首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
Document grouping with concept based discriminative analysis and feature partition 基于概念判别分析和特征划分的文档分组
S. Kajapriya, K. N. Vimal Shankar
Clustering is one of the most important techniques in machine learning and data mining responsibilities. Similar documents are grouped by performing clustering techniques. Similarity measure is used to determine transaction associations. Hierarchical clustering method produces tree structured results. Partition based clustering model produces the results in grid format. Text documents are formless data values with high dimensional attributes. Document clustering group the unlabeled text documents into meaningful clusters. Traditionally clustering methods need cluster count (K) before the document grouping process. Clustering accuracy decreases drastically with reference to the unsuitable cluster count. Document word features are automatically partitioned into two groups discriminative words and non-discriminative words. But only discriminative words are useful for grouping documents. The contribution of nondiscriminative words confuses the clustering process and leads to poor cluster solutions. The variational inference algorithm is used to infer the document collection structure and partition of document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition documents. DPM clustering model utilizes both the data likelihood and the clustering property of the Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to discover the latent cluster structure based on the DPM model. DPMFP clustering model is performed without requiring the no. of clusters as input. The Discriminative word identification process is enhanced with the labeled document analysis mechanism. The concept relationships are analyzed with Ontology support. Semantic weight analysis is used for the document similarity measure. This method increases the scalability with the support of labels and concept relations for dimensionality cutback process.
聚类是机器学习和数据挖掘中最重要的技术之一。通过执行聚类技术对类似文档进行分组。相似性度量用于确定事务关联。分层聚类方法产生树状结构的结果。基于分区的聚类模型以网格格式生成结果。文本文档是具有高维属性的无格式数据值。文档聚类将未标记的文本文档分组到有意义的簇中。传统的聚类方法需要在文档分组之前进行聚类计数(K)。不合适的聚类数量会使聚类精度急剧下降。将文档词特征自动划分为判别词和非判别词两组。但是,只有区别词对文档分组有用。非判别词的贡献混淆了聚类过程,导致了较差的聚类解决方案。采用变分推理算法对文档集合结构进行推理,同时对文档词进行划分。采用Dirichlet过程混合(DPM)模型对文档进行划分。DPM聚类模型同时利用了Dirichlet过程(DP)的数据似然和聚类特性。基于Dirichlet过程混合特征划分模型(Dirichlet Process Mixture Model for Feature Partition, DPMFP)发现潜在聚类结构。DPMFP聚类模型的执行不需要no。簇作为输入。通过标记文档分析机制,增强了判别词识别过程。在本体支持下,对概念关系进行了分析。语义权重分析用于文档相似度度量。该方法在维数裁剪过程的标签和概念关系支持下,提高了可扩展性。
{"title":"Document grouping with concept based discriminative analysis and feature partition","authors":"S. Kajapriya, K. N. Vimal Shankar","doi":"10.1109/ICICES.2014.7033763","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033763","url":null,"abstract":"Clustering is one of the most important techniques in machine learning and data mining responsibilities. Similar documents are grouped by performing clustering techniques. Similarity measure is used to determine transaction associations. Hierarchical clustering method produces tree structured results. Partition based clustering model produces the results in grid format. Text documents are formless data values with high dimensional attributes. Document clustering group the unlabeled text documents into meaningful clusters. Traditionally clustering methods need cluster count (K) before the document grouping process. Clustering accuracy decreases drastically with reference to the unsuitable cluster count. Document word features are automatically partitioned into two groups discriminative words and non-discriminative words. But only discriminative words are useful for grouping documents. The contribution of nondiscriminative words confuses the clustering process and leads to poor cluster solutions. The variational inference algorithm is used to infer the document collection structure and partition of document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition documents. DPM clustering model utilizes both the data likelihood and the clustering property of the Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to discover the latent cluster structure based on the DPM model. DPMFP clustering model is performed without requiring the no. of clusters as input. The Discriminative word identification process is enhanced with the labeled document analysis mechanism. The concept relationships are analyzed with Ontology support. Semantic weight analysis is used for the document similarity measure. This method increases the scalability with the support of labels and concept relations for dimensionality cutback process.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79701237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrity vérification of medical images using blind forensic method 用盲法鉴定医学图像的完整性
S. Govarthini, M. Vadivel
Digital images have been used in emerging applications, where their authenticity is quite importance. This proves to be problematic due to the widespread availability of digital image editing software. As a result, there is a great need for the development of reliable techniques for verifying the integrity of digital images. In this paper, we propose a novel technique based on blind forensic method to attest the image authenticity. This paper presents the efficient method of digital blind forensics within the medical imaging field with the objective to detect whether an image has been modified by some processing. It compares two image features: the histogram statistics of reorganized block-based discrete cosine transform coefficients, originally proposed for steganalysis purposes, and the histogram statistics of reorganized block-based Tchebichef moments. Both features serve as input of a set of support vector machine classifiers built in order to discriminate tampered images from original ones as well as to identify the nature of the global modification.
