首页 > 最新文献

2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Static Voltage Stability Analysis of Large Bus Power System 大型母线电力系统的静态电压稳定性分析
Swati S. Pande, Sagar T. Telrandhe, S. D. Naik
A study on large bus power system is performed using Power System Analysis Toolbox (PSAT). MATLAB offers flexible simulation environment for static voltage stability analysis using PSAT. This paper describes static voltage stability analysis of American Electric Power Service Corporation network which comprises of 30 bus system.
利用电力系统分析工具箱(PSAT)对大型客车电力系统进行了研究。MATLAB为PSAT静态电压稳定性分析提供了灵活的仿真环境。本文介绍了美国电力服务公司由30个母线系统组成的电网的静态电压稳定性分析。
{"title":"Static Voltage Stability Analysis of Large Bus Power System","authors":"Swati S. Pande, Sagar T. Telrandhe, S. D. Naik","doi":"10.1109/ICCMC.2019.8819697","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819697","url":null,"abstract":"A study on large bus power system is performed using Power System Analysis Toolbox (PSAT). MATLAB offers flexible simulation environment for static voltage stability analysis using PSAT. This paper describes static voltage stability analysis of American Electric Power Service Corporation network which comprises of 30 bus system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Panoramic View of Cloud Storage Security Attacks: an Insight and Security Approaches 云存储安全攻击全景:洞察和安全方法
E. Daniel, S. Durga, S. Seetha
Recent years the computer technologies are reaching every corner in the world through the cloud computing services. Cloud storage has many advantages and it allows the user to store a large amount of critical and sensitive data in the cloud. As we store the critical information in the cloud, the information attracts the highly skilled hackers to access the data in the cloud by breaching the security mechanisms. This paper discusses specific attacks related to efficient and secure storage of data in cloud. Specifically, we outline network-based, browser-based and social network-based attacks. We classify the mechanisms and prominent security systems available to handle the challenges faced by these security threats. The study contributes to the overview of drawbacks in state of art mechanisms and it's mitigations techniques to protect the outsourced data. The analysis enables to develop a suitable architecture for efficient and secure storage which outperforms the existing systems with low performance, high communication overheads, high computation cost, less efficiency, limited access for a system, less number of security properties and difficulty in handling the system.
近年来,计算机技术正通过云计算服务到达世界的每一个角落。云存储有很多优点,它允许用户在云中存储大量关键和敏感的数据。当我们将关键信息存储在云中时,这些信息吸引了高技能的黑客通过破坏安全机制来访问云中的数据。本文讨论了与高效、安全的云数据存储相关的特定攻击。具体来说,我们概述了基于网络、基于浏览器和基于社交网络的攻击。我们对可用于应对这些安全威胁挑战的机制和突出的安全系统进行了分类。该研究有助于概述最先进机制的缺陷及其用于保护外包数据的缓解技术。通过分析,可以开发出一种适合于高效安全存储的体系结构,以克服现有系统性能低、通信开销大、计算成本高、效率低、系统访问受限、安全属性数量少、系统管理困难等缺点。
{"title":"Panoramic View of Cloud Storage Security Attacks: an Insight and Security Approaches","authors":"E. Daniel, S. Durga, S. Seetha","doi":"10.1109/ICCMC.2019.8819801","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819801","url":null,"abstract":"Recent years the computer technologies are reaching every corner in the world through the cloud computing services. Cloud storage has many advantages and it allows the user to store a large amount of critical and sensitive data in the cloud. As we store the critical information in the cloud, the information attracts the highly skilled hackers to access the data in the cloud by breaching the security mechanisms. This paper discusses specific attacks related to efficient and secure storage of data in cloud. Specifically, we outline network-based, browser-based and social network-based attacks. We classify the mechanisms and prominent security systems available to handle the challenges faced by these security threats. The study contributes to the overview of drawbacks in state of art mechanisms and it's mitigations techniques to protect the outsourced data. The analysis enables to develop a suitable architecture for efficient and secure storage which outperforms the existing systems with low performance, high communication overheads, high computation cost, less efficiency, limited access for a system, less number of security properties and difficulty in handling the system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visiting Center Based Portable Emissary Approach for Data Gathering in Wireless Sensor Networks 基于访问中心的便携式无线传感器网络数据采集方法
M. Naresh, A. Akshith, CH. Sai Sri Harsha, M. Sai Kumar
Wireless sensor networks (WSNs) have been lately recognized as a trust-worthy innovation for many applications, for example, defence, ambient and physiology-monitoring. A WSN includes stationing of hundreds or thousands of minor sensor hubs that communicate remotely with each other to detect explicit activities in a field of intrigue. The way towards gathering tactile information from sensor hubs and returning back to the handling unit (e.g., sink hub) is called data gathering. In network-oriented gathering, single-hop strategy involves the information being transmitted specifically from the source hub to the sink; which includes high power utilization and transmission from source hub to sink through multi-hops with other system hub as the intermediate hub or nodes. This procedure prompts data congestion, increased dormancy and high energy utilization, especially for hubs situated close to the sink, because of the gigantic measure of information stream. To mitigate these issues, a portable emissary (PE) was proposed in order to give an alternative approach for customary information gathering procedures in WSNs. Furthermore, visiting center based approach (VCBPE) is proposed with the goal that versatile hubs need not venture out to each hub for information gathering.
