Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000125
D. Mahapatra, Chandan Maharana, S. Panda, J. P. Mohanty, Abu Talib, Amit Mangaraj
Due to the increasing number of digital document repositories there is a heavy demand for information retrieval systems and therefore, information retrieval is still appearing as an emerging area of research. The information retrieval technology these days focuses on achieving better performance under different context by extracting documents most appropriate to the user’s query. Majority of the classical keyword based retrieval techniques does not focus on semantic meanings and therefore, are found to be less effective in reconstructing the actual information conveyed in the context. Also, retrieval of the relevant documents depends on appropriate analysis of the query terms. As words are polysemic, their actual meanings are influenced by their relationships with other words and their syntactic roles in the sentence. This work presents a fuzzy-cluster based semantic information retrieval model that considers these relationships to determine the exact meaning of the user query and extracts relevant documents as per their relevance scores.
{"title":"A Fuzzy-Cluster based Semantic Information Retrieval System","authors":"D. Mahapatra, Chandan Maharana, S. Panda, J. P. Mohanty, Abu Talib, Amit Mangaraj","doi":"10.1109/ICCMC48092.2020.ICCMC-000125","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000125","url":null,"abstract":"Due to the increasing number of digital document repositories there is a heavy demand for information retrieval systems and therefore, information retrieval is still appearing as an emerging area of research. The information retrieval technology these days focuses on achieving better performance under different context by extracting documents most appropriate to the user’s query. Majority of the classical keyword based retrieval techniques does not focus on semantic meanings and therefore, are found to be less effective in reconstructing the actual information conveyed in the context. Also, retrieval of the relevant documents depends on appropriate analysis of the query terms. As words are polysemic, their actual meanings are influenced by their relationships with other words and their syntactic roles in the sentence. This work presents a fuzzy-cluster based semantic information retrieval model that considers these relationships to determine the exact meaning of the user query and extracts relevant documents as per their relevance scores.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000133
Tarish Ahmed B, M. S. Krishnan, Athul Anil
The recent research advancement of wireless protocols, cloud development services, and reduced hardware costs have launched a new dawn for cloud computing. Fog computing widens the cloud computing paradigm to the network’s edge and assists in the production and creation of multiple new Internet services and applications. Normally, IoT gateways are used under the IoT fog computing model to communicate data with IoT devices and the cloud. A plethora of wireless technologies exist, of that WiFi remains the ideal communication technology and WIFI6 the preferred protocol for fog in particular as it has various advantages over its predecessors like extended battery life, support for more than one device at a time with the help of OFDMA, simultaneous connection with multiple devices, increased data rates with the help of MU-MIMO, and the use of MPTL topology which makes connections easier and faster.
{"title":"A Predictive Analysis on the Influence of WiFi 6 in Fog Computing with OFDMA and MU-MIMO","authors":"Tarish Ahmed B, M. S. Krishnan, Athul Anil","doi":"10.1109/ICCMC48092.2020.ICCMC-000133","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000133","url":null,"abstract":"The recent research advancement of wireless protocols, cloud development services, and reduced hardware costs have launched a new dawn for cloud computing. Fog computing widens the cloud computing paradigm to the network’s edge and assists in the production and creation of multiple new Internet services and applications. Normally, IoT gateways are used under the IoT fog computing model to communicate data with IoT devices and the cloud. A plethora of wireless technologies exist, of that WiFi remains the ideal communication technology and WIFI6 the preferred protocol for fog in particular as it has various advantages over its predecessors like extended battery life, support for more than one device at a time with the help of OFDMA, simultaneous connection with multiple devices, increased data rates with the help of MU-MIMO, and the use of MPTL topology which makes connections easier and faster.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134255549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000137
S. Kargutkar, V. Chitre
Cyberbullying disturbs harassment online, with alarming implications. It exists in different ways, and is in textual format in most social networks. There is no question that over 1.96 billion of them would have an inescapable social operation. However, the developing decade presents genuine difficulties and the online-conduct of clients have been put to address. Expanding instances of provocation and harassing alongside instances of casualty has been a difficult issue. Programmed discovery of such episodes requires smart frameworks. A large portion of the current studies have been moving towards this issue with standard machine learning models and most of the models produced in these studies are scalable at one time into a solitary social network. Deep learning based models have discovered ways in the identification of digital harassing occurrences, asserting that they can beat the restrictions of the ordinary models, and improve the discovery execution. However, numerous old-school models are accessible to control the incident, the need to successfully order the tormenting is as yet weak. To successfully screen the harassing in the virtual space and to stop the savage outcome with the execution of Machine learning and Language preparing. A system is proposed to give a double characterization of cyberbullying. Our technique utilizes an inventive idea of CNN for content examination anyway the current strategies utilize a guileless way to deal with furnish the arrangement with less precision. A current dataset is utilized for experimentation and our system is proposed with other existing methods and is found to give better precision and grouping.
