首页 > 最新文献

2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)最新文献

英文 中文
Bridging the Gap between Disabled People and New Technology in Interactive Web Application with the Help of Voice 在语音的帮助下,在交互式Web应用程序中弥合残疾人与新技术之间的差距
Dilip Kumar, A. Sachan
Major area of developments in the field of voice recognition is more natural way of interacting with web technology have been taking place. The concept that computers can comprehend our various gestures by eyes, voices, touch and our different movements to interact is called the Easy User Interface. Today, many elements are available in mobile phones, PCs and in other devices but the lack of voice to voice application on web are not efficient to the disabled people. Speech technologies particularly play a vital role in this evolving technology. Significant advancement in automatic voice recognition for well defined applications like dictation and medium vocabulary transaction processing assignments in web application is comparatively controlled environments have been made on web server. But, automatic speech recognition still has to reach a level needed for speech to become a completely pervasive user interface because even in clean acoustic surroundings in web application. Visual voice recognition, however, is a promising source of extra voice information and it has successfully exhibited to enhance noise robustness of automatic voice recognizers, so thereby promising to enhance their usability in the web application by use of voice interaction in web. In this paper, the main objective is to provide more easy interaction between user (disabled people) and web application. Today we are using web text by typing the text and in early days Google chrome enhances their functionality adding voice search. But we are trying to accessing all web text with the help of voice. We are using JSAPI components of speech recognition from the java technology, i.e., the voice and the text components along with the latest advancements made in the field of web uses. Further, the research goes beyond the recent advancements and discusses the future scope of speech recognition technology and mentions some likely future developments, evaluating each on the basis of its performance.
语音识别领域的主要发展领域是更自然地与网络技术进行交互。计算机可以通过眼睛、声音、触摸和我们不同的动作来理解我们的各种手势,并进行交互的概念被称为简单用户界面。今天,许多元素都可以在移动电话,个人电脑和其他设备上使用,但缺乏网络上的语音对语音应用,这对残疾人来说效率不高。语音技术在这一不断发展的技术中发挥着至关重要的作用。在诸如听写和中等词汇量的事务处理等定义明确的应用中,web应用中的自动语音识别在相对可控的环境下已经在web服务器上取得了重大进展。但是,即使在干净的声学环境中,自动语音识别仍然需要达到语音成为完全普及的用户界面所需的水平。而视觉语音识别是一种很有前途的额外语音信息来源,它已经成功地增强了自动语音识别器的噪声鲁棒性,从而有望通过在web中使用语音交互来提高其在web应用中的可用性。在本文中,主要目标是提供更容易的用户(残疾人)和web应用程序之间的交互。今天,我们通过输入文本来使用网络文本,在早期,谷歌chrome增强了他们的功能,增加了语音搜索。但是我们正在尝试通过语音的帮助来访问所有的网络文本。我们正在使用来自java技术的语音识别的JSAPI组件,即语音和文本组件以及在web使用领域取得的最新进展。此外,该研究超越了最近的进展,讨论了语音识别技术的未来范围,并提到了一些可能的未来发展,并根据其性能对每种技术进行了评估。
{"title":"Bridging the Gap between Disabled People and New Technology in Interactive Web Application with the Help of Voice","authors":"Dilip Kumar, A. Sachan","doi":"10.1109/ICAETR.2014.7012885","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012885","url":null,"abstract":"Major area of developments in the field of voice recognition is more natural way of interacting with web technology have been taking place. The concept that computers can comprehend our various gestures by eyes, voices, touch and our different movements to interact is called the Easy User Interface. Today, many elements are available in mobile phones, PCs and in other devices but the lack of voice to voice application on web are not efficient to the disabled people. Speech technologies particularly play a vital role in this evolving technology. Significant advancement in automatic voice recognition for well defined applications like dictation and medium vocabulary transaction processing assignments in web application is comparatively controlled environments have been made on web server. But, automatic speech recognition still has to reach a level needed for speech to become a completely pervasive user interface because even in clean acoustic surroundings in web application. Visual voice recognition, however, is a promising source of extra voice information and it has successfully exhibited to enhance noise robustness of automatic voice recognizers, so thereby promising to enhance their usability in the web application by use of voice interaction in web. In this paper, the main objective is to provide more easy interaction between user (disabled people) and web application. Today we are using web text by typing the text and in early days Google chrome enhances their functionality adding voice search. But we are trying to accessing all web text with the help of voice. We are using JSAPI components of speech recognition from the java technology, i.e., the voice and the text components along with the latest advancements made in the field of web uses. Further, the research goes beyond the recent advancements and discusses the future scope of speech recognition technology and mentions some likely future developments, evaluating each on the basis of its performance.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125283753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Measurement of glucose by using modulating ultrasound with optical technique in normal and diabetic human blood serum 用光学技术调制超声测量正常人和糖尿病人血清中的葡萄糖
