首页 > 最新文献

2014 IEEE International Conference on Computational Intelligence and Computing Research最新文献

英文 中文
Applying SOA to an E-commerce system and designing a logical security framework for small and medium sized E-commerce based on SOA 将SOA应用于电子商务系统,并设计了一个基于SOA的中小型电子商务逻辑安全框架
A. K. Luhach, S. Dwivedi, C. K. Jha
In the last two decades, as with the growth of internet technologies, E-commerce proves to be the best system for conducting business. The E-commerce systems overshadowed the physical part of markets. E-commerce has the advantages of exposure and most organizations adopted E-commerce rapidly as other technologies. To support growing E-commerce, we require better system integration loom and security structure so that enterprise customers and partners efficiently associated through their nets. Service Oriented Architecture (SOA) may be the answer to their problems. SOA provides an autonomous platform for initiatives to transmit with their clients and collaborators. With the advantages, SOA is also endowed with ease for message tampering and unauthorized access. This causes the security technology implementation of SOA based E-commerce very difficult at other technologies or advances. This paper provides an overview of the various Service Development Approaches (SDA) used for migrating towards SOA and several factors discussed, which considered in the performance evaluation of SDAs. The performance evaluations of SDAs are out of scope, for this research. The primary aim of this editorial is to, identifies and evaluates the flaws in the current security standard for small and medium sized E-commerce system, and proposed a logical security framework for SOA based E-commerce.
在过去的二十年里,随着互联网技术的发展,电子商务被证明是开展业务的最佳系统。电子商务系统掩盖了市场的实体部分。电子商务具有公开的优势,大多数组织迅速采用电子商务作为其他技术。为了支持日益增长的电子商务,我们需要更好的系统集成织机和安全结构,以便企业客户和合作伙伴通过他们的网络有效地联系起来。面向服务的体系结构(SOA)可能是解决这些问题的答案。SOA为活动提供了一个自主的平台,以便与其客户和协作者进行传输。有了这些优点,SOA还易于进行消息篡改和未经授权的访问。这使得基于SOA的电子商务的安全技术实现在其他技术或进步中非常困难。本文概述了用于向SOA迁移的各种服务开发方法(SDA),并讨论了在SDA的性能评估中要考虑的几个因素。对sda的绩效评价超出了本研究的范围。本文的主要目的是识别和评估当前中小型电子商务系统安全标准中的缺陷,并提出一个基于SOA的电子商务逻辑安全框架。
{"title":"Applying SOA to an E-commerce system and designing a logical security framework for small and medium sized E-commerce based on SOA","authors":"A. K. Luhach, S. Dwivedi, C. K. Jha","doi":"10.1109/ICCIC.2014.7238358","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238358","url":null,"abstract":"In the last two decades, as with the growth of internet technologies, E-commerce proves to be the best system for conducting business. The E-commerce systems overshadowed the physical part of markets. E-commerce has the advantages of exposure and most organizations adopted E-commerce rapidly as other technologies. To support growing E-commerce, we require better system integration loom and security structure so that enterprise customers and partners efficiently associated through their nets. Service Oriented Architecture (SOA) may be the answer to their problems. SOA provides an autonomous platform for initiatives to transmit with their clients and collaborators. With the advantages, SOA is also endowed with ease for message tampering and unauthorized access. This causes the security technology implementation of SOA based E-commerce very difficult at other technologies or advances. This paper provides an overview of the various Service Development Approaches (SDA) used for migrating towards SOA and several factors discussed, which considered in the performance evaluation of SDAs. The performance evaluations of SDAs are out of scope, for this research. The primary aim of this editorial is to, identifies and evaluates the flaws in the current security standard for small and medium sized E-commerce system, and proposed a logical security framework for SOA based E-commerce.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115143954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Bio mechanics and human locomotion 生物力学和人体运动
Ahamed Nizam Amirudin, Subramaniam Parasuraman
Biomechanical investigation of human movement contributing to rehabilitation treatment has gained an increasing interest from researchers on regards to human impairments and assistive techniques. There are many methods of treatment previously investigated namely with the focus being towards the nervous system. Due to the advancement of technology over time, motion capture became possible where it allowed biomechanical investigation on human joint gauge to obtain the specific detail of human motion. Prior to the advancement of motion capture cameras, subjects were filmed on TV-video and force platforms that recorded the reaction forces. Currently there are a few methods being researched to attain a better understanding on alternative methods to rehabilitate impaired subjects. Firstly being the usage of force plates in order to obtain the force at the foot to calculate the loadings at the joints and secondly employing surface marker techniques to construct a model of the lower extremities and to identify the anatomical joints. Another method uses Electromyography techniques which gives the estimated muscle strengths. Even with the techniques previously mentioned, the joint loadings such as the moment for the lower extremities while ascending and descending of staircase was not found during time of this project. Two steps staircase were used in this experiment where the kinematics was analyzed by a motion capture camera and an inverse dynamic approach was applied to compute the joint moments. Therefore this project would concentrate on the kinematics, dynamics, kinetics and human locomotion of lower extremities of a few subjects while incorporating the related parameter in developing the rehabilitation system.