{"title":"A Study of Cyberbullying Detection Using Machine Learning Techniques","authors":"S. Kargutkar, V. Chitre","doi":"10.1109/ICCMC48092.2020.ICCMC-000137","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000137","url":null,"abstract":"Cyberbullying disturbs harassment online, with alarming implications. It exists in different ways, and is in textual format in most social networks. There is no question that over 1.96 billion of them would have an inescapable social operation. However, the developing decade presents genuine difficulties and the online-conduct of clients have been put to address. Expanding instances of provocation and harassing alongside instances of casualty has been a difficult issue. Programmed discovery of such episodes requires smart frameworks. A large portion of the current studies have been moving towards this issue with standard machine learning models and most of the models produced in these studies are scalable at one time into a solitary social network. Deep learning based models have discovered ways in the identification of digital harassing occurrences, asserting that they can beat the restrictions of the ordinary models, and improve the discovery execution. However, numerous old-school models are accessible to control the incident, the need to successfully order the tormenting is as yet weak. To successfully screen the harassing in the virtual space and to stop the savage outcome with the execution of Machine learning and Language preparing. A system is proposed to give a double characterization of cyberbullying. Our technique utilizes an inventive idea of CNN for content examination anyway the current strategies utilize a guileless way to deal with furnish the arrangement with less precision. A current dataset is utilized for experimentation and our system is proposed with other existing methods and is found to give better precision and grouping.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"28 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132938291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000172
Saurabh Anand, Anurag Awasthi, A. Verma, Zaid Ahmad Khan, Ashfaq Alam Khan
The smart home system is a widely used reference term and a platform for home automation control, and monitoring. Home automation with the help of IoT is not that much mature so far it is in the development phase and there is so much space for improvement but from the user point of view buying this kind of system could make our life simpler and it can reduce our time and cost. It can do many things that man faces problems in doing. This is basically a system that will connect with our device(phone or web) and there will be the main device inside the home that device will be connected with the wifi or Bluetooth and other home appliances that we want to control remotely. A standard workflow on home automation consists of 4 stages. By understanding the user experience through sensing, documenting incidents to a centralized entity, centralized entity analyzes and initiating workflow, workflow can lead and inform users through any social network, or even exercise (acting) over a home device. “Internet of Things is the technology” that we will use for this project, is used when we want to control appliances through our devices like mobile or web and it can be controlled from anywhere around the world. This whole technology termed as ‘Smart Home System’. Implementation of IoT in the future including Smart Energy, Smart City and Smart Home requires comparison of all data. Once we are through with sensing of data, the system may analyse on its own by seeing the previous patterns. Thus, in this paper, we are proposing the need for integrating user based patterns which are commonly used, with the Smart Home System.
