首页 > 最新文献

2017 IEEE 7th International Advance Computing Conference (IACC)最新文献

英文 中文
Intelligent Learning Environment Model for Education 教育智能学习环境模型
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0167
Tarun Dhar Diwan, Upasana Sinha, K. Mehta
Here during this Paper, Eye chase is employed in studies to look at education and learning processes. Additionally, lecture rooms and labs square measure being equipped with this technology so as to show tomorrow's work force the way to use eye chase in several fields. From our company shoppers, our team hears that there's a growing demand for those who square measure consultants all told aspects of eye chase. Universities have a singular chance to fulfill this growing demand by militarization students with eye chase tools. This expands their future choices by teaching them however visual attention may be analyzed and applied to several analysis fields. In order to relinquish each the university and also the students a a lot of competitive come on the market place, we are able to facilitate develop curriculums that demonstrate for college kids however eye chase may be integrated as a tool to answer analysis queries, solve business problems, and even build businesses. Eye chase will capture attention-grabbing insights regarding student learning behavior and teaching strategies in a very broad vary of academic things. The info from an eye fixed hunter will reveal completely different learning ways for researchers to higher perceive student psychological feature employment. This data can even be accustomed measure teacher performance and instruction strategies. By understanding the room dynamics, as well as interaction between students and academics, researchers will outline acceptable coaching programs and directions so as to boost education, Eye chase shows the immediate reactions of users, additionally because the distribution of their attention in AN interface. Testing code and applications throughout development is vital to making sure they're effective for the user.
在本文中,目光追逐被用于研究教育和学习过程。此外,教室和实验室都配备了这项技术,以便向未来的工作人员展示在几个领域使用目光追逐的方式。从我们公司的顾客那里,我们的团队听说对那些方方面面的测量顾问的需求在不断增长。大学有一个独特的机会来满足这种日益增长的需求,用眼球追踪工具军事化学生。通过教会他们如何分析视觉注意力并将其应用于几个分析领域,这扩大了他们未来的选择。为了让大学和学生在市场上有更多的竞争,我们可以帮助开发课程,向大学生展示如何将目光追逐作为回答分析问题、解决商业问题甚至创业的工具。目光追逐将捕捉到关于学生学习行为和教学策略的引人注目的见解,在非常广泛的学术事物中。目光猎手提供的信息将为研究者提供完全不同的学习方式,从而更好地感知学生的心理特征。这些数据甚至可以用来衡量教师的表现和教学策略。通过了解房间动态,以及学生和教师之间的互动,研究人员将概述可接受的指导计划和方向,以促进教育。眼球追逐显示用户的即时反应,另外因为他们的注意力在一个界面上的分布。在整个开发过程中测试代码和应用程序对于确保它们对用户有效至关重要。
{"title":"Intelligent Learning Environment Model for Education","authors":"Tarun Dhar Diwan, Upasana Sinha, K. Mehta","doi":"10.1109/IACC.2017.0167","DOIUrl":"https://doi.org/10.1109/IACC.2017.0167","url":null,"abstract":"Here during this Paper, Eye chase is employed in studies to look at education and learning processes. Additionally, lecture rooms and labs square measure being equipped with this technology so as to show tomorrow's work force the way to use eye chase in several fields. From our company shoppers, our team hears that there's a growing demand for those who square measure consultants all told aspects of eye chase. Universities have a singular chance to fulfill this growing demand by militarization students with eye chase tools. This expands their future choices by teaching them however visual attention may be analyzed and applied to several analysis fields. In order to relinquish each the university and also the students a a lot of competitive come on the market place, we are able to facilitate develop curriculums that demonstrate for college kids however eye chase may be integrated as a tool to answer analysis queries, solve business problems, and even build businesses. Eye chase will capture attention-grabbing insights regarding student learning behavior and teaching strategies in a very broad vary of academic things. The info from an eye fixed hunter will reveal completely different learning ways for researchers to higher perceive student psychological feature employment. This data can even be accustomed measure teacher performance and instruction strategies. By understanding the room dynamics, as well as interaction between students and academics, researchers will outline acceptable coaching programs and directions so as to boost education, Eye chase shows the immediate reactions of users, additionally because the distribution of their attention in AN interface. Testing code and applications throughout development is vital to making sure they're effective for the user.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"99 1-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirement Prioritization Using Adaptive Fuzzy Hierarchical Cumulative Voting 基于自适应模糊层次累积投票的需求优先排序
