首页 > 最新文献

2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)最新文献

英文 中文
Smart key generation for smart cities 智慧城市的智能密钥生成
KS Shravya, A. Deepak, K. Chandrasekaran
Statistical results have predicted that 70% of world's population will reside in cities by the year 2050. With the advancement in the field of information and communication technology, the concept of smart cities is gaining more prominence. Smart cities use the ICT technology to improve the functioning of the city and enhance the community services provided. To keep the data in smart city secure, different existing security mechanisms have been deployed directly in smart or have been modified to smart city scale. Most of the security mechanisms today need cryptographic keys, hence, key generation plays a pivotal role in the security of any smart city. In this paper, we proposes a key generation methodology especially designed for smart cities using a random number generator which collects entropy from different user end devices and sensors present in the city and generate secure random keys at a central node. We have also tested our method against NSIT random number test suite and have got acceptable results.
统计结果预测,到2050年,70%的世界人口将居住在城市。随着信息通信技术领域的发展,智慧城市的概念越来越突出。智慧城市利用信息通信技术来改善城市的功能,加强所提供的社区服务。为了保证智慧城市数据的安全,现有的各种安全机制已经直接部署在智慧城市中,或者已经被修改为智慧城市规模。当今大多数安全机制都需要加密密钥,因此密钥生成在任何智慧城市的安全中都起着关键作用。在本文中,我们提出了一种专门为智慧城市设计的密钥生成方法,该方法使用随机数生成器从城市中存在的不同用户终端设备和传感器收集熵,并在中心节点生成安全的随机密钥。我们还针对NSIT随机数测试套件测试了我们的方法,并获得了可接受的结果。
{"title":"Smart key generation for smart cities","authors":"KS Shravya, A. Deepak, K. Chandrasekaran","doi":"10.1109/CIACT.2017.7977278","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977278","url":null,"abstract":"Statistical results have predicted that 70% of world's population will reside in cities by the year 2050. With the advancement in the field of information and communication technology, the concept of smart cities is gaining more prominence. Smart cities use the ICT technology to improve the functioning of the city and enhance the community services provided. To keep the data in smart city secure, different existing security mechanisms have been deployed directly in smart or have been modified to smart city scale. Most of the security mechanisms today need cryptographic keys, hence, key generation plays a pivotal role in the security of any smart city. In this paper, we proposes a key generation methodology especially designed for smart cities using a random number generator which collects entropy from different user end devices and sensors present in the city and generate secure random keys at a central node. We have also tested our method against NSIT random number test suite and have got acceptable results.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study of performance analysis of signaling protocols in MPLS MPLS中信令协议的性能分析研究
Shilpi Garg, Anu Chaudhary
Multiprotocol Label Switching is an growing knowledge and very essential for now a days. It has an important position in the coming time of networks by given that Quality of Service (QoS), Traffic Engineering (TE), and enhancing speed, scalability. MPLS enhance the performance of the network by using signalling protocols for traffic engineering. Through the signalling protocol, traffic engineering selects the network paths for forwarding the packets to the routers in a balanced manner. This paper explains the study of performance analysis of Constraint-Based routed LDP signalling protocol and Resource Reservation Protocol-TE signalling protocol.