{"title":"IoT Enabled Home Automation System Comprehending the User Experience Based on Their Pattern Usage","authors":"Saurabh Anand, Anurag Awasthi, A. Verma, Zaid Ahmad Khan, Ashfaq Alam Khan","doi":"10.1109/ICCMC48092.2020.ICCMC-000172","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000172","url":null,"abstract":"The smart home system is a widely used reference term and a platform for home automation control, and monitoring. Home automation with the help of IoT is not that much mature so far it is in the development phase and there is so much space for improvement but from the user point of view buying this kind of system could make our life simpler and it can reduce our time and cost. It can do many things that man faces problems in doing. This is basically a system that will connect with our device(phone or web) and there will be the main device inside the home that device will be connected with the wifi or Bluetooth and other home appliances that we want to control remotely. A standard workflow on home automation consists of 4 stages. By understanding the user experience through sensing, documenting incidents to a centralized entity, centralized entity analyzes and initiating workflow, workflow can lead and inform users through any social network, or even exercise (acting) over a home device. “Internet of Things is the technology” that we will use for this project, is used when we want to control appliances through our devices like mobile or web and it can be controlled from anywhere around the world. This whole technology termed as ‘Smart Home System’. Implementation of IoT in the future including Smart Energy, Smart City and Smart Home requires comparison of all data. Once we are through with sensing of data, the system may analyse on its own by seeing the previous patterns. Thus, in this paper, we are proposing the need for integrating user based patterns which are commonly used, with the Smart Home System.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124135548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00098
U. Venkateshkumar, S. Kiruthiga, H. Mihitha, K. Maheswari, M. Nithiyasri
This paper outlines concept of two multiband antennas suitable for 5G communication.One of which is designed in such a way that the resonating frequencies lies within the 450 MHz-6 GHz.This proposed antenna has resonating frequencies such as 2.4 GHz,2.8 GHz,4.1 GHz,5.5 GHz,5.9 GH, 6.6 GHz, 7.9 GHz and 9.3 GHz. Another multiband antenna operates in millimetrewaveband(24 GHz-86 GHz) resonating at 14.601 GHz, 23.3.01 GHz and 28.9 GHz.The substrate chosen for the designs is FR-4 for.r=4.4 dielectric constant and designed using HFSS software.The proposed antennas have low return loss, high gain and high directivity and low VSWR. These patch antennas are suitable not only for 5G applicationsbut also for WiFi,WiMax, Bluetooth and WLAN applications.
{"title":"Multiband Patch Antenna Design for 5G Applications","authors":"U. Venkateshkumar, S. Kiruthiga, H. Mihitha, K. Maheswari, M. Nithiyasri","doi":"10.1109/ICCMC48092.2020.ICCMC-00098","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00098","url":null,"abstract":"This paper outlines concept of two multiband antennas suitable for 5G communication.One of which is designed in such a way that the resonating frequencies lies within the 450 MHz-6 GHz.This proposed antenna has resonating frequencies such as 2.4 GHz,2.8 GHz,4.1 GHz,5.5 GHz,5.9 GH, 6.6 GHz, 7.9 GHz and 9.3 GHz. Another multiband antenna operates in millimetrewaveband(24 GHz-86 GHz) resonating at 14.601 GHz, 23.3.01 GHz and 28.9 GHz.The substrate chosen for the designs is FR-4 for.r=4.4 dielectric constant and designed using HFSS software.The proposed antennas have low return loss, high gain and high directivity and low VSWR. These patch antennas are suitable not only for 5G applicationsbut also for WiFi,WiMax, Bluetooth and WLAN applications.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128779651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000115
R. Ratheesh Kumar, Jabin Mathew
Nowadays, securing images is essential because transmissions of images are suffering from various security attacks. Images like medical images, remote-sensing images, etc. have great value both in money and information. Therefore, there are several sophisticated methods for encrypting images. This paper mainly focuses on a survey of such methods and comparative evaluation of them. Here, the reviewers have used 13 papers for the survey and comparative evaluation. Various aspects of image encryption are surveyed and a comparative evaluation of the papers using different parameters such as security attacks, information loss, speed, overhead, etc. is performed. The conclusions are stated with the help of suitable tables. We hope this paper gives an insight into Image Encryption, Encryption Methods, Properties of Images, Evaluation Criteria, Analysis, Attacks, Resistance, Noise, and Information Loss.
