首页 > 最新文献

2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies最新文献

英文 中文
Detection and identification of open circuit faults in VSI-fed induction motor drive vsi感应电机驱动开路故障的检测与识别
Snehal Ghorpade, S. Jagtap
The objective of this project of is to develop a fault detection technique for MOSFET's open circuit faults in voltage source inverter (VSI)-fed induction motor drives. This consist the analysis of the control signals and the line-to-line voltage levels during the switching time of MOSFET, under both healthy and faulty conditions which requires line-to-line voltage measurement, which provides information about switching states. The fault detection scheme is achieved by a simple hardware and it can be included in the existing inverter system. It not only detects the accurate single and multiple faults diagnosis but also minimizes the fault detection time.
本课题的目的是开发电压源逆变器(VSI)馈电异步电机驱动中MOSFET开路故障的故障检测技术。这包括在正常和故障条件下对MOSFET开关时间内的控制信号和线对线电压水平的分析,这需要进行线对线电压测量,从而提供有关开关状态的信息。该故障检测方案通过简单的硬件实现,可用于现有的逆变器系统。它不仅能准确地诊断出单故障和多故障,而且能最大限度地缩短故障检测时间。
{"title":"Detection and identification of open circuit faults in VSI-fed induction motor drive","authors":"Snehal Ghorpade, S. Jagtap","doi":"10.1109/ICACCCT.2014.7019452","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019452","url":null,"abstract":"The objective of this project of is to develop a fault detection technique for MOSFET's open circuit faults in voltage source inverter (VSI)-fed induction motor drives. This consist the analysis of the control signals and the line-to-line voltage levels during the switching time of MOSFET, under both healthy and faulty conditions which requires line-to-line voltage measurement, which provides information about switching states. The fault detection scheme is achieved by a simple hardware and it can be included in the existing inverter system. It not only detects the accurate single and multiple faults diagnosis but also minimizes the fault detection time.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121761694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical implementation of secure email system based on IBE, DNS and proxy service 基于IBE、DNS和代理服务的安全邮件系统的实际实现
Suresh Kumar Balakrishnanl, Jagathy Raj
Now a days, email has become the most widely used communication system in daily life. To improve security and efficiency of email system, most of the current email system adopts S/MIME or PGP as the mechanism implement security. But these systems are not efficient because of the high cost for public key certificate management and the problem on credential trust management. This paper presents a complete implementation of a practical secure email system based on Identity Based Encryption (IBE) which uses DNS as the infrastructure for public key exchange, a proxy service for encryption/decryption on behalf of user and a secure key token or fingerprint authentication system for user authentication.
如今,电子邮件已经成为日常生活中使用最广泛的通信系统。为了提高电子邮件系统的安全性和效率,目前的电子邮件系统大多采用S/MIME或PGP作为安全机制来实现。但由于公钥证书管理成本高和证书信任管理问题,这些系统的效率不高。本文提出了一种基于身份加密(Identity based Encryption, IBE)的实用安全电子邮件系统的完整实现,该系统使用DNS作为公钥交换的基础设施,使用代理服务代表用户进行加/解密,使用安全密钥令牌或指纹认证系统对用户进行身份验证。
{"title":"Practical implementation of secure email system based on IBE, DNS and proxy service","authors":"Suresh Kumar Balakrishnanl, Jagathy Raj","doi":"10.1109/ICACCCT.2014.7019420","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019420","url":null,"abstract":"Now a days, email has become the most widely used communication system in daily life. To improve security and efficiency of email system, most of the current email system adopts S/MIME or PGP as the mechanism implement security. But these systems are not efficient because of the high cost for public key certificate management and the problem on credential trust management. This paper presents a complete implementation of a practical secure email system based on Identity Based Encryption (IBE) which uses DNS as the infrastructure for public key exchange, a proxy service for encryption/decryption on behalf of user and a secure key token or fingerprint authentication system for user authentication.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132487015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient system for the detection of exudates in colour fundus images using image processing technique 基于图像处理技术的彩色眼底图像渗出物检测系统
P. Ravivarma, B. Ramasubramanian, G. Arunmani, B. Babumohan
Diabetic Retinopathy is the major cause of blindness in many diabetic patients. Automatic detection of exudates in retinal images can assist in early screening of Diabetic Retinopathy. Several techniques can achieve good performance on a good quality retinal images. But when the image is of low quality, we need a new method. In this paper, we presented a novel method for the detection of exudates in low quality retinal images. The colour retinal images are pre-processed by a hyperbolic median filter and then segmented using fuzzy c-means clustering algorithm. After segmenting the images, a set of features based on colour, size and texture are extracted. Then these features are optimized using Particle Swarm Optimization (PSO) technique. Finally the features are classified using a recursive Support Vector Machine (SVM) Classifier. The proposed method achieves an accuracy of 98% and predictivity of 98.5% for the identification of exudates.