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0034
Bhagyashri B. Jawale, G. Patnaik, A. T. Bhole
Requirement prioritization is very useful for making decisions about product plan but most of the time it is ignored. In many cases it seems that the product hardly attains its principal objectives due to improper prioritization. Increased emphasis on requirement prioritization and highly dynamic requirements makes management of composite services time consuming and difficult task. When software project has rigid timelines, limited resources, but high client expectations, an instantaneous deployment of most vital and critical features becomes mandatory. The problem can be solved by prioritizing the requirements. Over the past years, various techniques for requirement prioritization are presented by a variety of researchers in software engineering domain. The proposed Adaptive Fuzzy Hierarchical Cumulative Voting (AFHCV) uses adaptive mechanism with existing Fuzzy Hierarchical Cumulative Voting (FHCV) technique, in order to increase the coverage of events that can occur at runtime. The adaptive mechanism includes Addition of new requirement set, Analysis and Reallocation of requirements, Assignment and Alteration of priorities and Re-prioritization. The re-prioritization is used to improve the results of proposed AFHCV. The proposed system compares the results of proposed AFHCV technique to the existing FHCV technique and the comparison shows the proposed AFHCV yields better results than FHCV.
需求优先级对于制定产品计划非常有用,但大多数时候它被忽略了。在许多情况下,由于优先级划分不当,产品似乎很难实现其主要目标。对需求优先级和高度动态需求的日益强调使得组合服务的管理既耗时又困难。当软件项目有严格的时间表,有限的资源,但客户的期望很高时,立即部署最重要和关键的特性就变得很有必要。这个问题可以通过划分需求的优先级来解决。在过去的几年里,软件工程领域的研究者们提出了各种需求优先级划分的技术。本文提出的自适应模糊分层累积投票(AFHCV)将自适应机制与现有的模糊分层累积投票(FHCV)技术相结合,以增加在运行时可能发生的事件的覆盖率。适应性机制包括新需求集的添加、需求的分析和重新分配、优先级的分配和更改以及重新确定优先级。重新确定优先级是为了改进所提出的AFHCV的结果。该系统将所提出的AFHCV技术与现有的FHCV技术的结果进行了比较,结果表明所提出的AFHCV技术比FHCV技术的效果更好。
{"title":"Requirement Prioritization Using Adaptive Fuzzy Hierarchical Cumulative Voting","authors":"Bhagyashri B. Jawale, G. Patnaik, A. T. Bhole","doi":"10.1109/IACC.2017.0034","DOIUrl":"https://doi.org/10.1109/IACC.2017.0034","url":null,"abstract":"Requirement prioritization is very useful for making decisions about product plan but most of the time it is ignored. In many cases it seems that the product hardly attains its principal objectives due to improper prioritization. Increased emphasis on requirement prioritization and highly dynamic requirements makes management of composite services time consuming and difficult task. When software project has rigid timelines, limited resources, but high client expectations, an instantaneous deployment of most vital and critical features becomes mandatory. The problem can be solved by prioritizing the requirements. Over the past years, various techniques for requirement prioritization are presented by a variety of researchers in software engineering domain. The proposed Adaptive Fuzzy Hierarchical Cumulative Voting (AFHCV) uses adaptive mechanism with existing Fuzzy Hierarchical Cumulative Voting (FHCV) technique, in order to increase the coverage of events that can occur at runtime. The adaptive mechanism includes Addition of new requirement set, Analysis and Reallocation of requirements, Assignment and Alteration of priorities and Re-prioritization. The re-prioritization is used to improve the results of proposed AFHCV. The proposed system compares the results of proposed AFHCV technique to the existing FHCV technique and the comparison shows the proposed AFHCV yields better results than FHCV.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Inferential Sensing of Output Quality in Petroleum Refinery Using Principal Component Regression and Support Vector Regression 基于主成分回归和支持向量回归的炼油厂输出质量推理感知
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0101
V. Jain, P. Kishore, R. Kumar, A. K. Pani
In this research, linear regression (ordinary least square and principal component) and non-linear regression (standard and least square support vector) models are developed for prediction of output quality from sulphur recovery unit. The hyper parameters associated with standard SVR and LS-SVR are determined analytically using the guidelines proposed in the literature. The relevant input-output data for process variables are taken from open source literature. The training set and validation set are statistically designed from the total data. The designed training data were used for design of the process model and the remaining validation data were used for model performance evaluation. Simulation results show superior performance of the standard SVR model over other models.