无线传感器网络(WSNs)最近被认为是许多应用中值得信赖的创新,例如国防,环境和生理监测。WSN包括数百或数千个小型传感器中心,这些传感器中心相互远程通信,以探测阴谋领域的明确活动。从传感器集线器收集触觉信息并返回到处理单元(例如,接收器集线器)的方法称为数据收集。在面向网络的采集中,单跳策略包括信息从源集线器专门传输到接收器;这包括高功率利用率和从源集线器到接收集线器通过多跳传输,其他系统集线器作为中间集线器或节点。由于信息流的巨大度量,这个过程会导致数据拥塞,增加休眠和高能量利用率,特别是对于位于接收器附近的集线器。为了缓解这些问题,提出了一种便携式使者(PE),以便为无线传感器网络的常规信息收集程序提供一种替代方法。此外,提出了基于访问中心的方法(VCBPE),其目标是多功能集线器不需要冒险到每个集线器进行信息收集。
{"title":"Visiting Center Based Portable Emissary Approach for Data Gathering in Wireless Sensor Networks","authors":"M. Naresh, A. Akshith, CH. Sai Sri Harsha, M. Sai Kumar","doi":"10.1109/ICCMC.2019.8819746","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819746","url":null,"abstract":"Wireless sensor networks (WSNs) have been lately recognized as a trust-worthy innovation for many applications, for example, defence, ambient and physiology-monitoring. A WSN includes stationing of hundreds or thousands of minor sensor hubs that communicate remotely with each other to detect explicit activities in a field of intrigue. The way towards gathering tactile information from sensor hubs and returning back to the handling unit (e.g., sink hub) is called data gathering. In network-oriented gathering, single-hop strategy involves the information being transmitted specifically from the source hub to the sink; which includes high power utilization and transmission from source hub to sink through multi-hops with other system hub as the intermediate hub or nodes. This procedure prompts data congestion, increased dormancy and high energy utilization, especially for hubs situated close to the sink, because of the gigantic measure of information stream. To mitigate these issues, a portable emissary (PE) was proposed in order to give an alternative approach for customary information gathering procedures in WSNs. Furthermore, visiting center based approach (VCBPE) is proposed with the goal that versatile hubs need not venture out to each hub for information gathering.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126524845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation and Analysis of Series Active Filter Using AC-AC Converter for Mitigation of Sag 采用交流-交流变换器的串联有源滤波器的仿真与分析
Ankita R. Gothane, Bhakti B. Baliwant, V. Waghmare
This paper presents three phase Series Active Filter using AC-AC Converter for mitigation of sag.. Now-a-days, industrial and distribution(domestic) consumers face problems associated with voltage and power quality. Voltage quality is mostly permeated by voltage sags, swells and interruptions. But, voltage sags occur more frequently than interruptions .To overcome this problem, series active filter is used, which is one of the most suitable and economical solution to compensate for voltage sags.. The proposed system is based on AC-AC converter with injection transformer. The operation principle and theoretical analysis of series active filter are presented. Here, AC-AC converters are used which eliminates the need of energy storage devices. The simulation and design of series active filter performance with results are shown in this paper.
