首页 > 最新文献

2014 IEEE International Conference on Computational Intelligence and Computing Research最新文献

英文 中文
Modeling causally dependent events using fuzzy cognitive maps 使用模糊认知图建模因果依赖事件
R. Sarala, G. Zayaraz, V. Vijayalakshmi, R. Sivaranjani
The increase in the number of security breaches has made information security risk management an essential security activity for all type of organizations. Risk Management involves assessment involves identification of assets, threats and vulnerabilities. Attacks by outsiders continue to cause the most security breaches to all organizations. Existing approaches like attack graph based risk assessment have scalability issues and focus on only single step attacks. It is very difficult to predict multistep attacks that exploit a chain of vulnerabilities. The multistep attacks are based on the causality of relation where every cause has an effect. Causality refers to a cause i.e. one event and consequences i.e. another event that has occurred because of the cause. The proposed system aims to make use of fuzzy cognitive maps to model the causally dependent events. Fuzzy cognitive map is a concrete representation of knowledge that can handle incomplete or conflicting information. This is very important in risk assessment because important information may be unreliable as they may be a result of unreliable measurement techniques. The proposed system will aid in proactive information security risk assessment.
安全漏洞数量的增加使得信息安全风险管理成为所有类型组织的基本安全活动。风险管理涉及评估,涉及识别资产、威胁和弱点。外部攻击仍然是所有组织中最严重的安全漏洞。现有的方法,如基于攻击图的风险评估,存在可伸缩性问题,并且只关注单步攻击。很难预测利用一系列漏洞的多步攻击。多步骤攻击是基于关系的因果关系,其中每个原因都有结果。因果关系指的是原因,即一个事件和结果,即由于原因而发生的另一个事件。该系统旨在利用模糊认知图对因果依赖事件进行建模。模糊认知地图是一种知识的具体表示,可以处理不完整或冲突的信息。这在风险评估中非常重要,因为重要的信息可能是不可靠的,因为它们可能是不可靠的测量技术的结果。拟议的系统将有助于进行主动的信息安全风险评估。
{"title":"Modeling causally dependent events using fuzzy cognitive maps","authors":"R. Sarala, G. Zayaraz, V. Vijayalakshmi, R. Sivaranjani","doi":"10.1109/ICCIC.2014.7238339","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238339","url":null,"abstract":"The increase in the number of security breaches has made information security risk management an essential security activity for all type of organizations. Risk Management involves assessment involves identification of assets, threats and vulnerabilities. Attacks by outsiders continue to cause the most security breaches to all organizations. Existing approaches like attack graph based risk assessment have scalability issues and focus on only single step attacks. It is very difficult to predict multistep attacks that exploit a chain of vulnerabilities. The multistep attacks are based on the causality of relation where every cause has an effect. Causality refers to a cause i.e. one event and consequences i.e. another event that has occurred because of the cause. The proposed system aims to make use of fuzzy cognitive maps to model the causally dependent events. Fuzzy cognitive map is a concrete representation of knowledge that can handle incomplete or conflicting information. This is very important in risk assessment because important information may be unreliable as they may be a result of unreliable measurement techniques. The proposed system will aid in proactive information security risk assessment.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115983271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model checking the component-based protocol specification for proving the design correctness 对基于组件的协议规范进行模型检查,以证明设计的正确性
P. Kaliappan, H. Koenig
We developed a component-oriented modeling approach for the design of communication protocols and distributed systems. The approach aims at the reuse of components represented by means of Unified Modeling Language (Uml) diagrams. Designs based on compositions of components have to formally be proved for correctness. In this paper we propose a verification approach by combining trace equivalence and model checking to verify UML-based designs of communication protocols. Our method consists of two steps. Foremost, the internal and external component behaviors are verified independently regarding their formal correctness. Thereafter the correctness and consistency of compositions is verified. This is achieved by generating the component adaptation path as traces during the composition. The requirements, i.e., safety and liveness properties, are formulated using linear temporal logic formulae. We apply the Spin tool as our model checking mechanism. For this, we present a method for automatically transforming the designs into Promela. We evaluate our approach for an example data transfer protocol as a case study.