数字图像已被用于新兴应用,其真实性是相当重要的。由于数字图像编辑软件的广泛可用性,这证明是有问题的。因此,非常需要开发可靠的技术来验证数字图像的完整性。本文提出了一种基于盲法的图像真实性验证方法。本文提出了一种有效的医学成像领域数字盲取证方法,目的是检测图像是否经过某些处理而被修改。它比较了两种图像特征:基于重组块的离散余弦变换系数的直方图统计,最初是为了隐写分析而提出的,以及基于重组块的切比切夫矩的直方图统计。这两个特征都作为一组支持向量机分类器的输入,这些分类器是为了区分篡改图像和原始图像以及识别全局修改的性质而构建的。
{"title":"Integrity vérification of medical images using blind forensic method","authors":"S. Govarthini, M. Vadivel","doi":"10.1109/ICICES.2014.7034064","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034064","url":null,"abstract":"Digital images have been used in emerging applications, where their authenticity is quite importance. This proves to be problematic due to the widespread availability of digital image editing software. As a result, there is a great need for the development of reliable techniques for verifying the integrity of digital images. In this paper, we propose a novel technique based on blind forensic method to attest the image authenticity. This paper presents the efficient method of digital blind forensics within the medical imaging field with the objective to detect whether an image has been modified by some processing. It compares two image features: the histogram statistics of reorganized block-based discrete cosine transform coefficients, originally proposed for steganalysis purposes, and the histogram statistics of reorganized block-based Tchebichef moments. Both features serve as input of a set of support vector machine classifiers built in order to discriminate tampered images from original ones as well as to identify the nature of the global modification.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79887808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proportional equal throughput scheduler — A very fair scheduling approach in LTE downlink 比例等吞吐量调度程序- LTE下行链路中非常公平的调度方法
S. Sudheep, B. Rebekka
Scheduling allots the frequency and time resources of the LTE network to the users based on certain algorithms. The aim of an efficient fair scheduling is to provide the radio resources such that all the users are serviced almost equally over time without reducing the average user throughput. In this paper a fair scheduling algorithm named Blind Equal Throughput is modified and tested in different user conditions and a new scheduling scheme named Proportional Equal Throughput (PET) is developed which offers better fairness among users without reducing average user throughput, in comparison with other scheduling algorithms.
调度是将LTE网络的频率和时间资源按照一定的算法分配给用户。有效的公平调度的目标是提供无线电资源,使所有用户在不降低平均用户吞吐量的情况下几乎平等地获得服务。本文对盲等吞吐量公平调度算法进行了改进,并在不同的用户条件下进行了测试,提出了一种新的比例等吞吐量调度算法,与其他调度算法相比,该算法在不降低用户平均吞吐量的前提下提供了更好的用户间公平性。
{"title":"Proportional equal throughput scheduler — A very fair scheduling approach in LTE downlink","authors":"S. Sudheep, B. Rebekka","doi":"10.1109/ICICES.2014.7034111","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034111","url":null,"abstract":"Scheduling allots the frequency and time resources of the LTE network to the users based on certain algorithms. The aim of an efficient fair scheduling is to provide the radio resources such that all the users are serviced almost equally over time without reducing the average user throughput. In this paper a fair scheduling algorithm named Blind Equal Throughput is modified and tested in different user conditions and a new scheduling scheme named Proportional Equal Throughput (PET) is developed which offers better fairness among users without reducing average user throughput, in comparison with other scheduling algorithms.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84110968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Smart shopping cart with automatic billing system through RFID and ZigBee 智能购物车,通过RFID和ZigBee自动计费系统
Mr P Chandrasekar, Ms T Sangeetha
Contemporary embedded systems are habitually based on microcontroller's i.e. CPUs in the company of integrated memory as well as peripheral interfaces but ordinary microprocessors by means of external chips for memory and peripheral interface circuits are also still common, especially in more complex systems. Radio frequency identification (RFID) technology may not only be useful for streamlining inventory and supply chains: it could also make shoppers swarm. ZigBee is based on an IEEE 802.15 standard. ZigBee devices often transmit data over longer distances by passing data through intermediate devices to reach more distant ones, creating a mesh network; i.e., a network with no centralized control or high-power transmitter/receiver able to reach all of the networked devices. This paper provides centralized and automated billing system using RFID and ZigBee communication. Each product of shopping mall, super markets will be provided with a RFID tag, to identify its type. Each shopping cart is designed or implemented with a Product Identification Device (PID) that contains microcontroller, LCD, an RFID reader, EEPROM, and ZigBee module. Purchasing product information will be read through a RFID reader on shopping cart, mean while product information will be stored into EEPROM attached to it and EEPROM data will be send to Central Billing System through ZigBee module. The central billing system gets the cart information and EEPROM data, it access the product database and calculates the total amount of purchasing for that particular cart. Main aim of this paper was to provide an automatic billing to avoid queue in malls and super markets.