Anuj Srivastava, Md. Koushik Chowdhury, Shiru Sharma, Neeraj Sharma
This paper describes the effect of various glucose concentrations in normal and diabetic human blood serums mixed with intralipid phantoms. Amplitude modulated ultrasound and infrared techniques were utilized here. Modulated ultrasound causes signature specific molecular vibrations through the area of its propagation. The infrared light of specific wavelength is used here to detect the target glucose molecules. The infrared photo sensor detects the resultant signal and undergoes series of signal processing steps to yield the output value. The trend obtained from the result indicates that human diabetic blood serum occupies highest peak values in Fast Fourier Transform domain as compared to the normal human blood serum peak values. The proposed method provides a new dimension for noninvasive blood glucose measurement techniques. Noninvasive method for blood glucose detection is the need of hour. Tight control regimen with noninvasive glucometer will change the way of living of the diabetes affected population.
本文描述了不同浓度的葡萄糖对正常和糖尿病人血清中脂内幻影的影响。本文采用了调幅超声和红外技术。调制超声通过其传播区域引起特征特定的分子振动。这里使用特定波长的红外光来检测目标葡萄糖分子。红外光传感器检测产生的信号,并经过一系列信号处理步骤以产生输出值。结果表明,糖尿病患者血清在快速傅里叶变换域中的峰值高于正常人血清的峰值。该方法为无创血糖测量技术提供了一个新的维度。无创血糖检测方法是当前的迫切需要。无创血糖仪的严格控制将改变糖尿病患者的生活方式。
{"title":"Measurement of glucose by using modulating ultrasound with optical technique in normal and diabetic human blood serum","authors":"Anuj Srivastava, Md. Koushik Chowdhury, Shiru Sharma, Neeraj Sharma","doi":"10.1109/ICAETR.2014.7012942","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012942","url":null,"abstract":"This paper describes the effect of various glucose concentrations in normal and diabetic human blood serums mixed with intralipid phantoms. Amplitude modulated ultrasound and infrared techniques were utilized here. Modulated ultrasound causes signature specific molecular vibrations through the area of its propagation. The infrared light of specific wavelength is used here to detect the target glucose molecules. The infrared photo sensor detects the resultant signal and undergoes series of signal processing steps to yield the output value. The trend obtained from the result indicates that human diabetic blood serum occupies highest peak values in Fast Fourier Transform domain as compared to the normal human blood serum peak values. The proposed method provides a new dimension for noninvasive blood glucose measurement techniques. Noninvasive method for blood glucose detection is the need of hour. Tight control regimen with noninvasive glucometer will change the way of living of the diabetes affected population.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114588042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PNG image copyright protection and authentication using SVD hash and AES 使用SVD哈希和AES的PNG图像版权保护和认证
Anushree Jain, V. Jain
There has been a rapid growth in the use of digital images due to development of modern technology. And easily available image editing tools and software's have made these images easy to distribute, manipulate, and duplicate. All these reasons are enforcing a need for copyright enforcement methods that can provide copyright to the owner. In our proposed method a PNG image is used as the cover image in which the alpha-channel value of each pixel is set to default. That is, the cover image is a totally transparent color one at the beginning of the proposed data hiding process. When we apply data hiding technique to any PNG image which has transparency, it distorts the image transparency, which causes visibility issues with PNG image. To overcome this issue proposed technique uses 3 LSB of alpha channel to embed signals in image. In proposed technique owner encrypted information and hash code using SVD is embedded in image. SVD hash can be used to cross check the image contents. Experimental result show, there is no visible defect after embedding authentication signal into the cover images using proposed technique. In this paper, the proposed technique embeds the copyright information (authentication signal) which is encrypted using 128 bit AES and Singular Value Data (SVD) by using Shamir secret sharing data hiding technique. This technique is very robust and more secure as compared to previous data hiding techniques.