本文提出了一种采用交流-交流变换器的三相串联有源滤波器。如今,工业和配电(家庭)消费者面临着与电压和电能质量相关的问题。电压质量主要表现为电压跌落、电压膨胀和电压中断。但是,电压跌落比中断发生得更频繁。为了克服这个问题,采用串联有源滤波器,这是补偿电压跌落最合适和最经济的解决方案之一。该系统基于带注入变压器的交流变换器。介绍了串联有源滤波器的工作原理和理论分析。在这里,使用交流-交流转换器,消除了对能量存储设备的需求。文中给出了串联有源滤波器性能的仿真和设计,并给出了仿真结果。
{"title":"Simulation and Analysis of Series Active Filter Using AC-AC Converter for Mitigation of Sag","authors":"Ankita R. Gothane, Bhakti B. Baliwant, V. Waghmare","doi":"10.1109/ICCMC.2019.8819629","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819629","url":null,"abstract":"This paper presents three phase Series Active Filter using AC-AC Converter for mitigation of sag.. Now-a-days, industrial and distribution(domestic) consumers face problems associated with voltage and power quality. Voltage quality is mostly permeated by voltage sags, swells and interruptions. But, voltage sags occur more frequently than interruptions .To overcome this problem, series active filter is used, which is one of the most suitable and economical solution to compensate for voltage sags.. The proposed system is based on AC-AC converter with injection transformer. The operation principle and theoretical analysis of series active filter are presented. Here, AC-AC converters are used which eliminates the need of energy storage devices. The simulation and design of series active filter performance with results are shown in this paper.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new approach to ROI based image compression using simple sliding window spatial filter 一种基于ROI的图像压缩新方法——简单滑动窗空间滤波
Rajasekhar Reddy M, Ravichandran K.S., Anashwara. P, A. S, Venkatraman
By reducing the file size, the number of images stored in the given amount of hard disk can be increased and the time required to send images over the internet has been reduced. Image compression is the common and adaptive method used for reducing all the chunks in our day to day life. There are many existing techniques and protypes available for compression. This paper deals with the special concepts on image compression using simple sliding window spatial filter or mean filter. The desired region can be selected using ROI from the image which can be processed for further compression of images. The proposed method uses DCT followed by the suitable encoding techniques. Various combinations of compression applied to come across the best one.
通过减小文件大小,可以增加在给定数量的硬盘中存储的图像数量,并且减少了通过互联网发送图像所需的时间。图像压缩是我们日常生活中常用的自适应方法,用于减少所有块。有许多现有的技术和原型可用于压缩。本文讨论了简单滑动窗口空间滤波器和均值滤波器在图像压缩中的特殊概念。可以使用ROI从图像中选择所需的区域,然后对图像进行进一步压缩处理。该方法首先采用离散余弦变换,然后采用合适的编码技术。各种组合的压缩应用来找到最好的一个。
{"title":"A new approach to ROI based image compression using simple sliding window spatial filter","authors":"Rajasekhar Reddy M, Ravichandran K.S., Anashwara. P, A. S, Venkatraman","doi":"10.1109/ICCMC.2019.8819690","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819690","url":null,"abstract":"By reducing the file size, the number of images stored in the given amount of hard disk can be increased and the time required to send images over the internet has been reduced. Image compression is the common and adaptive method used for reducing all the chunks in our day to day life. There are many existing techniques and protypes available for compression. This paper deals with the special concepts on image compression using simple sliding window spatial filter or mean filter. The desired region can be selected using ROI from the image which can be processed for further compression of images. The proposed method uses DCT followed by the suitable encoding techniques. Various combinations of compression applied to come across the best one.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Tolerance in VLSI Circuit with Reducing Rollback Cost using FSM 利用FSM降低回滚成本的VLSI电路容错
Gadde Doondi Srinath, M. Samson
In this generation, the revolutionary growth in nanometer technologies brought the drastic change in reduction of device size, increase in complexity, increasing operating speed and decrease in power consumption, which are more sensitive to various kinds of problems. In a combinational logic to protect the faults which are transient are not considered generally as this logic has a common hurdle to stop the faults propagation. In this architecture, there are three cover-up factors used in the process of electrical, logical, and window latch. With these factors, as the industry of processors progress in these days, the chances of generation of transient faults as well as the latches on subsequent element is reduced. Solutions that insulate the whole design are usually very expensive. So that, to implement the rollback, a fixed rollback of K-cycle or a rollback with checkpoint is used. This paper proposes a hardware architecture and the implementations of algorithm, which cut downs the rollback rate in all kind of circuits.
