首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
Development and analysis of microstrip antenna for Wireless Local Area Network (IEEE 802.11y) 无线局域网(IEEE 802.11y)微带天线的研制与分析
D. Neelamegam, V. Rajesh
This paper presents a compact narrow band antenna for Wireless Local Area Network (WLAN) which operates at 3.6 GHz. The proposed antenna has M-shaped structure with length (l) of 35.89 mm and width (w) of 22.99 mm respectively. In this, selection of the patch length and width are the major parameters taken into considerations when designing an antenna. Desired patch is initially simulated by using IE3D simulator and is realized as per design requirements. This antenna provides return loss of -20 dB while the -10 dBpassband of the developed antenna is 1GHz from 3.5GHz to 3.7 GHz. the designed antenna is fabricated on FR4 substrate with dielectric constant of 4.4, loss tangent of 0.0004 and thickness of 1.6 mm using dual side Printed Circuit Board (PCB) technology. The measured S parameter of an antenna is compared with the simulated one, where the results obtained over the desired passband is at acceptable level.
提出了一种工作频率为3.6 GHz的小型窄带无线局域网天线。天线为m型结构,长(l)为35.89 mm,宽(w)为22.99 mm。其中,贴片长度和宽度的选择是天线设计时要考虑的主要参数。利用IE3D模拟器对所需补丁进行初步仿真,并按设计要求实现。该天线的回波损耗为- 20db,而开发的天线的- 10db通带在3.5GHz到3.7 GHz范围内为1GHz。设计的天线采用双面印刷电路板(PCB)技术,在介电常数为4.4、损耗正切为0.0004、厚度为1.6 mm的FR4衬底上制作。将天线的测量S参数与模拟S参数进行比较,在期望的通带上得到的结果处于可接受的水平。
{"title":"Development and analysis of microstrip antenna for Wireless Local Area Network (IEEE 802.11y)","authors":"D. Neelamegam, V. Rajesh","doi":"10.1109/ICICES.2014.7033997","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033997","url":null,"abstract":"This paper presents a compact narrow band antenna for Wireless Local Area Network (WLAN) which operates at 3.6 GHz. The proposed antenna has M-shaped structure with length (l) of 35.89 mm and width (w) of 22.99 mm respectively. In this, selection of the patch length and width are the major parameters taken into considerations when designing an antenna. Desired patch is initially simulated by using IE3D simulator and is realized as per design requirements. This antenna provides return loss of -20 dB while the -10 dBpassband of the developed antenna is 1GHz from 3.5GHz to 3.7 GHz. the designed antenna is fabricated on FR4 substrate with dielectric constant of 4.4, loss tangent of 0.0004 and thickness of 1.6 mm using dual side Printed Circuit Board (PCB) technology. The measured S parameter of an antenna is compared with the simulated one, where the results obtained over the desired passband is at acceptable level.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"34 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89687899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hardware implementation for sending concealed data in video by using wavelets 基于小波的视频隐藏数据发送的硬件实现
E. Venkatesan, V. P. Kolanchinathan
This paper presents a hardware implementation of a digital watermarking system that can insert invisible watermark information into video streams in real time. The watermark embedding is processed in the integer based wavelet transformation, lifting and least significant bits approach. To achieve high performance, the proposed system architecture employs pipeline structure and uses parallelism. Hardware implementation using field programmable gate array has been done, and an experiment was carried out using a custom versatile breadboard for overall performance evaluation. Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences. Furthermore, the proposed hardware based watermarking system features low power consumption, low cost implementation, high processing speed, and reliability.