由于现代技术的发展,数字图像的使用迅速增长。易于获得的图像编辑工具和软件使得这些图像易于分发、操作和复制。所有这些原因都迫使我们需要能够向所有者提供版权的版权执行方法。在我们提出的方法中,使用PNG图像作为封面图像,其中每个像素的alpha通道值设置为默认值。即,在建议的数据隐藏处理开始时,封面图像是完全透明的彩色图像。当我们将数据隐藏技术应用于任何具有透明度的PNG图像时,它会扭曲图像的透明度,从而导致PNG图像的可见性问题。为了克服这一问题,提出了利用3 LSB的alpha通道将信号嵌入图像的技术。该技术利用奇异值分解技术在图像中嵌入所有者加密信息和哈希码。SVD散列可以用来交叉检查图像内容。实验结果表明,利用该方法将认证信号嵌入到封面图像后,没有明显的缺陷。本文采用Shamir秘密共享数据隐藏技术,将采用128位AES加密的版权信息(认证信号)和奇异值数据(SVD)进行嵌入。与以前的数据隐藏技术相比,这种技术非常健壮,也更安全。
{"title":"PNG image copyright protection and authentication using SVD hash and AES","authors":"Anushree Jain, V. Jain","doi":"10.1109/ICAETR.2014.7012950","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012950","url":null,"abstract":"There has been a rapid growth in the use of digital images due to development of modern technology. And easily available image editing tools and software's have made these images easy to distribute, manipulate, and duplicate. All these reasons are enforcing a need for copyright enforcement methods that can provide copyright to the owner. In our proposed method a PNG image is used as the cover image in which the alpha-channel value of each pixel is set to default. That is, the cover image is a totally transparent color one at the beginning of the proposed data hiding process. When we apply data hiding technique to any PNG image which has transparency, it distorts the image transparency, which causes visibility issues with PNG image. To overcome this issue proposed technique uses 3 LSB of alpha channel to embed signals in image. In proposed technique owner encrypted information and hash code using SVD is embedded in image. SVD hash can be used to cross check the image contents. Experimental result show, there is no visible defect after embedding authentication signal into the cover images using proposed technique. In this paper, the proposed technique embeds the copyright information (authentication signal) which is encrypted using 128 bit AES and Singular Value Data (SVD) by using Shamir secret sharing data hiding technique. This technique is very robust and more secure as compared to previous data hiding techniques.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115928910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Virtualized dynamic URL assignment web crawling model 虚拟动态URL分配网络爬虫模型
Wani Rohit Bhaginath, S. Shingade, M. Shirole
Web search engines are software systems that help to retrieve the information from the net by accepting the input in the form of query and providing the result as files, pages, images or information. These search engines heavily rely on the web crawlers that interact with millions of the web pages given a seed URL or a list of seed URLs. However, these crawlers demand a large amount of computing resources. The efficiency of web search engines depends upon the performance of the crawling processes. Despite the continuous improvement in the crawling processes still there is a need of improvement towards more efficient and low cost crawler. Most of the crawlers existing today have a centralized coordinator that brings the disadvantage of single point failure. Taking into consideration the shortfalls of the existing crawlers, this paper proposes an architecture of a distributed web crawler. The architecture addresses two issues of the existing web crawlers: the first is to create a low cost web crawler using the concept of virtualization of cloud computing. The second issue is a balanced load distribution based on dynamic assignment of the URLs. The first issue is solved using mutli-core machines where each multi-core processor is divided into number of virtual machines (VM) that can perform different crawling task in parallel. Second issue is addressed using a clustering algorithm that assigns requests to the machines as per the availability of the clusters thereby realizing the balance among components according to their real-time condition. This paper discusses a distributed architecture and details of the implementation of the proposed algorithm.