人体运动的生物力学研究对康复治疗的贡献已经引起了研究人员对人体损伤和辅助技术的越来越大的兴趣。以前研究过许多治疗方法,主要是针对神经系统。随着时间的推移,由于技术的进步,运动捕捉成为可能,它允许对人体关节测量进行生物力学研究,以获得人体运动的具体细节。在运动捕捉相机出现之前,受试者是在电视视频和力平台上拍摄的,力平台记录了反作用力。目前有一些方法正在研究,以获得更好的理解替代方法来康复受损受试者。首先是利用测力板获取足部受力,计算关节处的载荷;其次是利用曲面标记技术构建下肢模型,识别解剖关节。另一种方法是使用肌电图技术来估计肌肉力量。即使采用了前面提到的技术,在这个项目中也没有发现诸如上下楼梯时下肢的力矩等关节载荷。实验采用两级阶梯结构,采用运动捕捉相机进行运动学分析,并采用逆动力学方法计算关节力矩。因此,本项目将集中于运动学、动力学、动力学和少数科目的下肢运动,同时结合相关参数开发康复系统。
{"title":"Bio mechanics and human locomotion","authors":"Ahamed Nizam Amirudin, Subramaniam Parasuraman","doi":"10.1109/ICCIC.2014.7238460","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238460","url":null,"abstract":"Biomechanical investigation of human movement contributing to rehabilitation treatment has gained an increasing interest from researchers on regards to human impairments and assistive techniques. There are many methods of treatment previously investigated namely with the focus being towards the nervous system. Due to the advancement of technology over time, motion capture became possible where it allowed biomechanical investigation on human joint gauge to obtain the specific detail of human motion. Prior to the advancement of motion capture cameras, subjects were filmed on TV-video and force platforms that recorded the reaction forces. Currently there are a few methods being researched to attain a better understanding on alternative methods to rehabilitate impaired subjects. Firstly being the usage of force plates in order to obtain the force at the foot to calculate the loadings at the joints and secondly employing surface marker techniques to construct a model of the lower extremities and to identify the anatomical joints. Another method uses Electromyography techniques which gives the estimated muscle strengths. Even with the techniques previously mentioned, the joint loadings such as the moment for the lower extremities while ascending and descending of staircase was not found during time of this project. Two steps staircase were used in this experiment where the kinematics was analyzed by a motion capture camera and an inverse dynamic approach was applied to compute the joint moments. Therefore this project would concentrate on the kinematics, dynamics, kinetics and human locomotion of lower extremities of a few subjects while incorporating the related parameter in developing the rehabilitation system.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116933455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of classification techniques for predicting the cognitive skill of students in education environment 预测教育环境中学生认知技能的分类技术比较
M. Mayilvaganan, D. Kalpanadevi
The proposed methodology involves to compares classification techniques for predicting the cognitive skill of students which can be evaluate by conducting the online test. The paper focuses the comparative performance of C4.5 algorithm, Naïve Bayes classifier algorithm which one is well suited accuracy for predicting the skill of expertise by experimenting in Rapid miner.