本文提出了一种能够在视频流中实时插入不可见水印信息的数字水印系统的硬件实现。水印嵌入采用基于整数的小波变换、提升和最低有效位方法。为了实现高性能,提出的系统架构采用流水线结构,并采用并行性。利用现场可编程门阵列进行了硬件实现,并利用自定义的通用面包板进行了实验,进行了综合性能评估。实验结果表明,使用该水印技术的基于硬件的视频认证系统具有最小的视频质量下降,并且能够抵御视频序列的某些潜在攻击,如掩盖攻击、裁剪攻击和片段去除攻击。此外,所提出的基于硬件的水印系统具有功耗低、实现成本低、处理速度快、可靠性高等特点。
{"title":"Hardware implementation for sending concealed data in video by using wavelets","authors":"E. Venkatesan, V. P. Kolanchinathan","doi":"10.1109/ICICES.2014.7034021","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034021","url":null,"abstract":"This paper presents a hardware implementation of a digital watermarking system that can insert invisible watermark information into video streams in real time. The watermark embedding is processed in the integer based wavelet transformation, lifting and least significant bits approach. To achieve high performance, the proposed system architecture employs pipeline structure and uses parallelism. Hardware implementation using field programmable gate array has been done, and an experiment was carried out using a custom versatile breadboard for overall performance evaluation. Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences. Furthermore, the proposed hardware based watermarking system features low power consumption, low cost implementation, high processing speed, and reliability.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"33 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84026255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and contorlled sharing of privacy data in social networks 在社交网络中有效和可控地共享隐私数据
Th Theepigaa, A. Bhuvaneswari
Online social networks(OSNs) become a successful portal for millions of Internet users. These OSNs offer attractive means for social interactions and information sharing, but also raise a number issues in security and privacy. While OSNs allow users to restrict access to shared data, they do not currently provide any mechanism to enforce the privacy over data associated with multiple users. To share the private content and data our analysis presents an approach to enable the protection of shared data associated with multiple users in online social networks. We formulate an access control model to capture the essence of multiparty authorization requirements along with a multiparty policy specification scheme and enforcement mechanism. Our access control model allows us to overcome the disadvantages of existing system and perform various analysis tasks on privacy data sharing and selection strategies using the multiparty access control Framework (MACF).
在线社交网络(osn)已成为数百万互联网用户的成功门户。这些osn为社会交互和信息共享提供了有吸引力的手段,但也引起了一些安全和隐私问题。虽然osn允许用户限制对共享数据的访问,但它们目前没有提供任何机制来强制与多个用户关联的数据的隐私。为了共享私人内容和数据,我们的分析提出了一种方法,可以保护在线社交网络中与多个用户相关的共享数据。我们制定了一个访问控制模型,以捕获多方授权需求的本质,以及多方策略规范方案和实施机制。我们的访问控制模型允许我们克服现有系统的缺点,并使用多方访问控制框架(MACF)执行各种隐私数据共享和选择策略的分析任务。
{"title":"Efficient and contorlled sharing of privacy data in social networks","authors":"Th Theepigaa, A. Bhuvaneswari","doi":"10.1109/ICICES.2014.7033881","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033881","url":null,"abstract":"Online social networks(OSNs) become a successful portal for millions of Internet users. These OSNs offer attractive means for social interactions and information sharing, but also raise a number issues in security and privacy. While OSNs allow users to restrict access to shared data, they do not currently provide any mechanism to enforce the privacy over data associated with multiple users. To share the private content and data our analysis presents an approach to enable the protection of shared data associated with multiple users in online social networks. We formulate an access control model to capture the essence of multiparty authorization requirements along with a multiparty policy specification scheme and enforcement mechanism. Our access control model allows us to overcome the disadvantages of existing system and perform various analysis tasks on privacy data sharing and selection strategies using the multiparty access control Framework (MACF).","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84285588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an Ultra-low power WSN gateway for outdoor deployments 用于室外部署的超低功耗WSN网关的研制
Prateek Rajgarhia, P. James, Vivek Nainwal, P. Sowjanya, Santosh Sam Koshy
A Wireless Sensor Network (WSN) Gateway is treated as the most crucial entity of the WSN network, since it facilitates Data Storage, WSN Network Management and InterConnectivity to a back-end network. Most of the Gateway designs are implemented using a High End Processor and Operating System, to provide reliable data aggregation from the WSN. This paper, discusses the feasibility of using a low power, micro-controller as the Gateway, to provide reliable data aggregation in the face of challenges such as limited power supply, intermittent back end network connectivity and outdoor deployment conditions. In addition, the paper also discusses various mechanisms employed, to ensure that the system recovers and self-heals, when confronted with on-field failures. Finally, debug mechanisms, supplemented by various technologies are implemented and discussed, to provide additional and important on-field and off-field information.