糖尿病视网膜病变是许多糖尿病患者失明的主要原因。视网膜图像中渗出物的自动检测有助于糖尿病视网膜病变的早期筛查。有几种技术可以在高质量的视网膜图像上获得良好的性能。但是当图像质量较差时,我们需要一种新的方法。本文提出了一种检测低质量视网膜图像中渗出物的新方法。采用双曲中值滤波对彩色视网膜图像进行预处理,然后采用模糊c均值聚类算法对彩色视网膜图像进行分割。对图像进行分割后,提取一组基于颜色、大小和纹理的特征。然后利用粒子群算法(PSO)对这些特征进行优化。最后使用递归支持向量机(SVM)分类器对特征进行分类。该方法对渗出物的识别准确率为98%,预测率为98.5%。
{"title":"An efficient system for the detection of exudates in colour fundus images using image processing technique","authors":"P. Ravivarma, B. Ramasubramanian, G. Arunmani, B. Babumohan","doi":"10.1109/ICACCCT.2014.7019366","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019366","url":null,"abstract":"Diabetic Retinopathy is the major cause of blindness in many diabetic patients. Automatic detection of exudates in retinal images can assist in early screening of Diabetic Retinopathy. Several techniques can achieve good performance on a good quality retinal images. But when the image is of low quality, we need a new method. In this paper, we presented a novel method for the detection of exudates in low quality retinal images. The colour retinal images are pre-processed by a hyperbolic median filter and then segmented using fuzzy c-means clustering algorithm. After segmenting the images, a set of features based on colour, size and texture are extracted. Then these features are optimized using Particle Swarm Optimization (PSO) technique. Finally the features are classified using a recursive Support Vector Machine (SVM) Classifier. The proposed method achieves an accuracy of 98% and predictivity of 98.5% for the identification of exudates.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"22 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation of image based authentication to ensure the security of mail server 实现基于图像的认证,保证邮件服务器的安全性
A. Rahim
Electronic communication is an emerging technique where we send information from sender to receiver in the form of E-Mail. To send and receive an Email, each user should have an ID. That ID must be locked with the unique password. The password is in the form of text. It may be alphabetical, numbers, alphanumerical and etc. Email servers provide the constraints to set the passwords, for the users. Even most of the servers secured, Black hat hackers hack the account and access the informations. A graphical password is an authentication system, that works by having the user select from images, in a specific order, presented in a graphical user interface(GUI). The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.