网络搜索引擎是一种软件系统,它通过接受以查询形式输入的信息,并以文件、页面、图像或信息的形式提供结果,从而帮助从网上检索信息。这些搜索引擎严重依赖于网络爬虫,这些爬虫与数百万个给定种子URL或种子URL列表的网页进行交互。然而,这些爬虫需要大量的计算资源。网络搜索引擎的效率取决于爬行过程的性能。尽管爬行过程不断改进,但仍然需要向更高效、更低成本的爬行器改进。现有的大多数爬虫都有一个集中的协调器,这带来了单点故障的缺点。针对现有网络爬虫的不足,提出了一种分布式网络爬虫的体系结构。该体系结构解决了现有网络爬虫的两个问题:第一个是使用云计算虚拟化的概念创建低成本的网络爬虫。第二个问题是基于url动态分配的均衡负载分布。第一个问题是使用多核机器解决的,其中每个多核处理器被划分为多个虚拟机(VM),这些虚拟机可以并行执行不同的爬行任务。第二个问题是使用集群算法解决的,该算法根据集群的可用性将请求分配给机器,从而根据组件的实时状况实现组件之间的平衡。本文讨论了分布式架构和算法的实现细节。
{"title":"Virtualized dynamic URL assignment web crawling model","authors":"Wani Rohit Bhaginath, S. Shingade, M. Shirole","doi":"10.1109/ICAETR.2014.7012963","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012963","url":null,"abstract":"Web search engines are software systems that help to retrieve the information from the net by accepting the input in the form of query and providing the result as files, pages, images or information. These search engines heavily rely on the web crawlers that interact with millions of the web pages given a seed URL or a list of seed URLs. However, these crawlers demand a large amount of computing resources. The efficiency of web search engines depends upon the performance of the crawling processes. Despite the continuous improvement in the crawling processes still there is a need of improvement towards more efficient and low cost crawler. Most of the crawlers existing today have a centralized coordinator that brings the disadvantage of single point failure. Taking into consideration the shortfalls of the existing crawlers, this paper proposes an architecture of a distributed web crawler. The architecture addresses two issues of the existing web crawlers: the first is to create a low cost web crawler using the concept of virtualization of cloud computing. The second issue is a balanced load distribution based on dynamic assignment of the URLs. The first issue is solved using mutli-core machines where each multi-core processor is divided into number of virtual machines (VM) that can perform different crawling task in parallel. Second issue is addressed using a clustering algorithm that assigns requests to the machines as per the availability of the clusters thereby realizing the balance among components according to their real-time condition. This paper discusses a distributed architecture and details of the implementation of the proposed algorithm.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survey and overview of Mobile Ad-Hoc Network routing protocols 移动Ad-Hoc网络路由协议综述
A. Srivastava, A. Mishra, Bikash Upadhyay, Akhileshwar Yadav
In Early 1990 researchers have shown a keen interest in Mobile Ad-hoc Network. The absence of infrastructure and its dynamic, diverse principal characteristics has made it more popular as well as vibrant because of it the Internet Engineering Task Force (IETF) is established. Not only bigger company and organization, different institutes are also working on MANET. It applies the TCP/IP protocol stack with slight modification for end to end communication. In MANET Routing is the toughest task because nodes works as router and host at the same time with the changing environment, infact for this many researchers have proposed new protocols and have shown that the protocol proposed works well and is improved over different scenario, strategy and conditions. In contrast to above it is quite challenging that which protocol performs best under different scenario, strategy and condition. Therefore, in this paper we provide a survey and overview of different routing protocols even survey of complexity comparison is also performed to find out which protocol will fit for larger network or so.
