首页 > 最新文献

9th International Conference on Information Technology (ICIT'06)最新文献

英文 中文
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks 移动Adhoc网络QoS约束自适应路由协议
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.76
Vinod Kone, Sukumar Nandi
The ease of deployment and the infrastructure less nature of mobile ad hoc networks (MANETs) make them highly desirable for the present day multi media communications. Traditional routing protocols may not suffice for real time communications which require QoS support from the network. Though there has been considerable research in this area, most of the routing protocols take into account a single QoS constraint. In this paper, we propose an adaptive distributed routing protocol for MANETs which provides a QoS aware path from a given source to destination. The novelty of the protocol lies in taking multiple QoS constraints into consideration. Admission control and bandwidth reservation schemes are incorporated in the protocol to satisfy the QoS constraints of the applications. Relevant information is stored at the intermediate nodes to achieve the required QoS. The protocol has been simulated on top of IEEE 802.11 MAC, in ns-2 network simulator, to show it's correctness and efficiency.
移动自组织网络(manet)的易于部署和基础设施较少的特性使其非常适合当今的多媒体通信。传统的路由协议可能无法满足需要网络提供QoS支持的实时通信。尽管在这方面已经有了相当多的研究,但大多数路由协议都只考虑单个QoS约束。在本文中,我们提出了一种自适应分布式路由协议,该协议提供了从给定源到目的地的QoS感知路径。该协议的新颖之处在于考虑了多个QoS约束。协议中加入了准入控制和带宽预留方案,以满足应用的QoS约束。将相关信息存储在中间节点,以实现所需的QoS。在ns-2网络模拟器上对该协议进行了基于IEEE 802.11 MAC的仿真,验证了该协议的正确性和有效性。
{"title":"QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks","authors":"Vinod Kone, Sukumar Nandi","doi":"10.1109/ICIT.2006.76","DOIUrl":"https://doi.org/10.1109/ICIT.2006.76","url":null,"abstract":"The ease of deployment and the infrastructure less nature of mobile ad hoc networks (MANETs) make them highly desirable for the present day multi media communications. Traditional routing protocols may not suffice for real time communications which require QoS support from the network. Though there has been considerable research in this area, most of the routing protocols take into account a single QoS constraint. In this paper, we propose an adaptive distributed routing protocol for MANETs which provides a QoS aware path from a given source to destination. The novelty of the protocol lies in taking multiple QoS constraints into consideration. Admission control and bandwidth reservation schemes are incorporated in the protocol to satisfy the QoS constraints of the applications. Relevant information is stored at the intermediate nodes to achieve the required QoS. The protocol has been simulated on top of IEEE 802.11 MAC, in ns-2 network simulator, to show it's correctness and efficiency.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Route Failure Time of Node-Disjoint Paths in Mobile Ad hoc Networks 移动自组网中节点不相交路径的路由失效时间
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.79
A. Abbas
In this paper, we analyze the route failure time of node- disjoint paths in an ad hoc network. We discuss an exact expression for the expected value of route failure time when lifetimes of individual paths are independent and identically distributed random variables. When the lifetimes are not independent, we discuss an upper bound on route failure time. In order to validate the model, we simulate exponentially distributed random variables. The values of route failure time obtained from simulations are close to those obtained analytically.
本文分析了ad hoc网络中节点不相交路径的路由失效时间。讨论了当各路径的生存期为独立的同分布随机变量时,路由失效时间期望值的精确表达式。当生存时间不独立时,讨论了路由失效时间的上界。为了验证模型,我们模拟了指数分布的随机变量。仿真得到的路由失效时间与解析得到的结果接近。
{"title":"Route Failure Time of Node-Disjoint Paths in Mobile Ad hoc Networks","authors":"A. Abbas","doi":"10.1109/ICIT.2006.79","DOIUrl":"https://doi.org/10.1109/ICIT.2006.79","url":null,"abstract":"In this paper, we analyze the route failure time of node- disjoint paths in an ad hoc network. We discuss an exact expression for the expected value of route failure time when lifetimes of individual paths are independent and identically distributed random variables. When the lifetimes are not independent, we discuss an upper bound on route failure time. In order to validate the model, we simulate exponentially distributed random variables. The values of route failure time obtained from simulations are close to those obtained analytically.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126031860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANs 无线局域网实时流量中嗅探和出发MAC协议的性能研究
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.70
Aditya Dhananjay, D. Das
In this paper, we propose Sniff and Embark (Sniff) protocol, a novel frame sniffing and token passing based approach to provide QoS in WLANs. Our simulations show that S^E performs significantly better than EDCF over the performance metrics - delay, jitter and time- constrained frame drop ratio.