电子通信是一种新兴的技术,我们以电子邮件的形式将信息从发送者发送到接收者。要发送和接收电子邮件,每个用户都应该有一个ID。该ID必须用唯一的密码锁定。密码是文本形式的。它可以是字母、数字、字母数字等等。电子邮件服务器为用户提供设置密码的约束。即使大多数安全的服务器,黑帽黑客也会入侵账户并获取信息。图形密码是一种身份验证系统,它的工作原理是让用户以特定顺序从图形用户界面(GUI)中显示的图像中进行选择。最常见的计算机身份验证方法是使用字母数字用户名和密码。这种方法已被证明有明显的缺点。例如,用户倾向于选择容易被猜到的密码。另一方面,如果一个密码很难猜测,那么它通常也很难记住。
{"title":"Implementation of image based authentication to ensure the security of mail server","authors":"A. Rahim","doi":"10.1109/ICACCCT.2014.7019148","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019148","url":null,"abstract":"Electronic communication is an emerging technique where we send information from sender to receiver in the form of E-Mail. To send and receive an Email, each user should have an ID. That ID must be locked with the unique password. The password is in the form of text. It may be alphabetical, numbers, alphanumerical and etc. Email servers provide the constraints to set the passwords, for the users. Even most of the servers secured, Black hat hackers hack the account and access the informations. A graphical password is an authentication system, that works by having the user select from images, in a specific order, presented in a graphical user interface(GUI). The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, user tends to pick a passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Power quality analysis of a PV fed seven level cascaded H-bridge multilevel inverter 光伏供电七电平级联h桥多电平逆变器的电能质量分析
B. Raj Kiran, Meenakshi Jayaraman, V. .. Sreedevi
Efficient DC to DC and DC to AC converters play a vital role in the reliable performance of standalone and grid connected photovoltaic systems. This paper deals with DC to AC conversion by a seven level cascaded H-bridge multilevel inverter for a standalone photovoltaic system. The PV fed seven level cascaded H-bridge multilevel inverter is analyzed in two ways: 1) with equal voltage sources as input to the H-bridges and 2) with unequal voltage sources as input. A comparative study of the total harmonic distortion reduction in the PV fed multilevel inverter system with and without equal voltage sources as input is carried out. It is observed that with unequal voltage sources, the total harmonic distortion is increased than that with equal voltage sources as input to the PV fed seven level cascaded H-bridge multilevel inverter. Further, the study attempts to show that with an LC filter at the output stage of the multilevel inverter, the total harmonic reduction is significantly reduced and the power quality of the PV fed multilevel inverter system is highly improved. Results are verified using simulations done in MATLAB/Simulink environment.
高效的DC - DC和DC - AC转换器在独立和并网光伏系统的可靠性能中起着至关重要的作用。本文研究了独立光伏系统用七电平级联h桥多电平逆变器进行直流到交流的转换。采用等电压源作为h桥输入和不等电压源作为h桥输入两种方式对PV馈电七电平级联h桥多电平逆变器进行了分析。对有等电压源和无等电压源的光伏供电多电平逆变器系统的总谐波失真降低进行了比较研究。结果表明,当电压源不相等时,光伏供电的七电平级联h桥多电平逆变器的总谐波畸变比电压源相等时增大。进一步,本研究试图表明,在多电平逆变器的输出级添加LC滤波器,可以显著降低总谐波,并大大提高光伏供电多电平逆变器系统的电能质量。在MATLAB/Simulink环境下进行了仿真验证。
{"title":"Power quality analysis of a PV fed seven level cascaded H-bridge multilevel inverter","authors":"B. Raj Kiran, Meenakshi Jayaraman, V. .. Sreedevi","doi":"10.1109/ICACCCT.2014.7019446","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019446","url":null,"abstract":"Efficient DC to DC and DC to AC converters play a vital role in the reliable performance of standalone and grid connected photovoltaic systems. This paper deals with DC to AC conversion by a seven level cascaded H-bridge multilevel inverter for a standalone photovoltaic system. The PV fed seven level cascaded H-bridge multilevel inverter is analyzed in two ways: 1) with equal voltage sources as input to the H-bridges and 2) with unequal voltage sources as input. A comparative study of the total harmonic distortion reduction in the PV fed multilevel inverter system with and without equal voltage sources as input is carried out. It is observed that with unequal voltage sources, the total harmonic distortion is increased than that with equal voltage sources as input to the PV fed seven level cascaded H-bridge multilevel inverter. Further, the study attempts to show that with an LC filter at the output stage of the multilevel inverter, the total harmonic reduction is significantly reduced and the power quality of the PV fed multilevel inverter system is highly improved. Results are verified using simulations done in MATLAB/Simulink environment.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134490019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Classification of lung cancer stages on CT scan images using image processing 利用图像处理技术对CT扫描图像的肺癌分期进行分类
Anjali Kulkarni, A. Panditrao
Lung cancer is the uncontrolled growth of abnormal cells that starts off in one or both images. People who smoke have the greatest risk of lung cancer. The overall 5 year survival rate for lung cancer combining all stages is roughly 15%. Early detection of lung cancer can increase the chance of survival among people. Lung cancer may be found by imaging tests such as chest computed tomography scan as it provides more detailed picture. To classify the stages of lung cancer, image processing technique is developed. In this work, new algorithm is developed using image processing technique to detect the cancer at early stage with more accuracy. Image processing involves the pre-processing, feature extraction and finally classification steps.