无线传感器网络(WSN)网关被视为WSN网络中最关键的实体,因为它促进了数据存储、WSN网络管理和与后端网络的互连。大多数网关设计都使用高端处理器和操作系统来实现,以提供来自WSN的可靠数据聚合。本文讨论了在电力供应有限、后端网络连接时断时续、室外部署条件等挑战下,采用低功耗微控制器作为网关提供可靠数据聚合的可行性。此外,本文还讨论了所采用的各种机制,以确保系统在遇到现场故障时能够恢复和自我修复。最后,调试机制,辅以各种技术的实施和讨论,以提供额外的和重要的场内和场外的信息。
{"title":"Development of an Ultra-low power WSN gateway for outdoor deployments","authors":"Prateek Rajgarhia, P. James, Vivek Nainwal, P. Sowjanya, Santosh Sam Koshy","doi":"10.1109/ICICES.2014.7034151","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034151","url":null,"abstract":"A Wireless Sensor Network (WSN) Gateway is treated as the most crucial entity of the WSN network, since it facilitates Data Storage, WSN Network Management and InterConnectivity to a back-end network. Most of the Gateway designs are implemented using a High End Processor and Operating System, to provide reliable data aggregation from the WSN. This paper, discusses the feasibility of using a low power, micro-controller as the Gateway, to provide reliable data aggregation in the face of challenges such as limited power supply, intermittent back end network connectivity and outdoor deployment conditions. In addition, the paper also discusses various mechanisms employed, to ensure that the system recovers and self-heals, when confronted with on-field failures. Finally, debug mechanisms, supplemented by various technologies are implemented and discussed, to provide additional and important on-field and off-field information.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"73 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84321083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data stream mining based resilient identity fraudulent detection 基于数据流挖掘的弹性身份欺诈检测
V. Mareeswari, S. Sundareswari
To propose a new safe and secure mechanism to detect identity crimes, more precisely to identify replica in credit card. The synthetic identity fraud is the practice of reliable but false identities which is easy to make but more complicated to apply on real time. Detection system contains two layers which is communal detection and spike detection. Communal detection finds real social relationships to shrink the suspicion score, and is corrupt opposed to synthetic social relationships. It is the white list-oriented approach on a fixed set of attributes. Spike detection finds spikes in duplicates to enhance the suspicion score, and is probe-resistant for attributes. It is the attribute-oriented approach on a variable-size set of attributes. Both communal detection and spike detection become aware of more types of attacks, better account for changing legal behaviour, and remove the redundant attributes. To enhance identity crime detection systems flexible to real world scenario. The response time of the detection and fraud events need to be reduced. In credit card applications the key part is constrained to Identity Crime. Active Phase Blending algorithm is to reduce the time constraints on identifying fraudulent identity usage and response time.