本文提出了一种基于帧嗅探和令牌传递的无线局域网QoS协议。我们的仿真结果表明,S^E在延迟、抖动和时间约束的丢帧率等性能指标上明显优于EDCF。
{"title":"Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANs","authors":"Aditya Dhananjay, D. Das","doi":"10.1109/ICIT.2006.70","DOIUrl":"https://doi.org/10.1109/ICIT.2006.70","url":null,"abstract":"In this paper, we propose Sniff and Embark (Sniff) protocol, a novel frame sniffing and token passing based approach to provide QoS in WLANs. Our simulations show that S^E performs significantly better than EDCF over the performance metrics - delay, jitter and time- constrained frame drop ratio.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125349627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Two-stage Fuzzy Clustering of Microarray Gene Expression Data 芯片基因表达数据的高效两阶段模糊聚类
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.49
A. Mukhopadhyay, U. Maulik, S. Bandyopadhyay
This article presents an efficient two-stage clustering method for clustering microarray gene expression time series data. The algorithm is based on the identification of genes having significant membership to multiple classes. A recently proposed variable string length genetic scheme and an iterated version of well known fuzzy C-means algorithm are utilized as the underlying clustering techniques. The performance of the two-stage clustering technique has been compared with the hierarchical clustering algorithms, those are widely used for clustering gene expression data, to prove its effectiveness on some publicly available gene expression data.
本文提出了一种高效的两阶段聚类方法,用于聚类微阵列基因表达时间序列数据。该算法基于对多个类别具有重要隶属关系的基因的识别。采用了最近提出的变字符串长度遗传方案和迭代版的模糊c均值算法作为底层聚类技术。将两阶段聚类技术的性能与广泛用于基因表达数据聚类的层次聚类算法进行了比较,证明了其在一些公开的基因表达数据上的有效性。
{"title":"Efficient Two-stage Fuzzy Clustering of Microarray Gene Expression Data","authors":"A. Mukhopadhyay, U. Maulik, S. Bandyopadhyay","doi":"10.1109/ICIT.2006.49","DOIUrl":"https://doi.org/10.1109/ICIT.2006.49","url":null,"abstract":"This article presents an efficient two-stage clustering method for clustering microarray gene expression time series data. The algorithm is based on the identification of genes having significant membership to multiple classes. A recently proposed variable string length genetic scheme and an iterated version of well known fuzzy C-means algorithm are utilized as the underlying clustering techniques. The performance of the two-stage clustering technique has been compared with the hierarchical clustering algorithms, those are widely used for clustering gene expression data, to prove its effectiveness on some publicly available gene expression data.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122492403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Use of Instance Typicality for Efficient Detection of Outliers with Neural Network Classifiers 利用实例典型化在神经网络分类器中有效检测异常值
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.89
S. Sane, A. Ghatol
Detection of outliers is one of the data pre-processing tasks. In all the applications, outliers need to be detected to enhance the accuracy of the classifiers. Several different techniques, such as statistical, distance-based and deviation-based outlier detection exist to detect outliers. Many of these techniques use filter method. A wrapper method using the concept of instance typicality may also be used to detect outliers. This paper deals with a new wrapper method that builds an initial model using neural networks and treats values at the output of neurons in the output layer as the typicality scores. Instances with lowest output values are treated as potential outliers. In addition, the method is also useful to build compact and accurate classifiers by selecting a few most typical instances resulting in significant reduction in storage space. The method is generic and thus can also be used for instance selection with any kind of classifiers. Resultant compact models are useful for imputation of missing values.
