scispace - formally typeset
Search or ask a question
Conference

International Conference on Advanced Computing 

About: International Conference on Advanced Computing is an academic conference. The conference publishes majorly in the area(s): Cloud computing & Wireless sensor network. Over the lifetime, 3392 publications have been published by the conference receiving 25203 citations.


Papers
More filters
Proceedings ArticleDOI
01 Feb 2016
TL;DR: Results show that till a certain threshold, k-fold cross-validation with varying value of k with respect to number of instances can indeed be used over hold-out validation for quality classification.
Abstract: While training a model with data from a dataset, we have to think of an ideal way to do so. The training should be done in such a way that while the model has enough instances to train on, they should not over-fit the model and at the same time, it must be considered that if there are not enough instances to train on, the model would not be trained properly and would give poor results when used for testing. Accuracy is important when it comes to classification and one must always strive to achieve the highest accuracy, provided there is not trade off with inexcusable time. While working on small datasets, the ideal choices are k-fold cross-validation with large value of k (but smaller than number of instances) or leave-one-out cross-validation whereas while working on colossal datasets, the first thought is to use holdout validation, in general. This article studies the differences between the two validation schemes, analyzes the possibility of using k-fold cross-validation over hold-out validation even on large datasets. Experimentation was performed on four large datasets and results show that till a certain threshold, k-fold cross-validation with varying value of k with respect to number of instances can indeed be used over hold-out validation for quality classification.

401 citations

Proceedings Article
01 Jan 2000
TL;DR: This paper attempts to address the scheduling of jobs to the geographically distributed computing resources with a brief description of the three nature's heuristics namely Genetic Algorithm, Simulated Annealing and Tabu Search.
Abstract: Computational Grid (Grid Computing) is a new paradigm that will drive the computing arena in the new millennium. Unification of globally remote and diverse resources, coupled with the increasing computational needs for Grand Challenge Applications (GCA) and accelerated growth of the Internet and communication technology will further fuel the development of global computational power grids. In this paper, we attempt to address the scheduling of jobs to the geographically distributed computing resources. Conventional wisdom in the field of scheduling is that scheduling problems exhibit such richness and variety that no single scheduling method is sufficient. Heuristics derived from the nature has demonstrated a surprising degree of effectiveness and generality for handling combinatorial optimization problems. This paper begins with an introduction of computational grids followed by a brief description of the three nature's heuristics namely Genetic Algorithm (GA), Simulated Annealing (SA) and Tabu Search (TS). Experimental results using GA are included. We further demonstrate the hybridized usage of the above algorithms that can be applied in a computational grid environment for job scheduling.

378 citations

Proceedings ArticleDOI
01 Jan 2017
TL;DR: This paper focuses on analyzing these consensus protocols already proposed and their feasibility and efficiency in meeting the characteristics they propose to provide and their comparison with other protocols that were earlier proposed.
Abstract: Blockchain is a distributed, transparent, immutable ledger. Consensus protocol forms the core of blockchain. They decide how a blockchain works. With the advent of new possibilities in blockchain technology, researchers are keen to find a well-optimized Byzantine fault tolerant consensus protocol. Creating a global consensus protocol or tailoring a cross-platform plug and play software application for implementation of various consensus protocols are ideas of huge interest. Stellar Consensus Protocol (SCP) is considered to be a global consensus protocol and promises to be Byzantine Fault Tolerant (BFT) by bringing with it the concept of quorum slices and federated byzantine fault tolerance. This consensus's working and its comparison with other protocols that were earlier proposed are analyzed here. Also, hyperledger an open-source project by Linux Foundation which includes implementing the concept of practical byzantine fault tolerance and also a platform where various other consensus protocols and blockchain applications can be deployed in a plug and play manner is also being discussed here. This paper focuses on analyzing these consensus protocols already proposed and their feasibility and efficiency in meeting the characteristics they propose to provide.

370 citations

Proceedings ArticleDOI
08 Feb 2014
TL;DR: Various types of features, feature extraction techniques and explaining in what scenario, which features extraction technique, will be better are discussed and referred in case of character recognition application.
Abstract: Feature plays a very important role in the area of image processing. Before getting features, various image preprocessing techniques like binarization, thresholding, resizing, normalization etc. are applied on the sampled image. After that, feature extraction techniques are applied to get features that will be useful in classifying and recognition of images. Feature extraction techniques are helpful in various image processing applications e.g. character recognition. As features define the behavior of an image, they show its place in terms of storage taken, efficiency in classification and obviously in time consumption also. Here in this paper, we are going to discuss various types of features, feature extraction techniques and explaining in what scenario, which features extraction technique, will be better. Hereby in this paper, we are going to refer features and feature extraction methods in case of character recognition application.

357 citations

Proceedings ArticleDOI
07 Jan 2012
TL;DR: The various routing protocol are classified and described and the growing interest in WSN and the continual emergence of new architectural techniques inspired surveying the characteristics, applications and communication protocols for such a technical area.
Abstract: Extensive usage of wireless sensor network (WSN) is the reason of development of many routing protocols. Recent advances in WSN now witness the increased interest in the potential use in applications like Military, Environmental, Health (Scanning), Space Exploration, Vehicular Movement, Mechanical stress levels on attached objects, disaster management, combat field reconnaissance etc. Sensors are expected to be remotely deployed in unattended environments. Routing as one key technologies of wireless sensor network has now become a hot research because the applications of WSN is everywhere, it is impossible that there is a routing protocol suitable for all applications. In this paper, the various routing protocol are classified and described. The growing interest in WSN and the continual emergence of new architectural techniques inspired surveying the characteristics, applications and communication protocols for such a technical area.

302 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
20225
2021387
2020316
2019408
201890
2017299