Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000189
K. Santhosh, S. Ajitha
Analytics of gene expression data is the prolonged research area of present situation. Analysis of gene expression data requires enormous amount of work and huge set of algorithms. Using agent computing we deal with complex systems which are discovered many opportunities for developing data mining systems in a different ways. Hence to create predictive models, there is a huge need for intelligent and autonomous software agents which can procure useful information from the large datasets of raw information. Predictive analytics models can be created from these datasets which can be further used for various applications in security, future prediction etc. This research paper gives an overall function of multi agent systems in analytics of gene expression data, in terms of characteristics, adaptability, reliability and robotics of agents. Analytics on gene expression data is one of the emerging research fields. A large set of methodology and algorithms are existing in the field but in the application of agent technology in the field of gene expression data is at the infant stage. So the aim of this review paper is to integrate agent technology in the gene expression data analytics.
{"title":"Agent Technology for Data Analytics of Gene Expression Data: A Literature Review","authors":"K. Santhosh, S. Ajitha","doi":"10.1109/ICCMC48092.2020.ICCMC-000189","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000189","url":null,"abstract":"Analytics of gene expression data is the prolonged research area of present situation. Analysis of gene expression data requires enormous amount of work and huge set of algorithms. Using agent computing we deal with complex systems which are discovered many opportunities for developing data mining systems in a different ways. Hence to create predictive models, there is a huge need for intelligent and autonomous software agents which can procure useful information from the large datasets of raw information. Predictive analytics models can be created from these datasets which can be further used for various applications in security, future prediction etc. This research paper gives an overall function of multi agent systems in analytics of gene expression data, in terms of characteristics, adaptability, reliability and robotics of agents. Analytics on gene expression data is one of the emerging research fields. A large set of methodology and algorithms are existing in the field but in the application of agent technology in the field of gene expression data is at the infant stage. So the aim of this review paper is to integrate agent technology in the gene expression data analytics.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000120
M. Mohan, Lekshmi Priya T, L. S. Nair
Cancer statistics all around the globe are rising day by day, out of which breast cancer is the dominating one in women. Mammography is used to detect the presence of cancerous cells and computer-aided detection technologies are used to get more accurate results. There are different image processing techniques which are applied for cancer detection in mammograms. In this work, a combined methodology is used for enhancing the contrast of the mammogram which includes contrast limited histogram equalization (CLAHE), morphological gradient and fourth order nonlinear complex diffusion based unsharpening. The enhanced mammogram is then segmented using fuzzy c-means. An analysis is done on each of the following cases with Fuzzy-c means segmentation: CLAHE enhanced, morphologicall gradient enhanced, fourth order nonlinear complex diffusion enhanced and combined enhanced image using the above methods.
{"title":"Fuzzy c-means Segmentation on Enhanced Mammograms Using CLAHE and Fourth Order Complex Diffusion","authors":"M. Mohan, Lekshmi Priya T, L. S. Nair","doi":"10.1109/ICCMC48092.2020.ICCMC-000120","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000120","url":null,"abstract":"Cancer statistics all around the globe are rising day by day, out of which breast cancer is the dominating one in women. Mammography is used to detect the presence of cancerous cells and computer-aided detection technologies are used to get more accurate results. There are different image processing techniques which are applied for cancer detection in mammograms. In this work, a combined methodology is used for enhancing the contrast of the mammogram which includes contrast limited histogram equalization (CLAHE), morphological gradient and fourth order nonlinear complex diffusion based unsharpening. The enhanced mammogram is then segmented using fuzzy c-means. An analysis is done on each of the following cases with Fuzzy-c means segmentation: CLAHE enhanced, morphologicall gradient enhanced, fourth order nonlinear complex diffusion enhanced and combined enhanced image using the above methods.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000193
P. Tamilarasi, R. Rani
Crime against women has become a very big problem of our nation. Many countries are trying to control this offence continuously and its prevention is an essential task. In recent years crimes are significantly increasing against women. Currently the Indian government show interest to address this problem and give more importance to develop our society. Every year a huge amount of data collection is generated on the basis of the crime reporting. This data can be very useful for assessing and predicting crime, and can help us to some degree stop the crime. Data analysis is a process of examining, cleansing, transformation and modelling data with the goal of establish useful information, reporting conclusion and sustaining decision-making. Feature Scaling is one of the most important techniques to standardize the independent features to place the data in a fixed range. It is performed at the time of data pre-processing. K-fold cross-validation is a re-sampling method used for calculating machine learning models on a small sample of data. It is a common strategy since it is easy to understand and usually results in a model deftness calculation that is less biased or less negative than other approaches, such as a simple train or test divide. Machine learning plays a large part in data processing. This paper introduces six different types of Machine learning algorithms such as KNN and decision trees, Naïve Bayes, Linear Regression CART (Classification and Regression Tree) and SVM using similar characteristics on crime data. Those algorithms are tested for accuracy. The main objective of this research is to evaluate the efficacy and application of the machine learning algorithms in data analytics.
