: a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data

More information

Retrieval of Large Scale Images and Camera Identification via Random Projections

Retrieval of Large Scale Images and Camera Identification via Random Projections Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management

More information

The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology, Guangzhou, China

The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology, Guangzhou, China 2016 International Conference on Humanities Science, Management and Education Technology (HSMET 2016) ISBN: 978-1-60595-394-6 Research on Science and Technology Project Management Based on Data Knowledge

More information

Pervasive Services Engineering for SOAs

Pervasive Services Engineering for SOAs Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au

More information

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space

The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space , pp.62-67 http://dx.doi.org/10.14257/astl.2015.86.13 The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space Bokyoung Park, HyeonGyu Min, Green Bang and Ilju Ko Department

More information

A Polyline-Based Visualization Technique for Tagged Time-Varying Data

A Polyline-Based Visualization Technique for Tagged Time-Varying Data A Polyline-Based Visualization Technique for Tagged Time-Varying Data Sayaka Yagi, Yumiko Uchida, Takayuki Itoh Ochanomizu University {sayaka, yumi-ko, itot}@itolab.is.ocha.ac.jp Abstract We have various

More information

Analysis of Computer IoT technology in Multiple Fields

Analysis of Computer IoT technology in Multiple Fields IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Analysis of Computer IoT technology in Multiple Fields To cite this article: Huang Run 2018 IOP Conf. Ser.: Mater. Sci. Eng. 423

More information

A Vehicular Visual Tracking System Incorporating Global Positioning System

A Vehicular Visual Tracking System Incorporating Global Positioning System A Vehicular Visual Tracking System Incorporating Global Positioning System Hsien-Chou Liao and Yu-Shiang Wang Abstract Surveillance system is widely used in the traffic monitoring. The deployment of cameras

More information

The Elevator Fault Diagnosis Method Based on Sequential Probability Ratio Test (SPRT)

The Elevator Fault Diagnosis Method Based on Sequential Probability Ratio Test (SPRT) Automation, Control and Intelligent Systems 2017; 5(4): 50-55 http://www.sciencepublishinggroup.com/j/acis doi: 10.11648/j.acis.20170504.11 ISSN: 2328-5583 (Print); ISSN: 2328-5591 (Online) The Elevator

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

Energy Consumption and Latency Analysis for Wireless Multimedia Sensor Networks

Energy Consumption and Latency Analysis for Wireless Multimedia Sensor Networks Energy Consumption and Latency Analysis for Wireless Multimedia Sensor Networks Alvaro Pinto, Zhe Zhang, Xin Dong, Senem Velipasalar, M. Can Vuran, M. Cenk Gursoy Electrical Engineering Department, University

More information

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS Ming XING and Wushan CHENG College of Mechanical Engineering, Shanghai University of Engineering Science,

More information

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Linear Gaussian Method to Detect Blurry Digital Images using SIFT

Linear Gaussian Method to Detect Blurry Digital Images using SIFT IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org

More information

Extending lifetime of sensor surveillance systems in data fusion model

Extending lifetime of sensor surveillance systems in data fusion model IEEE WCNC 2011 - Network Exting lifetime of sensor surveillance systems in data fusion model Xiang Cao Xiaohua Jia Guihai Chen State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing,

More information

FAULT DIAGNOSIS AND PERFORMANCE ASSESSMENT FOR A ROTARY ACTUATOR BASED ON NEURAL NETWORK OBSERVER

FAULT DIAGNOSIS AND PERFORMANCE ASSESSMENT FOR A ROTARY ACTUATOR BASED ON NEURAL NETWORK OBSERVER 7 Journal of Marine Science and Technology, Vol., No., pp. 7-78 () DOI:.9/JMST-3 FAULT DIAGNOSIS AND PERFORMANCE ASSESSMENT FOR A ROTARY ACTUATOR BASED ON NEURAL NETWORK OBSERVER Jian Ma,, Xin Li,, Chen

