首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
e-Learning management system using web services 使用web服务的电子学习管理系统
N. Partheeban, N. Sankarram
E-learning fulfils the thirst of knowledge and offers online content that can be delivered for the learner at anywhere, anytime and any age through a wide range of e-learning solution while compared with traditional learning system. It also provides the rapid access to specific knowledge and information. With the rapid growth of voluminous information sources and the time constraint the learning methodology has changed. Learners obtain knowledge through e-Learning systems rather than manually teaching and learning. In this research paper proposes the e-learning management system with web services oriented frame work and SOA. This system supports the cross browser and fully integrated with different databases. This system focused around the several features namely Content Management, Content Protection, Learning Management, Delivery Management, Evaluation management, Access Control, etc., and mainly focused on integrated platform needed for e-learning and managements.
与传统学习系统相比,电子学习通过广泛的电子学习解决方案,满足了学习者对知识的渴望,并提供了可以在任何地点、任何时间、任何年龄为学习者提供的在线内容。它还提供了对特定知识和信息的快速访问。随着信息量的快速增长和时间的限制,学习方法发生了变化。学习者通过e-Learning系统获取知识,而不是手工教与学。本文提出了一种基于web服务框架和SOA的电子学习管理系统。本系统支持跨浏览器,并与不同的数据库充分集成。本系统围绕内容管理、内容保护、学习管理、交付管理、评价管理、访问控制等几个功能,重点开发了电子学习与管理所需的集成平台。
{"title":"e-Learning management system using web services","authors":"N. Partheeban, N. Sankarram","doi":"10.1109/ICICES.2014.7033900","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033900","url":null,"abstract":"E-learning fulfils the thirst of knowledge and offers online content that can be delivered for the learner at anywhere, anytime and any age through a wide range of e-learning solution while compared with traditional learning system. It also provides the rapid access to specific knowledge and information. With the rapid growth of voluminous information sources and the time constraint the learning methodology has changed. Learners obtain knowledge through e-Learning systems rather than manually teaching and learning. In this research paper proposes the e-learning management system with web services oriented frame work and SOA. This system supports the cross browser and fully integrated with different databases. This system focused around the several features namely Content Management, Content Protection, Learning Management, Delivery Management, Evaluation management, Access Control, etc., and mainly focused on integrated platform needed for e-learning and managements.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89280987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Review on fault tolerance with minimal topology changes in WSAN WSAN中最小拓扑变化的容错研究进展
Nisha M. Katre, M. Madankar
Wireless sensor and actor networks employ actor nodes within the wireless sensor network (WSN) which can process the sensed data and perform certain actions. For best response Inter-actor coordination is required. The employed actors should form and maintain a connected inter-actor network at the times. WSANs often operate in harsh environments where actors can easily fail or may get damaged. This kind of failures can partition the inter-actor network and thus eventually make the network useless. In order to handle such failures, one of the effective recovery methodologies is to autonomously reposition a subset of the sensor nodes to restore the connectivity. Generally the Contemporary recovery schemes either impose high node relocation overhead or extend some of the inter-actor data paths. Here an overview of such kinds of different fault tolerance algorithms is provided.
