首页 > 最新文献

2015 Eighth International Conference on Contemporary Computing (IC3)最新文献

英文 中文
Behavior analysis of malware using machine learning 使用机器学习的恶意软件行为分析
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346730
Arshi Dhammi, M. Singh
In today's scenario, cyber security is one of the major concerns in network security and malware pose a serious threat to cyber security. The foremost step to guard the cyber system is to have an in-depth knowledge of the existing malware, various types of malware, methods of detecting and bypassing the adverse effects of malware. In this work, machine learning approach to the fore-going static and dynamic analysis techniques is investigated and reported to discuss the most recent trends in cyber security. The study captures a wide variety of samples from various online sources. The peculiar details about the malware such as file details, signatures, and hosts involved, affected files, registry keys, mutexes, section details, imports, strings and results from different antivirus have been deeply analyzed to conclude origin and functionality of malware. This approach contributes to vital cyber situation awareness by combining different malware discovery techniques, for example, static examination, to alter the session of malware triage for cyber defense and decreases the count of false alarms. Current trends in warfare have been determined.
在当今的情况下,网络安全是网络安全的主要问题之一,恶意软件对网络安全构成严重威胁。保护网络系统的首要步骤是深入了解现有的恶意软件,各种类型的恶意软件,检测和绕过恶意软件的不利影响的方法。在这项工作中,研究并报告了机器学习方法对上述静态和动态分析技术的影响,以讨论网络安全的最新趋势。这项研究从各种在线资源中获取了各种各样的样本。深入分析了不同杀毒软件的文件详细信息、签名、涉及的主机、受影响的文件、注册表项、互斥锁、区段详细信息、导入、字符串和结果等恶意软件的特殊细节,得出了恶意软件的来源和功能。这种方法通过结合不同的恶意软件发现技术(例如,静态检查)来改变恶意软件分类的会话以进行网络防御,并减少假警报的数量,从而有助于重要的网络态势感知。目前的战争趋势已经确定。
{"title":"Behavior analysis of malware using machine learning","authors":"Arshi Dhammi, M. Singh","doi":"10.1109/IC3.2015.7346730","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346730","url":null,"abstract":"In today's scenario, cyber security is one of the major concerns in network security and malware pose a serious threat to cyber security. The foremost step to guard the cyber system is to have an in-depth knowledge of the existing malware, various types of malware, methods of detecting and bypassing the adverse effects of malware. In this work, machine learning approach to the fore-going static and dynamic analysis techniques is investigated and reported to discuss the most recent trends in cyber security. The study captures a wide variety of samples from various online sources. The peculiar details about the malware such as file details, signatures, and hosts involved, affected files, registry keys, mutexes, section details, imports, strings and results from different antivirus have been deeply analyzed to conclude origin and functionality of malware. This approach contributes to vital cyber situation awareness by combining different malware discovery techniques, for example, static examination, to alter the session of malware triage for cyber defense and decreases the count of false alarms. Current trends in warfare have been determined.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Analysis and modeling pauses for synthesis of storytelling speech based on discourse modes 基于话语模式的讲故事语音合成停顿分析与建模
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346683
Parakrant Sarkar, K. S. Rao
Generally in Text-to-Speech synthesis (TTS) systems, pause prediction plays a vital role in synthesizing natural and expressive speech. In storytelling style, pauses introduce suspense and climax by emphasizing the prominent words or emotion-salient words in a story. The objective of this work is to analyze and model the pause pattern to capture the story-semantic information. The purpose of this paper is to define a stepping stone towards developing a Story TTS based on modes of discourse. In this work, we base our analysis of the pauses in Hindi children stories for each mode of discourse: narrative, descriptive and dialogue. After grouping the sentences into modes, we analyse the pause pattern to capture the story-semantic information. A three stage data-driven method is proposed to predict the location and duration of pauses for each mode. Both the objective as well as subjective test are conducted to evaluate the performance of the proposed method. The subjective evaluation indicates that subjects appreciates the quality of synthesized speech by incorporating the proposed model.