本文采用线性回归(普通最小二乘和主成分)和非线性回归(标准和最小二乘支持向量)模型对硫磺回收装置的产出质量进行预测。与标准SVR和LS-SVR相关的超参数使用文献中提出的准则进行分析确定。过程变量的相关输入输出数据取自开源文献。训练集和验证集是根据总数据进行统计设计的。设计的训练数据用于流程模型的设计,剩余的验证数据用于模型性能评估。仿真结果表明,标准支持向量回归模型的性能优于其他模型。
{"title":"Inferential Sensing of Output Quality in Petroleum Refinery Using Principal Component Regression and Support Vector Regression","authors":"V. Jain, P. Kishore, R. Kumar, A. K. Pani","doi":"10.1109/IACC.2017.0101","DOIUrl":"https://doi.org/10.1109/IACC.2017.0101","url":null,"abstract":"In this research, linear regression (ordinary least square and principal component) and non-linear regression (standard and least square support vector) models are developed for prediction of output quality from sulphur recovery unit. The hyper parameters associated with standard SVR and LS-SVR are determined analytically using the guidelines proposed in the literature. The relevant input-output data for process variables are taken from open source literature. The training set and validation set are statistically designed from the total data. The designed training data were used for design of the process model and the remaining validation data were used for model performance evaluation. Simulation results show superior performance of the standard SVR model over other models.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130442626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient Feature Set for Spam Email Filtering 有效的垃圾邮件过滤功能集
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0152
Reshma Varghese, K. Dhanya
Spams are one of the major problems for the quality of Internet services, specially in the electronic mail. Classifying emails into spam and ham category without any misclassification is the concerned area of study. The objective is to find the best feature set for spam email filtering. For this work to be carried out, four categories of features are extracted. That are Bag-of-Word (BoW)s, Bigram Bag-of-Word (BoW)s, PoS Tag and Bigram PoS Tag. Rare features are eliminated based on Naive Bayes score. We chose Information Gain as feature selection technique and constructed Feature occurrence matrix, which is weighted by Term frequency-Inverse document frequency (TF-IDF) values. Singular Value Decomposition used as matrix factorization technique. AdaBoostJ48, Random Forest and Popular linear Support Vector Machine (SVM), called Sequential Minimal Optimization (SMO) are used as classifiers for model generation. The experiments are carried out on individual feature models as well as ensemble models. High ROC of 1 and low FPR of 0 were obtained for both individual feature model and ensemble model.
垃圾邮件是影响互联网服务质量的主要问题之一,特别是在电子邮件中。将电子邮件分类为垃圾邮件和火腿类别而没有任何错误分类是研究的相关领域。目标是找到过滤垃圾邮件的最佳特性集。为了开展这项工作,提取了四类特征。它们分别是词袋标签(BoW)、双词袋标签(BoW)、PoS标签和双词袋标签(Bigram PoS Tag)。基于朴素贝叶斯评分剔除稀有特征。我们选择信息增益作为特征选择技术,构造特征发生矩阵,该矩阵由词频-逆文档频率(TF-IDF)值加权。用奇异值分解作为矩阵分解技术。使用AdaBoostJ48、随机森林和称为顺序最小优化(SMO)的流行线性支持向量机(SVM)作为分类器进行模型生成。实验分别在单个特征模型和集成模型上进行。个体特征模型和集成模型的ROC均为1,FPR均为0。
{"title":"Efficient Feature Set for Spam Email Filtering","authors":"Reshma Varghese, K. Dhanya","doi":"10.1109/IACC.2017.0152","DOIUrl":"https://doi.org/10.1109/IACC.2017.0152","url":null,"abstract":"Spams are one of the major problems for the quality of Internet services, specially in the electronic mail. Classifying emails into spam and ham category without any misclassification is the concerned area of study. The objective is to find the best feature set for spam email filtering. For this work to be carried out, four categories of features are extracted. That are Bag-of-Word (BoW)s, Bigram Bag-of-Word (BoW)s, PoS Tag and Bigram PoS Tag. Rare features are eliminated based on Naive Bayes score. We chose Information Gain as feature selection technique and constructed Feature occurrence matrix, which is weighted by Term frequency-Inverse document frequency (TF-IDF) values. Singular Value Decomposition used as matrix factorization technique. AdaBoostJ48, Random Forest and Popular linear Support Vector Machine (SVM), called Sequential Minimal Optimization (SMO) are used as classifiers for model generation. The experiments are carried out on individual feature models as well as ensemble models. High ROC of 1 and low FPR of 0 were obtained for both individual feature model and ensemble model.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121576631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Existential Probability Weighting Strategy to Reduce Search Space & Time for Big Data Mining 减少大数据挖掘搜索空间和时间的存在概率加权策略
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0035
Mahesh Shinde, K. Adhiya