当代嵌入式系统通常基于微控制器,即集成存储器和外围接口的cpu,但普通微处理器通过外部存储器芯片和外围接口电路也很常见,特别是在更复杂的系统中。无线射频识别(RFID)技术不仅可以简化库存和供应链,还可以吸引购物者。ZigBee基于IEEE 802.15标准。ZigBee设备通常通过中间设备将数据传递到更远的设备,从而形成网状网络,从而在更长的距离上传输数据;也就是说,一个没有集中控制或能够到达所有联网设备的大功率发射机/接收机的网络。本文提出了一种采用RFID和ZigBee通信的集中自动化计费系统。商场、超市的每件产品都会配备RFID标签,以识别其类型。每个购物车都设计或实现了一个产品识别设备(PID),其中包含微控制器、LCD、RFID读取器、EEPROM和ZigBee模块。通过购物车上的RFID读取器读取采购产品信息,同时将产品信息存储到购物车附带的EEPROM中,EEPROM数据通过ZigBee模块发送到中央计费系统。中央计费系统获取购物车信息和EEPROM数据,它访问产品数据库并计算该特定购物车的总购买金额。本文的主要目的是为避免商场和超市排队提供一种自动计费系统。
{"title":"Smart shopping cart with automatic billing system through RFID and ZigBee","authors":"Mr P Chandrasekar, Ms T Sangeetha","doi":"10.1109/ICICES.2014.7033996","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033996","url":null,"abstract":"Contemporary embedded systems are habitually based on microcontroller's i.e. CPUs in the company of integrated memory as well as peripheral interfaces but ordinary microprocessors by means of external chips for memory and peripheral interface circuits are also still common, especially in more complex systems. Radio frequency identification (RFID) technology may not only be useful for streamlining inventory and supply chains: it could also make shoppers swarm. ZigBee is based on an IEEE 802.15 standard. ZigBee devices often transmit data over longer distances by passing data through intermediate devices to reach more distant ones, creating a mesh network; i.e., a network with no centralized control or high-power transmitter/receiver able to reach all of the networked devices. This paper provides centralized and automated billing system using RFID and ZigBee communication. Each product of shopping mall, super markets will be provided with a RFID tag, to identify its type. Each shopping cart is designed or implemented with a Product Identification Device (PID) that contains microcontroller, LCD, an RFID reader, EEPROM, and ZigBee module. Purchasing product information will be read through a RFID reader on shopping cart, mean while product information will be stored into EEPROM attached to it and EEPROM data will be send to Central Billing System through ZigBee module. The central billing system gets the cart information and EEPROM data, it access the product database and calculates the total amount of purchasing for that particular cart. Main aim of this paper was to provide an automatic billing to avoid queue in malls and super markets.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84643055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Developing intellectual patterns in online business to customer interaction with dynamic recommender system 开发在线商务与客户互动的智能模式与动态推荐系统
G. Nalini Priya, K. Murugan, A. Sharmila
Recommender systems are altering from novelties used by a small number of online sites, to grave business tools that are reshaping the world of E-commerce. Numerous sites are already using it to help their customers for finding good products to purchase. In this paper it presents an explanation of how recommender systems help E-commerce sites to increase sales, and analyze business patterns to developer. Based on the system business developer is helpful to build the product according to the customer likes. It create patterns using recommender systems, including the interfaces they present to customers, the technologies used to create the recommendations, and the inputs they need from customers. It concludes with ideas for new applications with recommender systems for business to customer interaction.