提出一种新的安全可靠的身份犯罪检测机制,更准确地识别信用卡中的副本。合成身份诈骗是利用可靠但虚假的身份进行诈骗的一种行为,其制作简单,但实时应用较为复杂。检测系统包括公共检测和尖峰检测两层。公共侦查通过发现真实的社会关系来缩小怀疑分数,与合成的社会关系相反是腐败的。它是针对一组固定属性的面向白列表的方法。尖峰检测在重复中发现尖峰以提高怀疑分数,并且对属性具有探测抗性。它是针对可变大小的属性集的面向属性的方法。公共检测和峰值检测都能发现更多类型的攻击,更好地解释不断变化的合法行为,并删除冗余属性。提高身份罪案侦测系统的灵活性,以适应现实情况。需要减少检测和欺诈事件的响应时间。在信用卡应用中,关键部分被限制为身份犯罪。主动相位混合算法是为了减少识别欺诈性身份使用和响应时间的时间限制。
{"title":"Data stream mining based resilient identity fraudulent detection","authors":"V. Mareeswari, S. Sundareswari","doi":"10.1109/ICICES.2014.7033914","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033914","url":null,"abstract":"To propose a new safe and secure mechanism to detect identity crimes, more precisely to identify replica in credit card. The synthetic identity fraud is the practice of reliable but false identities which is easy to make but more complicated to apply on real time. Detection system contains two layers which is communal detection and spike detection. Communal detection finds real social relationships to shrink the suspicion score, and is corrupt opposed to synthetic social relationships. It is the white list-oriented approach on a fixed set of attributes. Spike detection finds spikes in duplicates to enhance the suspicion score, and is probe-resistant for attributes. It is the attribute-oriented approach on a variable-size set of attributes. Both communal detection and spike detection become aware of more types of attacks, better account for changing legal behaviour, and remove the redundant attributes. To enhance identity crime detection systems flexible to real world scenario. The response time of the detection and fraud events need to be reduced. In credit card applications the key part is constrained to Identity Crime. Active Phase Blending algorithm is to reduce the time constraints on identifying fraudulent identity usage and response time.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"39 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84399894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey on resource allocation strategies in cloud computing 云计算中资源分配策略研究综述
V. Anuradha, D. Sumathi, P. Student
Cloud computing provides user-requested services that are reliable, dynamic, flexible and efficient. In order to offer such guaranteed services to cloud users, effective resource allocation strategies must be implemented. The methodology used should also confirm to the Service Level Agreement (SLA) drawn between the customer and the service provider. This work presents a study of such resource allocation strategies in cloud computing. The strategies include resource requirements prediction algorithms and resource allocation algorithms. This works studies the various resource allocation techniques utilized in cloud computing and makes a comparative study of the merits and demerits of each technique. This study aims to identify an efficient resource allocation strategy that utilizes resources effectively in the resource constrained environment of cloud computing.
云计算为用户提供可靠、动态、灵活、高效的服务。为了向云用户提供这种有保障的服务,必须实施有效的资源分配策略。所使用的方法还应确认客户和服务提供商之间制定的服务水平协议(SLA)。这项工作提出了云计算中这种资源分配策略的研究。这些策略包括资源需求预测算法和资源分配算法。本文研究了云计算中使用的各种资源分配技术,并对每种技术的优缺点进行了比较研究。本研究旨在确定一种在云计算资源受限环境下有效利用资源的高效资源分配策略。
{"title":"A survey on resource allocation strategies in cloud computing","authors":"V. Anuradha, D. Sumathi, P. Student","doi":"10.1109/ICICES.2014.7033931","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033931","url":null,"abstract":"Cloud computing provides user-requested services that are reliable, dynamic, flexible and efficient. In order to offer such guaranteed services to cloud users, effective resource allocation strategies must be implemented. The methodology used should also confirm to the Service Level Agreement (SLA) drawn between the customer and the service provider. This work presents a study of such resource allocation strategies in cloud computing. The strategies include resource requirements prediction algorithms and resource allocation algorithms. This works studies the various resource allocation techniques utilized in cloud computing and makes a comparative study of the merits and demerits of each technique. This study aims to identify an efficient resource allocation strategy that utilizes resources effectively in the resource constrained environment of cloud computing.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87936963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 222
A framework for fast IP rerouting 一个快速IP重路由的框架
Vimal Kumar Pal, Sneha M. Ramteke
As the Internet takes an increasingly central role in day to day communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, it presents a new recovery scheme called Multiple Routing Configurations (MRC). The proposed scheme guarantees recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. It can be implemented with only minor changes to existing solutions. The present MRC analyze its performance with respect to scalability, backup path lengths, and load distribution after a failure. It also shows how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.