异常值检测是数据预处理任务之一。在所有的应用中,都需要检测异常值以提高分类器的准确性。有几种不同的技术,如统计、基于距离和基于偏差的离群检测,用于检测离群值。这些技术中很多都使用了过滤方法。使用实例典型性概念的包装方法也可用于检测异常值。本文研究了一种新的包装方法,该方法利用神经网络构建初始模型,并将输出层中神经元的输出值作为典型性分数。输出值最低的实例被视为潜在的异常值。此外,该方法还可以通过选择几个最典型的实例来构建紧凑和准确的分类器,从而显著减少存储空间。该方法是通用的,因此也可用于与任何类型的分类器进行实例选择。所得到的紧凑模型对于缺失值的输入是有用的。
{"title":"Use of Instance Typicality for Efficient Detection of Outliers with Neural Network Classifiers","authors":"S. Sane, A. Ghatol","doi":"10.1109/ICIT.2006.89","DOIUrl":"https://doi.org/10.1109/ICIT.2006.89","url":null,"abstract":"Detection of outliers is one of the data pre-processing tasks. In all the applications, outliers need to be detected to enhance the accuracy of the classifiers. Several different techniques, such as statistical, distance-based and deviation-based outlier detection exist to detect outliers. Many of these techniques use filter method. A wrapper method using the concept of instance typicality may also be used to detect outliers. This paper deals with a new wrapper method that builds an initial model using neural networks and treats values at the output of neurons in the output layer as the typicality scores. Instances with lowest output values are treated as potential outliers. In addition, the method is also useful to build compact and accurate classifiers by selecting a few most typical instances resulting in significant reduction in storage space. The method is generic and thus can also be used for instance selection with any kind of classifiers. Resultant compact models are useful for imputation of missing values.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach 移动自组织网络中的入侵检测:一种移动代理方法
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.62
Upinder Kaur, R. B. Patel
In this paper we have presented design and implementation of a prototype for intrusion detection using mobile agents (MAs) in mobile ad hoc networks (MANETs). In this prototype each node runs intrusion detection system locally and equally cooperates with other intrusion detection systems running on other nodes. The proposed prototype is implemented and validated on PMADE (Platform for MA Distribution and Execution).
在本文中,我们提出了在移动自组织网络(manet)中使用移动代理(MAs)进行入侵检测的原型的设计和实现。在该原型中,每个节点都在本地运行入侵检测系统,并与运行在其他节点上的其他入侵检测系统进行平等的协作。提出的原型在pmake (MA分发和执行平台)上实现和验证。
{"title":"Intrusion Detection in Mobile Ad-Hoc Networks: A Mobile Agent Approach","authors":"Upinder Kaur, R. B. Patel","doi":"10.1109/ICIT.2006.62","DOIUrl":"https://doi.org/10.1109/ICIT.2006.62","url":null,"abstract":"In this paper we have presented design and implementation of a prototype for intrusion detection using mobile agents (MAs) in mobile ad hoc networks (MANETs). In this prototype each node runs intrusion detection system locally and equally cooperates with other intrusion detection systems running on other nodes. The proposed prototype is implemented and validated on PMADE (Platform for MA Distribution and Execution).","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116859884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GenericWA-RBAC: Role Based Access Control Model for Web Applications GenericWA-RBAC:基于角色的Web应用访问控制模型
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.57
Prasanna H. Bammigatti, P. R. Rao
Web applications involve the operations on the data objects across the organization boundaries. The operations are provided by the organization once the partners are identified. Web services are globally accepted and are adopted in any web application. The serious threat in web services is security, as these services are available to open world. In this paper the concept of generic web application-RBAC model, called as GenericWA-RBAC is introduced for secure information dissemination to the any web application. The proposal is to realize the system, which checks the security aspects for authorizing the access and reveling the data to the user belonging to partner organization. This model takes the hierarchy of the role in the partner organization and maps to the role of native systems. The proposed policies guaranty the safe data dissemination to partner organization role.