推荐系统正在从少数在线网站使用的新奇事物转变为重塑电子商务世界的重要商业工具。许多网站已经在使用它来帮助他们的客户找到好的产品来购买。本文介绍了推荐系统如何帮助电子商务网站增加销售额,并为开发人员分析业务模式。基于系统的业务开发人员可以根据客户的喜好来构建产品。它使用推荐系统创建模式,包括它们呈现给客户的界面、用于创建推荐的技术以及它们需要从客户那里获得的输入。最后,本文提出了一些用于企业与客户交互的推荐系统的新应用程序的想法。
{"title":"Developing intellectual patterns in online business to customer interaction with dynamic recommender system","authors":"G. Nalini Priya, K. Murugan, A. Sharmila","doi":"10.1109/ICICES.2014.7033851","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033851","url":null,"abstract":"Recommender systems are altering from novelties used by a small number of online sites, to grave business tools that are reshaping the world of E-commerce. Numerous sites are already using it to help their customers for finding good products to purchase. In this paper it presents an explanation of how recommender systems help E-commerce sites to increase sales, and analyze business patterns to developer. Based on the system business developer is helpful to build the product according to the customer likes. It create patterns using recommender systems, including the interfaces they present to customers, the technologies used to create the recommendations, and the inputs they need from customers. It concludes with ideas for new applications with recommender systems for business to customer interaction.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84644758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near point monitoring of the ionosphere using dual frequency GPS data over the hydearabad region: A Kalman filter approach 利用双频GPS数据对海德拉巴地区电离层的近点监测:卡尔曼滤波方法
K. V. Reddy, P. Hari Deepak, Lvisweswararao, K. Srividhya, B. S. Srilatha, Indira Dutt
In order to determine the position and attitude in a wide range of applications Global Positioning System is used. One of the utmost interests regarding navigation and positioning areas is the near point monitoring of the ionosphere using dual frequency GPS data. To determine the location and regulate time on the earth's surface through GPS receivers radio signals are broadcasted by the global positioning system (GPS) satellites which enable the receivers. These GPS signals comprehend time and status of entire satellite constellations, ranging signals, navigation messages. GPS provides entire information about positioning thoroughly for twenty four hours a day which covers any part of the world. The main cause of errors for GPS signals is the ionosphere which contains anonymous distribution of electrons which introduces a frequency dependant path delay proportional to the total electron content (TEC) along the signal path. This delay in the atmosphere specifically in ionosphere is due to the existence of electrons. Ionospheric effects can be miniaturized for single frequency GPS receivers via modelling using empirical or physics-based ionospheric models. But due to the dispersive nature of ionosphere in the electromagnetic spectrum the effects are considered for dual frequency GPS receivers. Though the errors likes, clock, orbital, satellite and multipath effects which effect the GPS signals are declined depending on the particular application. In this work we are only concerned with the ionospheric errors in which the ionosphere is modelled by Kalman filter approach and the obtained results are validated using SOPAC web application. To increase the accuracy and reliability of navigation Kalman filters are widely used. Using thin shell approximation of the ionosphere as the basis, ionosphere in the LOS is modelled using Kalman filter. It also contains how ionosphere impacts the GPS signals and about ionospheric TEC observables. Near point monitoring of ionosphere is investigated based on the data of dual frequency GPS receiver of an IGS station, NGRI Hyderabad (lat: 17° 22' 31" N, long: 78° 28' 27" E) which is collected through the web.