More information

STUDY OF VARIOUS TECHNIQUES FOR DRIVER BEHAVIOR MONITORING AND RECOGNITION SYSTEM

STUDY OF VARIOUS TECHNIQUES FOR DRIVER BEHAVIOR MONITORING AND RECOGNITION SYSTEM INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) ISSN 0976 6367(Print) ISSN 0976

More information

Implementation of Barcode Localization Technique using Morphological Operations

Implementation of Barcode Localization Technique using Morphological Operations Implementation of Barcode Localization Technique using Morphological Operations Savreet Kaur Student, Master of Technology, Department of Computer Engineering, ABSTRACT Barcode Localization is an extremely

More information

A Vehicular Visual Tracking System Incorporating Global Positioning System

A Vehicular Visual Tracking System Incorporating Global Positioning System A Vehicular Visual Tracking System Incorporating Global Positioning System Hsien-Chou Liao and Yu-Shiang Wang Abstract Surveillance system is widely used in the traffic monitoring. The deployment of cameras

More information

A Vehicular Visual Tracking System Incorporating Global Positioning System

A Vehicular Visual Tracking System Incorporating Global Positioning System Vol:5, :6, 20 A Vehicular Visual Tracking System Incorporating Global Positioning System Hsien-Chou Liao and Yu-Shiang Wang International Science Index, Computer and Information Engineering Vol:5, :6,

More information

Research on Hand Gesture Recognition Using Convolutional Neural Network

Research on Hand Gesture Recognition Using Convolutional Neural Network Research on Hand Gesture Recognition Using Convolutional Neural Network Tian Zhaoyang a, Cheng Lee Lung b a Department of Electronic Engineering, City University of Hong Kong, Hong Kong, China E-mail address:

More information

PREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm

PREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm PREDICTING ASSEMBLY QUALITY OF COMPLEX STRUCTURES USING DATA MINING Predicting with Decision Tree Algorithm Ekaterina S. Ponomareva, Kesheng Wang, Terje K. Lien Department of Production and Quality Engieering,

More information

A Solution to Cooperative Area Coverage Surveillance for a Swarm of MAVs

A Solution to Cooperative Area Coverage Surveillance for a Swarm of MAVs International Journal of Advanced Robotic Systems ARTICLE A Solution to Cooperative Area Coverage Surveillance for a Swarm of MAVs Regular Paper Wang Zheng-jie,* and Li Wei 2 School of Mechatronic Engineering,

More information

An Efficient Framework for Image Analysis using Mapreduce

An Efficient Framework for Image Analysis using Mapreduce An Efficient Framework for Image Analysis using Mapreduce S Vidya Sagar Appaji 1, P.V.Lakshmi 2 and P.Srinivasa Rao 3 1 CSE Department, MVGR College of Engineering, Vizianagaram 2 IT Department, GITAM,

More information

Design and Application of Architecture of Internet of Things Based on Open Source Hardware

Design and Application of Architecture of Internet of Things Based on Open Source Hardware 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 Design and Application of Architecture of Internet of Things Based on Open Source Hardware

More information

Urban Traffic Bottleneck Identification Based on Congestion Propagation

Urban Traffic Bottleneck Identification Based on Congestion Propagation Urban Traffic Bottleneck Identification Based on Congestion Propagation Wenwei Yue, Changle Li, Senior Member, IEEE and Guoqiang Mao, Fellow, IEEE State Key Laboratory of Integrated Services Networks,

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

Vehicle parameter detection in Cyber Physical System

Vehicle parameter detection in Cyber Physical System Vehicle parameter detection in Cyber Physical System Prof. Miss. Rupali.R.Jagtap 1, Miss. Patil Swati P 2 1Head of Department of Electronics and Telecommunication Engineering,ADCET, Ashta,MH,India 2Department

More information

A new seal verification for Chinese color seal

A new seal verification for Chinese color seal Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558

More information

Open Access An Improved Character Recognition Algorithm for License Plate Based on BP Neural Network