无线传感器和行动者网络在无线传感器网络(WSN)中使用行动者节点,这些节点可以处理被感知的数据并执行某些动作。为了作出最佳反应,需要行动者之间的协调。被雇佣的行为者应该在这个时代形成并保持一个相互联系的行为者网络。wsan通常在恶劣的环境中运行,在这种环境中,参与者很容易发生故障或损坏。这种故障会导致参与者间网络的分裂,最终导致网络失效。为了处理此类故障,一种有效的恢复方法是自主重新定位传感器节点子集以恢复连接。一般来说,当代恢复方案要么增加了很高的节点重新定位开销,要么扩展了一些交互参与者数据路径。这里概述了这类不同的容错算法。
{"title":"Review on fault tolerance with minimal topology changes in WSAN","authors":"Nisha M. Katre, M. Madankar","doi":"10.1109/ICICES.2014.7034192","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034192","url":null,"abstract":"Wireless sensor and actor networks employ actor nodes within the wireless sensor network (WSN) which can process the sensed data and perform certain actions. For best response Inter-actor coordination is required. The employed actors should form and maintain a connected inter-actor network at the times. WSANs often operate in harsh environments where actors can easily fail or may get damaged. This kind of failures can partition the inter-actor network and thus eventually make the network useless. In order to handle such failures, one of the effective recovery methodologies is to autonomously reposition a subset of the sensor nodes to restore the connectivity. Generally the Contemporary recovery schemes either impose high node relocation overhead or extend some of the inter-actor data paths. Here an overview of such kinds of different fault tolerance algorithms is provided.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89357907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Overview of data backup and disaster recovery in cloud 云数据备份与容灾概述
S. Suguna, A. Suhasini
Today, in every organization are generated in large volume of data in electronic format that required the safety storage services. Data backup and Disaster Recovery / Business Continuity issues are becoming fundamental in networks since the importance and societal value of digital data is continuously increasing. Every organization requires a business continuity plan (BCP) or disaster recovery plan (DRP) and data backup which falls within the cost constraints while achieving the target recovery requirements in terms of recovery time objective (RTO) and recovery point objective (RPO). The organizations must identify the probable consequences that can cause disasters and evaluate their impact. There is an obvious need of supporting data for resilience against major failures; in many situations the process of storing backup data is also enforced by the law. The aim of this paper is to overview of various techniques in data backup and disaster recovery systems in the cloud environment.
今天,在每个组织中都产生了大量的电子格式的数据,这就需要安全的存储服务。由于数字数据的重要性和社会价值不断增加,数据备份和灾难恢复/业务连续性问题正在成为网络的基础。每个组织都需要一个业务连续性计划(BCP)或灾难恢复计划(DRP)和数据备份,这些计划在成本限制范围内,同时在恢复时间目标(RTO)和恢复点目标(RPO)方面实现目标恢复需求。组织必须确定可能导致灾难的后果,并评估其影响。显然需要对重大失败的恢复能力提供支持数据;在许多情况下,存储备份数据的过程也是由法律强制执行的。本文的目的是概述各种技术的数据备份和灾难恢复系统在云环境。
{"title":"Overview of data backup and disaster recovery in cloud","authors":"S. Suguna, A. Suhasini","doi":"10.1109/ICICES.2014.7033804","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033804","url":null,"abstract":"Today, in every organization are generated in large volume of data in electronic format that required the safety storage services. Data backup and Disaster Recovery / Business Continuity issues are becoming fundamental in networks since the importance and societal value of digital data is continuously increasing. Every organization requires a business continuity plan (BCP) or disaster recovery plan (DRP) and data backup which falls within the cost constraints while achieving the target recovery requirements in terms of recovery time objective (RTO) and recovery point objective (RPO). The organizations must identify the probable consequences that can cause disasters and evaluate their impact. There is an obvious need of supporting data for resilience against major failures; in many situations the process of storing backup data is also enforced by the law. The aim of this paper is to overview of various techniques in data backup and disaster recovery systems in the cloud environment.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87334091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
ASIC implementation of high speed pipelined DDR SDRAM controller ASIC实现的高速流水线DDR SDRAM控制器
N. S. Reddy, Ganesh Chokkakula, Bhumarapu Devendra, K. Sivasankaran
Modern real-time embedded system must support multiple concurrently running applications. Double Data Rate Synchronous DRAM (DDR SDRAM) became mainstream choice in designing memories due to its burst access, speed and pipeline features. Synchronous dynamic access memory is designed to support DDR transferring. To achieve the correctness of different applications and system work as to be intended, the memory controller must be configured with pipelined design for multiple operations without delay. The main function of DDR SDRAM is to double the bandwidth of the memory by transferring data (either read operation or write operation) twice per cycle on both the falling and raising edges of the clock signal. The designed DDR Controller generates the control signals as synchronous command interface between the DRAM Memory and other modules. The DDR SDRAM controller supports data width of 64 bits and Burst Length of 4 and CAS (Column Address Strobe) latency of 2 and in this pipelined SRAM controller design, improvement of 28.57% is achieved in performance of memory accessing. The architecture is designed in Modelsim AlTERA STARTER EDITION 6.5b and Cadence (RTL complier and encounter).