提出的方法包括比较预测学生认知技能的分类技术,这些分类技术可以通过进行在线测试来评估。通过在Rapid miner上的实验,重点比较了C4.5算法和Naïve贝叶斯分类器算法的性能,其中C4.5算法非常适合预测专业技能的准确性。
{"title":"Comparison of classification techniques for predicting the cognitive skill of students in education environment","authors":"M. Mayilvaganan, D. Kalpanadevi","doi":"10.1109/ICCIC.2014.7238346","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238346","url":null,"abstract":"The proposed methodology involves to compares classification techniques for predicting the cognitive skill of students which can be evaluate by conducting the online test. The paper focuses the comparative performance of C4.5 algorithm, Naïve Bayes classifier algorithm which one is well suited accuracy for predicting the skill of expertise by experimenting in Rapid miner.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"2 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An approach to implementation of inteligent data acquisition systems of process industries in Android platforms 过程工业智能数据采集系统在Android平台上的实现方法
R. Rajkumar
In recent years control room environment is one of the highly required place in process automation industries. The user will get the information about the process station only on the control room. Here my proposed work will provide the information about the surrounding process parameters to the user instantly on his smart phone along with alarming feature so user can interact with the field parameters through his phone instantly. So user can teach the process plant to come back to its stable condition during emergency situations.
近年来,控制室环境是过程自动化行业对环境要求较高的场所之一。用户只能在控制室上获得有关过程站的信息。在这里,我提出的工作将在智能手机上立即向用户提供有关周围工艺参数的信息,以及报警功能,以便用户可以通过手机立即与现场参数进行交互。因此,用户可以教导过程装置在紧急情况下恢复到稳定状态。
{"title":"An approach to implementation of inteligent data acquisition systems of process industries in Android platforms","authors":"R. Rajkumar","doi":"10.1109/ICCIC.2014.7238517","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238517","url":null,"abstract":"In recent years control room environment is one of the highly required place in process automation industries. The user will get the information about the process station only on the control room. Here my proposed work will provide the information about the surrounding process parameters to the user instantly on his smart phone along with alarming feature so user can interact with the field parameters through his phone instantly. So user can teach the process plant to come back to its stable condition during emergency situations.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127234838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel methodology for windows 7 × 64 memory forensics windows 7 × 64内存取证的新方法
G. S. Suma, Dija S, Thomas K L
Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field in computer forensics where a live forensic methodology is adopted in order to acquire physical memory content. Analysis of the collected memory dump is very difficult due to the complex data structures in it, especially in Windows ×64 systems. Also, the complexity involved in 64-bit address translation makes the analysis tougher. This translation can be done only after finding an artifact called Directory Table Base (DTB). Even though there are few methods available for finding DTB, none is efficient for adopting in a memory analysis tool. In this paper, a novel methodology for finding DTB in a 64-bit Windows system is described in detail. The paper also explains algorithms for retrieving forensically relevant information like running processes and its associated details from physical memory dump collected from Windows7 × 64 machines.
由于恶意软件的增长速度越来越快,记忆取证在网络犯罪调查中不可避免。这是因为物理内存可能包含在系统硬盘中无处可用的关键信息。内存取证处理从嫌疑人系统的物理内存内容中收集的法医可靠证据。这是计算机取证中一个快速发展和具有挑战性的领域,采用现场取证方法来获取物理内存内容。由于所收集的内存转储中的数据结构非常复杂,对其进行分析非常困难,特别是在Windows ×64系统中。此外,64位地址转换的复杂性使得分析更加困难。这种转换只能在找到一个名为目录表基(DTB)的工件之后进行。尽管用于查找DTB的方法很少,但没有一种方法可以有效地用于内存分析工具。本文详细描述了一种在64位Windows系统中查找DTB的新方法。本文还解释了从Windows7 × 64机器收集的物理内存转储中检索法医相关信息(如运行进程及其相关细节)的算法。