我们开发了一种面向组件的建模方法来设计通信协议和分布式系统。该方法旨在重用由统一建模语言(Uml)图表示的组件。基于组件组合的设计必须正式证明其正确性。在本文中,我们提出了一种结合跟踪等价和模型检查的验证方法来验证基于uml的通信协议设计。我们的方法包括两个步骤。最重要的是,内部和外部组件行为根据其形式正确性进行独立验证。从而验证了组合的正确性和一致性。这是通过在组合过程中生成组件自适应路径作为轨迹来实现的。需求,即安全性和活动性,是用线性时间逻辑公式表述的。我们使用Spin工具作为我们的模型检查机制。为此,我们提出了一种将设计自动转换为Promela的方法。我们以一个示例数据传输协议作为案例研究来评估我们的方法。
{"title":"Model checking the component-based protocol specification for proving the design correctness","authors":"P. Kaliappan, H. Koenig","doi":"10.1109/ICCIC.2014.7238351","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238351","url":null,"abstract":"We developed a component-oriented modeling approach for the design of communication protocols and distributed systems. The approach aims at the reuse of components represented by means of Unified Modeling Language (Uml) diagrams. Designs based on compositions of components have to formally be proved for correctness. In this paper we propose a verification approach by combining trace equivalence and model checking to verify UML-based designs of communication protocols. Our method consists of two steps. Foremost, the internal and external component behaviors are verified independently regarding their formal correctness. Thereafter the correctness and consistency of compositions is verified. This is achieved by generating the component adaptation path as traces during the composition. The requirements, i.e., safety and liveness properties, are formulated using linear temporal logic formulae. We apply the Spin tool as our model checking mechanism. For this, we present a method for automatically transforming the designs into Promela. We evaluate our approach for an example data transfer protocol as a case study.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a low cost parallel pneumatic regenerative braking and acceleration assist for light motor vehicles 轻型机动车辆低成本并联气动再生制动与加速辅助系统的设计
S. V. Ragavan, M. Shanmugavel, C. H. Lim, Jin Zhen Lee
Land based vehicles, i.e. cars, make up the main mode of transport on Earth, emitting harmful greenhouse gases due to combustion of fossil fuels. By installing regenerative systems in vehicles, the fuel consumption of the internal combustion engine (ICE) is reduced by capturing the energy usually lost during braking and reusing it to help propel the vehicle. The work described in this paper explores the practicality of a pneumatic regenerative braking system (PRBS). A functional prototype was successfully designed and tested to obtain efficiency data from a prototype.