Very huge quantity of data is continuously generated from a variety of different sources such as IT industries, internet applications, hospital history records, social media feeds etc. called as "Big Data". Mostly Data mining algorithms find the interesting patterns of data from the value-based database where the information is exact. It is not so easy to discover interesting patterns from big data. To abstain from squandering a ton of space & time in searching down frequent item uncertain big data, proposed approach permits clients to show their enthusiasm for terms of succinct anti-monotone constraint. MapReduce technique is used to mine frequent patterns. Two sets of map and reduce functions are used by proposed system to mine valid singleton and non-singleton patterns. In proposed work, UF-tree algorithm generates tree structure of dataset and UF-growth mines frequent itemsets recursively. To further reduce the search space and execution time in uncertain big data, proposed work gives importance to the frequency of items using weighting factors, and calculate expected support of item on the basis of weight. It reduces the nodes in the first level of tree, which leads to a reduction in the size of the tree and execution time.
从各种不同的来源,如IT行业、互联网应用、医院历史记录、社交媒体馈送等,不断产生非常大量的数据,这些数据被称为“大数据”。大多数情况下,数据挖掘算法从信息准确的基于值的数据库中发现有趣的数据模式。从大数据中发现有趣的模式并不容易。为了避免浪费大量的空间和时间来搜索频繁项目不确定的大数据,建议的方法允许客户对简洁的反单调约束条款表现出他们的热情。MapReduce技术用于挖掘频繁模式。该系统使用两组map和reduce函数来挖掘有效的单例模式和非单例模式。在本文中,uf树算法生成数据集的树状结构,uf生长算法递归挖掘频繁项集。为了进一步减少不确定大数据下的搜索空间和执行时间,本文提出的工作利用权重因子来重视项目的出现频率,并在权重的基础上计算项目的期望支持度。它减少了树的第一层中的节点,从而减少了树的大小和执行时间。
{"title":"Existential Probability Weighting Strategy to Reduce Search Space & Time for Big Data Mining","authors":"Mahesh Shinde, K. Adhiya","doi":"10.1109/IACC.2017.0035","DOIUrl":"https://doi.org/10.1109/IACC.2017.0035","url":null,"abstract":"Very huge quantity of data is continuously generated from a variety of different sources such as IT industries, internet applications, hospital history records, social media feeds etc. called as \"Big Data\". Mostly Data mining algorithms find the interesting patterns of data from the value-based database where the information is exact. It is not so easy to discover interesting patterns from big data. To abstain from squandering a ton of space & time in searching down frequent item uncertain big data, proposed approach permits clients to show their enthusiasm for terms of succinct anti-monotone constraint. MapReduce technique is used to mine frequent patterns. Two sets of map and reduce functions are used by proposed system to mine valid singleton and non-singleton patterns. In proposed work, UF-tree algorithm generates tree structure of dataset and UF-growth mines frequent itemsets recursively. To further reduce the search space and execution time in uncertain big data, proposed work gives importance to the frequency of items using weighting factors, and calculate expected support of item on the basis of weight. It reduces the nodes in the first level of tree, which leads to a reduction in the size of the tree and execution time.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126584207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Method for Efficient Optimization of Energy for LTE with QoS Constraints 一种具有QoS约束的LTE高效能量优化方法
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0067
Owk. Srinivasulu, P. R. Kumar
It is well known that besides the QoS, the potency for energy is additionally a new key technology in coming up for estimating broadband wireless mobile communications. The associated energy potency method is analyzed first for MIMO-OFDM technologies in the transmission system of mobile for applied mathematics. Nature of administration issues utilizing the channel framework SVD system for subchannels unit arranged by their attributes of the channels. Besides, the multi-direct joint change drawback in ordinary MIMO-OFDM correspondence frameworks is redesigned into a multi-target single channel change drawback by gathering all sub channels. In this manner, a shut frame arrangement of the vitality intensity change springs for MIMO-OFDM versatile Multimedia correspondence frameworks. As an outcome, relate vitality effectiveness improved power allotment (EEOPA) algorithmic administer is anticipated to upgrade the vitality strength of MIMO-OFDM versatile transmission correspondence frameworks. Recreation examinations accept that the anticipated EEOPA algorithmic lead will ensure the predefined QoS with high vitality strength in MIMO-OFDM portable transmission correspondence frameworks.