现代实时嵌入式系统必须支持多个应用并发运行。双数据速率同步DRAM (DDR SDRAM)由于其突发访问、速度和流水线特性而成为存储器设计的主流选择。同步动态存取存储器是为支持DDR传输而设计的。为了实现不同应用程序和系统工作的正确性,内存控制器必须配置为流水线设计,以便无延迟地进行多个操作。DDR SDRAM的主要功能是通过在时钟信号的下降沿和上升沿上每个周期两次传输数据(无论是读操作还是写操作)来使内存的带宽翻倍。所设计的DDR控制器产生控制信号,作为DRAM存储器与其他模块之间的同步命令接口。DDR SDRAM控制器支持64位的数据宽度和4位的突发长度,以及2位的CAS (Column Address Strobe)延迟,在这种流水线SRAM控制器设计中,存储器访问性能提高了28.57%。该架构是在Modelsim AlTERA STARTER EDITION 6.5b和Cadence (RTL编译器和encounter)中设计的。
{"title":"ASIC implementation of high speed pipelined DDR SDRAM controller","authors":"N. S. Reddy, Ganesh Chokkakula, Bhumarapu Devendra, K. Sivasankaran","doi":"10.1109/ICICES.2014.7033980","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033980","url":null,"abstract":"Modern real-time embedded system must support multiple concurrently running applications. Double Data Rate Synchronous DRAM (DDR SDRAM) became mainstream choice in designing memories due to its burst access, speed and pipeline features. Synchronous dynamic access memory is designed to support DDR transferring. To achieve the correctness of different applications and system work as to be intended, the memory controller must be configured with pipelined design for multiple operations without delay. The main function of DDR SDRAM is to double the bandwidth of the memory by transferring data (either read operation or write operation) twice per cycle on both the falling and raising edges of the clock signal. The designed DDR Controller generates the control signals as synchronous command interface between the DRAM Memory and other modules. The DDR SDRAM controller supports data width of 64 bits and Burst Length of 4 and CAS (Column Address Strobe) latency of 2 and in this pipelined SRAM controller design, improvement of 28.57% is achieved in performance of memory accessing. The architecture is designed in Modelsim AlTERA STARTER EDITION 6.5b and Cadence (RTL complier and encounter).","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86967933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An empirical study of test cases in software testing 软件测试中测试用例的实证研究
Navnath Shete, Avinash Jadhav
Software is a set of instructions executed by a computer which are designed to perform a particular task. Software Development Life Cycle is used to develop the software. Software Testing is the important phase of software development life cycle (SDLC). Software testing is a part of SDLC. Testing fulfills the customer's requirement. In addition to that testing process finds and removes the bugs of the software. Developing organization tries to show that the software they developing is quality software and process used to develop as well as to test software are quality processes. To test any software, tester writes test cases based on Software Requirement Specification (SRS). SRS contain all the functional and non-functional requirements of the software. Individual component (Unit) requirement specifications are written in detail. Test engineer and / or Tester used SRS to write test cases. Test cases are used to test the software thoroughly in manual testing. All small loop holes of the software could be identified by test cases. This paper focus on the significance of test cases and their role to test software used in IT industries. The researcher has concluded that without test cases testing would not be possible.
