首页 > 最新文献

2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Panoramic View of Cloud Storage Security Attacks: an Insight and Security Approaches 云存储安全攻击全景:洞察和安全方法
E. Daniel, S. Durga, S. Seetha
Recent years the computer technologies are reaching every corner in the world through the cloud computing services. Cloud storage has many advantages and it allows the user to store a large amount of critical and sensitive data in the cloud. As we store the critical information in the cloud, the information attracts the highly skilled hackers to access the data in the cloud by breaching the security mechanisms. This paper discusses specific attacks related to efficient and secure storage of data in cloud. Specifically, we outline network-based, browser-based and social network-based attacks. We classify the mechanisms and prominent security systems available to handle the challenges faced by these security threats. The study contributes to the overview of drawbacks in state of art mechanisms and it's mitigations techniques to protect the outsourced data. The analysis enables to develop a suitable architecture for efficient and secure storage which outperforms the existing systems with low performance, high communication overheads, high computation cost, less efficiency, limited access for a system, less number of security properties and difficulty in handling the system.
近年来,计算机技术正通过云计算服务到达世界的每一个角落。云存储有很多优点,它允许用户在云中存储大量关键和敏感的数据。当我们将关键信息存储在云中时,这些信息吸引了高技能的黑客通过破坏安全机制来访问云中的数据。本文讨论了与高效、安全的云数据存储相关的特定攻击。具体来说,我们概述了基于网络、基于浏览器和基于社交网络的攻击。我们对可用于应对这些安全威胁挑战的机制和突出的安全系统进行了分类。该研究有助于概述最先进机制的缺陷及其用于保护外包数据的缓解技术。通过分析,可以开发出一种适合于高效安全存储的体系结构,以克服现有系统性能低、通信开销大、计算成本高、效率低、系统访问受限、安全属性数量少、系统管理困难等缺点。
{"title":"Panoramic View of Cloud Storage Security Attacks: an Insight and Security Approaches","authors":"E. Daniel, S. Durga, S. Seetha","doi":"10.1109/ICCMC.2019.8819801","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819801","url":null,"abstract":"Recent years the computer technologies are reaching every corner in the world through the cloud computing services. Cloud storage has many advantages and it allows the user to store a large amount of critical and sensitive data in the cloud. As we store the critical information in the cloud, the information attracts the highly skilled hackers to access the data in the cloud by breaching the security mechanisms. This paper discusses specific attacks related to efficient and secure storage of data in cloud. Specifically, we outline network-based, browser-based and social network-based attacks. We classify the mechanisms and prominent security systems available to handle the challenges faced by these security threats. The study contributes to the overview of drawbacks in state of art mechanisms and it's mitigations techniques to protect the outsourced data. The analysis enables to develop a suitable architecture for efficient and secure storage which outperforms the existing systems with low performance, high communication overheads, high computation cost, less efficiency, limited access for a system, less number of security properties and difficulty in handling the system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation and Analysis of Series Active Filter Using AC-AC Converter for Mitigation of Sag 采用交流-交流变换器的串联有源滤波器的仿真与分析
Ankita R. Gothane, Bhakti B. Baliwant, V. Waghmare
This paper presents three phase Series Active Filter using AC-AC Converter for mitigation of sag.. Now-a-days, industrial and distribution(domestic) consumers face problems associated with voltage and power quality. Voltage quality is mostly permeated by voltage sags, swells and interruptions. But, voltage sags occur more frequently than interruptions .To overcome this problem, series active filter is used, which is one of the most suitable and economical solution to compensate for voltage sags.. The proposed system is based on AC-AC converter with injection transformer. The operation principle and theoretical analysis of series active filter are presented. Here, AC-AC converters are used which eliminates the need of energy storage devices. The simulation and design of series active filter performance with results are shown in this paper.