多协议标签交换是一门不断发展的学问,在当今时代是非常重要的。它通过提供服务质量(QoS)、流量工程(TE)、提高速度、可扩展性,在未来的网络时代具有重要的地位。MPLS通过在业务工程中使用信令协议来提高网络的性能。流量工程通过信令协议选择网络路径,均衡地将报文转发到路由器。本文介绍了基于约束的路由LDP信令协议和资源预留协议- te信令协议的性能分析研究。
{"title":"A study of performance analysis of signaling protocols in MPLS","authors":"Shilpi Garg, Anu Chaudhary","doi":"10.1109/CIACT.2017.7977350","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977350","url":null,"abstract":"Multiprotocol Label Switching is an growing knowledge and very essential for now a days. It has an important position in the coming time of networks by given that Quality of Service (QoS), Traffic Engineering (TE), and enhancing speed, scalability. MPLS enhance the performance of the network by using signalling protocols for traffic engineering. Through the signalling protocol, traffic engineering selects the network paths for forwarding the packets to the routers in a balanced manner. This paper explains the study of performance analysis of Constraint-Based routed LDP signalling protocol and Resource Reservation Protocol-TE signalling protocol.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129894563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A robust fault modeling and prediction technique for heterogeneous network 异构网络鲁棒故障建模与预测技术
Pushpa, R. Agrawal
This paper proposes a modelling technique for fault identification in a heterogeneous network. Heterogeneous network is the integration of wired network, cellular network, wireless local area network (WLAN), and Adhoc network, etc. There may be several numbers of causes and sub-causes of fault in each type of network. These causes of fault must be mitigated in order to have a secure and reliable system. The paper introduces a model based approach that starts with the enumeration of possible causes of each fault over the heterogeneous network. A framework is then created by such causes which diagrammatically describe the causes and sub-causes responsible for the occurrence of a fault. This paper suggests a conceptual fault cause tree model based on the probabilistic framework for ranking the faults and their possible causes. An effective mitigation strategy is required to mitigate the causes and sub-causes. Once mitigation of the cause creating a fault is achieved, the system is analyzed and tested for accuracy and reliability. The Proposed technique assures that all sub-causes even at the lowest level of abstraction is taken into consideration in making the system more robust against the particular fault. The proposed model is also used to analyze the faulty probability of a heterogeneous network.
提出了一种异构网络故障识别的建模技术。异构网络是有线网络、蜂窝网络、无线局域网(WLAN)和Adhoc网络等的集成。在每种类型的网络中,故障可能有几个原因和子原因。为了拥有一个安全可靠的系统,必须减轻这些故障原因。本文介绍了一种基于模型的方法,该方法首先列举了异构网络中每个故障的可能原因。然后由这些原因创建一个框架,这些原因以图表的方式描述导致故障发生的原因和子原因。本文提出了一种基于概率框架的概念故障原因树模型,用于对故障及其可能原因进行排序。需要一项有效的缓解战略来缓解原因和次级原因。一旦减少了造成故障的原因,系统就会被分析和测试其准确性和可靠性。所提出的技术确保在使系统对特定故障更健壮时考虑到所有的子原因,即使是在最低的抽象级别。该模型还可用于分析异构网络的故障概率。
{"title":"A robust fault modeling and prediction technique for heterogeneous network","authors":"Pushpa, R. Agrawal","doi":"10.1109/CIACT.2017.7977351","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977351","url":null,"abstract":"This paper proposes a modelling technique for fault identification in a heterogeneous network. Heterogeneous network is the integration of wired network, cellular network, wireless local area network (WLAN), and Adhoc network, etc. There may be several numbers of causes and sub-causes of fault in each type of network. These causes of fault must be mitigated in order to have a secure and reliable system. The paper introduces a model based approach that starts with the enumeration of possible causes of each fault over the heterogeneous network. A framework is then created by such causes which diagrammatically describe the causes and sub-causes responsible for the occurrence of a fault. This paper suggests a conceptual fault cause tree model based on the probabilistic framework for ranking the faults and their possible causes. An effective mitigation strategy is required to mitigate the causes and sub-causes. Once mitigation of the cause creating a fault is achieved, the system is analyzed and tested for accuracy and reliability. The Proposed technique assures that all sub-causes even at the lowest level of abstraction is taken into consideration in making the system more robust against the particular fault. The proposed model is also used to analyze the faulty probability of a heterogeneous network.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130121977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comparative study of K-Means, K-Means++ and Fuzzy C-Means clustering algorithms K-Means、k - means++和模糊C-Means聚类算法的比较研究
Akanksha Kapoor, Abhishek Singhal
Clustering is essentially a procedure of grouping a set of objects in such a manner that items within the same clusters are more akin to each other compared with those data point or objects in different amassments or clusters. This paper discusses partition-predicated clustering techniques, such as K-Means, K-Means++ and object predicated Fuzzy C-Means clustering algorithm. This paper proposes a method for getting better clustering results by application of sorted and unsorted data into the algorithms. Elapsed time & total number of iterations are the factors on which, the behavioral patterns are analyzed. The experimental results shows that passing the sorted data instead of unsorted data not only effects the time complexity but withal ameliorates performance of these clustering techniques.