众所周知,在宽带无线移动通信评估中,除了QoS之外,能量潜能也是一项新的关键技术。首先从应用数学的角度分析了移动通信系统中MIMO-OFDM技术的关联能量势法。利用信道框架的性质管理问题SVD系统对子信道单元按其信道属性进行排列。此外,将普通MIMO-OFDM通信框架中的多直接联合变换缺陷重新设计为通过集合所有子信道实现的多目标单信道变换缺陷。在这种方式下,一个闭帧安排的活力强度变化簧MIMO-OFDM多功能多媒体通信框架。因此,相关活力有效性改进功率分配(EEOPA)算法管理有望提升MIMO-OFDM通用传输通信框架的活力强度。重新测试接受预期的EEOPA算法领先将确保MIMO-OFDM便携式传输通信框架中具有高活力强度的预定义QoS。
{"title":"A Novel Method for Efficient Optimization of Energy for LTE with QoS Constraints","authors":"Owk. Srinivasulu, P. R. Kumar","doi":"10.1109/IACC.2017.0067","DOIUrl":"https://doi.org/10.1109/IACC.2017.0067","url":null,"abstract":"It is well known that besides the QoS, the potency for energy is additionally a new key technology in coming up for estimating broadband wireless mobile communications. The associated energy potency method is analyzed first for MIMO-OFDM technologies in the transmission system of mobile for applied mathematics. Nature of administration issues utilizing the channel framework SVD system for subchannels unit arranged by their attributes of the channels. Besides, the multi-direct joint change drawback in ordinary MIMO-OFDM correspondence frameworks is redesigned into a multi-target single channel change drawback by gathering all sub channels. In this manner, a shut frame arrangement of the vitality intensity change springs for MIMO-OFDM versatile Multimedia correspondence frameworks. As an outcome, relate vitality effectiveness improved power allotment (EEOPA) algorithmic administer is anticipated to upgrade the vitality strength of MIMO-OFDM versatile transmission correspondence frameworks. Recreation examinations accept that the anticipated EEOPA algorithmic lead will ensure the predefined QoS with high vitality strength in MIMO-OFDM portable transmission correspondence frameworks.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122460017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvisation in BER and PAPR by Using Hybrid Reduction Techniques in MIMO-OFDM Employing Channel Estimation Techniques 基于信道估计技术的MIMO-OFDM混合约简技术对误码率和PAPR的改进
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0047
Ashna Kakkar, S. N. Garsha, O. Jain, Kritika
The implementation of MIMO with OFDM is an effective and more attractive technique for high data rate transmission and provides burly reliability in wireless communication. It has lot of advantages which can decrease receiver complexity, provides heftiness against narrowband interference and have capability to reduce multipath fading. The major problem of MIMO-OFDM is high PAPR which leads to reduction in Signal to Quantization Noise Ratio of the converters which also degrades the efficiency of power amplifier at transmitter. In this paper we mainly focus on one of scrambling and non scrambling technique Iterative clipping and filtering, and partial Transmit sequence (PTS) which results in better performance. The two techniques once united or combined in the system prove that along with trimming down the PAPR value, the power spectral density also gets smoother.