肺癌是一种不受控制的异常细胞生长,它开始于一张或两张图像。吸烟的人患肺癌的风险最大。肺癌所有阶段的总体5年生存率约为15%。早期发现肺癌可以增加人们的生存机会。肺癌可通过影像学检查发现,如胸部计算机断层扫描,因为它能提供更详细的图像。为了对肺癌的分期进行分类,发展了图像处理技术。本文利用图像处理技术开发了一种新的算法,以提高癌症的早期检测精度。图像处理包括预处理、特征提取和分类等步骤。
{"title":"Classification of lung cancer stages on CT scan images using image processing","authors":"Anjali Kulkarni, A. Panditrao","doi":"10.1109/ICACCCT.2014.7019327","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019327","url":null,"abstract":"Lung cancer is the uncontrolled growth of abnormal cells that starts off in one or both images. People who smoke have the greatest risk of lung cancer. The overall 5 year survival rate for lung cancer combining all stages is roughly 15%. Early detection of lung cancer can increase the chance of survival among people. Lung cancer may be found by imaging tests such as chest computed tomography scan as it provides more detailed picture. To classify the stages of lung cancer, image processing technique is developed. In this work, new algorithm is developed using image processing technique to detect the cancer at early stage with more accuracy. Image processing involves the pre-processing, feature extraction and finally classification steps.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Determining redundant nodes in a location unaware Wireless Sensor Network 确定位置未知无线传感器网络中的冗余节点
Mrinmoy Bhattacharjee, Shubhrata Gupta
Recently Wireless Sensor Networks (WSNs) have garnered a great interest among the research community. WSNs are heavily energy constrained and hence redundant nodes in the network must be allowed to sleep so that the network lifetime may be enhanced. Recently a lot of work has been done to determine the amount of redundancy inherent in a WSN. This paper describes a method that attempts to reduce the redundancy in the network that is distributive in nature and does not use the location information of the nodes. To find out if a node is redundant, the nodes' sensing area overlap is to be found out. The method uses three-circle overlap area as the base case for finding the total overlap over the sensing area of a node by its neighbors. The work here is for static deployment of the sensor nodes.