{"title":"Diagnosis of Crime Rate against Women using k-fold Cross Validation through Machine Learning","authors":"P. Tamilarasi, R. Rani","doi":"10.1109/ICCMC48092.2020.ICCMC-000193","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000193","url":null,"abstract":"Crime against women has become a very big problem of our nation. Many countries are trying to control this offence continuously and its prevention is an essential task. In recent years crimes are significantly increasing against women. Currently the Indian government show interest to address this problem and give more importance to develop our society. Every year a huge amount of data collection is generated on the basis of the crime reporting. This data can be very useful for assessing and predicting crime, and can help us to some degree stop the crime. Data analysis is a process of examining, cleansing, transformation and modelling data with the goal of establish useful information, reporting conclusion and sustaining decision-making. Feature Scaling is one of the most important techniques to standardize the independent features to place the data in a fixed range. It is performed at the time of data pre-processing. K-fold cross-validation is a re-sampling method used for calculating machine learning models on a small sample of data. It is a common strategy since it is easy to understand and usually results in a model deftness calculation that is less biased or less negative than other approaches, such as a simple train or test divide. Machine learning plays a large part in data processing. This paper introduces six different types of Machine learning algorithms such as KNN and decision trees, Naïve Bayes, Linear Regression CART (Classification and Regression Tree) and SVM using similar characteristics on crime data. Those algorithms are tested for accuracy. The main objective of this research is to evaluate the efficacy and application of the machine learning algorithms in data analytics.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132785991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000172
Saurabh Anand, Anurag Awasthi, A. Verma, Zaid Ahmad Khan, Ashfaq Alam Khan
The smart home system is a widely used reference term and a platform for home automation control, and monitoring. Home automation with the help of IoT is not that much mature so far it is in the development phase and there is so much space for improvement but from the user point of view buying this kind of system could make our life simpler and it can reduce our time and cost. It can do many things that man faces problems in doing. This is basically a system that will connect with our device(phone or web) and there will be the main device inside the home that device will be connected with the wifi or Bluetooth and other home appliances that we want to control remotely. A standard workflow on home automation consists of 4 stages. By understanding the user experience through sensing, documenting incidents to a centralized entity, centralized entity analyzes and initiating workflow, workflow can lead and inform users through any social network, or even exercise (acting) over a home device. “Internet of Things is the technology” that we will use for this project, is used when we want to control appliances through our devices like mobile or web and it can be controlled from anywhere around the world. This whole technology termed as ‘Smart Home System’. Implementation of IoT in the future including Smart Energy, Smart City and Smart Home requires comparison of all data. Once we are through with sensing of data, the system may analyse on its own by seeing the previous patterns. Thus, in this paper, we are proposing the need for integrating user based patterns which are commonly used, with the Smart Home System.