20世纪90年代初,研究人员对移动自组织网络表现出浓厚的兴趣。基础设施的缺乏及其动态的、多样化的主要特征使其更受欢迎和充满活力,因为它建立了互联网工程任务组(IETF)。不仅是大公司和组织,不同的研究所也在研究MANET。它应用TCP/IP协议栈,对端到端通信进行了轻微修改。在MANET中,路由是最困难的任务,因为节点在不断变化的环境中同时作为路由器和主机,因此许多研究人员提出了新的协议,并表明所提出的协议在不同的场景、策略和条件下都能很好地工作并得到改进。相比之下,在不同的场景、策略和条件下,哪种协议表现最好是一个相当具有挑战性的问题。因此,本文对不同的路由协议进行了调查和概述,甚至对复杂性进行了调查比较,以找出哪种协议适合更大的网络。
{"title":"Survey and overview of Mobile Ad-Hoc Network routing protocols","authors":"A. Srivastava, A. Mishra, Bikash Upadhyay, Akhileshwar Yadav","doi":"10.1109/ICAETR.2014.7012959","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012959","url":null,"abstract":"In Early 1990 researchers have shown a keen interest in Mobile Ad-hoc Network. The absence of infrastructure and its dynamic, diverse principal characteristics has made it more popular as well as vibrant because of it the Internet Engineering Task Force (IETF) is established. Not only bigger company and organization, different institutes are also working on MANET. It applies the TCP/IP protocol stack with slight modification for end to end communication. In MANET Routing is the toughest task because nodes works as router and host at the same time with the changing environment, infact for this many researchers have proposed new protocols and have shown that the protocol proposed works well and is improved over different scenario, strategy and conditions. In contrast to above it is quite challenging that which protocol performs best under different scenario, strategy and condition. Therefore, in this paper we provide a survey and overview of different routing protocols even survey of complexity comparison is also performed to find out which protocol will fit for larger network or so.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123706220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Multiple Kernel Learning for stock price direction prediction 多核学习用于股票价格方向预测
Amit Sirohi, P. Mahato, V. Attar
Unstable and assumptive aspects of the securities makes it hard to predict the next day stock prices. There is no absolute indicator for financial forecasting but there are many technical indicators like simple moving average, exponential moving average, stochastic fast and slow, on balance volume for better accomplishment. It is important to have a significant and well-constructed set of features to elaborate stock trends. In this paper, we have proposed a Multiple Kernel Learning Model which predicts the daily trend of stock prices such as up or down, it comprises of 2-tier framework. In first tier, we extracted some technical indicators based on five raw elements- opening price, daily high price, daily low price, closing price and trading volume. In second tier, we built different base kernels on the extracted feature set and then combined these base kernels through Multiple Kernel learning, we have trained the model through walk forward method and predicted the movement of daily stock trend such as up or down, and then evaluated its performance. Experiment results shows that our proposed solution performs well consistently than baseline methods (Support Vector Machine) in terms of prediction accuracy for two commodities in stock market.
证券的不稳定性和假设性使得人们很难预测第二天的股价。财务预测没有绝对的指标,但有许多技术指标,如简单移动平均线、指数移动平均线、随机快慢、平衡量等,可以更好地完成。重要的是要有一组重要的和构造良好的特征来阐述股票趋势。在本文中,我们提出了一个多核学习模型来预测股票价格的日常趋势,如上涨或下跌,它由两层框架组成。在第一层,我们根据开盘价、日最高价、日最低价、收盘价和交易量这五个原始要素提取了一些技术指标。在第二层,我们在提取的特征集上构建不同的基核,然后通过多核学习将这些基核组合在一起,通过正向行走法对模型进行训练,预测每日股票的涨跌走势,然后对其性能进行评估。实验结果表明,我们提出的方法在股票市场两种商品的预测精度方面优于基线方法(支持向量机)。
{"title":"Multiple Kernel Learning for stock price direction prediction","authors":"Amit Sirohi, P. Mahato, V. Attar","doi":"10.1109/ICAETR.2014.7012901","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012901","url":null,"abstract":"Unstable and assumptive aspects of the securities makes it hard to predict the next day stock prices. There is no absolute indicator for financial forecasting but there are many technical indicators like simple moving average, exponential moving average, stochastic fast and slow, on balance volume for better accomplishment. It is important to have a significant and well-constructed set of features to elaborate stock trends. In this paper, we have proposed a Multiple Kernel Learning Model which predicts the daily trend of stock prices such as up or down, it comprises of 2-tier framework. In first tier, we extracted some technical indicators based on five raw elements- opening price, daily high price, daily low price, closing price and trading volume. In second tier, we built different base kernels on the extracted feature set and then combined these base kernels through Multiple Kernel learning, we have trained the model through walk forward method and predicted the movement of daily stock trend such as up or down, and then evaluated its performance. Experiment results shows that our proposed solution performs well consistently than baseline methods (Support Vector Machine) in terms of prediction accuracy for two commodities in stock market.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A effective and efficient algorithm for cross level frequent pattern mining 一种高效的跨层频繁模式挖掘算法
Syed Zishan Ali, Y. Rathore
Today many data mining techniques have been implemented in order to retrieve useful patterns from the respective information. But Still there is an issue to generate the require patterns effectively. This paper shows a effective method for cross level frequent pattern mining. Data concerning Multilevel and cross level frequent patterns is attention-grabbing and helpful. The classic frequent pattern mining algorithms supported a homogenous minimum support, such as Apriori and FP-growth, either miss attention-grabbing patterns of low support or suffer from the bottleneck of itemset generation.