为了在广泛的应用中确定位置和姿态,使用了全球定位系统。关于导航和定位领域的最大兴趣之一是使用双频GPS数据对电离层进行近点监测。为了通过全球定位系统(GPS)接收器确定地球表面的位置和调节时间,无线电信号由全球定位系统(GPS)卫星广播,使接收器能够工作。这些GPS信号包括整个卫星星座的时间和状态、测距信号、导航信息。全球定位系统每天24小时提供完整的定位信息,覆盖世界任何地方。GPS信号误差的主要原因是电离层,其中包含电子的匿名分布,这引入了与信号路径上的总电子含量(TEC)成比例的频率相关的路径延迟。这种在大气特别是电离层中的延迟是由于电子的存在。电离层效应可以通过使用经验模型或基于物理的电离层模型来缩小单频GPS接收机的电离层效应。但由于电离层在电磁波谱中的色散特性,对双频GPS接收机考虑了影响。虽然影响GPS信号的时钟、轨道、卫星和多径效应的误差随具体应用而减小。在本文中,我们只关注电离层误差,其中电离层采用卡尔曼滤波方法建模,并使用SOPAC web应用程序对所得结果进行验证。为了提高导航的精度和可靠性,卡尔曼滤波被广泛应用。以电离层的薄壳近似为基础,利用卡尔曼滤波对LOS中的电离层进行了建模。它还包括电离层如何影响GPS信号和电离层TEC观测。利用NGRI Hyderabad IGS站(北纬17°22′31”N,东经78°28′27”E)双频GPS接收机通过网络采集的数据,对电离层近点监测进行了研究。
{"title":"Near point monitoring of the ionosphere using dual frequency GPS data over the hydearabad region: A Kalman filter approach","authors":"K. V. Reddy, P. Hari Deepak, Lvisweswararao, K. Srividhya, B. S. Srilatha, Indira Dutt","doi":"10.1109/ICICES.2014.7034115","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034115","url":null,"abstract":"In order to determine the position and attitude in a wide range of applications Global Positioning System is used. One of the utmost interests regarding navigation and positioning areas is the near point monitoring of the ionosphere using dual frequency GPS data. To determine the location and regulate time on the earth's surface through GPS receivers radio signals are broadcasted by the global positioning system (GPS) satellites which enable the receivers. These GPS signals comprehend time and status of entire satellite constellations, ranging signals, navigation messages. GPS provides entire information about positioning thoroughly for twenty four hours a day which covers any part of the world. The main cause of errors for GPS signals is the ionosphere which contains anonymous distribution of electrons which introduces a frequency dependant path delay proportional to the total electron content (TEC) along the signal path. This delay in the atmosphere specifically in ionosphere is due to the existence of electrons. Ionospheric effects can be miniaturized for single frequency GPS receivers via modelling using empirical or physics-based ionospheric models. But due to the dispersive nature of ionosphere in the electromagnetic spectrum the effects are considered for dual frequency GPS receivers. Though the errors likes, clock, orbital, satellite and multipath effects which effect the GPS signals are declined depending on the particular application. In this work we are only concerned with the ionospheric errors in which the ionosphere is modelled by Kalman filter approach and the obtained results are validated using SOPAC web application. To increase the accuracy and reliability of navigation Kalman filters are widely used. Using thin shell approximation of the ionosphere as the basis, ionosphere in the LOS is modelled using Kalman filter. It also contains how ionosphere impacts the GPS signals and about ionospheric TEC observables. Near point monitoring of ionosphere is investigated based on the data of dual frequency GPS receiver of an IGS station, NGRI Hyderabad (lat: 17° 22' 31\" N, long: 78° 28' 27\" E) which is collected through the web.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81752068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing the effect of bagged ensemble approach for software fault prediction in class level and package level metrics 从类级和包级度量两方面分析了袋装集成方法在软件故障预测中的效果
A. Shanthini, R. Chandrasekaran
Faults in a module tend to cause failure of the software product. These defective modules in the software pose considerable risk by increasing the developing cost and decreasing the customer satisfaction. Hence in a software development life cycle it is very important to predict the faulty modules in the software product. Prediction of the defective modules should be done as early as possible so as to improve software developers' ability to identify the defect-prone modules and focus quality assurance activities such as testing and inspections on those defective modules. For quality assurance activity, it is important to concentrate on the software metrics. Software metrics play a vital role in measuring the quality of software. Many researchers focused on classification algorithm for predicting the software defect. On the other hand, classifiers ensemble can effectively improve classification performance when compared with a single classifier. This paper mainly addresses using ensemble approach of Support Vector Machine (SVM) for fault prediction. Ensemble classifier was examined for Eclipse Package level dataset and NASA KC1 dataset. We showed that proposed ensemble of Support Vector Machine is superior to individual approach for software fault prediction in terms of classification rate through Root Mean Square Error Rate (RMSE), AUC-ROC, ROC curves.