聚类本质上是一个对一组对象进行分组的过程,在这种方式下,同一集群中的项目与不同集群或集群中的数据点或对象相比,彼此之间更相似。本文讨论了划分预测聚类技术,如K-Means、k - means++和对象预测模糊C-Means聚类算法。本文提出了一种将排序和未排序数据应用到算法中的方法,以获得更好的聚类结果。运行时间和总迭代次数是分析行为模式的因素。实验结果表明,传递排序数据而不是传递未排序数据不仅影响了时间复杂度,而且改善了聚类技术的性能。
{"title":"A comparative study of K-Means, K-Means++ and Fuzzy C-Means clustering algorithms","authors":"Akanksha Kapoor, Abhishek Singhal","doi":"10.1109/CIACT.2017.7977272","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977272","url":null,"abstract":"Clustering is essentially a procedure of grouping a set of objects in such a manner that items within the same clusters are more akin to each other compared with those data point or objects in different amassments or clusters. This paper discusses partition-predicated clustering techniques, such as K-Means, K-Means++ and object predicated Fuzzy C-Means clustering algorithm. This paper proposes a method for getting better clustering results by application of sorted and unsorted data into the algorithms. Elapsed time & total number of iterations are the factors on which, the behavioral patterns are analyzed. The experimental results shows that passing the sorted data instead of unsorted data not only effects the time complexity but withal ameliorates performance of these clustering techniques.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125284799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
New morphological technique for medical image segmentation 医学图像分割的形态学新技术
Priya, Vivek Singh Verma
Image segmentation is a most important operation over an image for analysis or identification purposes. Segmentation implies clear distinct delineation between object of interest and rest of the image data known as background. Segmentation algorithm is generally based on either finding the discontinuity or similarity of pixels in the local neighborhood, they are commonly termed region-based or boundary based. Most of the times, these algorithms do not produce accurate segmentation. In this paper, medical Image segmentation based on morphological operators along with threshold selection is presented. The main aim is to have better segmentation accuracy and clarity of segmented image since medical images are sensitive images.
图像分割是对图像进行分析或识别的最重要的操作。分割意味着在感兴趣的对象和称为背景的图像数据的其余部分之间明确地划分。分割算法一般是基于寻找局部邻域像素的不连续或相似,通常称为基于区域或基于边界。大多数情况下,这些算法不能产生准确的分割。提出了一种基于形态学算子和阈值选择的医学图像分割方法。医学图像属于敏感图像,其主要目的是使分割后的图像具有更好的分割精度和清晰度。
{"title":"New morphological technique for medical image segmentation","authors":"Priya, Vivek Singh Verma","doi":"10.1109/CIACT.2017.7977282","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977282","url":null,"abstract":"Image segmentation is a most important operation over an image for analysis or identification purposes. Segmentation implies clear distinct delineation between object of interest and rest of the image data known as background. Segmentation algorithm is generally based on either finding the discontinuity or similarity of pixels in the local neighborhood, they are commonly termed region-based or boundary based. Most of the times, these algorithms do not produce accurate segmentation. In this paper, medical Image segmentation based on morphological operators along with threshold selection is presented. The main aim is to have better segmentation accuracy and clarity of segmented image since medical images are sensitive images.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of the simplified predictive model for the estimation of annual PV energy production: A case study for Odisha 光伏年发电量估算的简化预测模型的开发:以奥里萨邦为例
R. K. Tarai, V. Chandola, P. Kale
The decision to install a PV plant depends on three major factors: the climatic and environment conditions of the location, the viability of commercial operations, and the government policies. Economic feasibility of a PV system in the energy market depends on the cost of technology, the cost of installation, and the yield of the plant. Considering uncertain nature of climatic parameters, development of a reliable model to predict the energy output of a plant-to-be installed becomes essential. The presented study deals with PVGIS software method to estimate the total PV energy production of Odisha for a year. The proposed model considers only two meteorological variables collected from 1195 locations of Odisha: total annual incident global radiation on the surface of the module and annual average air temperature. The paper focuses on simplification at every stage of the development while analyzing the preciseness of the model.