Open Access An Improved Character Recognition Algorithm for License Plate Based on BP Neural Network Send Orders for Reprints to reprints@benthamscience.ae 202 The Open Electrical & Electronic Engineering Journal, 2014, 8, 202-207 Open Access An Improved Character Recognition Algorithm for License Plate

More information

Tutorial: The Web of Things

Tutorial: The Web of Things Tutorial: The Web of Things Carolina Fortuna 1, Marko Grobelnik 2 1 Communication Systems Department, 2 Artificial Intelligence Laboratory Jozef Stefan Institute, Jamova 39, 1000 Ljubljana, Slovenia {carolina.fortuna,

More information

A Reconfigurable Citizen Observatory Platform for the Brussels Capital Region. by Jesse Zaman

A Reconfigurable Citizen Observatory Platform for the Brussels Capital Region. by Jesse Zaman 1 A Reconfigurable Citizen Observatory Platform for the Brussels Capital Region by Jesse Zaman 2 Key messages Today s citizen observatories are beyond the reach of most societal stakeholder groups. A generic

More information

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP LIU Ying 1,HAN Yan-bin 2 and ZHANG Yu-lin 3 1 School of Information Science and Engineering, University of Jinan, Jinan 250022, PR China

More information

Non-contact structural vibration monitoring under varying environmental conditions

Non-contact structural vibration monitoring under varying environmental conditions Non-contact structural vibration monitoring under varying environmental conditions C. Z. Dong, X. W. Ye 2, T. Liu 3 Department of Civil Engineering, Zhejiang University, Hangzhou 38, China 2 Corresponding

More information

M2M Communications and IoT for Smart Cities

M2M Communications and IoT for Smart Cities M2M Communications and IoT for Smart Cities Soumya Kanti Datta, Christian Bonnet Mobile Communications Dept. Emails: Soumya-Kanti.Datta@eurecom.fr, Christian.Bonnet@eurecom.fr Roadmap Introduction to Smart

More information

An Embedding Model for Mining Human Trajectory Data with Image Sharing

An Embedding Model for Mining Human Trajectory Data with Image Sharing An Embedding Model for Mining Human Trajectory Data with Image Sharing C.GANGAMAHESWARI 1, A.SURESHBABU 2 1 M. Tech Scholar, CSE Department, JNTUACEA, Ananthapuramu, A.P, India. 2 Associate Professor,

More information

A New Connected-Component Labeling Algorithm

A New Connected-Component Labeling Algorithm A New Connected-Component Labeling Algorithm Yuyan Chao 1, Lifeng He 2, Kenji Suzuki 3, Qian Yu 4, Wei Tang 5 1.Shannxi University of Science and Technology, China & Nagoya Sangyo University, Aichi, Japan,

More information

Evolution of Sensor Suites for Complex Environments

Evolution of Sensor Suites for Complex Environments Evolution of Sensor Suites for Complex Environments Annie S. Wu, Ayse S. Yilmaz, and John C. Sciortino, Jr. Abstract We present a genetic algorithm (GA) based decision tool for the design and configuration

More information

Virtual Engineering: Challenges and Solutions for Intuitive Offline Programming for Industrial Robot

Virtual Engineering: Challenges and Solutions for Intuitive Offline Programming for Industrial Robot Virtual Engineering: Challenges and Solutions for Intuitive Offline Programming for Industrial Robot Liwei Qi, Xingguo Yin, Haipeng Wang, Li Tao ABB Corporate Research China No. 31 Fu Te Dong San Rd.,

More information

An Optimization Approach for Real Time Evacuation Reroute. Planning

An Optimization Approach for Real Time Evacuation Reroute. Planning An Optimization Approach for Real Time Evacuation Reroute Planning Gino J. Lim and M. Reza Baharnemati and Seon Jin Kim November 16, 2015 Abstract This paper addresses evacuation route management in the

More information

Research on Condition Monitoring of Power Big Data Based on Rough Sets

Research on Condition Monitoring of Power Big Data Based on Rough Sets International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) Research on Condition Monitoring of Power Big Data Based on Rough Sets Yulong Yan 1, a, Jilai Wu 2,