{"title":"A novel methodology for windows 7 × 64 memory forensics","authors":"G. S. Suma, Dija S, Thomas K L","doi":"10.1109/ICCIC.2014.7238400","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238400","url":null,"abstract":"Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field in computer forensics where a live forensic methodology is adopted in order to acquire physical memory content. Analysis of the collected memory dump is very difficult due to the complex data structures in it, especially in Windows ×64 systems. Also, the complexity involved in 64-bit address translation makes the analysis tougher. This translation can be done only after finding an artifact called Directory Table Base (DTB). Even though there are few methods available for finding DTB, none is efficient for adopting in a memory analysis tool. In this paper, a novel methodology for finding DTB in a 64-bit Windows system is described in detail. The paper also explains algorithms for retrieving forensically relevant information like running processes and its associated details from physical memory dump collected from Windows7 × 64 machines.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"943 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Removal of fixed valued impulse noise by improved Trimmed Mean Median filter 改进的修剪均值中值滤波器去除固定值脉冲噪声
Shachi Sharma, Pranay Yadav
Impulse noise removal is considered one of the most burning topic in digital image processing (DIP). When an image is formed, factors like lighting (source, and intensity) and camera characteristics like the sensor response, lenses and also atmospheric condition affect the presence of the image. It hides the important fine points and information of images. In order to enhance the qualities of the image, the removal of noises becomes imperative and that should not be at the cost of any loss of image information like edges. Removal of noise is one of the most important pre-processing tasks of different of image analysis works and tasks like image enhancement, steganography, segmentation and other enhancement related process. In this research article, we have proposed a new method for the removal and restoration of gray images is introduced, when images are corrupted by impulse noise. This method proposed a novel combination of Mean. Median and trimmed value concept for elimination of fixed valued impulse noise. Our methodology ensures a better performance for different level low, medium and high density of fixed value impulse noise as compare to the other famous filters like Standard Median Filter (SMF), Decision Based Median Filter (DBMF) and Modified Decision Based Median Filter (MDBMF) etc. The main objective of the proposed method is to improve not only a peak signal to noise ratio (PSNR) but also improve the visual perception and reduction in blurring of the resultant image. In the proposed method when previous pixels values, 0's and 255's are present in the particular window and all the pixel values are 0's and 255's then the remaining corrupted pixels are substituted by mean and median value. Proposed methodology was tested on gray-scale images like Mandrill and Lena. The experimental result shows improved value of peak signal to noise ratio (PSNR) and mean square error (MSE) values with better visual and human perception.
脉冲噪声去除一直是数字图像处理(DIP)中最热门的课题之一。当图像形成时,诸如照明(光源和强度)和相机特性(如传感器响应,镜头和大气条件)等因素都会影响图像的存在。它隐藏了图像的重要细节和信息。为了提高图像的质量,去除噪声变得势在必行,这不应该以任何损失图像信息为代价,如边缘。噪声去除是各种图像分析工作和图像增强、隐写、分割等增强相关过程中最重要的预处理任务之一。在本文中,我们提出了一种新的方法来去除和恢复被脉冲噪声破坏的灰度图像。该方法提出了一种新颖的均值组合方法。用于消除定值脉冲噪声的中值和修剪值概念。与其他著名的滤波器如标准中值滤波器(SMF)、基于决策的中值滤波器(DBMF)和基于改进决策的中值滤波器(MDBMF)等相比,我们的方法确保了对不同级别的低、中、高密度固定值脉冲噪声的更好性能。该方法的主要目的不仅是提高峰值信噪比(PSNR),而且还提高了视觉感知和减少了生成图像的模糊。在所提出的方法中,当先前的像素值,0和255存在于特定的窗口中,并且所有像素值都是0和255,然后剩余的损坏像素被平均值和中位数替换。提出的方法在像Mandrill和Lena这样的灰度图像上进行了测试。实验结果表明,改进后的峰值信噪比(PSNR)值和均方误差(MSE)值具有更好的视觉和人眼感知效果。
{"title":"Removal of fixed valued impulse noise by improved Trimmed Mean Median filter","authors":"Shachi Sharma, Pranay Yadav","doi":"10.1109/ICCIC.2014.7238368","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238368","url":null,"abstract":"Impulse noise removal is considered one of the most burning topic in digital image processing (DIP). When an image is formed, factors like lighting (source, and intensity) and camera characteristics like the sensor response, lenses and also atmospheric condition affect the presence of the image. It hides the important fine points and information of images. In order to enhance the qualities of the image, the removal of noises becomes imperative and that should not be at the cost of any loss of image information like edges. Removal of noise is one of the most important pre-processing tasks of different of image analysis works and tasks like image enhancement, steganography, segmentation and other enhancement related process. In this research article, we have proposed a new method for the removal and restoration of gray images is introduced, when images are corrupted by impulse noise. This method proposed a novel combination