安装光伏电站的决定取决于三个主要因素:地点的气候和环境条件、商业运营的可行性以及政府政策。光伏系统在能源市场上的经济可行性取决于技术成本、安装成本和发电厂的产量。考虑到气候参数的不确定性,开发一个可靠的模型来预测即将安装的工厂的能量输出变得至关重要。本文采用PVGIS软件方法估算了奥里萨邦一年的光伏发电总量。所提出的模型只考虑了从奥里萨邦1195个地点收集的两个气象变量:模块表面的年总入射全球辐射和年平均气温。在分析模型的精确性的同时,着重分析了开发过程中各个阶段的简化。
{"title":"Development of the simplified predictive model for the estimation of annual PV energy production: A case study for Odisha","authors":"R. K. Tarai, V. Chandola, P. Kale","doi":"10.1109/CIACT.2017.7977337","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977337","url":null,"abstract":"The decision to install a PV plant depends on three major factors: the climatic and environment conditions of the location, the viability of commercial operations, and the government policies. Economic feasibility of a PV system in the energy market depends on the cost of technology, the cost of installation, and the yield of the plant. Considering uncertain nature of climatic parameters, development of a reliable model to predict the energy output of a plant-to-be installed becomes essential. The presented study deals with PVGIS software method to estimate the total PV energy production of Odisha for a year. The proposed model considers only two meteorological variables collected from 1195 locations of Odisha: total annual incident global radiation on the surface of the module and annual average air temperature. The paper focuses on simplification at every stage of the development while analyzing the preciseness of the model.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121360583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A multi-device front-end power factor converter for EV battery charger 一种用于电动汽车电池充电器的多设备前端功率因数转换器
A. Singh, M. Pathak, Y. S. Rao
This work presents a front-end a novel boost power factor converter for on-board plug-in electric vehicle battery charger. The converter has lower passive components size such as inductor and EMI filter. In addition, low switch stress and higher efficiency can be expected. As a result, the size of charger, charging time and cost of electricity is minimized. In addition, a detailed current stress model of this topology is presented for selection of power stage components as well as for efficiency calculation. The proposed converter is simulated in Matlab/Simulink environment to demonstrate its effectiveness.