陆地交通工具,即汽车,是地球上的主要交通工具,由于燃烧化石燃料而排放有害的温室气体。通过在车辆上安装再生系统,内燃机(ICE)的燃料消耗通过捕获通常在制动过程中损失的能量并重新利用它来帮助推动车辆,从而降低了燃料消耗。本文所描述的工作探讨了气动再生制动系统(PRBS)的实用性。成功地设计了一个功能样机并进行了测试,获得了样机的效率数据。
{"title":"Design of a low cost parallel pneumatic regenerative braking and acceleration assist for light motor vehicles","authors":"S. V. Ragavan, M. Shanmugavel, C. H. Lim, Jin Zhen Lee","doi":"10.1109/ICCIC.2014.7238556","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238556","url":null,"abstract":"Land based vehicles, i.e. cars, make up the main mode of transport on Earth, emitting harmful greenhouse gases due to combustion of fossil fuels. By installing regenerative systems in vehicles, the fuel consumption of the internal combustion engine (ICE) is reduced by capturing the energy usually lost during braking and reusing it to help propel the vehicle. The work described in this paper explores the practicality of a pneumatic regenerative braking system (PRBS). A functional prototype was successfully designed and tested to obtain efficiency data from a prototype.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122381205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy aware load balancing for computational cloud 计算云的能量感知负载平衡
A. Florence, V. Shanthi
Cloud computing is novel technology, which enables any resource as service on demand. Cloud environment motivates highly dynamic resource provisioning. Hence clients can scale up or scale down their requirements as per their demand. Load balancing is very important and complex problem in cloud environment, because of its heterogeneity of the computing nodes. In order to realize the full potential of cloud computing it is vital to minimize energy consumption along with effective load balancing. The aim of Energy Aware Load Balancing (EALB) model is to minimize energy consumption with load balancing. EALB model classifies the incoming job request either CPU bound or I/O bound according to their purpose and behaviour. This classification details are maintained in a table named Pattern History Table (PHT) and organized as hash table. One of the virtual machine (VM) is selected dynamically based on best fit allocation policy and the job is assigned to the victimized VM. From the pattern history table job's nature is identified. Using Dynamic Voltage Frequency Scaling (DVFS) scheme the selected VM's processor clock frequency is increased if it is found CPU bound else decreased (I/O bound). Thus, EALB algorithm saves considerable amount of energy and proves to be more efficient.
云计算是一种新颖的技术,它使任何资源都能按需提供服务。云环境激发了高度动态的资源配置。因此,客户可以根据他们的需求增加或减少他们的需求。由于计算节点的异构性,负载均衡是云环境中一个非常重要而复杂的问题。为了充分发挥云计算的潜力,最小化能源消耗以及有效的负载平衡至关重要。能量感知负载均衡(EALB)模型的目标是通过负载均衡使能耗最小化。EALB模型根据传入作业请求的目的和行为,对传入作业请求进行CPU绑定或I/O绑定的分类。这些分类细节保存在一个名为Pattern History table (PHT)的表中,并组织为散列表。根据最佳匹配分配策略动态选择一个虚拟机,并将任务分配给受害虚拟机。从模式历史表作业的性质被识别出来。使用动态电压频率缩放(DVFS)方案,如果发现CPU绑定或降低(I/O绑定),则所选VM的处理器时钟频率将增加。因此,EALB算法节省了大量的能量,并且被证明是更高效的。
{"title":"Energy aware load balancing for computational cloud","authors":"A. Florence, V. Shanthi","doi":"10.1109/ICCIC.2014.7238489","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238489","url":null,"abstract":"Cloud computing is novel technology, which enables any resource as service on demand. Cloud environment motivates highly dynamic resource provisioning. Hence clients can scale up or scale down their requirements as per their demand. Load balancing is very important and complex problem in cloud environment, because of its heterogeneity of the computing nodes. In order to realize the full potential of cloud computing it is vital to minimize energy consumption along with effective load balancing. The aim of Energy Aware Load Balancing (EALB) model is to minimize energy consumption with load balancing. EALB model classifies the incoming job request either CPU bound or I/O bound according to their purpose and behaviour. This classification details are maintained in a table named Pattern History Table (PHT) and organized as hash table. One of the virtual machine (VM) is selected dynamically based on best fit allocation policy and the job is assigned to the victimized VM. From the pattern history table job's nature is identified. Using Dynamic Voltage Frequency Scaling (DVFS) scheme the selected VM's processor clock frequency is increased if it is found CPU bound else decreased (I/O bound). Thus, EALB algorithm saves considerable amount of energy and proves to be more efficient.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Impact of code rate on the performance of Viterbi decoder in AWGN channel 码率对AWGN信道维特比解码器性能的影响
S. V. Viraktamath, Preeya H. Patil, G. V. Attimarad
The most of the modern hand held communicating devices rely on forward error correction techniques for their proper functioning. Convolutional coding and Viterbi decoding is one of the forward error correction technique used in most of the communication applications. This paper investigates the impact of code rates on the performance of hard decision Viterbi decoder. In this paper different rates such as 1/2, 2/3 and 3/5 have been simulated using different constraint lengths from 5 to 10 as well as different generator polynomials. All the simulations are conducted in MATLAB over AWGN channel. The paper also investigates the impact of trace back length on the performance of Viterbi decoder. The decoding time for different constraint lengths have also been observed.