在这一代中,纳米技术的革命性增长带来了器件尺寸的缩小、复杂性的增加、运行速度的提高和功耗的降低等方面的巨大变化,对各种问题更加敏感。在组合逻辑中,暂态故障的保护一般不被考虑,因为这种逻辑具有阻止故障传播的共同障碍。在该体系结构中,在电、逻辑和窗闩过程中使用了三种掩盖因素。有了这些因素,随着处理器行业在这些日子里的进步,产生瞬态故障以及后续元件锁存的机会减少了。将整个设计隔离的解决方案通常非常昂贵。因此,为了实现回滚,使用k周期的固定回滚或带有检查点的回滚。本文提出了一种硬件结构和算法实现,降低了各种电路的回滚率。
{"title":"Fault Tolerance in VLSI Circuit with Reducing Rollback Cost using FSM","authors":"Gadde Doondi Srinath, M. Samson","doi":"10.1109/ICCMC.2019.8819739","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819739","url":null,"abstract":"In this generation, the revolutionary growth in nanometer technologies brought the drastic change in reduction of device size, increase in complexity, increasing operating speed and decrease in power consumption, which are more sensitive to various kinds of problems. In a combinational logic to protect the faults which are transient are not considered generally as this logic has a common hurdle to stop the faults propagation. In this architecture, there are three cover-up factors used in the process of electrical, logical, and window latch. With these factors, as the industry of processors progress in these days, the chances of generation of transient faults as well as the latches on subsequent element is reduced. Solutions that insulate the whole design are usually very expensive. So that, to implement the rollback, a fixed rollback of K-cycle or a rollback with checkpoint is used. This paper proposes a hardware architecture and the implementations of algorithm, which cut downs the rollback rate in all kind of circuits.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Fundamental of Wireless Sensor Network with Various Issues in Optimization 无线传感器网络的基本原理及优化问题综述
Kumkum Dubey, Prashant S. Kumar, Pragati Pathak, Shobhit Kumar, Prince Rajpoot, S. Pandey
Wireless Sensor Network (WSN) is becoming the very provocative model to executing the surveillance tasks and monitoring. In spite of that there are many challenges grow increasingly to reduce the packet loss rate, energy depletion in order to enlarge the network lifetime. In this appraisement paper, we can oversee the recently research work and implementation method to make efficient network. Here we analyse the discrete techniques use in multi-objective optimization (MOO). During the last years, the problems arises in the real world optimization and to solve these types of problems, many researchers believe that multi-population techniques are the primarily used solution. It is based on the optimization of nature inspired algorithm. These techniques are one of the solution of multi-objective optimization. Hence, this review paper provide us the summary of all published publish work and future work. Which is depend on the method of multi-population. After the realization of methods used in multi-population based algorithm and significance of these methods. We noticed that this is time to give a summarization of the different published research work, and there are various aspects that used to discussing the future work. Hence, the main motive of this paper is to give a review of all summarize techniques used in the optimization of nature inspiration. Which are based on multi-population methods. The consequence issues in the method of multi-population that will also give a review and see the major application in the field of engineering and science. Basically, the proposed survey paper provide us a brief knowledge of the problems related to the real world optimization and its future work.