{"title":"IoT Enabled Home Automation System Comprehending the User Experience Based on Their Pattern Usage","authors":"Saurabh Anand, Anurag Awasthi, A. Verma, Zaid Ahmad Khan, Ashfaq Alam Khan","doi":"10.1109/ICCMC48092.2020.ICCMC-000172","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000172","url":null,"abstract":"The smart home system is a widely used reference term and a platform for home automation control, and monitoring. Home automation with the help of IoT is not that much mature so far it is in the development phase and there is so much space for improvement but from the user point of view buying this kind of system could make our life simpler and it can reduce our time and cost. It can do many things that man faces problems in doing. This is basically a system that will connect with our device(phone or web) and there will be the main device inside the home that device will be connected with the wifi or Bluetooth and other home appliances that we want to control remotely. A standard workflow on home automation consists of 4 stages. By understanding the user experience through sensing, documenting incidents to a centralized entity, centralized entity analyzes and initiating workflow, workflow can lead and inform users through any social network, or even exercise (acting) over a home device. “Internet of Things is the technology” that we will use for this project, is used when we want to control appliances through our devices like mobile or web and it can be controlled from anywhere around the world. This whole technology termed as ‘Smart Home System’. Implementation of IoT in the future including Smart Energy, Smart City and Smart Home requires comparison of all data. Once we are through with sensing of data, the system may analyse on its own by seeing the previous patterns. Thus, in this paper, we are proposing the need for integrating user based patterns which are commonly used, with the Smart Home System.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124135548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00098
U. Venkateshkumar, S. Kiruthiga, H. Mihitha, K. Maheswari, M. Nithiyasri
This paper outlines concept of two multiband antennas suitable for 5G communication.One of which is designed in such a way that the resonating frequencies lies within the 450 MHz-6 GHz.This proposed antenna has resonating frequencies such as 2.4 GHz,2.8 GHz,4.1 GHz,5.5 GHz,5.9 GH, 6.6 GHz, 7.9 GHz and 9.3 GHz. Another multiband antenna operates in millimetrewaveband(24 GHz-86 GHz) resonating at 14.601 GHz, 23.3.01 GHz and 28.9 GHz.The substrate chosen for the designs is FR-4 for.r=4.4 dielectric constant and designed using HFSS software.The proposed antennas have low return loss, high gain and high directivity and low VSWR. These patch antennas are suitable not only for 5G applicationsbut also for WiFi,WiMax, Bluetooth and WLAN applications.
{"title":"Multiband Patch Antenna Design for 5G Applications","authors":"U. Venkateshkumar, S. Kiruthiga, H. Mihitha, K. Maheswari, M. Nithiyasri","doi":"10.1109/ICCMC48092.2020.ICCMC-00098","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00098","url":null,"abstract":"This paper outlines concept of two multiband antennas suitable for 5G communication.One of which is designed in such a way that the resonating frequencies lies within the 450 MHz-6 GHz.This proposed antenna has resonating frequencies such as 2.4 GHz,2.8 GHz,4.1 GHz,5.5 GHz,5.9 GH, 6.6 GHz, 7.9 GHz and 9.3 GHz. Another multiband antenna operates in millimetrewaveband(24 GHz-86 GHz) resonating at 14.601 GHz, 23.3.01 GHz and 28.9 GHz.The substrate chosen for the designs is FR-4 for.r=4.4 dielectric constant and designed using HFSS software.The proposed antennas have low return loss, high gain and high directivity and low VSWR. These patch antennas are suitable not only for 5G applicationsbut also for WiFi,WiMax, Bluetooth and WLAN applications.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128779651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000115
R. Ratheesh Kumar, Jabin Mathew
Nowadays, securing images is essential because transmissions of images are suffering from various security attacks. Images like medical images, remote-sensing images, etc. have great value both in money and information. Therefore, there are several sophisticated methods for encrypting images. This paper mainly focuses on a survey of such methods and comparative evaluation of them. Here, the reviewers have used 13 papers for the survey and comparative evaluation. Various aspects of image encryption are surveyed and a comparative evaluation of the papers using different parameters such as security attacks, information loss, speed, overhead, etc. is performed. The conclusions are stated with the help of suitable tables. We hope this paper gives an insight into Image Encryption, Encryption Methods, Properties of Images, Evaluation Criteria, Analysis, Attacks, Resistance, Noise, and Information Loss.