软件是计算机为执行特定任务而设计的一组指令。采用软件开发生命周期法对软件进行开发。软件测试是软件开发生命周期(SDLC)的重要阶段。软件测试是SDLC的一部分。测试满足了客户的需求。除此之外,测试过程还可以发现并消除软件中的错误。开发组织试图表明他们开发的软件是质量软件,用于开发和测试软件的过程是质量过程。为了测试任何软件,测试人员根据软件需求规范(SRS)编写测试用例。SRS包含软件的所有功能和非功能需求。详细编写了单个组件(单元)需求规范。测试工程师和/或测试人员使用SRS编写测试用例。在手工测试中,测试用例用于对软件进行彻底的测试。软件的所有小漏洞都可以通过测试用例识别出来。本文主要讨论了测试用例的意义以及测试用例在IT行业测试软件中的作用。研究者已经得出结论,没有测试用例,测试是不可能的。
{"title":"An empirical study of test cases in software testing","authors":"Navnath Shete, Avinash Jadhav","doi":"10.1109/ICICES.2014.7033883","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033883","url":null,"abstract":"Software is a set of instructions executed by a computer which are designed to perform a particular task. Software Development Life Cycle is used to develop the software. Software Testing is the important phase of software development life cycle (SDLC). Software testing is a part of SDLC. Testing fulfills the customer's requirement. In addition to that testing process finds and removes the bugs of the software. Developing organization tries to show that the software they developing is quality software and process used to develop as well as to test software are quality processes. To test any software, tester writes test cases based on Software Requirement Specification (SRS). SRS contain all the functional and non-functional requirements of the software. Individual component (Unit) requirement specifications are written in detail. Test engineer and / or Tester used SRS to write test cases. Test cases are used to test the software thoroughly in manual testing. All small loop holes of the software could be identified by test cases. This paper focus on the significance of test cases and their role to test software used in IT industries. The researcher has concluded that without test cases testing would not be possible.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90761894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improvements on construction of quasi cyclic irregular non binary LDPC codes 拟循环不规则非二进制LDPC码构造的改进
M. Arulmozhi, M. Anbuselvi
Non Binary Low Density Parity Check (NB-LDPC) codes, a category of LDPC codes have better decoding performance in high order Galois field. A construction method called hierarchically diagonal matrix (HDM) is proposed in this paper. The constructed HDM is analyzed for IEEE 802.11 n specification of code length 648, rate 1/2 over GF (4). Codes constructed based on the hierarchical matrix perform well over the AWGN channel with FFT based sum product iterative decoding (FFT-SPA) algorithm. The computation complexity of the HDM is analyzed. The average number of multiplications and additions involved in the HDM of check node unit and variable node unit has reduced to 62% and 48% when compared with random matrix.
非二进制低密度奇偶校验码(Non Binary Low Density Parity Check, NB-LDPC)是一类在高阶伽罗瓦域具有较好译码性能的LDPC码。本文提出了一种分层对角矩阵的构造方法。对编码长度为648、速率为1/2 / GF(4)的IEEE 802.11 n规范所构造的HDM进行了分析。基于层次矩阵构造的编码在基于FFT的和积迭代译码(FFT- spa)算法的AWGN信道上表现良好。分析了HDM的计算复杂度。与随机矩阵相比,检查节点单元和可变节点单元的HDM中涉及的平均乘法和加法次数分别减少到62%和48%。
{"title":"Improvements on construction of quasi cyclic irregular non binary LDPC codes","authors":"M. Arulmozhi, M. Anbuselvi","doi":"10.1109/ICICES.2014.7034108","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034108","url":null,"abstract":"Non Binary Low Density Parity Check (NB-LDPC) codes, a category of LDPC codes have better decoding performance in high order Galois field. A construction method called hierarchically diagonal matrix (HDM) is proposed in this paper. The constructed HDM is analyzed for IEEE 802.11 n specification of code length 648, rate 1/2 over GF (4). Codes constructed based on the hierarchical matrix perform well over the AWGN channel with FFT based sum product iterative decoding (FFT-SPA) algorithm. The computation complexity of the HDM is analyzed. The average number of multiplications and additions involved in the HDM of check node unit and variable node unit has reduced to 62% and 48% when compared with random matrix.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89996289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic placement of virtualized resources for data centers in cloud 云数据中心虚拟化资源的动态布局
S. Usmin, M. A. Irudayaraja, U. Muthaiah