{"title":"Image Encryption:Traditional Methods vs Alternative Methods","authors":"R. Ratheesh Kumar, Jabin Mathew","doi":"10.1109/ICCMC48092.2020.ICCMC-000115","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000115","url":null,"abstract":"Nowadays, securing images is essential because transmissions of images are suffering from various security attacks. Images like medical images, remote-sensing images, etc. have great value both in money and information. Therefore, there are several sophisticated methods for encrypting images. This paper mainly focuses on a survey of such methods and comparative evaluation of them. Here, the reviewers have used 13 papers for the survey and comparative evaluation. Various aspects of image encryption are surveyed and a comparative evaluation of the papers using different parameters such as security attacks, information loss, speed, overhead, etc. is performed. The conclusions are stated with the help of suitable tables. We hope this paper gives an insight into Image Encryption, Encryption Methods, Properties of Images, Evaluation Criteria, Analysis, Attacks, Resistance, Noise, and Information Loss.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129266059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000158
K. Pradeep, C. R. TintuRosmin, Sherly Susana Durom, G. Anisha
In this paper, we aim to find an accurate algorithm for implementing information mining systems utilizing Weka tool to foresee the achievement or disappointment of motion pictures dependent on a few important qualities with respect to system by systematically analyzing decision tree algorithms. The weightage for each attribute is calculated in the first stage, and then weightage of that movie is calculated by combined calculation of attributes using decision tree algorithms. Here we are trying to implement this idea on mainly three decision tree algorithms. J48 algorithm, Random Forest, Hoeffiding tree. Here, we try to find key factors for a profitable movie. This model assists with discovering the rating of the upcoming motion picture through qualities or attributes of that movie.
{"title":"Decision Tree Algorithms for Accurate Prediction of Movie Rating","authors":"K. Pradeep, C. R. TintuRosmin, Sherly Susana Durom, G. Anisha","doi":"10.1109/ICCMC48092.2020.ICCMC-000158","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000158","url":null,"abstract":"In this paper, we aim to find an accurate algorithm for implementing information mining systems utilizing Weka tool to foresee the achievement or disappointment of motion pictures dependent on a few important qualities with respect to system by systematically analyzing decision tree algorithms. The weightage for each attribute is calculated in the first stage, and then weightage of that movie is calculated by combined calculation of attributes using decision tree algorithms. Here we are trying to implement this idea on mainly three decision tree algorithms. J48 algorithm, Random Forest, Hoeffiding tree. Here, we try to find key factors for a profitable movie. This model assists with discovering the rating of the upcoming motion picture through qualities or attributes of that movie.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000103
R. Kohar
Things fitting to the Internet to provide and access online information are denoted as Internet of Things (IoT). A huge number of networks shall be required to convert this information into meaningful interpretations. SOA based services are used to develop large enterprise systems and therefore play an important part in Internet-of-Things domain. In this paper, the existing methodologies/ architecture/ techniques, challenges and future directions conducted on the usage of services and Service Oriented Architecture (SOA) in IoT based systems have been discussed. This paper presents a comprehensive review of more than 50 recent research work done in IoT services and classifies it into five categories which are based on the: usage in real world applications, architectures used, different IoT features, IoT service modeling and discovery and platforms used. The paper also provides the research areas and problems that can be explored in future by the research community.