模块的故障往往会导致软件产品的故障。软件中这些有缺陷的模块增加了开发成本,降低了客户满意度,造成了相当大的风险。因此,在软件开发生命周期中,对软件产品中的故障模块进行预测是非常重要的。对缺陷模块的预测应尽早完成,以提高软件开发人员识别易出现缺陷模块的能力,并将质量保证活动(如测试和检查)集中在这些缺陷模块上。对于质量保证活动,关注软件度量是很重要的。软件度量在度量软件质量方面起着至关重要的作用。软件缺陷预测的分类算法是许多研究者关注的焦点。另一方面,与单个分类器相比,分类器集成可以有效地提高分类性能。本文主要研究了支持向量机集成方法在故障预测中的应用。对Eclipse Package级数据集和NASA KC1数据集进行了集成分类器检验。通过均方根错误率(RMSE)、AUC-ROC、ROC曲线分析表明,支持向量机集成方法在分类率方面优于单个方法。
{"title":"Analyzing the effect of bagged ensemble approach for software fault prediction in class level and package level metrics","authors":"A. Shanthini, R. Chandrasekaran","doi":"10.1109/ICICES.2014.7033809","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033809","url":null,"abstract":"Faults in a module tend to cause failure of the software product. These defective modules in the software pose considerable risk by increasing the developing cost and decreasing the customer satisfaction. Hence in a software development life cycle it is very important to predict the faulty modules in the software product. Prediction of the defective modules should be done as early as possible so as to improve software developers' ability to identify the defect-prone modules and focus quality assurance activities such as testing and inspections on those defective modules. For quality assurance activity, it is important to concentrate on the software metrics. Software metrics play a vital role in measuring the quality of software. Many researchers focused on classification algorithm for predicting the software defect. On the other hand, classifiers ensemble can effectively improve classification performance when compared with a single classifier. This paper mainly addresses using ensemble approach of Support Vector Machine (SVM) for fault prediction. Ensemble classifier was examined for Eclipse Package level dataset and NASA KC1 dataset. We showed that proposed ensemble of Support Vector Machine is superior to individual approach for software fault prediction in terms of classification rate through Root Mean Square Error Rate (RMSE), AUC-ROC, ROC curves.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83706412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Prevention of Sybil attack and priority batch verification in VANETs VANETs中Sybil攻击防范及优先级批量验证
P. Vinoth Kumar, M. Maheshwari
VANET is a form of Mobile Ad-Hoc Network which provides communication between vehicles and road-side base stations. The aim is to provide safety, traffic management, and infotainment services. The security of VANET is in concern state from early time. VANETs face several security threats and there are a number of attacks that can lead to human life loss. Existing VANET systems used detection algorithm to detect the attacks at the verification time in which delay overhead occurred. Batch authenticated and key agreement (ABAKA) scheme is used to authenticate multiple requests sent from different vehicles. Yet it does not provide any priority to the requests from emergency vehicles and a malicious vehicle can send a false message by spoofing the identity of valid vehicles to other vehicles leading to Sybil attack. Priority Batch Verification Algorithm (PBVA) is used to classify the requests obtained from multiple vehicles in order to provide immediate response to emergency vehicles with less time delay. This system also to prevent Sybil attack by restricting timestamps provided by RSU at an early stage itself.
VANET是移动自组织网络的一种形式,它提供车辆和路边基站之间的通信。其目的是提供安全、交通管理和信息娱乐服务。VANET的安全性从一开始就处于令人担忧的状态。vanet面临着几种安全威胁,并且有一些攻击可能导致人命损失。现有的VANET系统采用检测算法在发生延迟开销的验证时间检测攻击。批量认证和密钥协议(ABAKA)方案用于对来自不同车辆的多个请求进行认证。然而,它不能优先处理紧急车辆的请求,恶意车辆可以通过欺骗有效车辆的身份向其他车辆发送虚假信息,从而导致Sybil攻击。采用优先级批量验证算法(PBVA)对多个车辆的请求进行分类,以便以较小的时间延迟向应急车辆提供即时响应。该系统还可以在早期阶段通过限制RSU提供的时间戳来防止Sybil攻击。
{"title":"Prevention of Sybil attack and priority batch verification in VANETs","authors":"P. Vinoth Kumar, M. Maheshwari","doi":"10.1109/ICICES.2014.7033926","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033926","url":null,"abstract":"VANET is a form of Mobile Ad-Hoc Network which provides communication between vehicles and road-side base stations. The aim is to provide safety, traffic management, and infotainment services. The security of VANET is in concern state from early time. VANETs face several security threats and there are a number of attacks that can lead to human life loss. Existing VANET systems used detection algorithm to detect the attacks at the verification time in which delay overhead occurred. Batch authenticated and key agreement (ABAKA) scheme is used to authenticate multiple requests sent from different vehicles. Yet it does not provide any priority to the requests from emergency vehicles and a malicious vehicle can send a false message by spoofing the identity of valid vehicles to other vehicles leading to Sybil attack. Priority Batch Verification Algorithm (PBVA) is used to classify the requests obtained from multiple vehicles in order to provide immediate response to emergency vehicles with less time delay. This system also to prevent Sybil attack by restricting timestamps provided by RSU at an early stage itself.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83990439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A new scalable reactive location based ad hoc routing protocol for VANETs 一种新的可扩展的基于被动位置的自组织路由协议