Cloud Data Centers provides a range of solutions for systems deployment and operation. It is used to provide hosted applications for a third party to offer services to their customers by multiplexing server resources. Virtualization creates a virtual version of the resources by dividing the execution units into one or more execution units. In this paper, we present an approach that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers actively used. The resource allocation problem can be modeled as the bin packing problem where each server is a bin and each virtual machine is the item to be packed. Virtualization technology makes it easy to move running application across physical machines without any interruption. We abstract this as a variant of the relaxed classical on-line bin packing problem and develop a practical, efficient algorithm that works well in a real system according to Service Level Agreements. We adjust the resources available to each VM both within and across physical servers with memory de-duplication technologies. This can be used to adjust the VM layout for load balancing and energy saving purpose. Extensive simulation and experiment results demonstrate that our system achieves good performance compared to the existing work.
云数据中心为系统的部署和运营提供了一系列的解决方案。它用于为第三方提供托管应用程序,以便通过多路复用服务器资源向其客户提供服务。虚拟化通过将执行单元划分为一个或多个执行单元来创建资源的虚拟版本。在本文中,我们提出了一种利用虚拟化技术根据应用需求动态分配数据中心资源的方法,并通过优化活跃使用的服务器数量来支持绿色计算。资源分配问题可以建模为装箱问题,其中每个服务器都是一个箱子,每个虚拟机都是要打包的项目。虚拟化技术可以轻松地跨物理机器移动正在运行的应用程序,而不会造成任何中断。我们将其抽象为经典的松弛在线装箱问题的一个变体,并根据服务水平协议开发了一个实用、高效的算法,该算法在实际系统中运行良好。我们通过内存重复删除技术调整物理服务器内部和跨物理服务器的每个VM可用的资源。通过调整虚拟机布局,达到负载均衡和节能的目的。大量的仿真和实验结果表明,与现有的工作相比,我们的系统取得了良好的性能。
{"title":"Dynamic placement of virtualized resources for data centers in cloud","authors":"S. Usmin, M. A. Irudayaraja, U. Muthaiah","doi":"10.1109/ICICES.2014.7033745","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033745","url":null,"abstract":"Cloud Data Centers provides a range of solutions for systems deployment and operation. It is used to provide hosted applications for a third party to offer services to their customers by multiplexing server resources. Virtualization creates a virtual version of the resources by dividing the execution units into one or more execution units. In this paper, we present an approach that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers actively used. The resource allocation problem can be modeled as the bin packing problem where each server is a bin and each virtual machine is the item to be packed. Virtualization technology makes it easy to move running application across physical machines without any interruption. We abstract this as a variant of the relaxed classical on-line bin packing problem and develop a practical, efficient algorithm that works well in a real system according to Service Level Agreements. We adjust the resources available to each VM both within and across physical servers with memory de-duplication technologies. This can be used to adjust the VM layout for load balancing and energy saving purpose. Extensive simulation and experiment results demonstrate that our system achieves good performance compared to the existing work.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90068955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sentiment classification using principal component analysis based neural network model 基于主成分分析的神经网络情感分类模型
G. Vinodhini, R. Chandrasekaran
The rapid growth of online social media acts as a medium where people contribute their opinion and emotions as text messages. The messages include reviews and opinions on certain topics such as movie, book, product, politics and so on. Opinion mining refers to the application of natural language processing, computational linguistics, and text mining to identify or classify whether the opinion expressed in text message is positive or negative. Back Propagation Neural Networks is supervised machine learning methods that analyze data and recognize the patterns that are used for classification. This work focuses on binary classification to classify the text sentiment into positive and negative reviews. In this study Principal Component Analysis (PCA) is used to extract the principal components, to be used as predictors and back propagation neural network (BPN) have been employed as a classifier. The performance of PCA+ BPN and BPN without PCA has been compared using Receiver Operating Characteristics (ROC) analysis. The classifier is validated using 10-Fold cross validation. The result shows the effectiveness of BPN with PCA used as a feature reduction method for text sentiment classification.