近年来,无线传感器网络(WSNs)引起了研究界的极大兴趣。无线传感器网络能量受到严重限制,因此必须允许网络中的冗余节点休眠,以提高网络的生存时间。近年来,人们已经做了大量的工作来确定WSN中固有的冗余量。本文描述了一种不利用节点位置信息,试图减少分布式网络中冗余的方法。为了确定节点是否冗余,需要找出节点的感知区域重叠。该方法以三圆重叠区域为基例,求节点相邻节点在感知区域上的总重叠。这里的工作是用于传感器节点的静态部署。
{"title":"Determining redundant nodes in a location unaware Wireless Sensor Network","authors":"Mrinmoy Bhattacharjee, Shubhrata Gupta","doi":"10.1109/ICACCCT.2014.7019215","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019215","url":null,"abstract":"Recently Wireless Sensor Networks (WSNs) have garnered a great interest among the research community. WSNs are heavily energy constrained and hence redundant nodes in the network must be allowed to sleep so that the network lifetime may be enhanced. Recently a lot of work has been done to determine the amount of redundancy inherent in a WSN. This paper describes a method that attempts to reduce the redundancy in the network that is distributive in nature and does not use the location information of the nodes. To find out if a node is redundant, the nodes' sensing area overlap is to be found out. The method uses three-circle overlap area as the base case for finding the total overlap over the sensing area of a node by its neighbors. The work here is for static deployment of the sensor nodes.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A three level cache structure 三级缓存结构
J. G. Anjana, M. Prasanth
Hierarchy of cache levels plays a major role for a faster memory access compared to direct main memory access for information recently used by a processor. In this paper, we propose a three level cache structure with additional decoder for much faster accesses. The three level caches maintains data redundancy and decoder helps to enable part of cache memory in each level rather than complete cache memory in each level. A piece of information from the address referencing the locations is used for enabling each way in corresponding levels. Thus the access takes less time rather than accessing the whole memory in each level. The decoder helps in enabling the way depending on few bits considered from the address to enable the desired way. A three level cache structure with L1 (2 way, 128 Kb), L2 (4 way, 128 kb) and L3 (8 way, 128 kb) has been simulated in Xilinx 9.1 ISE. The technology of decoder in each cache level improves the efficiency.
与直接访问处理器最近使用的信息相比,缓存级别的层次结构对于更快的内存访问起着重要作用。在本文中,我们提出了一个三层缓存结构与额外的解码器,以获得更快的访问速度。三级缓存保持数据冗余,解码器有助于在每一级启用部分缓存存储器,而不是在每一级启用完整的缓存存储器。从地址中引用位置的一条信息用于在相应级别中启用每种方式。因此,访问比访问每个级别的整个内存花费更少的时间。解码器帮助启用依赖于从地址考虑的几个比特的方式来启用所需的方式。在Xilinx 9.1 ISE中模拟了L1(2路,128 Kb), L2(4路,128 Kb)和L3(8路,128 Kb)的三级缓存结构。每个缓存层的解码器技术提高了效率。
{"title":"A three level cache structure","authors":"J. G. Anjana, M. Prasanth","doi":"10.1109/ICACCCT.2014.7019478","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019478","url":null,"abstract":"Hierarchy of cache levels plays a major role for a faster memory access compared to direct main memory access for information recently used by a processor. In this paper, we propose a three level cache structure with additional decoder for much faster accesses. The three level caches maintains data redundancy and decoder helps to enable part of cache memory in each level rather than complete cache memory in each level. A piece of information from the address referencing the locations is used for enabling each way in corresponding levels. Thus the access takes less time rather than accessing the whole memory in each level. The decoder helps in enabling the way depending on few bits considered from the address to enable the desired way. A three level cache structure with L1 (2 way, 128 Kb), L2 (4 way, 128 kb) and L3 (8 way, 128 kb) has been simulated in Xilinx 9.1 ISE. The technology of decoder in each cache level improves the efficiency.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114466905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visualization of deadlock and wait-notify anomaly in multithreaded programs 多线程程序中死锁和等待通知异常的可视化
A. Jyoti, V. Arora
The paper addresses deadlock due to lock acquisition dependency and wait-notify anomalies. In this work, dependencies are visualized with three types of dependence graphs namely data-control, lock acquisition and wait-notify dependence graphs. Algorithms are also proposed for generating graphs; and hence, bugs are detected due to blockage. Graphical method is used to detect bugs. A prototype tool “Bug Visualizer” is implemented in Java version 7.