More information

Rating and Generating Sudoku Puzzles Based On Constraint Satisfaction Problems

Rating and Generating Sudoku Puzzles Based On Constraint Satisfaction Problems Rating and Generating Sudoku Puzzles Based On Constraint Satisfaction Problems Bahare Fatemi, Seyed Mehran Kazemi, Nazanin Mehrasa International Science Index, Computer and Information Engineering waset.org/publication/9999524

More information

DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK

DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK CHUAN CAI, LIANG YUAN School of Information Engineering, Chongqing City Management College, Chongqing, China E-mail: 1 caichuan75@163.com,

More information

Sensor Technology and Industry Development Trend in China and Betterment Approaches

Sensor Technology and Industry Development Trend in China and Betterment Approaches Sensor Technology and Industry Development Trend in China and Betterment Approaches Abstract Zhengqing Li University of Sanya, Sanya 572022, China Sensor technology is one of the most rapidly developing

More information

Detection of Vulnerable Road Users in Blind Spots through Bluetooth Low Energy

Detection of Vulnerable Road Users in Blind Spots through Bluetooth Low Energy 1 Detection of Vulnerable Road Users in Blind Spots through Bluetooth Low Energy Jo Verhaevert IDLab, Department of Information Technology Ghent University-imec, Technologiepark-Zwijnaarde 15, Ghent B-9052,

More information

QALAAI ZANIST JOURNAL A

QALAAI ZANIST JOURNAL A Adaptive Data Collection protocol for Extending Lifetime of Periodic Sensor Networks Ali K. M. Al-Qurabat Department of Software, College of Information Technology, University of Babylon - Iraq alik.m.alqurabat@uobabylon.edu.iq

More information

Automatic Licenses Plate Recognition System

Automatic Licenses Plate Recognition System Automatic Licenses Plate Recognition System Garima R. Yadav Dept. of Electronics & Comm. Engineering Marathwada Institute of Technology, Aurangabad (Maharashtra), India yadavgarima08@gmail.com Prof. H.K.

More information

Frequent Itemset based Event Detection in Uncertain Sensor Networks

Frequent Itemset based Event Detection in Uncertain Sensor Networks 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Frequent Itemset based Event Detection in Uncertain Sensor

More information

Quantification of Internal Air Leakage in Ball Valve using Acoustic Emission Signals

Quantification of Internal Air Leakage in Ball Valve using Acoustic Emission Signals 19 th World Conference on Non-Destructive Testing 2016 Quantification of Internal Air Leakage in Ball Valve using Acoustic Emission Signals Changhang XU 1, Guoxing HAN 1, Piao GONG 1, Lizhen ZHANG 1, Guoming

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

Local and Low-Cost White Space Detection

Local and Low-Cost White Space Detection Local and Low-Cost White Space Detection Ahmed Saeed*, Khaled A. Harras, Ellen Zegura*, and Mostafa Ammar* *Georgia Institute of Technology Carnegie Mellon University Qatar White Space Definition A vacant

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

Research Article Research of Smart Car s Speed Control Based on the Internal Model Control

Research Article Research of Smart Car s Speed Control Based on the Internal Model Control Abstract and Applied Analysis, Article ID 274293, 5 pages http://dx.doi.org/.55/24/274293 Research Article Research of Smart Car s Speed Control Based on the Internal Model Control Han Yu, Hamid Reza Karimi,

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

SPTF: Smart Photo-Tagging Framework on Smart Phones

SPTF: Smart Photo-Tagging Framework on Smart Phones , pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,

More information

ScienceDirect. An Integrated Xbee arduino And Differential Evolution Approach for Localization in Wireless Sensor Networks

ScienceDirect. An Integrated Xbee arduino And Differential Evolution Approach for Localization in Wireless Sensor Networks Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 447 453 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach

More information

A High Definition Motion JPEG Encoder Based on Epuma Platform

A High Definition Motion JPEG Encoder Based on Epuma Platform Available online at www.sciencedirect.com Procedia Engineering 29 (2012) 2371 2375 2012 International Workshop on Information and Electronics Engineering (IWIEE) A High Definition Motion JPEG Encoder Based