快速发展的在线社交媒体作为一种媒介,人们通过短信表达自己的观点和情绪。这些信息包括对某些主题的评论和意见,如电影、书籍、产品、政治等。意见挖掘是指应用自然语言处理、计算语言学和文本挖掘技术,对文本信息中表达的意见是积极的还是消极的进行识别或分类。反向传播神经网络是一种有监督的机器学习方法,用于分析数据并识别用于分类的模式。本研究的重点是二元分类,将文本情感分为正面评论和负面评论。本研究采用主成分分析(PCA)提取主成分作为预测因子,并采用反向传播神经网络(BPN)作为分类器。采用受试者工作特征(ROC)分析比较PCA+ BPN和不加PCA的BPN的性能。分类器使用10-Fold交叉验证进行验证。结果表明,BPN结合PCA作为文本情感分类的特征约简方法是有效的。
{"title":"Sentiment classification using principal component analysis based neural network model","authors":"G. Vinodhini, R. Chandrasekaran","doi":"10.1109/ICICES.2014.7033961","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033961","url":null,"abstract":"The rapid growth of online social media acts as a medium where people contribute their opinion and emotions as text messages. The messages include reviews and opinions on certain topics such as movie, book, product, politics and so on. Opinion mining refers to the application of natural language processing, computational linguistics, and text mining to identify or classify whether the opinion expressed in text message is positive or negative. Back Propagation Neural Networks is supervised machine learning methods that analyze data and recognize the patterns that are used for classification. This work focuses on binary classification to classify the text sentiment into positive and negative reviews. In this study Principal Component Analysis (PCA) is used to extract the principal components, to be used as predictors and back propagation neural network (BPN) have been employed as a classifier. The performance of PCA+ BPN and BPN without PCA has been compared using Receiver Operating Characteristics (ROC) analysis. The classifier is validated using 10-Fold cross validation. The result shows the effectiveness of BPN with PCA used as a feature reduction method for text sentiment classification.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90304065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of security issues and their solutions in wireless LAN 无线局域网安全问题分析及解决方案
Prashant Singh, Mayank Mishra, P. N. Barwal
This paper begins by introducing the concept of wireless LAN (WLAN). The introductory section gives brief information on the WLAN components and its architecture. In order to examine the WLAN security threats, this paper will look at both active & passive attacks. The paper will then explain the security & flaws of legacy IEEE802.11 WLAN standards. This situation leads to further research regarding practical solutions in implementing a more secured WLAN. This paper will also cover the new standards to improve the security of WLAN such as the IEEE 802. lx standard, which comprises of three separated sections: Point-to-Point Protocol (PPP), Extensible Authentication Protocol (EAP) and 802. lx itself. Then the paper look for a newly proposed standard i.e. 802.11Î for key distribution and encryption that will play a big role in improving the overall security capabilities of current and future WLAN networks. Finally, this paper ends with the conclusion of highlighted issues and solutions.