现在已经实现了许多数据挖掘技术,以便从各自的信息中检索有用的模式。但是有效地生成需求模式仍然存在一个问题。提出了一种有效的跨层频繁模式挖掘方法。关于多层和跨层频繁模式的数据是引人注目和有益的。经典的频繁模式挖掘算法支持同质最小支持度,如Apriori和FP-growth,要么错过了低支持度的引人注目的模式,要么受到项目集生成的瓶颈的影响。
{"title":"A effective and efficient algorithm for cross level frequent pattern mining","authors":"Syed Zishan Ali, Y. Rathore","doi":"10.1109/ICAETR.2014.7012865","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012865","url":null,"abstract":"Today many data mining techniques have been implemented in order to retrieve useful patterns from the respective information. But Still there is an issue to generate the require patterns effectively. This paper shows a effective method for cross level frequent pattern mining. Data concerning Multilevel and cross level frequent patterns is attention-grabbing and helpful. The classic frequent pattern mining algorithms supported a homogenous minimum support, such as Apriori and FP-growth, either miss attention-grabbing patterns of low support or suffer from the bottleneck of itemset generation.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117100649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Tuning of PID controller by Cuckoo Search via Lévy flights 基于lvac的杜鹃搜索PID控制器的最优整定
Meenakshi Kishnani, S. Pareek, Rajeev Gupta
Nature has been a main source of inspiration for many optimization algorithms. Such algorithms are increasingly becoming popular among control engineers for the optimal tuning of PID controller. In this paper, a very recent nature inspired metaheuristic technique known as Cuckoo Search Algorithm is presented for the optimal tuning of PID controller. This controller is required to achieve the desired specification of the closed loop response of the DC motor plant, that here is taken as a third order plant system. Though several conventional techniques have been proposed to sufficiently optimize linear plant systems but the desired performance indices i.e. settling time, overshoot, rise time etc. are comparatively higher than the response attained by heuristic algorithms. Here, a study is done on PID controller optimized by Cuckoo Search Algorithm for different fitness functions i.e. IAE, ISE, ITAE and ITSE and their responses are compared with one such conventional method.
大自然一直是许多优化算法的主要灵感来源。这种算法越来越受到控制工程师的欢迎,用于PID控制器的最优整定。本文提出了一种基于自然启发的元启发式算法——布谷鸟搜索算法,用于PID控制器的最优整定。该控制器需要达到直流电机系统闭环响应的期望规格,这里取为三阶系统。虽然已经提出了几种传统技术来充分优化线性植物系统,但期望的性能指标,即沉降时间,超调量,上升时间等相对高于启发式算法所获得的响应。本文对不同适应度函数IAE、ISE、ITAE、ITSE采用布谷鸟搜索算法优化的PID控制器进行了研究,并与常规方法进行了响应比较。
{"title":"Optimal Tuning of PID controller by Cuckoo Search via Lévy flights","authors":"Meenakshi Kishnani, S. Pareek, Rajeev Gupta","doi":"10.1109/ICAETR.2014.7012927","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012927","url":null,"abstract":"Nature has been a main source of inspiration for many optimization algorithms. Such algorithms are increasingly becoming popular among control engineers for the optimal tuning of PID controller. In this paper, a very recent nature inspired metaheuristic technique known as Cuckoo Search Algorithm is presented for the optimal tuning of PID controller. This controller is required to achieve the desired specification of the closed loop response of the DC motor plant, that here is taken as a third order plant system. Though several conventional techniques have been proposed to sufficiently optimize linear plant systems but the desired performance indices i.e. settling time, overshoot, rise time etc. are comparatively higher than the response attained by heuristic algorithms. Here, a study is done on PID controller optimized by Cuckoo Search Algorithm for different fitness functions i.e. IAE, ISE, ITAE and ITSE and their responses are compared with one such conventional method.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A view of Artificial Neural Network 人工神经网络的观点
Manish Mishra, M. Srivastava
In this paper, An Artificial Neural Network or ANN, its various characteristics and business applications. In this paper also show that “what are neural networks” and “Why they are so important in today's Artificial intelligence?” Because various advances have been made in developing intelligent system, some inspired by biological neural networks. ANN provides a very exciting alternatives and other application which can play important role in today's computer science field. There are some Limitations also which are mentioned.