{"title":"Image Encryption:Traditional Methods vs Alternative Methods","authors":"R. Ratheesh Kumar, Jabin Mathew","doi":"10.1109/ICCMC48092.2020.ICCMC-000115","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000115","url":null,"abstract":"Nowadays, securing images is essential because transmissions of images are suffering from various security attacks. Images like medical images, remote-sensing images, etc. have great value both in money and information. Therefore, there are several sophisticated methods for encrypting images. This paper mainly focuses on a survey of such methods and comparative evaluation of them. Here, the reviewers have used 13 papers for the survey and comparative evaluation. Various aspects of image encryption are surveyed and a comparative evaluation of the papers using different parameters such as security attacks, information loss, speed, overhead, etc. is performed. The conclusions are stated with the help of suitable tables. We hope this paper gives an insight into Image Encryption, Encryption Methods, Properties of Images, Evaluation Criteria, Analysis, Attacks, Resistance, Noise, and Information Loss.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129266059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000158
K. Pradeep, C. R. TintuRosmin, Sherly Susana Durom, G. Anisha
In this paper, we aim to find an accurate algorithm for implementing information mining systems utilizing Weka tool to foresee the achievement or disappointment of motion pictures dependent on a few important qualities with respect to system by systematically analyzing decision tree algorithms. The weightage for each attribute is calculated in the first stage, and then weightage of that movie is calculated by combined calculation of attributes using decision tree algorithms. Here we are trying to implement this idea on mainly three decision tree algorithms. J48 algorithm, Random Forest, Hoeffiding tree. Here, we try to find key factors for a profitable movie. This model assists with discovering the rating of the upcoming motion picture through qualities or attributes of that movie.
{"title":"Decision Tree Algorithms for Accurate Prediction of Movie Rating","authors":"K. Pradeep, C. R. TintuRosmin, Sherly Susana Durom, G. Anisha","doi":"10.1109/ICCMC48092.2020.ICCMC-000158","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000158","url":null,"abstract":"In this paper, we aim to find an accurate algorithm for implementing information mining systems utilizing Weka tool to foresee the achievement or disappointment of motion pictures dependent on a few important qualities with respect to system by systematically analyzing decision tree algorithms. The weightage for each attribute is calculated in the first stage, and then weightage of that movie is calculated by combined calculation of attributes using decision tree algorithms. Here we are trying to implement this idea on mainly three decision tree algorithms. J48 algorithm, Random Forest, Hoeffiding tree. Here, we try to find key factors for a profitable movie. This model assists with discovering the rating of the upcoming motion picture through qualities or attributes of that movie.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000103
R. Kohar
Things fitting to the Internet to provide and access online information are denoted as Internet of Things (IoT). A huge number of networks shall be required to convert this information into meaningful interpretations. SOA based services are used to develop large enterprise systems and therefore play an important part in Internet-of-Things domain. In this paper, the existing methodologies/ architecture/ techniques, challenges and future directions conducted on the usage of services and Service Oriented Architecture (SOA) in IoT based systems have been discussed. This paper presents a comprehensive review of more than 50 recent research work done in IoT services and classifies it into five categories which are based on the: usage in real world applications, architectures used, different IoT features, IoT service modeling and discovery and platforms used. The paper also provides the research areas and problems that can be explored in future by the research community.