of Mean. Median and trimmed value concept for elimination of fixed valued impulse noise. Our methodology ensures a better performance for different level low, medium and high density of fixed value impulse noise as compare to the other famous filters like Standard Median Filter (SMF), Decision Based Median Filter (DBMF) and Modified Decision Based Median Filter (MDBMF) etc. The main objective of the proposed method is to improve not only a peak signal to noise ratio (PSNR) but also improve the visual perception and reduction in blurring of the resultant image. In the proposed method when previous pixels values, 0's and 255's are present in the particular window and all the pixel values are 0's and 255's then the remaining corrupted pixels are substituted by mean and median value. Proposed methodology was tested on gray-scale images like Mandrill and Lena. The experimental result shows improved value of peak signal to noise ratio (PSNR) and mean square error (MSE) values with better visual and human perception.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122674214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Forecasting of cyclone using multi-temporal change detected satellite images 利用探测到的多时变化卫星图像预报气旋
D. David, D. Rangaswamy
Clouds in the sky play an important role in predicting the weather. Satellite images provide an excellent view of clouds in the sky which can be certainly used in forecasting the weather. In Satellite images, particularly Infra Red (IR) images play a vital role in many applications. The satellite cloud images contain valuable information for weather forecasting and early prediction of different atmospheric disturbance such as typhoons, hurricanes etc. Very strong winds and torrential rainfall which makes people to become shelter less during cyclones. Therefore in forecasting weather, cyclone prediction has a major role as this is directly related to the lives and households of human being. Many sub-continents in the world have regions that are affected severely because of cyclones. In India, during Madi 2013 cyclone, nearly seven lakh people were forced to relocate, to prevent the loss of human life and their assets. So it is necessary to plan out your day accordingly so that you are not caught off guard. In the literatures, for cyclone prediction which is mainly dependent on Doppler Radars along with Historical Satellite images. Because of its limited range and semi-automatic approach, there is a need to propose a method to automate cyclone prediction, which finds the movement & direction of cyclone towards the given specific locality and relays those information to the subscribed users. Fuzzy C-means clustering is applied for segmenting each cyclone image, followed by extracting features like shape, color and texture for the same. Change Detection is the process of finding changes in multitemporal images. The features obtained from the multi-temporal cyclone IR images are compared with each other in order to determine the movement of cyclone.
天空中的云在预测天气方面起着重要的作用。卫星图像提供了天空中云的绝佳视图,这当然可以用于天气预报。在卫星图像中,特别是红外图像在许多应用中起着至关重要的作用。卫星云图为天气预报和早期预报台风、飓风等不同的大气扰动提供了宝贵的资料。强风和暴雨使人们在飓风来袭时避雨少。因此,在天气预报中,气旋预报具有重要作用,因为它直接关系到人类的生活和家庭。世界上许多次大陆都有受气旋严重影响的地区。在印度,在2013年5月的飓风期间,近70万人被迫搬迁,以防止生命和财产的损失。因此,有必要相应地计划好你的一天,这样你就不会措手不及。在文献中,气旋预报主要依靠多普勒雷达和历史卫星图像。由于气旋预报的范围有限,而且是半自动化的方法,因此有必要提出一种自动预报气旋的方法,该方法可以发现气旋向特定地点的移动和方向,并将这些信息转发给订阅用户。采用模糊c均值聚类对每张气旋图像进行分割,然后提取气旋图像的形状、颜色、纹理等特征。变化检测是发现多时相图像变化的过程。为了确定气旋的运动,将多时段气旋红外图像的特征进行比较。
{"title":"Forecasting of cyclone using multi-temporal change detected satellite images","authors":"D. David, D. Rangaswamy","doi":"10.1109/ICCIC.2014.7238301","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238301","url":null,"abstract":"Clouds in the sky play an important role in predicting the weather. Satellite images provide an excellent view of clouds in the sky which can be certainly used in forecasting the weather. In Satellite images, particularly Infra Red (IR) images play a vital role in many applications. The satellite cloud images contain valuable information for weather forecasting and early prediction of different atmospheric disturbance such as typhoons, hurricanes etc. Very strong winds and torrential rainfall which makes people to become shelter less during cyclones. Therefore in forecasting weather, cyclone prediction has a major role as this is directly related to the lives and households of human being. Many sub-continents in the world have regions that are affected severely because of cyclones. In India, during