在文本语音合成(TTS)系统中,停顿预测在合成自然而富有表现力的语音中起着至关重要的作用。在讲故事的风格中,停顿通过强调故事中的突出词或情感突出词来引入悬念和高潮。本工作的目的是分析和建模暂停模式,以捕获故事语义信息。本文的目的是为发展基于话语模式的故事TTS奠定基础。在这项工作中,我们对印度语儿童故事中的停顿进行了分析,分析了每种话语模式:叙事、描述和对话。在对句子进行模式分组后,分析停顿模式以获取故事语义信息。提出了一种三阶段数据驱动的方法来预测每种模式的暂停位置和持续时间。同时进行了客观和主观测试来评估所提出的方法的性能。主观评价表明被试对合成语音的质量表示赞赏。
{"title":"Analysis and modeling pauses for synthesis of storytelling speech based on discourse modes","authors":"Parakrant Sarkar, K. S. Rao","doi":"10.1109/IC3.2015.7346683","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346683","url":null,"abstract":"Generally in Text-to-Speech synthesis (TTS) systems, pause prediction plays a vital role in synthesizing natural and expressive speech. In storytelling style, pauses introduce suspense and climax by emphasizing the prominent words or emotion-salient words in a story. The objective of this work is to analyze and model the pause pattern to capture the story-semantic information. The purpose of this paper is to define a stepping stone towards developing a Story TTS based on modes of discourse. In this work, we base our analysis of the pauses in Hindi children stories for each mode of discourse: narrative, descriptive and dialogue. After grouping the sentences into modes, we analyse the pause pattern to capture the story-semantic information. A three stage data-driven method is proposed to predict the location and duration of pauses for each mode. Both the objective as well as subjective test are conducted to evaluate the performance of the proposed method. The subjective evaluation indicates that subjects appreciates the quality of synthesized speech by incorporating the proposed model.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"1935 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128969895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designing chaos based strong substitution box 基于混沌的强替换盒设计
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346660
Musheer Ahmad, Faiyaz Ahmad, Zeba Nasim, Zohra Bano, Shadab Zafar
Substitution boxes are the indispensable part of block ciphering techniques such as AES, DES, IDEA, etc. It is important to design effective S-boxes in an efficient way. In this paper, a method to generate effective S-boxes is proposed. A new technique is suggested to produce the input S-boxes candidates. An initial S-box is obtained by sampling the trajectory of chaotic maps followed by raster and zigzag pattern scanning are performed to further enhance the quality of S-box. Iterating it 1000 times and the best S-box among them is chosen to be given as input S-box. Then a composition is applied on the selected k S-boxes. The generated S-box is tested against different performance criteria. The results of performance tests depict good cryptographic strength and prove it to be the promising method to design a nonlinear component for strong block cipher.
替换盒是AES、DES、IDEA等分组加密技术不可缺少的组成部分。以一种高效的方式设计有效的s盒是很重要的。本文提出了一种生成有效s盒的方法。提出了一种产生候选输入s框的新方法。首先对混沌映射的轨迹进行采样得到初始s盒,然后进行栅格扫描和锯齿形扫描,进一步提高s盒的质量。迭代1000次,选取其中最优的s盒作为输入s盒。然后在选定的k个s框上应用合成。生成的S-box根据不同的性能标准进行测试。性能测试结果表明,该方法具有良好的密码强度,是设计强分组密码非线性组件的有效方法。
{"title":"Designing chaos based strong substitution box","authors":"Musheer Ahmad, Faiyaz Ahmad, Zeba Nasim, Zohra Bano, Shadab Zafar","doi":"10.1109/IC3.2015.7346660","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346660","url":null,"abstract":"Substitution boxes are the indispensable part of block ciphering techniques such as AES, DES, IDEA, etc. It is important to design effective S-boxes in an efficient way. In this paper, a method to generate effective S-boxes is proposed. A new technique is suggested to produce the input S-boxes candidates. An initial S-box is obtained by sampling the trajectory of chaotic maps followed by raster and zigzag pattern scanning are performed to further enhance the quality of S-box. Iterating it 1000 times and the best S-box among them is chosen to be given as input S-box. Then a composition is applied on the selected k S-boxes. The generated S-box is tested against different performance criteria. The results of performance tests depict good cryptographic strength and prove it to be the promising method to design a nonlinear component for strong block cipher.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129383814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Two phase sinusoidal power clocked quasi-static adiabatic logic families 两相正弦功率时钟准静态绝热逻辑族
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346734
P. Sasipriya, V. S. K. Bhaaskaran