随着互联网在日常通信基础设施中发挥越来越重要的作用,网络故障后路由协议的缓慢收敛成为一个日益严重的问题。为了保证IP网络中链路和节点故障的快速恢复,提出了一种新的多路由配置(MRC)恢复方案。该方案保证了在所有单一故障场景下的恢复,使用单一机制处理链路和节点故障,并且不知道故障的根本原因。MRC是严格无连接的,并且只假设基于目的地的逐跳转发。MRC基于在路由器中保留额外的路由信息,并允许在检测到故障后立即在备用输出链路上继续转发数据包。它可以通过对现有解决方案的微小更改来实现。当前的MRC从可伸缩性、备份路径长度和故障后的负载分配等方面分析其性能。它还展示了如何使用网络中流量需求的估计来改善恢复流量的分布,从而减少使用MRC时出现拥塞的机会。
{"title":"A framework for fast IP rerouting","authors":"Vimal Kumar Pal, Sneha M. Ramteke","doi":"10.1109/ICICES.2014.7033905","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033905","url":null,"abstract":"As the Internet takes an increasingly central role in day to day communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, it presents a new recovery scheme called Multiple Routing Configurations (MRC). The proposed scheme guarantees recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. It can be implemented with only minor changes to existing solutions. The present MRC analyze its performance with respect to scalability, backup path lengths, and load distribution after a failure. It also shows how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"89 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88097085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Improved subjective and objective image quality assessment of JPEG image 改进了JPEG图像的主客观图像质量评价
C. Bhargava, Nidhi Verma
With all speedy development's immediate satisfaction going in the vicinity, once potency not noticed the intensity to which professional business also depends on Digital Imaging. Administrators of both print and internet stuffs rely upon densely on the feature and approachability of their images. This paper outlined the exploratory data that undoubtedly testify to the outlook of Image Quality IMPROVEMENT of JPEG IMAGE with respect to Quality, File Size, Compression Ratio, Mean Square Error and Peak Signal to Noise Ratio. The utilitarian implementation of all exploratory outcome processes utilizing MATLAB code has been compiled on MATLAB R2013a software gizmo.
随着一切快速发展的直接满足感就在身边,曾经的潜能没有注意到专业业务也依赖于数码影像的程度。印刷和互联网内容的管理员都高度依赖于其图像的特征和可接近性。本文概述的探索性数据无疑证明了JPEG图像在质量、文件大小、压缩比、均方误差和峰值信噪比等方面的图像质量改进前景。在MATLAB R2013a软件gizmo上编译了利用MATLAB实现所有探索性结果过程的实用代码。
{"title":"Improved subjective and objective image quality assessment of JPEG image","authors":"C. Bhargava, Nidhi Verma","doi":"10.1109/ICICES.2014.7033994","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033994","url":null,"abstract":"With all speedy development's immediate satisfaction going in the vicinity, once potency not noticed the intensity to which professional business also depends on Digital Imaging. Administrators of both print and internet stuffs rely upon densely on the feature and approachability of their images. This paper outlined the exploratory data that undoubtedly testify to the outlook of Image Quality IMPROVEMENT of JPEG IMAGE with respect to Quality, File Size, Compression Ratio, Mean Square Error and Peak Signal to Noise Ratio. The utilitarian implementation of all exploratory outcome processes utilizing MATLAB code has been compiled on MATLAB R2013a software gizmo.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"69 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86905537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information extraction based on probing algorithm with Bayesian approach 基于贝叶斯方法探测算法的信息提取
J. Davidson, I. Jacob, K. G. Srinivasagam
Document Annotation is the task of adding metadata information in the document which is useful in information extraction. Document annotation has emerged as a different stream in data mining. Majority of algorithms are concentrated on query workload. This paper uses Probing algorithm with Bayesian approach which identifies the attribute based on query workload, text frequency and content of the previous text annotation such as content value. This method has been implemented in datasets that facilitates data annotation and prioritizes the values of the attributes by ranking scheme. Query cost is also low when compared to other approach. The experimental analysis shows a better performance while comparing with other methods because probability theory provides a principled foundation for such reasoning under uncertainty.