本文介绍了人工神经网络(Artificial Neural Network,简称ANN)的各种特点和业务应用。在这篇论文中还展示了“什么是神经网络”和“为什么它们在今天的人工智能中如此重要?”因为在开发智能系统方面取得了各种进展,其中一些受到生物神经网络的启发。人工神经网络提供了一个非常令人兴奋的替代方案和其他应用,可以在当今的计算机科学领域发挥重要作用。同时也提到了一些局限性。
{"title":"A view of Artificial Neural Network","authors":"Manish Mishra, M. Srivastava","doi":"10.1109/ICAETR.2014.7012785","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012785","url":null,"abstract":"In this paper, An Artificial Neural Network or ANN, its various characteristics and business applications. In this paper also show that “what are neural networks” and “Why they are so important in today's Artificial intelligence?” Because various advances have been made in developing intelligent system, some inspired by biological neural networks. ANN provides a very exciting alternatives and other application which can play important role in today's computer science field. There are some Limitations also which are mentioned.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
“Feature level fusion of face, palm vein and palm print modalities using Discrete Cosine Transform” 基于离散余弦变换的人脸、掌纹和掌纹特征级融合
Aditya Gupta, A. Malage, Dhiraj More, Priya M. Hemane, Prayanti P. Bhautmage, Duhita Dhandekar
Due to usefulness in recognition and identification biometric systems have become a major part of research. Paper proposes a multimodal biometric system using face modality combined with palm print and palm vein modality. The proposed methodology uses Local Statistical method in which pre-defined block of DCT coefficient were used to calculate standard deviation and store them as feature vector. Matching is done using distance between feature vector of testing and training data set. Results show that the Genuine Acceptance Rate (GAR) of feature level fusion is 100% which is better than, that of uni-modal systems, hence having multimodality is advantageous. For testing and training database of 100 students of College of Engineering Pune.
由于生物特征识别系统在识别和身份识别方面的有用性,已成为研究的重要组成部分。本文提出了一种基于人脸模态、手掌纹模态和手掌静脉模态的多模态生物识别系统。该方法采用局部统计方法,利用预先定义好的DCT系数块计算标准差并存储为特征向量。利用测试特征向量与训练数据集之间的距离进行匹配。结果表明,特征级融合的真实接受率(GAR)为100%,优于单模态系统,因此具有多模态是有利的。用于浦那工程学院100名学生的测试和培训数据库。
{"title":"“Feature level fusion of face, palm vein and palm print modalities using Discrete Cosine Transform”","authors":"Aditya Gupta, A. Malage, Dhiraj More, Priya M. Hemane, Prayanti P. Bhautmage, Duhita Dhandekar","doi":"10.1109/ICAETR.2014.7012805","DOIUrl":"https://doi.org/10.1109/ICAETR.2014.7012805","url":null,"abstract":"Due to usefulness in recognition and identification biometric systems have become a major part of research. Paper proposes a multimodal biometric system using face modality combined with palm print and palm vein modality. The proposed methodology uses Local Statistical method in which pre-defined block of DCT coefficient were used to calculate standard deviation and store them as feature vector. Matching is done using distance between feature vector of testing and training data set. Results show that the Genuine Acceptance Rate (GAR) of feature level fusion is 100% which is better than, that of uni-modal systems, hence having multimodality is advantageous. For testing and training database of 100 students of College of Engineering Pune.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124399916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1