Madi 2013 cyclone, nearly seven lakh people were forced to relocate, to prevent the loss of human life and their assets. So it is necessary to plan out your day accordingly so that you are not caught off guard. In the literatures, for cyclone prediction which is mainly dependent on Doppler Radars along with Historical Satellite images. Because of its limited range and semi-automatic approach, there is a need to propose a method to automate cyclone prediction, which finds the movement & direction of cyclone towards the given specific locality and relays those information to the subscribed users. Fuzzy C-means clustering is applied for segmenting each cyclone image, followed by extracting features like shape, color and texture for the same. Change Detection is the process of finding changes in multitemporal images. The features obtained from the multi-temporal cyclone IR images are compared with each other in order to determine the movement of cyclone.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114183680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Leaf recognition using contour based edge detection and SIFT algorithm 基于轮廓边缘检测和SIFT算法的叶片识别
Shubham Lavania, Palash Sushil Matey
The paper presents two advanced methods for comparative study in the field of computer vision. The first method involves the implementation of the Scalar Invariant Fourier Transform (SIFT) algorithm for the leaf recognition based on the key descriptors value. The second method involves the contour-based corner detection and classification which is done with the help of Mean Projection algorithm. The advantage of this system over the other Curvature Scale Space (CSS) systems is that there are fewer false-positive (FP) and false-negative (FN) points compared with recent standard corner detection techniques. The performance analysis of both the algorithm was done on the flavia database.
本文介绍了计算机视觉领域中比较研究的两种先进方法。第一种方法是实现基于关键描述符值的标量不变傅立叶变换(SIFT)算法。第二种方法是利用均值投影算法进行基于轮廓的角点检测和分类。与其他曲率尺度空间(CSS)系统相比,该系统的优点是与最近的标准角点检测技术相比,有更少的假阳性(FP)和假阴性(FN)点。在flavia数据库上对两种算法进行了性能分析。
{"title":"Leaf recognition using contour based edge detection and SIFT algorithm","authors":"Shubham Lavania, Palash Sushil Matey","doi":"10.1109/ICCIC.2014.7238345","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238345","url":null,"abstract":"The paper presents two advanced methods for comparative study in the field of computer vision. The first method involves the implementation of the Scalar Invariant Fourier Transform (SIFT) algorithm for the leaf recognition based on the key descriptors value. The second method involves the contour-based corner detection and classification which is done with the help of Mean Projection algorithm. The advantage of this system over the other Curvature Scale Space (CSS) systems is that there are fewer false-positive (FP) and false-negative (FN) points compared with recent standard corner detection techniques. The performance analysis of both the algorithm was done on the flavia database.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122053692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Multi agent reinforcement learning based distributed optimization of solar microgrid 基于多智能体强化学习的太阳能微网分布式优化
R. Leo, R. S. Milton, A. Kaviya
We consider grid connected solar microgrid system which contains a local consumers, solar photo voltaic (PV) systems, load and battery. The consumer as an agent continuously interacts with the environment and learns to take optimal actions through a model-free Reinforcement Learning algorithm, namely Q Learning. The aim of the agent is to optimally schedule the battery to increase the utility of the battery and solar photo voltaic system and thereby aims for the long term objective of reducing the power consumption from grid. Multiple agents sense the states of environment components and make collective decisions about how to respond to randomness in load and intermittent solar power by using a Multi agent reinforcement algorithm, namely Coordinated Q Learning (CQ Learning). Each agent learns to optimize individually and contribute to global optimization. Grid power consumed when solar PV system operates individually, by using Q learning is compared with operation of many such solar PV systems in a distributed environment using CQ learning and it is proved that the grid power requirement is considerably reduced in CQ learning than in Q learning. Simulation results using real numerical data are presented for a reliability test of the system.