大多数现代手持通信设备依靠前向纠错技术来正常工作。卷积编码和维特比译码是目前大多数通信应用中常用的前向纠错技术之一。本文研究了码率对硬决策维特比解码器性能的影响。本文模拟了不同的速率,如1/2,2/3和3/5,使用不同的约束长度从5到10,以及不同的发电机多项式。所有仿真均在MATLAB中通过AWGN信道进行。本文还研究了跟踪长度对维特比解码器性能的影响。还观察了不同约束长度下的解码时间。
{"title":"Impact of code rate on the performance of Viterbi decoder in AWGN channel","authors":"S. V. Viraktamath, Preeya H. Patil, G. V. Attimarad","doi":"10.1109/ICCIC.2014.7238371","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238371","url":null,"abstract":"The most of the modern hand held communicating devices rely on forward error correction techniques for their proper functioning. Convolutional coding and Viterbi decoding is one of the forward error correction technique used in most of the communication applications. This paper investigates the impact of code rates on the performance of hard decision Viterbi decoder. In this paper different rates such as 1/2, 2/3 and 3/5 have been simulated using different constraint lengths from 5 to 10 as well as different generator polynomials. All the simulations are conducted in MATLAB over AWGN channel. The paper also investigates the impact of trace back length on the performance of Viterbi decoder. The decoding time for different constraint lengths have also been observed.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127257846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A comparative study on low power adders using microwind EDA tool 利用微风EDA工具进行低功率加法器的比较研究
Phaniram Sayapaneni, V. Elamaran
From the past few years a variety of low power adders have been proposed to reduce the overall power consumption of micro-electronic systems. The role of adders are important in almost all fields of engineering and applied sciences. With the help of low power adders, all the other systems which make use of adders may dissipate less power. This study presents a detailed comparison between various low power 1-bit full adders. This study focuses mainly on the comparisons among conventional Complementary Metal Oxide Semiconductor (CMOS) adder, bridge style adder, transmission gate adder, square root based adder and static energy recovery full adder, etc. All the simulation results are done using Digital Schematic (DSCH) editor and the functionality is verified using the Microwind layout editor tool. The sole objective of this study to conclude with a better estimate and ease in selecting a low power adder for the required application.
从过去的几年中,各种低功耗加法器已被提出,以降低微电子系统的整体功耗。加法器的作用在几乎所有的工程和应用科学领域都很重要。在低功率加法器的帮助下,所有其他使用加法器的系统都可以消耗更少的功率。本研究详细比较了各种低功耗1位全加法器。本文主要对传统CMOS加法器、桥式加法器、传输门加法器、平方根加法器、静态能量回收全加法器等进行了比较。所有仿真结果均使用DSCH编辑器完成,并使用Microwind布局编辑器工具验证了功能。本研究的唯一目的是得出更好的估计,并为所需应用选择低功耗加法器。
{"title":"A comparative study on low power adders using microwind EDA tool","authors":"Phaniram Sayapaneni, V. Elamaran","doi":"10.1109/ICCIC.2014.7238457","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238457","url":null,"abstract":"From the past few years a variety of low power adders have been proposed to reduce the overall power consumption of micro-electronic systems. The role of adders are important in almost all fields of engineering and applied sciences. With the help of low power adders, all the other systems which make use of adders may dissipate less power. This study presents a detailed comparison between various low power 1-bit full adders. This study focuses mainly on the comparisons among conventional Complementary Metal Oxide Semiconductor (CMOS) adder, bridge style adder, transmission gate adder, square root based adder and static energy recovery full adder, etc. All the simulation results are done using Digital Schematic (DSCH) editor and the functionality is verified using the Microwind layout editor tool. The sole objective of this study to conclude with a better estimate and ease in selecting a low power adder for the required application.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design PID controller for TITO process based on least square optimization tuning method 基于最小二乘优化整定方法设计TITO过程的PID控制器