本文提出了一种采用交流-交流变换器的三相串联有源滤波器。如今,工业和配电(家庭)消费者面临着与电压和电能质量相关的问题。电压质量主要表现为电压跌落、电压膨胀和电压中断。但是,电压跌落比中断发生得更频繁。为了克服这个问题,采用串联有源滤波器,这是补偿电压跌落最合适和最经济的解决方案之一。该系统基于带注入变压器的交流变换器。介绍了串联有源滤波器的工作原理和理论分析。在这里,使用交流-交流转换器,消除了对能量存储设备的需求。文中给出了串联有源滤波器性能的仿真和设计,并给出了仿真结果。
{"title":"Simulation and Analysis of Series Active Filter Using AC-AC Converter for Mitigation of Sag","authors":"Ankita R. Gothane, Bhakti B. Baliwant, V. Waghmare","doi":"10.1109/ICCMC.2019.8819629","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819629","url":null,"abstract":"This paper presents three phase Series Active Filter using AC-AC Converter for mitigation of sag.. Now-a-days, industrial and distribution(domestic) consumers face problems associated with voltage and power quality. Voltage quality is mostly permeated by voltage sags, swells and interruptions. But, voltage sags occur more frequently than interruptions .To overcome this problem, series active filter is used, which is one of the most suitable and economical solution to compensate for voltage sags.. The proposed system is based on AC-AC converter with injection transformer. The operation principle and theoretical analysis of series active filter are presented. Here, AC-AC converters are used which eliminates the need of energy storage devices. The simulation and design of series active filter performance with results are shown in this paper.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Optimized Classifier For the Loan Repayment Capability Prediction System 贷款偿还能力预测系统的一种新型优化分类器
Soni P M, V. Paul
The most suitable predictive modelling technique to predict the loan repayment capability of a customer in a banking industry is classification. Classification is a supervised learning technique in data mining. The loan repayment capability of a customer can be predicted more accurately using random forest algorithm. The accuracy of the prediction depends on various parameters of the random forest algorithm. The main objective of this paper is to prove that optimization of parameters results in a better accuracy for the capability prediction of loan repayment by the customers. This paper illustrates the process of optimization that leads to an improved accuracy in classification. The comparative study explains that optimization can lead to a better accuracy and the experiments were done in weka and R.
在银行业中,最适合预测客户贷款偿还能力的预测建模技术是分类。分类是数据挖掘中的一种监督学习技术。使用随机森林算法可以更准确地预测客户的贷款偿还能力。预测的准确性取决于随机森林算法的各种参数。本文的主要目的是为了证明参数优化可以提高客户还贷能力预测的准确性。本文阐述了提高分类精度的优化过程。对比研究表明,优化后可以获得更好的精度,并在weka和R中进行了实验。
{"title":"A Novel Optimized Classifier For the Loan Repayment Capability Prediction System","authors":"Soni P M, V. Paul","doi":"10.1109/ICCMC.2019.8819772","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819772","url":null,"abstract":"The most suitable predictive modelling technique to predict the loan repayment capability of a customer in a banking industry is classification. Classification is a supervised learning technique in data mining. The loan repayment capability of a customer can be predicted more accurately using random forest algorithm. The accuracy of the prediction depends on various parameters of the random forest algorithm. The main objective of this paper is to prove that optimization of parameters results in a better accuracy for the capability prediction of loan repayment by the customers. This paper illustrates the process of optimization that leads to an improved accuracy in classification. The comparative study explains that optimization can lead to a better accuracy and the experiments were done in weka and R.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fake Data Analysis and Detection Using Ensembled Hybrid Algorithm 基于集成混合算法的假数据分析与检测
Palagati Bhanu Prakash Reddy, M. K. Reddy, G. Reddy, K. Mehata
Fake data detection is the most important problem to be addressed in the recent years, there is lot of research going on in this field. Because of its serious impacts on the readers. researchers, government and private agencies working together to solve the issue. This paper represents a hybrid approach for fake data detection using the multinomial voting algorithm. This algorithm was tested with multiple fake news dataset which resulted in an accuracy score of 94 percent which is a benchmark in the machine learning field where the other algorithms are at a range of 82 to 88 percent. The list of algorithms that have been used here is as follows Naive Bayes, Random Forest, Decision Tree, Support Vector Machine, K Nearest Neighbors. All these algorithms use training data as the bag of words model which was created using Count Vectorizer. Experimental data has collected from the Kaggle data world. Python is used as a language to verify and validate the results. Tableau is used as a visualization tool. Implementation is carried out using default algorithm values.