K. Rajesh, R. Karthick, G. S. Raj
VANETs are used for high-speed, short-range communication among vehicles and vehicle to road side equipments, consistent internet connectivity resulting in improved road safety alerts, accessing comforts and for entertainments. Within VANETs, Vehicle mobility leads to constant breakage of communication links between vehicles. Such link failures require a direct response from the routing protocols in VANETs. This leads to increase the routing overhead in VANET and also reduce network efficiency or scalability. In this paper, we propose a reactive location based ad hoc routing protocol. This routing protocol minimize the routing overhead by using the efficiently make use of all the location information available. This protocol moves to reactive routing as location information degrades. Through analysis and simulation we show that our protocol is efficient in presence of high Location errors in all environments of VANETS.
vanet用于车辆之间以及车辆与路边设备之间的高速短距离通信,一致的互联网连接可改善道路安全警报,获得舒适和娱乐。在VANETs中,车辆的移动性导致车辆之间的通信链路不断中断。这种链路故障需要VANETs路由协议的直接响应。这会增加VANET中的路由开销,也会降低网络效率或可扩展性。本文提出了一种基于响应式位置的自组织路由协议。该路由协议通过有效地利用所有可用的位置信息,使路由开销最小化。当位置信息降级时,该协议转向响应路由。通过分析和仿真表明,该协议在VANETS的所有环境下都具有较高的定位误差。
{"title":"A new scalable reactive location based ad hoc routing protocol for VANETs","authors":"K. Rajesh, R. Karthick, G. S. Raj","doi":"10.1109/ICICES.2014.7033848","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033848","url":null,"abstract":"VANETs are used for high-speed, short-range communication among vehicles and vehicle to road side equipments, consistent internet connectivity resulting in improved road safety alerts, accessing comforts and for entertainments. Within VANETs, Vehicle mobility leads to constant breakage of communication links between vehicles. Such link failures require a direct response from the routing protocols in VANETs. This leads to increase the routing overhead in VANET and also reduce network efficiency or scalability. In this paper, we propose a reactive location based ad hoc routing protocol. This routing protocol minimize the routing overhead by using the efficiently make use of all the location information available. This protocol moves to reactive routing as location information degrades. Through analysis and simulation we show that our protocol is efficient in presence of high Location errors in all environments of VANETS.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83373073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stability analysis of linear discrete time system with time varying delay and actuator saturation 具有时变延迟和执行器饱和的线性离散时间系统稳定性分析
N. Soni, R. Negi
This paper considers the problem of asymptotic stability of linear discrete-time system with interval-like time-varying delay subjected to actuator saturation through anti-windup strategies. By using a delay based Lyapunov function, a new criterion for the asymptotic stability of such system is proposed in terms of linear matrix inequalities (LMIs). The proposed technique is illustrated by means of numerical example.
本文通过反绕组策略研究了一类类区间时变时滞线性离散系统在致动器饱和作用下的渐近稳定性问题。利用基于时滞的Lyapunov函数,用线性矩阵不等式(lmi)给出了该系统渐近稳定性的新判据。最后通过数值算例对该方法进行了说明。
{"title":"Stability analysis of linear discrete time system with time varying delay and actuator saturation","authors":"N. Soni, R. Negi","doi":"10.1109/ICICES.2014.7034055","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034055","url":null,"abstract":"This paper considers the problem of asymptotic stability of linear discrete-time system with interval-like time-varying delay subjected to actuator saturation through anti-windup strategies. By using a delay based Lyapunov function, a new criterion for the asymptotic stability of such system is proposed in terms of linear matrix inequalities (LMIs). The proposed technique is illustrated by means of numerical example.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76368627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1