本文首先介绍无线局域网(WLAN)的概念。介绍部分简要介绍了WLAN组件及其体系结构。为了研究无线局域网的安全威胁,本文将研究主动和被动攻击。然后,本文将解释传统IEEE802.11 WLAN标准的安全性和缺陷。这种情况导致了对实现更安全的WLAN的实际解决方案的进一步研究。本文还将介绍提高无线局域网安全性的新标准,如IEEE 802。它由三个独立的部分组成:点对点协议(PPP)、可扩展身份验证协议(EAP)和802。lx本身。在此基础上,提出了一种新的密钥分发和加密标准,即802.11Î,它将在提高当前和未来WLAN网络的整体安全能力方面发挥重要作用。最后,对本文的重点问题和解决方案进行了总结。
{"title":"Analysis of security issues and their solutions in wireless LAN","authors":"Prashant Singh, Mayank Mishra, P. N. Barwal","doi":"10.1109/ICICES.2014.7033871","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033871","url":null,"abstract":"This paper begins by introducing the concept of wireless LAN (WLAN). The introductory section gives brief information on the WLAN components and its architecture. In order to examine the WLAN security threats, this paper will look at both active & passive attacks. The paper will then explain the security & flaws of legacy IEEE802.11 WLAN standards. This situation leads to further research regarding practical solutions in implementing a more secured WLAN. This paper will also cover the new standards to improve the security of WLAN such as the IEEE 802. lx standard, which comprises of three separated sections: Point-to-Point Protocol (PPP), Extensible Authentication Protocol (EAP) and 802. lx itself. Then the paper look for a newly proposed standard i.e. 802.11Î for key distribution and encryption that will play a big role in improving the overall security capabilities of current and future WLAN networks. Finally, this paper ends with the conclusion of highlighted issues and solutions.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76963064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Non-intrusive bit swapping pattern generator for BIST testing of LUTs 用于lut测试的非侵入式位交换模式发生器
G. Devi Prasanna, P. Abinaya, J. Poornimasre
This paper presents the non-intrusive built-in self-test system (BIST) for the test pattern generator (TPG) and output response analyzer (ORA) for testing of the field programmable gate array (FPGA). It consists of software and hardware parts with channels in between them to establish communication. The test generation and the response analysis are done in the software part whereas the hardware part is the circuit under test. Another FPGA is used to perform the interfacing operation. The configuration numbers are greatly reduced in this technique when compared with the embedded BIST technique. By incorporating bit-swapping linear feedback shift register (BS-LFSR) as the TPG instead of the conventional LFSR, transition numbers are reduced effectively. Hence the overall switching activity is reduced during the test operation, minimizing the power.
针对现场可编程门阵列(FPGA)的测试模式发生器(TPG)和输出响应分析仪(ORA),提出了一种非侵入式内置自检系统(BIST)。它由软件和硬件部分组成,它们之间有通道来建立通信。测试生成和响应分析在软件部分完成,而硬件部分是被测电路。另一个FPGA用于执行接口操作。与嵌入式BIST技术相比,该技术大大减少了配置数。通过将交换位线性反馈移位寄存器(BS-LFSR)作为TPG代替传统的LFSR,有效地减少了跃迁数。因此,在测试操作期间,总体开关活动减少,使功率最小化。
{"title":"Non-intrusive bit swapping pattern generator for BIST testing of LUTs","authors":"G. Devi Prasanna, P. Abinaya, J. Poornimasre","doi":"10.1109/ICICES.2014.7034030","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034030","url":null,"abstract":"This paper presents the non-intrusive built-in self-test system (BIST) for the test pattern generator (TPG) and output response analyzer (ORA) for testing of the field programmable gate array (FPGA). It consists of software and hardware parts with channels in between them to establish communication. The test generation and the response analysis are done in the software part whereas the hardware part is the circuit under test. Another FPGA is used to perform the interfacing operation. The configuration numbers are greatly reduced in this technique when compared with the embedded BIST technique. By incorporating bit-swapping linear feedback shift register (BS-LFSR) as the TPG instead of the conventional LFSR, transition numbers are reduced effectively. Hence the overall switching activity is reduced during the test operation, minimizing the power.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75031729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1