文档注释是在文档中添加元数据信息的任务,它对信息提取非常有用。文档注释已经成为数据挖掘中一个不同的流。大多数算法都集中在查询工作负载上。本文采用基于贝叶斯方法的探测算法,根据查询工作量、文本频率和前一个文本注释的内容(如内容值)来识别属性。该方法已在数据集中实现,方便了数据标注,并通过排序方案对属性值进行优先级排序。与其他方法相比,查询成本也很低。实验分析表明,与其他方法相比,概率论为这种不确定情况下的推理提供了原则性的基础。
{"title":"Information extraction based on probing algorithm with Bayesian approach","authors":"J. Davidson, I. Jacob, K. G. Srinivasagam","doi":"10.1109/ICICES.2014.7033761","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033761","url":null,"abstract":"Document Annotation is the task of adding metadata information in the document which is useful in information extraction. Document annotation has emerged as a different stream in data mining. Majority of algorithms are concentrated on query workload. This paper uses Probing algorithm with Bayesian approach which identifies the attribute based on query workload, text frequency and content of the previous text annotation such as content value. This method has been implemented in datasets that facilitates data annotation and prioritizes the values of the attributes by ranking scheme. Query cost is also low when compared to other approach. The experimental analysis shows a better performance while comparing with other methods because probability theory provides a principled foundation for such reasoning under uncertainty.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"57 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86790997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THD reduction and voltage flicker mitigation in power system base on STATCOM 基于STATCOM的电力系统THD降低与电压闪变抑制
T. Tadivaka, M. Srikanth, T. Vijay Muni
Voltage flicker is a disturbance in electrical power systems. The reason for this disturbance is mainly due to the large nonlinear loads such as electric arc furnaces. A STATCOM is considered as a proper technique to mitigate the voltage flicker. Application of more suitable and precise power electronic converter leads to a more precise performance of the compensator. The voltage flicker compensation by 6 - pulse as well as 12-pulse static synchronous compensator (STATCOM) has been performed. In this case, injection of harmonics into the system caused some problems which were later overcome by using 12-pulse assignment of SATCOM and RLC Alter. This paper deals with the voltage flicker mitigation and reduction in total harmonic distortion (THD) and compared the results in detail. The obtained results show that STATCOM is very efficient and effective for the compensation and mitigation of voltage flicker and harmonics all the simulation results have been performed on the MATLAB Software.
电压闪变是电力系统中的一种干扰。造成这种扰动的主要原因是电弧炉等大型非线性负荷。STATCOM被认为是缓解电压闪变的一种合适的技术。采用更合适、精度更高的电力电子变换器,使补偿器的性能更精确。采用6脉冲和12脉冲静态同步补偿器(STATCOM)对电压闪变进行了补偿。在这种情况下,向系统中注入谐波引起了一些问题,这些问题后来通过使用SATCOM和RLC Alter的12脉冲分配来克服。本文讨论了电压闪变的抑制和总谐波失真的降低,并对结果进行了详细的比较。仿真结果表明,STATCOM对电压闪变和谐波的补偿和抑制是非常有效的,仿真结果已在MATLAB软件上进行了验证。
{"title":"THD reduction and voltage flicker mitigation in power system base on STATCOM","authors":"T. Tadivaka, M. Srikanth, T. Vijay Muni","doi":"10.1109/ICICES.2014.7034161","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034161","url":null,"abstract":"Voltage flicker is a disturbance in electrical power systems. The reason for this disturbance is mainly due to the large nonlinear loads such as electric arc furnaces. A STATCOM is considered as a proper technique to mitigate the voltage flicker. Application of more suitable and precise power electronic converter leads to a more precise performance of the compensator. The voltage flicker compensation by 6 - pulse as well as 12-pulse static synchronous compensator (STATCOM) has been performed. In this case, injection of harmonics into the system caused some problems which were later overcome by using 12-pulse assignment of SATCOM and RLC Alter. This paper deals with the voltage flicker mitigation and reduction in total harmonic distortion (THD) and compared the results in detail. The obtained results show that STATCOM is very efficient and effective for the compensation and mitigation of voltage flicker and harmonics all the simulation results have been performed on the MATLAB Software.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87069502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1