虚假数据检测是近年来亟待解决的问题,在这一领域进行了大量的研究。由于其对读者的严重影响。研究人员、政府和私人机构共同努力解决这个问题。本文提出了一种利用多项投票算法进行虚假数据检测的混合方法。该算法在多个假新闻数据集上进行了测试,结果准确率达到94%,这是机器学习领域的基准,其他算法的范围在82%到88%之间。这里使用的算法列表如下:朴素贝叶斯,随机森林,决策树,支持向量机,K近邻。这些算法都使用训练数据作为词包模型,并使用计数矢量器建立词包模型。实验数据是从Kaggle数据世界收集的。Python被用作验证和验证结果的语言。Tableau被用作可视化工具。实现是使用默认算法值进行的。
{"title":"Fake Data Analysis and Detection Using Ensembled Hybrid Algorithm","authors":"Palagati Bhanu Prakash Reddy, M. K. Reddy, G. Reddy, K. Mehata","doi":"10.1109/ICCMC.2019.8819741","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819741","url":null,"abstract":"Fake data detection is the most important problem to be addressed in the recent years, there is lot of research going on in this field. Because of its serious impacts on the readers. researchers, government and private agencies working together to solve the issue. This paper represents a hybrid approach for fake data detection using the multinomial voting algorithm. This algorithm was tested with multiple fake news dataset which resulted in an accuracy score of 94 percent which is a benchmark in the machine learning field where the other algorithms are at a range of 82 to 88 percent. The list of algorithms that have been used here is as follows Naive Bayes, Random Forest, Decision Tree, Support Vector Machine, K Nearest Neighbors. All these algorithms use training data as the bag of words model which was created using Count Vectorizer. Experimental data has collected from the Kaggle data world. Python is used as a language to verify and validate the results. Tableau is used as a visualization tool. Implementation is carried out using default algorithm values.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134380212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A new approach to ROI based image compression using simple sliding window spatial filter 一种基于ROI的图像压缩新方法——简单滑动窗空间滤波
Rajasekhar Reddy M, Ravichandran K.S., Anashwara. P, A. S, Venkatraman
By reducing the file size, the number of images stored in the given amount of hard disk can be increased and the time required to send images over the internet has been reduced. Image compression is the common and adaptive method used for reducing all the chunks in our day to day life. There are many existing techniques and protypes available for compression. This paper deals with the special concepts on image compression using simple sliding window spatial filter or mean filter. The desired region can be selected using ROI from the image which can be processed for further compression of images. The proposed method uses DCT followed by the suitable encoding techniques. Various combinations of compression applied to come across the best one.
通过减小文件大小,可以增加在给定数量的硬盘中存储的图像数量,并且减少了通过互联网发送图像所需的时间。图像压缩是我们日常生活中常用的自适应方法,用于减少所有块。有许多现有的技术和原型可用于压缩。本文讨论了简单滑动窗口空间滤波器和均值滤波器在图像压缩中的特殊概念。可以使用ROI从图像中选择所需的区域,然后对图像进行进一步压缩处理。该方法首先采用离散余弦变换,然后采用合适的编码技术。各种组合的压缩应用来找到最好的一个。
{"title":"A new approach to ROI based image compression using simple sliding window spatial filter","authors":"Rajasekhar Reddy M, Ravichandran K.S., Anashwara. P, A. S, Venkatraman","doi":"10.1109/ICCMC.2019.8819690","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819690","url":null,"abstract":"By reducing the file size, the number of images stored in the given amount of hard disk can be increased and the time required to send images over the internet has been reduced. Image compression is the common and adaptive method used for reducing all the chunks in our day to day life. There are many existing techniques and protypes available for compression. This paper deals with the special concepts on image compression using simple sliding window spatial filter or mean filter. The desired region can be selected using ROI from the image which can be processed for further compression of images. The proposed method uses DCT followed by the suitable encoding techniques. Various combinations of compression applied to come across the best one.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Tolerance in VLSI Circuit with Reducing Rollback Cost using FSM 利用FSM降低回滚成本的VLSI电路容错
Gadde Doondi Srinath, M. Samson
In this generation, the revolutionary growth in nanometer technologies brought the drastic change in reduction of device size, increase in complexity, increasing operating speed and decrease in power consumption, which are more sensitive to various kinds of problems. In a combinational logic to protect the faults which are transient are not considered generally as this logic has a common hurdle to stop the faults propagation. In this architecture, there are three cover-up factors used in the process of electrical, logical, and window latch. With these factors, as the industry of processors progress in these days, the chances of generation of transient faults as well as the latches on subsequent element is reduced. Solutions that insulate the whole design are usually very expensive. So that, to implement the rollback, a fixed rollback of K-cycle or a rollback with checkpoint is used. This paper proposes a hardware architecture and the implementations of algorithm, which cut downs the rollback rate in all kind of circuits.