The paper presents the comprehensive analysis and evaluation of static adiabatic logic circuits operated by two phase sinusoidal clock signals. The static adiabatic logic has an advantage in the form of reduction in switching energy while comparing with the dynamic adiabatic logic. This advantage is realized due to the fact that the discharging operation at a node happens only when the input signal transition demands a change in the state of the output. Or in other words, if the next input state happens to be the same as the present state, the charged output nodal state remains the same, without undergoing any recovery phase. The analysis of the static adiabatic logic is done using a carry look ahead adder (CLA) implemented by static adiabatic families, namely, QSERL, CEPAL, ASL and QSECRL and comparing them against the static CMOS counterpart. The performance of each of the circuit is studied in terms of the frequency and power clock voltage range of operation. The simulations show that the 8-bit CLA static adiabatic adder realizes energy reduction from 45% to 83% over a frequency range of 100 KHz to 500MHz operation against the static CMOS implementation. The analyses were carried out using SPICE EDA tools using 180 nm technology library from TSMC.
本文对由两相正弦时钟信号驱动的静态绝热逻辑电路进行了综合分析和评价。与动态绝热逻辑相比,静态绝热逻辑在减少开关能量方面具有优势。实现这一优势的原因是,只有当输入信号转换需要改变输出状态时,节点上的放电操作才会发生。或者换句话说,如果下一个输入状态恰好与当前状态相同,则带电输出节点状态保持不变,而不经历任何恢复阶段。静态绝热逻辑的分析是使用由静态绝热族(即QSERL, CEPAL, ASL和QSECRL)实现的进位前置加法器(CLA)完成的,并将它们与静态CMOS对口器进行比较。从工作频率和功率时钟电压范围的角度研究了各电路的性能。仿真结果表明,与静态CMOS实现相比,8位CLA静态绝热加法器在100 KHz至500MHz的频率范围内实现了45%至83%的能量降低。分析采用SPICE EDA工具,采用台积电180nm工艺库。
{"title":"Two phase sinusoidal power clocked quasi-static adiabatic logic families","authors":"P. Sasipriya, V. S. K. Bhaaskaran","doi":"10.1109/IC3.2015.7346734","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346734","url":null,"abstract":"The paper presents the comprehensive analysis and evaluation of static adiabatic logic circuits operated by two phase sinusoidal clock signals. The static adiabatic logic has an advantage in the form of reduction in switching energy while comparing with the dynamic adiabatic logic. This advantage is realized due to the fact that the discharging operation at a node happens only when the input signal transition demands a change in the state of the output. Or in other words, if the next input state happens to be the same as the present state, the charged output nodal state remains the same, without undergoing any recovery phase. The analysis of the static adiabatic logic is done using a carry look ahead adder (CLA) implemented by static adiabatic families, namely, QSERL, CEPAL, ASL and QSECRL and comparing them against the static CMOS counterpart. The performance of each of the circuit is studied in terms of the frequency and power clock voltage range of operation. The simulations show that the 8-bit CLA static adiabatic adder realizes energy reduction from 45% to 83% over a frequency range of 100 KHz to 500MHz operation against the static CMOS implementation. The analyses were carried out using SPICE EDA tools using 180 nm technology library from TSMC.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131210579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characterizing impacts of multi-Vt routers on power and reliability of Network-on-Chip 多路路由器对片上网络的功耗和可靠性的影响
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346729
Ruby Ansar, Prachi Upadhyay, Manish Singhal, Ashish Sharma, M. Gaur
Prolong advancements in technology scaling over the past few years eventually leads to the development of multi core processors. Network On Chip architecture is a promising paradigm to attain higher network density in high performance multi core computing systems. In today's scenario, with the growing number of transistors, power density is becoming prominent issue in the network design. Therefore, the researchers are constantly focusing on accurate estimation of system power which ultimately leads to system reliability enhancement. In this paper, an experimental setup is formulated to analyze the working of multi-Vt NoC routers and their impacts on system power. Different life time distribution schemes are adopted for accurate reliability estimation. We have done the power analysis on the basis of multi-threshold voltage cells which is a low power technique i.e. low Vt (LVT), normal Vt (NVT) and high Vt (HVT) routers and reliability analysis by using two life time distributions i.e. lognormal and weibull and have compared their results. We have also done the comparative analysis with the previous integrated power model on the basis of reliability, transistor performance, architectural and technological parameters. The reliability results by weibull distribution for LVT routers shows 35% degradation as compared to HVT routers and for lognormal the difference is 56%.