本文提出了一种用于车载插电式电动车电池充电器的前端升压功率因数变换器。该变换器具有较低的电感和EMI滤波器等无源元件尺寸。此外,低开关应力和更高的效率可以预期。因此,充电器的大小,充电时间和电力成本是最小的。此外,还给出了该拓扑结构的详细电流应力模型,用于功率级元件的选择和效率计算。在Matlab/Simulink环境中对该转换器进行了仿真,验证了其有效性。
{"title":"A multi-device front-end power factor converter for EV battery charger","authors":"A. Singh, M. Pathak, Y. S. Rao","doi":"10.1109/CIACT.2017.7977339","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977339","url":null,"abstract":"This work presents a front-end a novel boost power factor converter for on-board plug-in electric vehicle battery charger. The converter has lower passive components size such as inductor and EMI filter. In addition, low switch stress and higher efficiency can be expected. As a result, the size of charger, charging time and cost of electricity is minimized. In addition, a detailed current stress model of this topology is presented for selection of power stage components as well as for efficiency calculation. The proposed converter is simulated in Matlab/Simulink environment to demonstrate its effectiveness.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116251985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An effective approach for secure video watermarking based on H.264 coding standard 一种基于H.264编码标准的安全视频水印方法
Abhishek Tiwari, S. Ojha, Dmitry Pantiukhin
Video has an important entity that is shared over the network which is exchange through various devices like mobile, digital television, internet streaming. In the enhancement of bandwidth utilization from 2G to 3G and 3G to 4G, a lot of interest is found in video transmission so it's created issue of secure video transmission. In proposed approach, mainly focus invisible and robust video watermarking approach for H.264 standard and it's robustness against different special and temporal domain attacks. It has able to retrieved watermark without access of original video content. Experimental outcomes show that our proposed scheme outperforms.
视频是网络上共享的重要实体,通过各种设备(如手机、数字电视、互联网流媒体)进行交换。在带宽利用率从2G到3G、3G到4G的提升过程中,人们对视频传输产生了很大的兴趣,因此产生了视频安全传输的问题。本文主要研究了H.264标准视频水印的不可见性和鲁棒性,以及对不同时域和特殊域攻击的鲁棒性。它能够在不访问原始视频内容的情况下检索水印。实验结果表明,该方案具有较好的性能。
{"title":"An effective approach for secure video watermarking based on H.264 coding standard","authors":"Abhishek Tiwari, S. Ojha, Dmitry Pantiukhin","doi":"10.1109/CIACT.2017.7977379","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977379","url":null,"abstract":"Video has an important entity that is shared over the network which is exchange through various devices like mobile, digital television, internet streaming. In the enhancement of bandwidth utilization from 2G to 3G and 3G to 4G, a lot of interest is found in video transmission so it's created issue of secure video transmission. In proposed approach, mainly focus invisible and robust video watermarking approach for H.264 standard and it's robustness against different special and temporal domain attacks. It has able to retrieved watermark without access of original video content. Experimental outcomes show that our proposed scheme outperforms.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"13 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Comparison of clustering techniques for measuring similarity in articles 文章相似性度量聚类技术的比较
Usha Rani, Shashank Sahu
Clustering groups the objects into clusters having similarity with each other. This paper focuses on the two techniques of clustering i.e. hierarchical clustering and k-means clustering. The research is to compare various similarities measuring methods and finding out the best one. Research work is started by selecting different categories of textual contents or articles. For each selected category, articles have been selected from various news channels. Search words are identified which are most relevant for a respective category. Now these words are used as input for processing in the program to create a matrix of words. This matrix is then processed in Matlab using different measuring methods. The final outcome is demonstrated by the Cophenatic correlation coefficient & Silhouette Value to find out the best method of similarity measure. In this paper, five categories have been selected for the analysis which are “Business”, “Education”, “Election”, “Entertainment” and “Game” and 28 news articles have been filtered out for each category from various news channels. Different numbers of words are selected like 35, 49, 25, 30 and 35 against the mentioned categories for the implementation of the proposed technique. The research work finally concludes that for hierarchical clustering — ‘Cityblock’ and for k-means clustering — ‘Correlation’ is the best method however cityblock is at second position in the k-means clustering.