我们考虑并网太阳能微电网系统,它包含一个本地消费者,太阳能光伏(PV)系统,负载和电池。消费者作为智能体不断与环境交互,并通过无模型强化学习算法(即Q Learning)学习采取最优行动。代理的目标是优化电池调度,以提高电池和太阳能光伏系统的效用,从而达到降低电网耗电量的长期目标。多智能体感知环境组件的状态,并通过多智能体强化算法,即协调Q学习(CQ Learning),对如何应对负荷随机性和间歇性太阳能做出集体决策。每个智能体学习单独优化,并为全局优化做出贡献。将太阳能光伏系统单独运行时所消耗的电网功率与多个太阳能光伏系统在分布式环境下使用CQ学习运行时所消耗的电网功率进行了比较,证明了CQ学习比Q学习能显著降低电网功率需求。给出了利用实际数值数据的仿真结果,对系统进行了可靠性测试。
{"title":"Multi agent reinforcement learning based distributed optimization of solar microgrid","authors":"R. Leo, R. S. Milton, A. Kaviya","doi":"10.1109/ICCIC.2014.7238438","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238438","url":null,"abstract":"We consider grid connected solar microgrid system which contains a local consumers, solar photo voltaic (PV) systems, load and battery. The consumer as an agent continuously interacts with the environment and learns to take optimal actions through a model-free Reinforcement Learning algorithm, namely Q Learning. The aim of the agent is to optimally schedule the battery to increase the utility of the battery and solar photo voltaic system and thereby aims for the long term objective of reducing the power consumption from grid. Multiple agents sense the states of environment components and make collective decisions about how to respond to randomness in load and intermittent solar power by using a Multi agent reinforcement algorithm, namely Coordinated Q Learning (CQ Learning). Each agent learns to optimize individually and contribute to global optimization. Grid power consumed when solar PV system operates individually, by using Q learning is compared with operation of many such solar PV systems in a distributed environment using CQ learning and it is proved that the grid power requirement is considerably reduced in CQ learning than in Q learning. Simulation results using real numerical data are presented for a reliability test of the system.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Computer vision & fuzzy logic based offline signature verification and forgery detection 基于计算机视觉和模糊逻辑的离线签名验证与伪造检测
G. S. Prakash, Shanu Sharma
Automated signature verification and forgery detection has many applications in the field of Bank-cheque processing, document authentication, ATM access etc. Handwritten signatures have proved to be important in authenticating a person's identity, who is signing the document. In this paper a Fuzzy Logic and Artificial Neural Network Based Off-line Signature Verification and Forgery Detection System is presented. As there are unique and important variations in the feature elements of each signature, so in order to match a particular signature with the database, the structural parameters of the signatures along with the local variations in the signature characteristics are used. These characteristics have been used to train the artificial neural network. The system uses the features extracted from the signatures such as centroid, height - width ratio, total area, Ist and IInd order derivatives, quadrant areas etc. After the verification of the signature the angle features are used in fuzzy logic based system for forgery detection.
自动签名验证与伪造检测在银行支票处理、文件认证、ATM存取等领域有着广泛的应用。事实证明,手写签名对于验证正在签署文件的人的身份非常重要。本文基于模糊逻辑和人工神经网络的离线签名验证和伪造检测系统。由于每个签名的特征元素都有独特而重要的变化,因此为了将特定签名与数据库进行匹配,需要使用签名的结构参数以及签名特征的局部变化。这些特征已被用于训练人工神经网络。该系统利用了从签名中提取的质心、高宽比、总面积、1阶导数和1阶导数、象限面积等特征。在对签名进行验证后,将角度特征用于基于模糊逻辑的伪造检测系统中。
{"title":"Computer vision & fuzzy logic based offline signature verification and forgery detection","authors":"G. S. Prakash, Shanu Sharma","doi":"10.1109/ICCIC.2014.7238363","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238363","url":null,"abstract":"Automated signature verification and forgery detection has many applications in the field of Bank-cheque processing, document authentication, ATM access etc. Handwritten signatures have proved to be important in authenticating a person's identity, who is signing the document. In this paper a Fuzzy Logic and Artificial Neural Network Based Off-line Signature Verification and Forgery Detection System is presented. As there are unique and important variations in the feature elements of each signature, so in order to match a particular signature with the database, the structural parameters of the signatures along with the local variations in the signature characteristics are used. These characteristics have been used to train the artificial neural network. The system uses the features extracted from the signatures such as centroid, height - width ratio, total area, Ist and IInd order derivatives, quadrant areas etc. After the verification of the signature the angle features are used in fuzzy logic based system for forgery detection.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129614777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 IEEE International Conference on Computational Intelligence and Computing Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1