在过去的几年里,技术的不断进步最终导致了多核处理器的发展。片上网络架构是在高性能多核计算系统中实现更高网络密度的一种很有前途的模式。在当今的场景中,随着晶体管数量的不断增加,功率密度成为网络设计中的突出问题。因此,如何准确估计系统功率,最终提高系统可靠性一直是研究人员关注的焦点。本文建立了一个实验装置,分析了多路NoC路由器的工作原理及其对系统功率的影响。采用不同的寿命时间分配方案进行准确的可靠性估计。我们在多阈值电压单元的基础上进行了功率分析,这是一种低功率技术,即低Vt (LVT),正常Vt (NVT)和高Vt (HVT)路由器,并通过使用两种寿命分布(对数正态分布和威布尔分布)进行了可靠性分析,并比较了它们的结果。并从可靠性、晶体管性能、结构参数和工艺参数等方面与以往的集成功率模型进行了比较分析。由威布尔分布得出的可靠性结果表明,LVT路由器的可靠性与HVT路由器相比下降了35%,对数正态分布的可靠性与HVT路由器相比下降了56%。
{"title":"Characterizing impacts of multi-Vt routers on power and reliability of Network-on-Chip","authors":"Ruby Ansar, Prachi Upadhyay, Manish Singhal, Ashish Sharma, M. Gaur","doi":"10.1109/IC3.2015.7346729","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346729","url":null,"abstract":"Prolong advancements in technology scaling over the past few years eventually leads to the development of multi core processors. Network On Chip architecture is a promising paradigm to attain higher network density in high performance multi core computing systems. In today's scenario, with the growing number of transistors, power density is becoming prominent issue in the network design. Therefore, the researchers are constantly focusing on accurate estimation of system power which ultimately leads to system reliability enhancement. In this paper, an experimental setup is formulated to analyze the working of multi-Vt NoC routers and their impacts on system power. Different life time distribution schemes are adopted for accurate reliability estimation. We have done the power analysis on the basis of multi-threshold voltage cells which is a low power technique i.e. low Vt (LVT), normal Vt (NVT) and high Vt (HVT) routers and reliability analysis by using two life time distributions i.e. lognormal and weibull and have compared their results. We have also done the comparative analysis with the previous integrated power model on the basis of reliability, transistor performance, architectural and technological parameters. The reliability results by weibull distribution for LVT routers shows 35% degradation as compared to HVT routers and for lognormal the difference is 56%.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125341951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Significance of Clustering Coefficient over Jaccard Index 聚类系数对Jaccard指数的显著性
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346726
Anand Kumar Gupta, Neetu Sardana
Link prediction is a key task to identify the future links among existing non-connected members of a network, by measuring the proximity between nodes in a network. Node neighbourhood based link prediction techniques are immensely used for prediction of future links. These techniques can be applied on various applications like biological protein- protein interaction network, social network, information network and citation network to predict the future links. Every network has got certain structural properties. For predicting the accuracy of future links, structural properties might play an important role. Current work is an effort to find out the correlation between structural properties of network and prediction accuracy. Positive Correlation will signify that knowing the structural properties of a Network will assist us to know the prediction accuracy in advance.