A. Suresh, M. Kiran, C. S. Kumar
In this paper, a new auto tuning least square optimization tuning technique is presented to design Wood and Berry (WB) distillation column. It has Two Inputs and Two Outputs (TITO) binary distillation column. Design of TITO systems with decentralized, centralized, decouplers (compensators) and optimization tuning methods are not guaranteed to achieve desired output response. By adopting least square optimization tuning, it acts like an auto tuning control strategy. Hence, best performance characteristics of the system can be obtained. Here, WB TITO system is designed with full centralized structure and its PID values are evaluated from the MATLAB simulation program. Performance of the closed loop system is compared with Real Coded Genetic algorithm (RGA) and Covariance Matrix Adaption Evolution Strategy (CMAES). Best simulation results and performance indices values are obtained in least square optimization tuning method.
本文提出了一种新的自整定最小二乘优化整定技术,用于Wood & Berry精馏塔的设计。它有两个输入和两个输出(TITO)二元精馏塔。采用分散式、集中式、解耦(补偿器)和优化调谐方法的TITO系统设计不能保证获得期望的输出响应。通过采用最小二乘优化调优,它就像一种自动调优控制策略。从而获得系统的最佳性能特性。本文采用全集中式结构设计WB TITO系统,并通过MATLAB仿真程序对其PID值进行评估。将闭环系统的性能与实编码遗传算法(RGA)和协方差矩阵自适应进化策略(CMAES)进行了比较。采用最小二乘优化调优方法获得了最佳的仿真结果和性能指标值。
{"title":"Design PID controller for TITO process based on least square optimization tuning method","authors":"A. Suresh, M. Kiran, C. S. Kumar","doi":"10.1109/ICCIC.2014.7238444","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238444","url":null,"abstract":"In this paper, a new auto tuning least square optimization tuning technique is presented to design Wood and Berry (WB) distillation column. It has Two Inputs and Two Outputs (TITO) binary distillation column. Design of TITO systems with decentralized, centralized, decouplers (compensators) and optimization tuning methods are not guaranteed to achieve desired output response. By adopting least square optimization tuning, it acts like an auto tuning control strategy. Hence, best performance characteristics of the system can be obtained. Here, WB TITO system is designed with full centralized structure and its PID values are evaluated from the MATLAB simulation program. Performance of the closed loop system is compared with Real Coded Genetic algorithm (RGA) and Covariance Matrix Adaption Evolution Strategy (CMAES). Best simulation results and performance indices values are obtained in least square optimization tuning method.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125477068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Recital analysis of localization algorithm in wireless sensor networks 无线传感器网络中定位算法的简要分析
Z. Livinsa
Recent technological developments in Micro-Electro-Mechanical System (MEMS) and communication system have made the wireless sensor networks (WSNs) with emerging applications. Localization is the essential research problem in WSNs. In this paper, I have projected Received Signal Strength Indicator (RSSI) and improved Distance vector (DV) localization algorithms for accurate position estimation. The localization error is premeditated for a diverse range of anchor population, communication range and degree of irregularity (DOI). In the simulation, I compare these two localization algorithms and the result shows that the performance of improved DV-Hop algorithm has high position accuracy as compared to the RSSI algorithm.