无线传感器网络(WSN)正在成为执行监控任务和监测的一种极具挑战性的模式。尽管如此,如何降低丢包率、降低能量消耗以延长网络寿命的挑战也越来越多。在本文中,我们可以回顾最近的研究工作和实施方法,以建立有效的网络。本文分析了多目标优化(MOO)中使用的离散技术。在过去的几年里,在现实世界中出现了优化问题,为了解决这类问题,许多研究者认为多种群技术是主要的解决方案。它是基于自然启发算法的优化。这些技术是解决多目标优化问题的一种方法。因此,本文对已发表的研究成果和今后的工作进行了总结。这取决于多种群的方法。之后给出了基于多种群算法的实现方法以及这些方法的意义。我们注意到,现在是时候对不同的已发表的研究工作进行总结,并且有不同的方面用来讨论未来的工作。因此,本文的主要目的是对所有用于自然灵感优化的总结技术进行综述。这是基于多种群方法的。对多种群方法中的后果问题进行了综述,并对其在工程和科学领域的主要应用进行了评述。基本上,提出的调查论文为我们提供了与现实世界优化及其未来工作相关的问题的简要知识。
{"title":"A Survey on Fundamental of Wireless Sensor Network with Various Issues in Optimization","authors":"Kumkum Dubey, Prashant S. Kumar, Pragati Pathak, Shobhit Kumar, Prince Rajpoot, S. Pandey","doi":"10.1109/ICCMC.2019.8819833","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819833","url":null,"abstract":"Wireless Sensor Network (WSN) is becoming the very provocative model to executing the surveillance tasks and monitoring. In spite of that there are many challenges grow increasingly to reduce the packet loss rate, energy depletion in order to enlarge the network lifetime. In this appraisement paper, we can oversee the recently research work and implementation method to make efficient network. Here we analyse the discrete techniques use in multi-objective optimization (MOO). During the last years, the problems arises in the real world optimization and to solve these types of problems, many researchers believe that multi-population techniques are the primarily used solution. It is based on the optimization of nature inspired algorithm. These techniques are one of the solution of multi-objective optimization. Hence, this review paper provide us the summary of all published publish work and future work. Which is depend on the method of multi-population. After the realization of methods used in multi-population based algorithm and significance of these methods. We noticed that this is time to give a summarization of the different published research work, and there are various aspects that used to discussing the future work. Hence, the main motive of this paper is to give a review of all summarize techniques used in the optimization of nature inspiration. Which are based on multi-population methods. The consequence issues in the method of multi-population that will also give a review and see the major application in the field of engineering and science. Basically, the proposed survey paper provide us a brief knowledge of the problems related to the real world optimization and its future work.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of acoustical models of GMM-HMM based for speech recognition in Hindi using PocketSphinx 基于GMM-HMM的印地语语音识别声学模型比较
Chadalavada Sai Manasa, K. J. Priya, Deepa Gupta
Automatic Speech recognition (ASR) is widely gaining momentum worldwide, to be used as a part of Human Computer Interface and also in a wide variety of commercial applications. In Indian context, commercial applications using automatic speech recognition are still in the evolving process. This paper describes the acoustic models that have been cross language adapted for speech recognition in Hindi using CMU’s PocketSphinx. A database of 177 words in Hindi is prepared, along with transcription and dictionary. Two approaches for developing acoustical model for the speech recognition has been discussed in this paper. In the first approach, English acoustical model has been cross-language adapted to Hindi. In the second approach different acoustical models -continuous, semi continuous and phonetically tied models have been trained. GMM-HMM is used for acoustical modeling and language modeling.
自动语音识别(ASR)在世界范围内得到了广泛的发展,它不仅可以作为人机界面的一部分,还可以用于各种各样的商业应用。在印度,使用自动语音识别的商业应用仍处于发展过程中。本文描述了使用CMU的PocketSphinx进行印地语语音识别的跨语言声学模型。准备了177个印地语单词的数据库,以及转录和词典。本文讨论了两种建立语音识别声学模型的方法。在第一种方法中,英语声学模型被跨语言适应于印地语。在第二种方法中,训练了不同的声学模型——连续的、半连续的和语音捆绑的模型。GMM-HMM用于声学建模和语言建模。
{"title":"Comparison of acoustical models of GMM-HMM based for speech recognition in Hindi using PocketSphinx","authors":"Chadalavada Sai Manasa, K. J. Priya, Deepa Gupta","doi":"10.1109/ICCMC.2019.8819747","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819747","url":null,"abstract":"Automatic Speech recognition (ASR) is widely gaining momentum worldwide, to be used as a part of Human Computer Interface and also in a wide variety of commercial applications. In Indian context, commercial applications using automatic speech recognition are still in the evolving process. This paper describes the acoustic models that have been cross language adapted for speech recognition in Hindi using CMU’s PocketSphinx. A database of 177 words in Hindi is prepared, along with transcription and dictionary. Two approaches for developing acoustical model for the speech recognition has been discussed in this paper. In the first approach, English acoustical model has been cross-language adapted to Hindi. In the second approach different acoustical models -continuous, semi continuous and phonetically tied models have been trained. GMM-HMM is used for acoustical modeling and language modeling.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation 云安全第三方审计系统综述:安全分析、计算开销与性能评价
T. K. Babu, C. D. Guruprakash
Cloud storage offers a considerable efficiency and security to the user’s data and provide high flexibility to the user. The hackers make attempt of several attacks to steal the data that increase the concern of data security in cloud. The Third Party Auditing (TPA) method is introduced to check the data integrity. There are several TPA methods developed to improve the privacy and efficiency of the data integrity checking method. Various methods involved in TPA, have been analyzed in this review in terms of function, security and overall performance. Merkel Hash Tree (MHT) method provides efficiency and security in checking the integrity of data. The computational overhead of the proof verify is also analyzed in this review. The communication cost of the most TPA methods observed as low and there is a need of improvement in security of the public auditing.