链路预测是一项关键任务,通过测量网络中节点之间的接近度来识别网络中现有非连接成员之间的未来链路。基于节点邻域的链路预测技术被广泛用于预测未来的链路。这些技术可以应用于生物蛋白-蛋白相互作用网络、社会网络、信息网络和引文网络等各种应用中,预测未来的链接。每个网络都有一定的结构性质。为了预测未来链接的准确性,结构特性可能起着重要作用。目前的工作是找出网络结构特性与预测精度之间的关系。正相关意味着知道网络的结构属性将有助于我们提前知道预测的准确性。
{"title":"Significance of Clustering Coefficient over Jaccard Index","authors":"Anand Kumar Gupta, Neetu Sardana","doi":"10.1109/IC3.2015.7346726","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346726","url":null,"abstract":"Link prediction is a key task to identify the future links among existing non-connected members of a network, by measuring the proximity between nodes in a network. Node neighbourhood based link prediction techniques are immensely used for prediction of future links. These techniques can be applied on various applications like biological protein- protein interaction network, social network, information network and citation network to predict the future links. Every network has got certain structural properties. For predicting the accuracy of future links, structural properties might play an important role. Current work is an effort to find out the correlation between structural properties of network and prediction accuracy. Positive Correlation will signify that knowing the structural properties of a Network will assist us to know the prediction accuracy in advance.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Development of a prototype to detect speed limit violation for better traffic management 开发一个原型,以检测违反速度限制,以更好地管理交通
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346723
Joyeeta Goswami, Shirsha Ghosh, Shivaditya Katiyar, A. Majumder
Due to the extreme fast movement of traffic in the busy localities, the cases of road accidents are increasing day by day. Traffic Control Board made different speed limit for different places to limit the speed, but it is not possible to always monitor the infringements manually due to several factors. This paper proposes development of a prototype by which the Traffic Control Board automatically gets the details of the over speed vehicles in any place. Specifically, a network of Master XBees are installed in every locality that will broadcast the information regarding the speed limit of the region. The vehicle will have a device that has a CPU, a speedometer along with another XBee. This XBee will get the speed limit of the region from the Master XBee and the CPU will compare that with the instantaneous speed of the vehicle. If the instantaneous speed is higher than the speed limit of the region then a warning message will be displayed and a particular time slot is given to check the speed. After the time if the speed is not reduced, then the information regarding the Registration number of the vehicle is transmitted to the master XBee. This information is then stored into a server, from which the data can be accessed anywhere via internet. We have also developed the prototype of the Web Monitoring System by which the data can be accessed from the server.
由于繁忙地区的交通速度极快,道路交通事故日益增多。交通管理委员会为不同的地方制定了不同的限速来限制速度,但由于几个因素,不可能总是手动监控违规行为。本文提出了一种可使交通管制局在任何地点自动获取超速车辆详细信息的原型系统。具体来说,每个地方都安装了一个主XBees网络,它将广播有关该地区限速的信息。这辆车将有一个设备,它有一个CPU,一个速度计和另一个XBee。这个XBee将从Master XBee获得该区域的速度限制,CPU将其与车辆的瞬时速度进行比较。如果瞬时速度高于该地区的速度限制,则会显示警告信息,并给出特定的时隙来检查速度。在此时间之后,如果速度没有降低,那么有关车辆注册号的信息将被传输到主XBee。然后,这些信息被存储到服务器中,通过互联网可以在任何地方访问这些数据。我们还开发了Web监控系统的原型,通过该系统可以从服务器访问数据。
{"title":"Development of a prototype to detect speed limit violation for better traffic management","authors":"Joyeeta Goswami, Shirsha Ghosh, Shivaditya Katiyar, A. Majumder","doi":"10.1109/IC3.2015.7346723","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346723","url":null,"abstract":"Due to the extreme fast movement of traffic in the busy localities, the cases of road accidents are increasing day by day. Traffic Control Board made different speed limit for different places to limit the speed, but it is not possible to always monitor the infringements manually due to several factors. This paper proposes development of a prototype by which the Traffic Control Board automatically gets the details of the over speed vehicles in any place. Specifically, a network of Master XBees are installed in every locality