在这一代中,纳米技术的革命性增长带来了器件尺寸的缩小、复杂性的增加、运行速度的提高和功耗的降低等方面的巨大变化,对各种问题更加敏感。在组合逻辑中,暂态故障的保护一般不被考虑,因为这种逻辑具有阻止故障传播的共同障碍。在该体系结构中,在电、逻辑和窗闩过程中使用了三种掩盖因素。有了这些因素,随着处理器行业在这些日子里的进步,产生瞬态故障以及后续元件锁存的机会减少了。将整个设计隔离的解决方案通常非常昂贵。因此,为了实现回滚,使用k周期的固定回滚或带有检查点的回滚。本文提出了一种硬件结构和算法实现,降低了各种电路的回滚率。
{"title":"Fault Tolerance in VLSI Circuit with Reducing Rollback Cost using FSM","authors":"Gadde Doondi Srinath, M. Samson","doi":"10.1109/ICCMC.2019.8819739","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819739","url":null,"abstract":"In this generation, the revolutionary growth in nanometer technologies brought the drastic change in reduction of device size, increase in complexity, increasing operating speed and decrease in power consumption, which are more sensitive to various kinds of problems. In a combinational logic to protect the faults which are transient are not considered generally as this logic has a common hurdle to stop the faults propagation. In this architecture, there are three cover-up factors used in the process of electrical, logical, and window latch. With these factors, as the industry of processors progress in these days, the chances of generation of transient faults as well as the latches on subsequent element is reduced. Solutions that insulate the whole design are usually very expensive. So that, to implement the rollback, a fixed rollback of K-cycle or a rollback with checkpoint is used. This paper proposes a hardware architecture and the implementations of algorithm, which cut downs the rollback rate in all kind of circuits.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Fundamental of Wireless Sensor Network with Various Issues in Optimization 无线传感器网络的基本原理及优化问题综述
Kumkum Dubey, Prashant S. Kumar, Pragati Pathak, Shobhit Kumar, Prince Rajpoot, S. Pandey
Wireless Sensor Network (WSN) is becoming the very provocative model to executing the surveillance tasks and monitoring. In spite of that there are many challenges grow increasingly to reduce the packet loss rate, energy depletion in order to enlarge the network lifetime. In this appraisement paper, we can oversee the recently research work and implementation method to make efficient network. Here we analyse the discrete techniques use in multi-objective optimization (MOO). During the last years, the problems arises in the real world optimization and to solve these types of problems, many researchers believe that multi-population techniques are the primarily used solution. It is based on the optimization of nature inspired algorithm. These techniques are one of the solution of multi-objective optimization. Hence, this review paper provide us the summary of all published publish work and future work. Which is depend on the method of multi-population. After the realization of methods used in multi-population based algorithm and significance of these methods. We noticed that this is time to give a summarization of the different published research work, and there are various aspects that used to discussing the future work. Hence, the main motive of this paper is to give a review of all summarize techniques used in the optimization of nature inspiration. Which are based on multi-population methods. The consequence issues in the method of multi-population that will also give a review and see the major application in the field of engineering and science. Basically, the proposed survey paper provide us a brief knowledge of the problems related to the real world optimization and its future work.