本文讨论了由于锁获取依赖和等待通知异常引起的死锁。在这项工作中,依赖关系被可视化为三种类型的依赖图,即数据控制依赖图、锁获取依赖图和等待通知依赖图。还提出了生成图的算法;因此,由于堵塞而检测到错误。采用图形化方法检测bug。在Java版本7中实现了一个原型工具“Bug Visualizer”。
{"title":"Visualization of deadlock and wait-notify anomaly in multithreaded programs","authors":"A. Jyoti, V. Arora","doi":"10.1109/ICACCCT.2014.7019382","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019382","url":null,"abstract":"The paper addresses deadlock due to lock acquisition dependency and wait-notify anomalies. In this work, dependencies are visualized with three types of dependence graphs namely data-control, lock acquisition and wait-notify dependence graphs. Algorithms are also proposed for generating graphs; and hence, bugs are detected due to blockage. Graphical method is used to detect bugs. A prototype tool “Bug Visualizer” is implemented in Java version 7.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic search engine and its strategies with IAN encoder 基于IAN编码器的语义搜索引擎及其策略
Shivangi Nanda, Parteek Bhatia
A semantic based approach is better in many ways than the keyword based searches. As the wide amount of information on the internet is exceling daily, the keyword based approach in many commercial search engines is failing to retrieve correct information without getting the knowledge and need of user query. Since the keyword based search could search for the particular language having that keyword, thus many commercial search engine is one language oriented. We present our solution for performing cross lingual semantic based search. First, we introduce the UNL, the approach followed and the frameworks IAN and EUGENE which are used as enconverter and deconverter for the system. Second, we focus on the failure of some other meaning based search engines in brief. Third, we present our semantic model semiautomated cross lingual semantic model, which encapsulate and sharpen previously proposed models. Forth, we report our analysis of search success using these data, which confirm and extend previous findings. Finally, we demonstrate our model on different strategies of search engine. Together, our semantic search engine is another approach that not only distinguishes between the search strategies but is able to perform meaning based, cross-lingual search using IAN encoder having dictionaries and rules of different languages.
基于语义的方法在许多方面都比基于关键字的搜索更好。由于互联网上的信息量日益庞大,许多商业搜索引擎中基于关键词的搜索方法在不了解用户查询的知识和需求的情况下无法检索到正确的信息。由于基于关键字的搜索可以搜索具有该关键字的特定语言,因此许多商业搜索引擎都是面向一种语言的。我们提出了跨语言语义搜索的解决方案。首先,我们介绍了UNL,遵循的方法和框架IAN和EUGENE作为系统的转换和反转换。其次,我们重点对其他一些基于含义的搜索引擎的失败进行简要介绍。第三,我们提出了我们的语义模型半自动化跨语言语义模型,该模型封装和优化了先前提出的模型。第四,我们使用这些数据报告我们对搜索成功的分析,这证实并扩展了之前的发现。最后,我们在不同的搜索引擎策略上验证了我们的模型。总之,我们的语义搜索引擎是另一种方法,它不仅区分搜索策略,而且能够使用具有不同语言字典和规则的IAN编码器执行基于含义的跨语言搜索。
{"title":"Semantic search engine and its strategies with IAN encoder","authors":"Shivangi Nanda, Parteek Bhatia","doi":"10.1109/ICACCCT.2014.7019156","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019156","url":null,"abstract":"A semantic based approach is better in many ways than the keyword based searches. As the wide amount of information on the internet is exceling daily, the keyword based approach in many commercial search engines is failing to retrieve correct information without getting the knowledge and need of user query. Since the keyword based search could search for the particular language having that keyword, thus many commercial search engine is one language oriented. We present our solution for performing cross lingual semantic based search. First, we introduce the UNL, the approach followed and the frameworks IAN and EUGENE which are used as enconverter and deconverter for the system. Second, we focus on the failure of some other meaning based search engines in brief. Third, we present our semantic model semiautomated cross lingual semantic model, which encapsulate and sharpen previously proposed models. Forth, we report our analysis of search success using these data, which confirm and extend previous findings. Finally, we demonstrate our model on different strategies of search engine. Together, our semantic search engine is another approach that not only distinguishes between the search strategies but is able to perform meaning based, cross-lingual search using IAN encoder having dictionaries and rules of different languages.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1