that will broadcast the information regarding the speed limit of the region. The vehicle will have a device that has a CPU, a speedometer along with another XBee. This XBee will get the speed limit of the region from the Master XBee and the CPU will compare that with the instantaneous speed of the vehicle. If the instantaneous speed is higher than the speed limit of the region then a warning message will be displayed and a particular time slot is given to check the speed. After the time if the speed is not reduced, then the information regarding the Registration number of the vehicle is transmitted to the master XBee. This information is then stored into a server, from which the data can be accessed anywhere via internet. We have also developed the prototype of the Web Monitoring System by which the data can be accessed from the server.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Neutral to happy emotion conversion by blending prosody and laughter 通过混合韵律和笑声中性到快乐的情感转换
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346704
M. GurunathReddy, K. S. Rao
In this paper, we propose a method to convert synthesised neutral speech to happy emotion speech by prosody modification and synthesizing laughter sequence. Excitation source features of verbal (spoken) and non-verbal (laughter) segments of elicited happy emotion are separately analysed and incorporated in the neutral speech. Pitch contours of verbal segments of the happy emotion are divided into three components and analysed separately for incorporation. Laughter sequence is synthesised by incorporating the appropriate pitch period and strength of excitation contours on a synthesised vowel utterance. Modulated frication noise is added to the laughter segments to enhance the quality further. The effectiveness of the synthesized happy speech is confirmed by the waveforms, spectrograms and subjective evaluations.
本文提出了一种通过韵律修饰和笑声序列合成将合成的中性语音转化为快乐情绪语音的方法。分别分析了被诱发的快乐情绪的言语(说)段和非言语(笑)段的激励源特征,并将其纳入中性言语中。将快乐情绪的语段音高轮廓分为三个部分,分别进行分析。笑声序列是通过将适当的音高周期和激发轮廓的强度结合在合成的元音话语上合成的。调制摩擦噪声被添加到笑声片段,以进一步提高质量。通过波形、谱图和主观评价,证实了合成快乐语音的有效性。
{"title":"Neutral to happy emotion conversion by blending prosody and laughter","authors":"M. GurunathReddy, K. S. Rao","doi":"10.1109/IC3.2015.7346704","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346704","url":null,"abstract":"In this paper, we propose a method to convert synthesised neutral speech to happy emotion speech by prosody modification and synthesizing laughter sequence. Excitation source features of verbal (spoken) and non-verbal (laughter) segments of elicited happy emotion are separately analysed and incorporated in the neutral speech. Pitch contours of verbal segments of the happy emotion are divided into three components and analysed separately for incorporation. Laughter sequence is synthesised by incorporating the appropriate pitch period and strength of excitation contours on a synthesised vowel utterance. Modulated frication noise is added to the laughter segments to enhance the quality further. The effectiveness of the synthesized happy speech is confirmed by the waveforms, spectrograms and subjective evaluations.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121515602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Energy conservation and collision avoidance by controlled access protocol in WSN 无线传感器网络中控制接入协议的节能与避碰
Pub Date : 2015-08-20 DOI: 10.1109/IC3.2015.7346661
Gurkiran Kaur, R. Miglani, G. S. Gaba, R. Pasricha
Energy conservation is one of the major aspects in Wireless Sensor Networks since it impacts the network lifetime. In this paper; we focus on the energy conservation in the MAC protocol which is basically used for the transmitting of data/selecting the channel for transmission. The energy conservation process is carried out by using the controlled access protocol. The paper emphasizes on operation of primary and secondary nodes in the polling mechanism and MACA-BI to carry out transmission in proper manner without any delay factor involved. The lifetime of a node and network of proposed technique is compared with the network using Random Access Protocol by considering the power consumed by each node under various modes.