无线传感器网络(WSN)正在成为执行监控任务和监测的一种极具挑战性的模式。尽管如此,如何降低丢包率、降低能量消耗以延长网络寿命的挑战也越来越多。在本文中,我们可以回顾最近的研究工作和实施方法,以建立有效的网络。本文分析了多目标优化(MOO)中使用的离散技术。在过去的几年里,在现实世界中出现了优化问题,为了解决这类问题,许多研究者认为多种群技术是主要的解决方案。它是基于自然启发算法的优化。这些技术是解决多目标优化问题的一种方法。因此,本文对已发表的研究成果和今后的工作进行了总结。这取决于多种群的方法。之后给出了基于多种群算法的实现方法以及这些方法的意义。我们注意到,现在是时候对不同的已发表的研究工作进行总结,并且有不同的方面用来讨论未来的工作。因此,本文的主要目的是对所有用于自然灵感优化的总结技术进行综述。这是基于多种群方法的。对多种群方法中的后果问题进行了综述,并对其在工程和科学领域的主要应用进行了评述。基本上,提出的调查论文为我们提供了与现实世界优化及其未来工作相关的问题的简要知识。
{"title":"A Survey on Fundamental of Wireless Sensor Network with Various Issues in Optimization","authors":"Kumkum Dubey, Prashant S. Kumar, Pragati Pathak, Shobhit Kumar, Prince Rajpoot, S. Pandey","doi":"10.1109/ICCMC.2019.8819833","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819833","url":null,"abstract":"Wireless Sensor Network (WSN) is becoming the very provocative model to executing the surveillance tasks and monitoring. In spite of that there are many challenges grow increasingly to reduce the packet loss rate, energy depletion in order to enlarge the network lifetime. In this appraisement paper, we can oversee the recently research work and implementation method to make efficient network. Here we analyse the discrete techniques use in multi-objective optimization (MOO). During the last years, the problems arises in the real world optimization and to solve these types of problems, many researchers believe that multi-population techniques are the primarily used solution. It is based on the optimization of nature inspired algorithm. These techniques are one of the solution of multi-objective optimization. Hence, this review paper provide us the summary of all published publish work and future work. Which is depend on the method of multi-population. After the realization of methods used in multi-population based algorithm and significance of these methods. We noticed that this is time to give a summarization of the different published research work, and there are various aspects that used to discussing the future work. Hence, the main motive of this paper is to give a review of all summarize techniques used in the optimization of nature inspiration. Which are based on multi-population methods. The consequence issues in the method of multi-population that will also give a review and see the major application in the field of engineering and science. Basically, the proposed survey paper provide us a brief knowledge of the problems related to the real world optimization and its future work.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of acoustical models of GMM-HMM based for speech recognition in Hindi using PocketSphinx 基于GMM-HMM的印地语语音识别声学模型比较
Chadalavada Sai Manasa, K. J. Priya, Deepa Gupta
Automatic Speech recognition (ASR) is widely gaining momentum worldwide, to be used as a part of Human Computer Interface and also in a wide variety of commercial applications. In Indian context, commercial applications using automatic speech recognition are still in the evolving process. This paper describes the acoustic models that have been cross language adapted for speech recognition in Hindi using CMU’s PocketSphinx. A database of 177 words in Hindi is prepared, along with transcription and dictionary. Two approaches for developing acoustical model for the speech recognition has been discussed in this paper. In the first approach, English acoustical model has been cross-language adapted to Hindi. In the second approach different acoustical models -continuous, semi continuous and phonetically tied models have been trained. GMM-HMM is used for acoustical modeling and language modeling.