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

Durham Research Online

Durham Research Online Durham Research Online Deposited in DRO: 29 August 2017 Version of attached le: Accepted Version Peer-review status of attached le: Not peer-reviewed Citation for published item: Chiu, Wei-Yu and Sun,

More information

Intelligent Identification System Research

Intelligent Identification System Research 2016 International Conference on Manufacturing Construction and Energy Engineering (MCEE) ISBN: 978-1-60595-374-8 Intelligent Identification System Research Zi-Min Wang and Bai-Qing He Abstract: From the

More information

FDM (Fast Distributed Mining) over normal mining algorithm based on A-priori property and its application in market basket analysis

FDM (Fast Distributed Mining) over normal mining algorithm based on A-priori property and its application in market basket analysis FDM (Fast Distributed Mining) over normal mining algorithm based on A-priori property and its application in market basket analysis Sateesh Reddy, Ravi Konaraddi, Sivagama Sundari G CSE Department, MVJCE

More information

Application of Classifier Integration Model to Disturbance Classification in Electric Signals

Application of Classifier Integration Model to Disturbance Classification in Electric Signals Application of Classifier Integration Model to Disturbance Classification in Electric Signals Dong-Chul Park Abstract An efficient classifier scheme for classifying disturbances in electric signals using

More information

Modeling Study on Dynamic Spectrum Sharing System Under Interference Temperature Constraints in Underground Coal Mines

Modeling Study on Dynamic Spectrum Sharing System Under Interference Temperature Constraints in Underground Coal Mines Send Orders for Reprints to reprints@benthamscienceae 140 The Open Fuels & Energy Science Journal, 2015, 8, 140-148 Open Access Modeling Study on Dynamic Spectrum Sharing System Under Interference Temperature

More information

Knowledge-based Reconfiguration of Driving Styles for Intelligent Transport Systems

Knowledge-based Reconfiguration of Driving Styles for Intelligent Transport Systems Knowledge-based Reconfiguration of Driving Styles for Intelligent Transport Systems Lecturer, Informatics and Telematics department Harokopion University of Athens GREECE e-mail: gdimitra@hua.gr International

More information

Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development. Ya Nie

Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development. Ya Nie International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2016) Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

19th Meeting of the Directors of NMIs and Member State Representatives with BIPM

19th Meeting of the Directors of NMIs and Member State Representatives with BIPM 19th Meeting of the Directors of NMIs and Member State Representatives with BIPM Session on Advanced Manufacturing, Digitization and Internet of Things Thursday, 19 th October 2017 11:10 to 13:00 Advanced

More information

Location and User Activity Preference Based Recommendation System

Location and User Activity Preference Based Recommendation System . Location and User Activity Preference Based Recommendation System Prabhakaran.K 1,Yuvaraj.T 2, Mr.A.Naresh kumar 3 student, Dept.of Computer Science,Agni college of technology, India 1,2. Asst.Professor,

More information

An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon Tracking Method

An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon Tracking Method International Journal of Emerging Trends in Science and Technology DOI: http://dx.doi.org/10.18535/ijetst/v2i8.03 An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon

More information

Demosaicing Algorithm for Color Filter Arrays Based on SVMs

Demosaicing Algorithm for Color Filter Arrays Based on SVMs www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan

More information

Blur Estimation for Barcode Recognition in Out-of-Focus Images

Blur Estimation for Barcode Recognition in Out-of-Focus Images Blur Estimation for Barcode Recognition in Out-of-Focus Images Duy Khuong Nguyen, The Duy Bui, and Thanh Ha Le Human Machine Interaction Laboratory University Engineering and Technology Vietnam National

More information

Case 1 - ENVISAT Gyroscope Monitoring: Case Summary

Case 1 - ENVISAT Gyroscope Monitoring: Case Summary Code FUZZY_134_005_1-0 Edition 1-0 Date 22.03.02 Customer ESOC-ESA: European Space Agency Ref. Customer AO/1-3874/01/D/HK Fuzzy Logic for Mission Control Processes Case 1 - ENVISAT Gyroscope Monitoring:

More information

Changing and Transforming a Story in a Framework of an Automatic Narrative Generation Game

Changing and Transforming a Story in a Framework of an Automatic Narrative Generation Game Changing and Transforming a in a Framework of an Automatic Narrative Generation Game Jumpei Ono Graduate School of Software Informatics, Iwate Prefectural University Takizawa, Iwate, 020-0693, Japan Takashi

More information

A Review of Related Work on Machine Learning in Semiconductor Manufacturing and Assembly Lines

A Review of Related Work on Machine Learning in Semiconductor Manufacturing and Assembly Lines A Review of Related Work on Machine Learning in Semiconductor Manufacturing and Assembly Lines DI Darko Stanisavljevic VIRTUAL VEHICLE DI Michael Spitzer VIRTUAL VEHICLE i-know 16 18.-19.10.2016, Graz

More information

Towards Location and Trajectory Privacy Protection in Participatory Sensing

Towards Location and Trajectory Privacy Protection in Participatory Sensing Towards Location and Trajectory Privacy Protection in Participatory Sensing Sheng Gao 1, Jianfeng Ma 1, Weisong Shi 2 and Guoxing Zhan 2 1 Xidian University, Xi an, Shaanxi 710071, China 2 Wayne State

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Blockage and Voltage Island-Aware Dual-VDD Buffered Tree Construction

Blockage and Voltage Island-Aware Dual-VDD Buffered Tree Construction Blockage and Voltage Island-Aware Dual-VDD Buffered Tree Construction Bruce Tseng Faraday Technology Cor. Hsinchu, Taiwan Hung-Ming Chen Dept of EE National Chiao Tung U. Hsinchu, Taiwan April 14, 2008

More information

Design Automation for IEEE P1687

Design Automation for IEEE P1687 Design Automation for IEEE P1687 Farrokh Ghani Zadegan 1, Urban Ingelsson 1, Gunnar Carlsson 2 and Erik Larsson 1 1 Linköping University, 2 Ericsson AB, Linköping, Sweden Stockholm, Sweden ghanizadegan@ieee.org,

More information

Laser Printer Source Forensics for Arbitrary Chinese Characters

Laser Printer Source Forensics for Arbitrary Chinese Characters Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,

More information

An Integrated Simulation Method to Support Virtual Factory Engineering

An Integrated Simulation Method to Support Virtual Factory Engineering International Journal of CAD/CAM Vol. 2, No. 1, pp. 39~44 (2002) An Integrated Simulation Method to Support Virtual Factory Engineering Zhai, Wenbin*, Fan, xiumin, Yan, Juanqi, and Zhu, Pengsheng Inst.

More information

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Malamati Louta Konstantina Banti University of Western Macedonia OUTLINE Internet of Things Mobile Crowd Sensing

More information

Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node

Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node Shikha Nema*, Branch CTA Ganga Ganga College of Technology, Jabalpur (M.P) ABSTRACT A

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Application of Artificial Intelligence in Mechanical Engineering. Qi Huang

Application of Artificial Intelligence in Mechanical Engineering. Qi Huang 2nd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2017) Application of Artificial Intelligence in Mechanical Engineering Qi Huang School of Electrical

More information

Research and application on the smart home based on component technologies and Internet of Things

Research and application on the smart home based on component technologies and Internet of Things Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 2087 2092 Advanced in Control Engineering and Information Science Research and application on the smart home based on component

More information

A Smart Home Design and Implementation Based on Kinect

A Smart Home Design and Implementation Based on Kinect 2018 International Conference on Physics, Computing and Mathematical Modeling (PCMM 2018) ISBN: 978-1-60595-549-0 A Smart Home Design and Implementation Based on Kinect Jin-wen DENG 1,2, Xue-jun ZHANG

More information

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems AMADEOS Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems FP7-ICT-2013.3.4 - Grant Agreement n 610535 The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