近年来微机电系统(MEMS)和通信系统技术的发展使无线传感器网络(WSNs)具有了新兴的应用前景。定位是无线传感器网络研究的核心问题。在本文中,我提出了接收信号强度指示器(RSSI)和改进的距离矢量(DV)定位算法,以实现准确的位置估计。定位误差是根据不同范围的锚定人口、通信范围和不规则程度(DOI)预先考虑的。在仿真中,我对这两种定位算法进行了比较,结果表明改进的DV-Hop算法相对于RSSI算法具有较高的定位精度。
{"title":"Recital analysis of localization algorithm in wireless sensor networks","authors":"Z. Livinsa","doi":"10.1109/ICCIC.2014.7238545","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238545","url":null,"abstract":"Recent technological developments in Micro-Electro-Mechanical System (MEMS) and communication system have made the wireless sensor networks (WSNs) with emerging applications. Localization is the essential research problem in WSNs. In this paper, I have projected Received Signal Strength Indicator (RSSI) and improved Distance vector (DV) localization algorithms for accurate position estimation. The localization error is premeditated for a diverse range of anchor population, communication range and degree of irregularity (DOI). In the simulation, I compare these two localization algorithms and the result shows that the performance of improved DV-Hop algorithm has high position accuracy as compared to the RSSI algorithm.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126617488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient fuzzy color and texture feature extraction technique for content based image retrieval system 基于内容的图像检索系统中有效的模糊颜色和纹理特征提取技术
K. Jayanthi, M. Karthikeyan
The future user needs in the field of Multimedia retrieval is the focus of many research and development activists. It is empirically observed that no single algorithm is efficient in extracting all different types of images like building images, flower images, car images and so on. Hence a thorough analysis of certain color, texture and shape extraction techniques are carried out to identify an efficient CBIR technique which suits for a particular type of images. The Extraction of an image includes feature description, index generation and feature detection. The low-level feature extraction techniques are proposed in this paper are tested on Corel database, which contains 1000 images. The feature vectors of the query image (QI) are compared with feature vectors of the database images to obtain matching images(MI). This paper proposes Fuzzy Color and Texture Histogram (FCTH) techniques which extract the matching image based on the similarity of color and edge of an image in the database. The Image Retrieval Precision value (IRP) of the proposed techniques are calculated and compared with that of the existing techniques. The algorithms used in this paper are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Fuzzy Linking algorithm. The proposed technique results in the improvement of the average precision value. Also FCTH is effective and efficient for image indexing and image retrieval.
未来用户在多媒体检索领域的需求是许多研究和发展活动家关注的焦点。经验观察到,没有一种算法可以有效地提取所有不同类型的图像,如建筑图像、花卉图像、汽车图像等。因此,对某些颜色、纹理和形状提取技术进行了深入的分析,以确定适合特定类型图像的有效CBIR技术。图像的提取包括特征描述、索引生成和特征检测。本文提出的底层特征提取技术在包含1000幅图像的Corel数据库上进行了测试。将查询图像的特征向量(QI)与数据库图像的特征向量进行比较,得到匹配图像(MI)。本文提出了模糊颜色和纹理直方图(FCTH)技术,该技术基于数据库中图像的颜色和边缘的相似性提取匹配图像。计算了所提技术的图像检索精度值(IRP),并与现有技术进行了比较。本文使用的算法有离散余弦变换(DCT)、离散小波变换(DWT)和模糊链接算法。该方法提高了平均精度值。FCTH对于图像索引和图像检索也是有效的。
{"title":"Efficient fuzzy color and texture feature extraction technique for content based image retrieval system","authors":"K. Jayanthi, M. Karthikeyan","doi":"10.1109/ICCIC.2014.7238474","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238474","url":null,"abstract":"The future user needs in the field of Multimedia retrieval is the focus of many research and development activists. It is empirically observed that no single algorithm is efficient in extracting all different types of images like building images, flower images, car images and so on. Hence a thorough analysis of certain color, texture and shape extraction techniques are carried out to identify an efficient CBIR technique which suits for a particular type of images. The Extraction of an image includes feature description, index generation and feature detection. The low-level feature extraction techniques