自动语音识别(ASR)在世界范围内得到了广泛的发展,它不仅可以作为人机界面的一部分,还可以用于各种各样的商业应用。在印度,使用自动语音识别的商业应用仍处于发展过程中。本文描述了使用CMU的PocketSphinx进行印地语语音识别的跨语言声学模型。准备了177个印地语单词的数据库,以及转录和词典。本文讨论了两种建立语音识别声学模型的方法。在第一种方法中,英语声学模型被跨语言适应于印地语。在第二种方法中,训练了不同的声学模型——连续的、半连续的和语音捆绑的模型。GMM-HMM用于声学建模和语言建模。
{"title":"Comparison of acoustical models of GMM-HMM based for speech recognition in Hindi using PocketSphinx","authors":"Chadalavada Sai Manasa, K. J. Priya, Deepa Gupta","doi":"10.1109/ICCMC.2019.8819747","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819747","url":null,"abstract":"Automatic Speech recognition (ASR) is widely gaining momentum worldwide, to be used as a part of Human Computer Interface and also in a wide variety of commercial applications. In Indian context, commercial applications using automatic speech recognition are still in the evolving process. This paper describes the acoustic models that have been cross language adapted for speech recognition in Hindi using CMU’s PocketSphinx. A database of 177 words in Hindi is prepared, along with transcription and dictionary. Two approaches for developing acoustical model for the speech recognition has been discussed in this paper. In the first approach, English acoustical model has been cross-language adapted to Hindi. In the second approach different acoustical models -continuous, semi continuous and phonetically tied models have been trained. GMM-HMM is used for acoustical modeling and language modeling.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation 云安全第三方审计系统综述:安全分析、计算开销与性能评价
T. K. Babu, C. D. Guruprakash
Cloud storage offers a considerable efficiency and security to the user’s data and provide high flexibility to the user. The hackers make attempt of several attacks to steal the data that increase the concern of data security in cloud. The Third Party Auditing (TPA) method is introduced to check the data integrity. There are several TPA methods developed to improve the privacy and efficiency of the data integrity checking method. Various methods involved in TPA, have been analyzed in this review in terms of function, security and overall performance. Merkel Hash Tree (MHT) method provides efficiency and security in checking the integrity of data. The computational overhead of the proof verify is also analyzed in this review. The communication cost of the most TPA methods observed as low and there is a need of improvement in security of the public auditing.
云存储为用户的数据提供了相当高的效率和安全性,并为用户提供了很高的灵活性。黑客试图通过多次攻击来窃取云中的数据,这增加了人们对云数据安全的担忧。引入第三方审计(Third Party Auditing, TPA)方法对数据的完整性进行检查。为了提高数据完整性检查方法的保密性和效率,开发了几种TPA方法。本文从功能、安全性和综合性能等方面分析了TPA中涉及的各种方法。默克尔哈希树(MHT)方法在检查数据完整性方面提供了效率和安全性。本文还分析了证明验证的计算开销。大多数TPA方法的通信成本较低,公共审计的安全性需要改进。
{"title":"A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation","authors":"T. K. Babu, C. D. Guruprakash","doi":"10.1109/ICCMC.2019.8819848","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819848","url":null,"abstract":"Cloud storage offers a considerable efficiency and security to the user’s data and provide high flexibility to the user. The hackers make attempt of several attacks to steal the data that increase the concern of data security in cloud. The Third Party Auditing (TPA) method is introduced to check the data integrity. There are several TPA methods developed to improve the privacy and efficiency of the data integrity checking method. Various methods involved in TPA, have been analyzed in this review in terms of function, security and overall performance. Merkel Hash Tree (MHT) method provides efficiency and security in checking the integrity of data. The computational overhead of the proof verify is also analyzed in this review. The communication cost of the most TPA methods observed as low and there is a need of improvement in security of the public auditing.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparative Study on Parsing in Natural Language Processing 自然语言处理中句法分析的比较研究
Sandeep Kiran, Charan R Shesha Sai, Priyanka, M. Pooja
The main focus of this paper is to deduce which parsing technique is better among the natural language processing techniques. A brief study of LR parsing, its construction and implementation, providing limitations (drawback) on different types of parsing. Comparing LR parsing, through proven results and usage in the field of ‘Natural Language Processing’ and comparing different methods of parsing. Showing drawbacks of LL parsing and coming to the conclusion that LR is more efficient than other parsing methods.
本文的研究重点是推导出在自然语言处理技术中哪一种解析技术更好。简要研究了LR解析及其构造和实现,指出了不同类型解析的局限性(缺点)。比较LR解析,通过在“自然语言处理”领域的验证结果和使用,比较不同的解析方法。展示了LL解析的缺点,并得出LR比其他解析方法更有效的结论。
{"title":"A Comparative Study on Parsing in Natural Language Processing","authors":"Sandeep Kiran, Charan R Shesha Sai, Priyanka, M. Pooja","doi":"10.1109/ICCMC.2019.8819687","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819687","url":null,"abstract":"The main focus of this paper is to deduce which parsing technique is better among the natural language processing techniques. A brief study of LR parsing, its construction and implementation, providing limitations (drawback) on different types of parsing. Comparing LR parsing, through proven results and usage in the field of ‘Natural Language Processing’ and comparing different methods of parsing. Showing drawbacks of LL parsing and coming to the conclusion that LR is more efficient than other parsing methods.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125041999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1