云存储为用户的数据提供了相当高的效率和安全性,并为用户提供了很高的灵活性。黑客试图通过多次攻击来窃取云中的数据,这增加了人们对云数据安全的担忧。引入第三方审计(Third Party Auditing, TPA)方法对数据的完整性进行检查。为了提高数据完整性检查方法的保密性和效率,开发了几种TPA方法。本文从功能、安全性和综合性能等方面分析了TPA中涉及的各种方法。默克尔哈希树(MHT)方法在检查数据完整性方面提供了效率和安全性。本文还分析了证明验证的计算开销。大多数TPA方法的通信成本较低,公共审计的安全性需要改进。
{"title":"A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation","authors":"T. K. Babu, C. D. Guruprakash","doi":"10.1109/ICCMC.2019.8819848","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819848","url":null,"abstract":"Cloud storage offers a considerable efficiency and security to the user’s data and provide high flexibility to the user. The hackers make attempt of several attacks to steal the data that increase the concern of data security in cloud. The Third Party Auditing (TPA) method is introduced to check the data integrity. There are several TPA methods developed to improve the privacy and efficiency of the data integrity checking method. Various methods involved in TPA, have been analyzed in this review in terms of function, security and overall performance. Merkel Hash Tree (MHT) method provides efficiency and security in checking the integrity of data. The computational overhead of the proof verify is also analyzed in this review. The communication cost of the most TPA methods observed as low and there is a need of improvement in security of the public auditing.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparative Study on Parsing in Natural Language Processing 自然语言处理中句法分析的比较研究
Sandeep Kiran, Charan R Shesha Sai, Priyanka, M. Pooja
The main focus of this paper is to deduce which parsing technique is better among the natural language processing techniques. A brief study of LR parsing, its construction and implementation, providing limitations (drawback) on different types of parsing. Comparing LR parsing, through proven results and usage in the field of ‘Natural Language Processing’ and comparing different methods of parsing. Showing drawbacks of LL parsing and coming to the conclusion that LR is more efficient than other parsing methods.
本文的研究重点是推导出在自然语言处理技术中哪一种解析技术更好。简要研究了LR解析及其构造和实现,指出了不同类型解析的局限性(缺点)。比较LR解析,通过在“自然语言处理”领域的验证结果和使用,比较不同的解析方法。展示了LL解析的缺点,并得出LR比其他解析方法更有效的结论。
{"title":"A Comparative Study on Parsing in Natural Language Processing","authors":"Sandeep Kiran, Charan R Shesha Sai, Priyanka, M. Pooja","doi":"10.1109/ICCMC.2019.8819687","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819687","url":null,"abstract":"The main focus of this paper is to deduce which parsing technique is better among the natural language processing techniques. A brief study of LR parsing, its construction and implementation, providing limitations (drawback) on different types of parsing. Comparing LR parsing, through proven results and usage in the field of ‘Natural Language Processing’ and comparing different methods of parsing. Showing drawbacks of LL parsing and coming to the conclusion that LR is more efficient than other parsing methods.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125041999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1