Web应用程序涉及跨组织边界对数据对象的操作。一旦确定了合作伙伴,组织就会提供操作。Web服务被全球接受,并在任何Web应用程序中采用。web服务中最严重的威胁是安全性,因为这些服务是开放的。本文提出了通用web应用程序rbac模型(GenericWA-RBAC)的概念,以保证信息在任意web应用程序中的安全传播。建议实现对属于伙伴组织的用户进行访问授权和数据泄露安全检查的系统。该模型采用伙伴组织中的角色层次结构,并映射到本地系统的角色。所提出的策略保证了数据向伙伴组织角色的安全传播。
{"title":"GenericWA-RBAC: Role Based Access Control Model for Web Applications","authors":"Prasanna H. Bammigatti, P. R. Rao","doi":"10.1109/ICIT.2006.57","DOIUrl":"https://doi.org/10.1109/ICIT.2006.57","url":null,"abstract":"Web applications involve the operations on the data objects across the organization boundaries. The operations are provided by the organization once the partners are identified. Web services are globally accepted and are adopted in any web application. The serious threat in web services is security, as these services are available to open world. In this paper the concept of generic web application-RBAC model, called as GenericWA-RBAC is introduced for secure information dissemination to the any web application. The proposal is to realize the system, which checks the security aspects for authorizing the access and reveling the data to the user belonging to partner organization. This model takes the hierarchy of the role in the partner organization and maps to the role of native systems. The proposed policies guaranty the safe data dissemination to partner organization role.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129024401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A High Performance ASIC for Cellular Automata (CA) Applications 用于元胞自动机(CA)应用的高性能ASIC
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.9
Cheryl-Annette Kincaid, S. Mohanty, Armin R. Mikler, E. Kougianos, Brandon Parker
CA are useful tools in modeling and simulation. However, the more complex a CA is, the longer it takes to run in typical environments. A dedicated CA machine solves this problem by allowing all cells to be computed in parallel. In this paper we present simple yet useful hardware that can perform the required computations in constant time complexity, O(l).
CA是建模和仿真的有用工具。但是,CA越复杂,在典型环境中运行所需的时间就越长。专用CA机器通过允许并行计算所有单元来解决这个问题。在本文中,我们提出了简单而有用的硬件,可以在恒定的时间复杂度O(l)下执行所需的计算。
{"title":"A High Performance ASIC for Cellular Automata (CA) Applications","authors":"Cheryl-Annette Kincaid, S. Mohanty, Armin R. Mikler, E. Kougianos, Brandon Parker","doi":"10.1109/ICIT.2006.9","DOIUrl":"https://doi.org/10.1109/ICIT.2006.9","url":null,"abstract":"CA are useful tools in modeling and simulation. However, the more complex a CA is, the longer it takes to run in typical environments. A dedicated CA machine solves this problem by allowing all cells to be computed in parallel. In this paper we present simple yet useful hardware that can perform the required computations in constant time complexity, O(l).","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121670228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Novel Reversible Carry Look-Ahead BCD Subtractor 一种新型可逆进位前瞻BCD减法器的设计
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.44
H. Thapliyal, Sumedha Gupta
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard. A major enhancement to the standard is the addition of decimal format, thus the design of BCD arithmetic units is likely to get significant attention. Firstly, this paper introduces a novel carry look-ahead BCD adder and then builds a novel carry look-ahead BCD subtracter based on it. Secondly, it introduces the reversible logic implementation of the proposed carry look-ahead BCD subtracter. We have tried to design the reversible logic implementation of the BCD Subtracter optimal in terms of number of reversible gates used and garbage outputs produced. Thus, the proposed work will be of significant value as the technologies mature.