适合于互联网提供和访问在线信息的事物称为物联网(Internet of Things, IoT)。需要大量的网络将这些信息转化为有意义的解释。基于SOA的服务用于开发大型企业系统,因此在物联网领域中扮演着重要的角色。本文讨论了在基于物联网的系统中使用服务和面向服务的体系结构(SOA)的现有方法/体系结构/技术、挑战和未来方向。本文全面回顾了最近在物联网服务方面所做的50多项研究工作,并将其分为五类,这是基于:在现实世界应用中的使用,使用的架构,不同的物联网功能,物联网服务建模和发现以及使用的平台。文章还提出了今后研究界可以探索的研究领域和问题。
{"title":"IoT systems based on SOA services: Methodologies, Challenges and Future directions","authors":"R. Kohar","doi":"10.1109/ICCMC48092.2020.ICCMC-000103","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000103","url":null,"abstract":"Things fitting to the Internet to provide and access online information are denoted as Internet of Things (IoT). A huge number of networks shall be required to convert this information into meaningful interpretations. SOA based services are used to develop large enterprise systems and therefore play an important part in Internet-of-Things domain. In this paper, the existing methodologies/ architecture/ techniques, challenges and future directions conducted on the usage of services and Service Oriented Architecture (SOA) in IoT based systems have been discussed. This paper presents a comprehensive review of more than 50 recent research work done in IoT services and classifies it into five categories which are based on the: usage in real world applications, architectures used, different IoT features, IoT service modeling and discovery and platforms used. The paper also provides the research areas and problems that can be explored in future by the research community.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114131112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00045
S. Subbulakshmi, Anvy Elsa Saji, Geethu Chandran
Web Services are materialized as a major technology carried out for automated interaction between distributed and miscellaneous applications. It is defined as a software service that provides business solutions consumed by different service requester. It can be accessed by a standard web protocol. Service composition is the mechanism used for selecting, reusing and combining existing web services to build new web services. With immense increase in web services, quality assessment plays an essential role in the selection approach. QoS is defined as the ability to guarantee the requirements like latency, reliability, bandwidth, etc. in order to satisfy a service level agreement between an application provider and end-user. QoS based dynamic service composition leads to the upward growth of an organization that implements multiple services to provide its business solution. The proposed research work elaborates the research work on different methodologies of QoS prediction with its implications to provide a proper road map for future research on efficient service composition.
{"title":"Methodologies for selection of Quality Web Services to Develop Efficient Web Service Composition","authors":"S. Subbulakshmi, Anvy Elsa Saji, Geethu Chandran","doi":"10.1109/ICCMC48092.2020.ICCMC-00045","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00045","url":null,"abstract":"Web Services are materialized as a major technology carried out for automated interaction between distributed and miscellaneous applications. It is defined as a software service that provides business solutions consumed by different service requester. It can be accessed by a standard web protocol. Service composition is the mechanism used for selecting, reusing and combining existing web services to build new web services. With immense increase in web services, quality assessment plays an essential role in the selection approach. QoS is defined as the ability to guarantee the requirements like latency, reliability, bandwidth, etc. in order to satisfy a service level agreement between an application provider and end-user. QoS based dynamic service composition leads to the upward growth of an organization that implements multiple services to provide its business solution. The proposed research work elaborates the research work on different methodologies of QoS prediction with its implications to provide a proper road map for future research on efficient service composition.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000182
Anil Kumar Singh, R. Sharma
This paper proposes audio signal processing implementation on two different multimedia FPGA board (Zybo and Zed Board). The audio signal coming from audio codec is adaptive filtering using LMS algorithm and it is implemented on FPGA. The comparative study has been done in terms of hardware resource utilization, static and dynamic power dissipation and speed of the system. The interesting result we have found is that hardware resource utilization and delay are less in ZYBO as compare to Zed multimedia board and also, we have found that the static power dissipation is less and dynamic power dissipation is more in ZYBO multimedia board.
{"title":"Different FPGA Implementations of Audio Processing Using Least Mean Square Adaptive Filtering: A Comparative Study","authors":"Anil Kumar Singh, R. Sharma","doi":"10.1109/ICCMC48092.2020.ICCMC-000182","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000182","url":null,"abstract":"This paper proposes audio signal processing implementation on two different multimedia FPGA board (Zybo and Zed Board). The audio signal coming from audio codec is adaptive filtering using LMS algorithm and it is implemented on FPGA. The comparative study has been done in terms of hardware resource utilization, static and dynamic power dissipation and speed of the system. The interesting result we have found is that hardware resource utilization and delay are less in ZYBO as compare to Zed multimedia board and also, we have found that the static power dissipation is less and dynamic power dissipation is more in ZYBO multimedia board.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116632878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}