are proposed in this paper are tested on Corel database, which contains 1000 images. The feature vectors of the query image (QI) are compared with feature vectors of the database images to obtain matching images(MI). This paper proposes Fuzzy Color and Texture Histogram (FCTH) techniques which extract the matching image based on the similarity of color and edge of an image in the database. The Image Retrieval Precision value (IRP) of the proposed techniques are calculated and compared with that of the existing techniques. The algorithms used in this paper are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Fuzzy Linking algorithm. The proposed technique results in the improvement of the average precision value. Also FCTH is effective and efficient for image indexing and image retrieval.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fading aware MAC (FAMAC) protocol for mobile adhoc network 衰落感知MAC (FAMAC)移动自组网协议
D. Seth, S. Patnaik, Srikanta Pal
In this paper a new MAC protocol called FAMAC is proposed. This protocol has been designed keeping in view the impact of both small scale and large scale fading environments. Whenever the transmission process encounters a small scale fading environments such as rayleigh or ricean, the action is taken to retransmit the RTS control signal expecting the improvement of the communication environment. In case of large scale fading, the transmission power is increased under the assumption that the communicating environment will remain approximately same in the near future. By using ns2 simulator, performance of FAMAC the proposed MAC protocol is compared with the two other most widely used MAC protocol DCF & EDCF. Avg. end-to-end delay and throughput are taken as the performance measure for the purpose. It was observed that the proposed FAMAC protocol shows improved results in comparison to DCF & EDCF. FAMAC shows higher throughput and lesser avg. delay in comparison to other MAC protocols. It was also observed that in FAMAC, the throughput and avg. and-to-end delay remains unaffected by various fading environment. But in DCF and EDCF, those are affected by Rayleigh and Ricean fading environment.
本文提出了一种新的MAC协议FAMAC。该协议的设计考虑了小规模和大规模衰落环境的影响。每当传输过程中遇到瑞利、米恩等小规模衰落环境时,就采取行动,重传RTS控制信号,期待通信环境的改善。在大规模衰落的情况下,假设在不久的将来通信环境大致保持不变的情况下,增加传输功率。通过ns2模拟器,将FAMAC协议的性能与另外两种最常用的MAC协议DCF和EDCF进行了比较。采用端到端平均延迟和吞吐量作为性能指标。与DCF和EDCF相比,所提出的FAMAC协议具有更好的效果。与其他MAC协议相比,FAMAC具有更高的吞吐量和更小的平均延迟。在FAMAC中,吞吐量和平均到端延迟不受各种衰落环境的影响。但在DCF和EDCF中,受瑞利和赖斯衰落环境的影响。
{"title":"Fading aware MAC (FAMAC) protocol for mobile adhoc network","authors":"D. Seth, S. Patnaik, Srikanta Pal","doi":"10.1109/ICCIC.2014.7238466","DOIUrl":"https://doi.org/10.1109/ICCIC.2014.7238466","url":null,"abstract":"In this paper a new MAC protocol called FAMAC is proposed. This protocol has been designed keeping in view the impact of both small scale and large scale fading environments. Whenever the transmission process encounters a small scale fading environments such as rayleigh or ricean, the action is taken to retransmit the RTS control signal expecting the improvement of the communication environment. In case of large scale fading, the transmission power is increased under the assumption that the communicating environment will remain approximately same in the near future. By using ns2 simulator, performance of FAMAC the proposed MAC protocol is compared with the two other most widely used MAC protocol DCF & EDCF. Avg. end-to-end delay and throughput are taken as the performance measure for the purpose. It was observed that the proposed FAMAC protocol shows improved results in comparison to DCF & EDCF. FAMAC shows higher throughput and lesser avg. delay in comparison to other MAC protocols. It was also observed that in FAMAC, the throughput and avg. and-to-end delay remains unaffected by various fading environment. But in DCF and EDCF, those are affected by Rayleigh and Ricean fading environment.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE International Conference on Computational Intelligence and Computing Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1