聚类将对象聚到具有相似性的聚类中。本文主要讨论了两种聚类技术,即层次聚类和k-means聚类。研究的目的是比较各种相似度测量方法,找出最佳的相似度测量方法。研究工作是通过选择不同类别的文本内容或文章开始的。对于每个选定的类别,文章都是从不同的新闻频道中选择的。搜索词被识别为与各自类别最相关的词。现在这些单词被用作输入,在程序中进行处理,以创建一个单词矩阵。然后在Matlab中使用不同的测量方法对该矩阵进行处理。最后用相关系数和剪影值对结果进行论证,找出最佳的相似性度量方法。本文选择了“商业”、“教育”、“选举”、“娱乐”和“游戏”五个类别进行分析,并从各个新闻频道中为每个类别过滤出28篇新闻报道。针对上述类别选择不同数量的单词,如35、49、25、30和35,以实现所提出的技术。研究最终得出结论:对于分层聚类,“Cityblock”和k-means聚类,“相关性”是最好的聚类方法,而“Cityblock”在k-means聚类中排名第二。
{"title":"Comparison of clustering techniques for measuring similarity in articles","authors":"Usha Rani, Shashank Sahu","doi":"10.1109/CIACT.2017.7977377","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977377","url":null,"abstract":"Clustering groups the objects into clusters having similarity with each other. This paper focuses on the two techniques of clustering i.e. hierarchical clustering and k-means clustering. The research is to compare various similarities measuring methods and finding out the best one. Research work is started by selecting different categories of textual contents or articles. For each selected category, articles have been selected from various news channels. Search words are identified which are most relevant for a respective category. Now these words are used as input for processing in the program to create a matrix of words. This matrix is then processed in Matlab using different measuring methods. The final outcome is demonstrated by the Cophenatic correlation coefficient & Silhouette Value to find out the best method of similarity measure. In this paper, five categories have been selected for the analysis which are “Business”, “Education”, “Election”, “Entertainment” and “Game” and 28 news articles have been filtered out for each category from various news channels. Different numbers of words are selected like 35, 49, 25, 30 and 35 against the mentioned categories for the implementation of the proposed technique. The research work finally concludes that for hierarchical clustering — ‘Cityblock’ and for k-means clustering — ‘Correlation’ is the best method however cityblock is at second position in the k-means clustering.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Study of IFT technique in a view to create a novel hardware 研究IFT技术,以期创造一种新颖的硬件
Grayson Himunzowa, F. Smith
The most recent technique for tuning proportional-integral-differential(PID) controllers is the Iterative Feedback Tuning (IFT) technique. The IFT has gone through many phases of improvement, such as increased transient performance, accelerated convergence, strengthened technique robustness and modified system stability. In this paper we propose the study of IFT technique in a view to create a novel hardware that implements IFT technique. To accomplish the said proposal, we carried out an overview of IFT technique basic theory and applications so that algorithm's expressions are refined to simplify development of hardware architecture. Then VHDL code is developed, simulated, and implemented on to the National Instruments (NI) Digital Electronics FPGA Board.
比例-积分-微分(PID)控制器的最新调谐技术是迭代反馈调谐(IFT)技术。IFT经历了多个阶段的改进,如瞬态性能的提高、收敛速度的加快、技术鲁棒性的增强和系统稳定性的改善。在本文中,我们提出了对IFT技术的研究,以期创建一种实现IFT技术的新型硬件。为了实现上述建议,我们对IFT技术的基本理论和应用进行了概述,从而改进了算法的表达式,简化了硬件架构的开发。然后在NI数字电子FPGA板上开发、仿真并实现了VHDL代码。
{"title":"Study of IFT technique in a view to create a novel hardware","authors":"Grayson Himunzowa, F. Smith","doi":"10.1109/CIACT.2017.7977346","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977346","url":null,"abstract":"The most recent technique for tuning proportional-integral-differential(PID) controllers is the Iterative Feedback Tuning (IFT) technique. The IFT has gone through many phases of improvement, such as increased transient performance, accelerated convergence, strengthened technique robustness and modified system stability. In this paper we propose the study of IFT technique in a view to create a novel hardware that implements IFT technique. To accomplish the said proposal, we carried out an overview of IFT technique basic theory and applications so that algorithm's expressions are refined to simplify development of hardware architecture. Then VHDL code is developed, simulated, and implemented on to the National Instruments (NI) Digital Electronics FPGA Board.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129369999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1