IEEE 754r是对IEEE 754浮点标准的持续修订。该标准的一个主要改进是增加了十进制格式,因此BCD算术单位的设计可能会得到很大的关注。本文首先介绍了一种新颖的进位前瞻式BCD加法器,然后在此基础上构造了一种新颖的进位前瞻式BCD减法器。其次,介绍了进位预读BCD减法器的可逆逻辑实现。我们试图设计BCD减法器的可逆逻辑实现,在使用的可逆门数量和产生的垃圾输出方面是最优的。因此,随着技术的成熟,所建议的工作将具有重要的价值。
{"title":"Design of Novel Reversible Carry Look-Ahead BCD Subtractor","authors":"H. Thapliyal, Sumedha Gupta","doi":"10.1109/ICIT.2006.44","DOIUrl":"https://doi.org/10.1109/ICIT.2006.44","url":null,"abstract":"IEEE 754r is the ongoing revision to the IEEE 754 floating point standard. A major enhancement to the standard is the addition of decimal format, thus the design of BCD arithmetic units is likely to get significant attention. Firstly, this paper introduces a novel carry look-ahead BCD adder and then builds a novel carry look-ahead BCD subtracter based on it. Secondly, it introduces the reversible logic implementation of the proposed carry look-ahead BCD subtracter. We have tried to design the reversible logic implementation of the BCD Subtracter optimal in terms of number of reversible gates used and garbage outputs produced. Thus, the proposed work will be of significant value as the technologies mature.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"16 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113995272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Swara Indentification for South Indian Classical Music 南印度古典音乐的斯瓦拉识别
Pub Date : 2006-12-18 DOI: 10.1109/ICIT.2006.83
R. Sridhar, T. Geetha
This paper deals with the identification of the swaras in a given Carnatic song, which is an essential component, needed for raga identification of South Indian Classical - Carnatic music. Raga is a representation of the possible swaras that can occur in a given Carnatic song. This paper first deals with the segmentation of Carnatic vocal music and then attempts to find the pitch associated with each segment. We propose a two level segmentation algorithm to yield the probable swara segments. For each segment, pitch information is extracted to find the frequency of that particular segment. The fundamental frequency associated with the music signal conveys the overall pitch of the singer, which in turn corresponds to the middle octave swara 'Sa'. The frequencies associated with the segments are identified and the exact tagging of swara is performed to find the 7-swara combinations in the given music signal.
本文研究了一首卡纳蒂克歌曲中swaras的识别,这是南印度古典卡纳蒂克音乐中拉格识别的重要组成部分。拉格是在给定的卡纳蒂克歌曲中可能出现的swaras的代表。本文首先对卡纳蒂克声乐进行切分,然后试图找到与每个切分相关联的音高。我们提出了一种两级分割算法来产生可能的swara片段。对于每个片段,提取音调信息以找到该特定片段的频率。与音乐信号相关的基本频率传达了歌手的整体音高,而这又对应于中间八度音“Sa”。识别与片段相关的频率,并执行精确的swara标记,以找到给定音乐信号中的7-swara组合。
{"title":"Swara Indentification for South Indian Classical Music","authors":"R. Sridhar, T. Geetha","doi":"10.1109/ICIT.2006.83","DOIUrl":"https://doi.org/10.1109/ICIT.2006.83","url":null,"abstract":"This paper deals with the identification of the swaras in a given Carnatic song, which is an essential component, needed for raga identification of South Indian Classical - Carnatic music. Raga is a representation of the possible swaras that can occur in a given Carnatic song. This paper first deals with the segmentation of Carnatic vocal music and then attempts to find the pitch associated with each segment. We propose a two level segmentation algorithm to yield the probable swara segments. For each segment, pitch information is extracted to find the frequency of that particular segment. The fundamental frequency associated with the music signal conveys the overall pitch of the singer, which in turn corresponds to the middle octave swara 'Sa'. The frequencies associated with the segments are identified and the exact tagging of swara is performed to find the 7-swara combinations in the given music signal.","PeriodicalId":161120,"journal":{"name":"9th International Conference on Information Technology (ICIT'06)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124054367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
9th International Conference on Information Technology (ICIT'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1