More information

DEVELOPING A CLOUD-BASED ONLINE GEOSPATIAL INFORMATION SHARING AND GEOPROCESSING PLATFORM TO FACILITATE COLLABORATIVE EDUCATION AND RESEARCH

DEVELOPING A CLOUD-BASED ONLINE GEOSPATIAL INFORMATION SHARING AND GEOPROCESSING PLATFORM TO FACILITATE COLLABORATIVE EDUCATION AND RESEARCH DEVELOPING A CLOUD-BASED ONLINE GEOSPATIAL INFORMATION SHARING AND GEOPROCESSING PLATFORM TO FACILITATE COLLABORATIVE EDUCATION AND RESEARCH Z. L. Yang a, *, J. Cao a, K. Hu a, Z. P. Gui b, H. Y. Wu a,

More information

AUTONOMOUS NAVIGATION SYSTEM BASED ON GPS

AUTONOMOUS NAVIGATION SYSTEM BASED ON GPS AUTONOMOUS NAVIGATION SYSTEM BASED ON GPS Zhaoxiang Liu, Gang Liu * Key Laboratory of Modern Precision Agriculture System Integration Research, China Agricultural University, Beijing, China, 100083 * Corresponding

More information

A Novel Fault Diagnosis Method for Rolling Element Bearings Using Kernel Independent Component Analysis and Genetic Algorithm Optimized RBF Network

A Novel Fault Diagnosis Method for Rolling Element Bearings Using Kernel Independent Component Analysis and Genetic Algorithm Optimized RBF Network Research Journal of Applied Sciences, Engineering and Technology 6(5): 895-899, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 3, 212 Accepted: December 15,

More information

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Journal of Clean Energy Technologies, Vol. 4, No. 3, May 2016 Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Hanim Ismail, Zuhaina Zakaria, and Noraliza Hamzah

More information

Research on Framework of Knowledge-Oriented Innovation. Risk Management System

Research on Framework of Knowledge-Oriented Innovation. Risk Management System Original Paper Modern Management Science & Engineering ISSN 2052-2576 Vol. 1, No. 2, 2013 www.scholink.org/ojs/index.php/mmse Research on Framework of Knowledge-Oriented Innovation Risk Management System

More information

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory The 29th Workshop on Combinatorial Mathematics and Computation Theory Visual Cryptography for Gray-level Image by Random Grids * Hui-Yu Hsu and Justie Su-Tzu Juan 1 Department of Computer Science and Information

More information

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase

More information

Co-evolution of agent-oriented conceptual models and CASO agent programs

Co-evolution of agent-oriented conceptual models and CASO agent programs University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Co-evolution of agent-oriented conceptual models and CASO agent programs

More information

Color Image Segmentation in RGB Color Space Based on Color Saliency

Color Image Segmentation in RGB Color Space Based on Color Saliency Color Image Segmentation in RGB Color Space Based on Color Saliency Chen Zhang 1, Wenzhu Yang 1,*, Zhaohai Liu 1, Daoliang Li 2, Yingyi Chen 2, and Zhenbo Li 2 1 College of Mathematics and Computer Science,

More information

Automated Leak Detection System for the Improvement of Water Network Management

Automated Leak Detection System for the Improvement of Water Network Management Proceedings Automated Leak Detection System for the Improvement of Water Network Management Domenico Perfido 1, *, Thomas Messervey 1, *, Chiara Zanotti 2, Massimiliano Raciti 1 and Andrea Costa 1 1 R2M

More information

CHAPTER 1: INTRODUCTION. Multiagent Systems mjw/pubs/imas/

CHAPTER 1: INTRODUCTION. Multiagent Systems   mjw/pubs/imas/ CHAPTER 1: INTRODUCTION Multiagent Systems http://www.csc.liv.ac.uk/ mjw/pubs/imas/ Five Trends in the History of Computing ubiquity; interconnection; intelligence; delegation; and human-orientation. http://www.csc.liv.ac.uk/

More information