适合于互联网提供和访问在线信息的事物称为物联网(Internet of Things, IoT)。需要大量的网络将这些信息转化为有意义的解释。基于SOA的服务用于开发大型企业系统,因此在物联网领域中扮演着重要的角色。本文讨论了在基于物联网的系统中使用服务和面向服务的体系结构(SOA)的现有方法/体系结构/技术、挑战和未来方向。本文全面回顾了最近在物联网服务方面所做的50多项研究工作,并将其分为五类,这是基于:在现实世界应用中的使用,使用的架构,不同的物联网功能,物联网服务建模和发现以及使用的平台。文章还提出了今后研究界可以探索的研究领域和问题。
{"title":"IoT systems based on SOA services: Methodologies, Challenges and Future directions","authors":"R. Kohar","doi":"10.1109/ICCMC48092.2020.ICCMC-000103","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000103","url":null,"abstract":"Things fitting to the Internet to provide and access online information are denoted as Internet of Things (IoT). A huge number of networks shall be required to convert this information into meaningful interpretations. SOA based services are used to develop large enterprise systems and therefore play an important part in Internet-of-Things domain. In this paper, the existing methodologies/ architecture/ techniques, challenges and future directions conducted on the usage of services and Service Oriented Architecture (SOA) in IoT based systems have been discussed. This paper presents a comprehensive review of more than 50 recent research work done in IoT services and classifies it into five categories which are based on the: usage in real world applications, architectures used, different IoT features, IoT service modeling and discovery and platforms used. The paper also provides the research areas and problems that can be explored in future by the research community.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114131112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00045
S. Subbulakshmi, Anvy Elsa Saji, Geethu Chandran
Web Services are materialized as a major technology carried out for automated interaction between distributed and miscellaneous applications. It is defined as a software service that provides business solutions consumed by different service requester. It can be accessed by a standard web protocol. Service composition is the mechanism used for selecting, reusing and combining existing web services to build new web services. With immense increase in web services, quality assessment plays an essential role in the selection approach. QoS is defined as the ability to guarantee the requirements like latency, reliability, bandwidth, etc. in order to satisfy a service level agreement between an application provider and end-user. QoS based dynamic service composition leads to the upward growth of an organization that implements multiple services to provide its business solution. The proposed research work elaborates the research work on different methodologies of QoS prediction with its implications to provide a proper road map for future research on efficient service composition.
{"title":"Methodologies for selection of Quality Web Services to Develop Efficient Web Service Composition","authors":"S. Subbulakshmi, Anvy Elsa Saji, Geethu Chandran","doi":"10.1109/ICCMC48092.2020.ICCMC-00045","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00045","url":null,"abstract":"Web Services are materialized as a major technology carried out for automated interaction between distributed and miscellaneous applications. It is defined as a software service that provides business solutions consumed by different service requester. It can be accessed by a standard web protocol. Service composition is the mechanism used for selecting, reusing and combining existing web services to build new web services. With immense increase in web services, quality assessment plays an essential role in the selection approach. QoS is defined as the ability to guarantee the requirements like latency, reliability, bandwidth, etc. in order to satisfy a service level agreement between an application provider and end-user. QoS based dynamic service composition leads to the upward growth of an organization that implements multiple services to provide its business solution. The proposed research work elaborates the research work on different methodologies of QoS prediction with its implications to provide a proper road map for future research on efficient service composition.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000182
Anil Kumar Singh, R. Sharma
This paper proposes audio signal processing implementation on two different multimedia FPGA board (Zybo and Zed Board). The audio signal coming from audio codec is adaptive filtering using LMS algorithm and it is implemented on FPGA. The comparative study has been done in terms of hardware resource utilization, static and dynamic power dissipation and speed of the system. The interesting result we have found is that hardware resource utilization and delay are less in ZYBO as compare to Zed multimedia board and also, we have found that the static power dissipation is less and dynamic power dissipation is more in ZYBO multimedia board.
{"title":"Different FPGA Implementations of Audio Processing Using Least Mean Square Adaptive Filtering: A Comparative Study","authors":"Anil Kumar Singh, R. Sharma","doi":"10.1109/ICCMC48092.2020.ICCMC-000182","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000182","url":null,"abstract":"This paper proposes audio signal processing implementation on two different multimedia FPGA board (Zybo and Zed Board). The audio signal coming from audio codec is adaptive filtering using LMS algorithm and it is implemented on FPGA. The comparative study has been done in terms of hardware resource utilization, static and dynamic power dissipation and speed of the system. The interesting result we have found is that hardware resource utilization and delay are less in ZYBO as compare to Zed multimedia board and also, we have found that the static power dissipation is less and dynamic power dissipation is more in ZYBO multimedia board.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116632878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}