利用OFDM实现MIMO是一种有效的、更有吸引力的高数据速率传输技术,在无线通信中具有很高的可靠性。它具有降低接收机复杂度、抗窄带干扰能力强、抗多径衰落能力强等优点。MIMO-OFDM的主要问题是高PAPR导致变换器的信噪比降低,从而降低发射机功率放大器的效率。本文主要研究了加扰和非加扰技术中的一种,即迭代滤波和部分发射序列(PTS)技术。这两种技术在系统中结合或联合应用表明,随着PAPR值的减小,功率谱密度也变得更平滑。
{"title":"Improvisation in BER and PAPR by Using Hybrid Reduction Techniques in MIMO-OFDM Employing Channel Estimation Techniques","authors":"Ashna Kakkar, S. N. Garsha, O. Jain, Kritika","doi":"10.1109/IACC.2017.0047","DOIUrl":"https://doi.org/10.1109/IACC.2017.0047","url":null,"abstract":"The implementation of MIMO with OFDM is an effective and more attractive technique for high data rate transmission and provides burly reliability in wireless communication. It has lot of advantages which can decrease receiver complexity, provides heftiness against narrowband interference and have capability to reduce multipath fading. The major problem of MIMO-OFDM is high PAPR which leads to reduction in Signal to Quantization Noise Ratio of the converters which also degrades the efficiency of power amplifier at transmitter. In this paper we mainly focus on one of scrambling and non scrambling technique Iterative clipping and filtering, and partial Transmit sequence (PTS) which results in better performance. The two techniques once united or combined in the system prove that along with trimming down the PAPR value, the power spectral density also gets smoother.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Comparative Analysis of Approximate Point in Triangulation (APIT) and DV-HOP Algorithms for Solving Localization Problem in Wireless Sensor Networks 求解无线传感器网络定位问题的近似点三角法(APIT)与DV-HOP算法的比较分析
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0085
Samuel Anthrayose, A. Payal
Wireless sensor networks is a topic of much research and interest, because they can be widely applied in different areas such as surveillance, environmental monitoring, etc. For all these applications, localization is the most basic issue. The localization algorithms or techniques can be categorized into two: range-based and range-free. The range-free scheme uses the connectivity information between nodes. In the range-free scheme, nodes that are aware of their location are called anchors, while others that are not are called normal nodes. Anchors are fixed nodes, while the normal nodes are generally mobile. For estimation of their positions, the normal nodes initially gather the information of the positions of anchors as well as their connection, and then calculates its own positions. When compared with range-based techniques, the range-free techniques are more cost-effective, since no additional devices are required. As a result, this paper focuses on the study of two range-free localisation techniques namely, Approximate Point in Triangulation (APIT) and DV-Hop. Thus, we are interested in the investigation of wireless sensor networks on application of these two techniques under varying conditions and parameters.
无线传感器网络是一个备受研究和关注的话题,因为它可以广泛应用于不同的领域,如监视,环境监测等。对于所有这些应用程序,本地化是最基本的问题。定位算法或技术可分为基于距离的和无距离的两种。无距离方案使用节点间的连通性信息。在无距离方案中,知道自己位置的节点称为锚节点,而不知道自己位置的节点称为正常节点。锚点是固定节点,而正常节点一般是移动节点。对于它们的位置估计,法向节点首先收集锚点的位置及其连接信息,然后计算自己的位置。与基于距离的技术相比,无距离技术更具成本效益,因为不需要额外的设备。因此,本文重点研究了两种无距离定位技术,即Approximate Point in Triangulation (APIT)和DV-Hop。因此,我们有兴趣研究无线传感器网络在不同条件和参数下这两种技术的应用。
{"title":"Comparative Analysis of Approximate Point in Triangulation (APIT) and DV-HOP Algorithms for Solving Localization Problem in Wireless Sensor Networks","authors":"Samuel Anthrayose, A. Payal","doi":"10.1109/IACC.2017.0085","DOIUrl":"https://doi.org/10.1109/IACC.2017.0085","url":null,"abstract":"Wireless sensor networks is a topic of much research and interest, because they can be widely applied in different areas such as surveillance, environmental monitoring, etc. For all these applications, localization is the most basic issue. The localization algorithms or techniques can be categorized into two: range-based and range-free. The range-free scheme uses the connectivity information between nodes. In the range-free scheme, nodes that are aware of their location are called anchors, while others that are not are called normal nodes. Anchors are fixed nodes, while the normal nodes are generally mobile. For estimation of their positions, the normal nodes initially gather the information of the positions of anchors as well as their connection, and then calculates its own positions. When compared with range-based techniques, the range-free techniques are more cost-effective, since no additional devices are required. As a result, this paper focuses on the study of two range-free localisation techniques namely, Approximate Point in Triangulation (APIT) and DV-Hop. Thus, we are interested in the investigation of wireless sensor networks on application of these two techniques under varying conditions and parameters.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Implementation of K-Anonymity Using Android SDK 基于Android SDK的k -匿名实现
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0177
M. Sheshikala, R. Prakash, D. Rao
Privacy preserving of personal data is done by many techniques like k-anonymity, l-diversity, t-closeness etc., but the techniques proposed are implemented only when there is the availability of a laptop or a computer. Now-a-days people are interested to carry a mobile instead of a lab-top, because some of the works done by a lap-top can also be done by a mobile, like files sharing, images and videos sharing, and many more, but the sharing may lose the privacy of the data. With a specific end goal to give the protection to the information the strategy k-anonymity is utilized, which chooses the k-esteem where at any rate k-1 people whose data additionally shows up in the discharge. This technique is implemented using Android SDK. Whenever the user requests the information, instead of sending original information, the data is sent in an anonymized way. This paper presents the implementation of this technique and results are shown.