节能是无线传感器网络的一个重要方面,因为它直接影响到网络的寿命。在本文中;我们重点研究了MAC协议中的节能问题,它主要用于数据的传输/选择传输通道。节能过程是通过使用受控访问协议来实现的。本文强调轮询机制中的主节点和从节点以及MACA-BI的运行,在不涉及任何延迟因素的情况下,以适当的方式进行传输。通过考虑各节点在各种模式下的功耗,比较了采用该技术的节点和网络与采用随机接入协议的网络的寿命。
{"title":"Energy conservation and collision avoidance by controlled access protocol in WSN","authors":"Gurkiran Kaur, R. Miglani, G. S. Gaba, R. Pasricha","doi":"10.1109/IC3.2015.7346661","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346661","url":null,"abstract":"Energy conservation is one of the major aspects in Wireless Sensor Networks since it impacts the network lifetime. In this paper; we focus on the energy conservation in the MAC protocol which is basically used for the transmitting of data/selecting the channel for transmission. The energy conservation process is carried out by using the controlled access protocol. The paper emphasizes on operation of primary and secondary nodes in the polling mechanism and MACA-BI to carry out transmission in proper manner without any delay factor involved. The lifetime of a node and network of proposed technique is compared with the network using Random Access Protocol by considering the power consumed by each node under various modes.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121631450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pruned search: A machine learning based meta-heuristic approach for constrained continuous optimization 修剪搜索:一种基于机器学习的约束连续优化元启发式方法
Pub Date : 2015-08-01 DOI: 10.1109/IC3.2015.7346645
Ruoqian Liu, Ankit Agrawal, W. Liao, A. Choudhary, Zhengzhang Chen
Searching for solutions that optimize a continuous function can be difficult due to the infinite search space, and can be further complicated by the high dimensionality in the number of variables and complexity in the structure of constraints. Both deterministic and stochastic methods have been presented in the literature with a purpose of exploiting the search space and avoiding local optima as much as possible. In this research, we develop a machine learning framework aiming to `prune' the search effort of both types of optimization techniques by developing meta-heuristics, attempting to knowledgeably reordering the search space and reducing the search region. Numerical examples demonstrate that this approach can effectively find the global optimal solutions and significantly reduce the computational time for seven benchmark problems with variable dimensions of 100, 500 and 1000, compared to Genetic Algorithms.
由于搜索空间无限,寻找优化连续函数的解可能会很困难,并且由于变量数量的高维性和约束结构的复杂性,可能会进一步复杂化。文献中提出了确定性和随机方法,目的是利用搜索空间并尽可能避免局部最优。在本研究中,我们开发了一个机器学习框架,旨在通过开发元启发式来“修剪”两种优化技术的搜索工作,试图明智地重新排序搜索空间并减少搜索区域。数值算例表明,与遗传算法相比,该方法可以有效地找到100、500和1000变维的7个基准问题的全局最优解,显著减少了计算时间。
{"title":"Pruned search: A machine learning based meta-heuristic approach for constrained continuous optimization","authors":"Ruoqian Liu, Ankit Agrawal, W. Liao, A. Choudhary, Zhengzhang Chen","doi":"10.1109/IC3.2015.7346645","DOIUrl":"https://doi.org/10.1109/IC3.2015.7346645","url":null,"abstract":"Searching for solutions that optimize a continuous function can be difficult due to the infinite search space, and can be further complicated by the high dimensionality in the number of variables and complexity in the structure of constraints. Both deterministic and stochastic methods have been presented in the literature with a purpose of exploiting the search space and avoiding local optima as much as possible. In this research, we develop a machine learning framework aiming to `prune' the search effort of both types of optimization techniques by developing meta-heuristics, attempting to knowledgeably reordering the search space and reducing the search region. Numerical examples demonstrate that this approach can effectively find the global optimal solutions and significantly reduce the computational time for seven benchmark problems with variable dimensions of 100, 500 and 1000, compared to Genetic Algorithms.","PeriodicalId":217950,"journal":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132612515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2015 Eighth International Conference on Contemporary Computing (IC3)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1