个人数据的隐私保护可以通过k-匿名、l-多样性、t-接近等技术来实现,但所提出的技术只有在笔记本电脑或计算机可用的情况下才能实现。现在人们对携带手机而不是实验室桌面很感兴趣,因为在笔记本电脑上完成的一些工作也可以在手机上完成,比如文件共享、图像和视频共享等等,但是共享可能会失去数据的隐私性。为了保护信息,我们使用了k-匿名策略,它选择了k-尊重,至少k-1个人的数据会出现在数据中。该技术是使用Android SDK实现的。当用户请求信息时,数据将以匿名方式发送,而不是发送原始信息。本文介绍了该技术的实现,并给出了结果。
{"title":"Implementation of K-Anonymity Using Android SDK","authors":"M. Sheshikala, R. Prakash, D. Rao","doi":"10.1109/IACC.2017.0177","DOIUrl":"https://doi.org/10.1109/IACC.2017.0177","url":null,"abstract":"Privacy preserving of personal data is done by many techniques like k-anonymity, l-diversity, t-closeness etc., but the techniques proposed are implemented only when there is the availability of a laptop or a computer. Now-a-days people are interested to carry a mobile instead of a lab-top, because some of the works done by a lap-top can also be done by a mobile, like files sharing, images and videos sharing, and many more, but the sharing may lose the privacy of the data. With a specific end goal to give the protection to the information the strategy k-anonymity is utilized, which chooses the k-esteem where at any rate k-1 people whose data additionally shows up in the discharge. This technique is implemented using Android SDK. Whenever the user requests the information, instead of sending original information, the data is sent in an anonymized way. This paper presents the implementation of this technique and results are shown.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cache Friendly Strategies to Optimize Matrix Multiplication 优化矩阵乘法的缓存友好策略
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0020
M. Ananth, S. Vishwas, M. R. Anala
Matrix multiplication is an operation used in many algorithms with a plethora of applications ranging from Image Processing, Signal Processing, to Artificial Neural Networks and Linear algebra. This work aims to showcase the effect of developing matrix multiplication strategies that are less time and processor intensive by effectively handling memory accesses. The paper also touches upon on the advantages of using OpenMP, a multiprocessing toolkit to show the effect of parallelizing matrix multiplication.
矩阵乘法是许多算法中使用的一种操作,其应用范围从图像处理、信号处理到人工神经网络和线性代数。这项工作旨在展示开发矩阵乘法策略的效果,通过有效地处理内存访问来减少时间和处理器密集型。本文还谈到了使用OpenMP的优点,OpenMP是一个多处理工具包,用于显示并行化矩阵乘法的效果。
{"title":"Cache Friendly Strategies to Optimize Matrix Multiplication","authors":"M. Ananth, S. Vishwas, M. R. Anala","doi":"10.1109/IACC.2017.0020","DOIUrl":"https://doi.org/10.1109/IACC.2017.0020","url":null,"abstract":"Matrix multiplication is an operation used in many algorithms with a plethora of applications ranging from Image Processing, Signal Processing, to Artificial Neural Networks and Linear algebra. This work aims to showcase the effect of developing matrix multiplication strategies that are less time and processor intensive by effectively handling memory accesses. The paper also touches upon on the advantages of using OpenMP, a multiprocessing toolkit to show the effect of parallelizing matrix multiplication.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"588 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117071229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 IEEE 7th International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1