首页 > 最新文献

2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation最新文献

英文 中文
Control of a Class of Nonlinear Systems with Input Delay Using Mean Value Theorem Approach 一类具有输入时滞的非线性系统的均值定理控制
C. Sarkar, A. Sengupta
This work examines controller design based on feedback linearization of a nonlinear system in the presence of time delay. Various analytic constraints make it difficult to design a controller in the conventional manner for a nonlinear system with input delay. Using a input delaydependent feedback linearization algorithm, a nonlinear input delay system having a linear input-output map can be determined. In this work both the nominal and compensating parts of the system are individually handled and then combined to get a complete linear representation of the original system. A controller is designed base on Linear Quadratic regulator (LQR) theory for the linearized system to illustrate the effectiveness of the proposed method. Also sufficient conditions are mentioned which guarantee the stability of the closed loop system with input delay.
这项工作研究了基于反馈线性化的非线性系统在存在时间延迟时的控制器设计。对于具有输入延迟的非线性系统,各种解析约束使得用常规方法设计控制器变得困难。利用与输入延迟相关的反馈线性化算法,可以确定具有线性输入输出映射的非线性输入延迟系统。在这项工作中,系统的标称部分和补偿部分分别处理,然后结合起来得到原始系统的完整线性表示。基于线性二次型调节器(LQR)理论设计了一个线性化系统的控制器,以说明所提方法的有效性。并给出了具有输入时滞的闭环系统稳定性的充分条件。
{"title":"Control of a Class of Nonlinear Systems with Input Delay Using Mean Value Theorem Approach","authors":"C. Sarkar, A. Sengupta","doi":"10.1109/CIMSIM.2013.37","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.37","url":null,"abstract":"This work examines controller design based on feedback linearization of a nonlinear system in the presence of time delay. Various analytic constraints make it difficult to design a controller in the conventional manner for a nonlinear system with input delay. Using a input delaydependent feedback linearization algorithm, a nonlinear input delay system having a linear input-output map can be determined. In this work both the nominal and compensating parts of the system are individually handled and then combined to get a complete linear representation of the original system. A controller is designed base on Linear Quadratic regulator (LQR) theory for the linearized system to illustrate the effectiveness of the proposed method. Also sufficient conditions are mentioned which guarantee the stability of the closed loop system with input delay.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Neural Network (NN) Approach to Solving a Static-non-exchange Scattering of Electron-Hydrogen 求解电子-氢静态非交换散射的神经网络方法
Mohammad Shazri Bin Shahrir, Kurunathan Ratnavely
In this present work is to numerically estimate via neural network the scattering elastic-collision phase shift from electron hydrogen interaction. Previous works have shown reliable results using runge-kutta 4th order (RK-4). This can be achieved by solving the 2nd Order Differential Equation (ODE) that is found commonly in physical scattering problem. A number of trial functions was tested that describe the Schrodinger Equation in which solves the static field approximation of the wave equation. Results have shown comparable but inferior results relatively to the RK-4 method. It can be said that NN approach shows promise with the advantage of continuous estimation but lack the accuracy that can be produced by RK-4.
本文利用神经网络对电子-氢相互作用的散射弹性-碰撞相移进行了数值估计。以前的研究已经用龙格-库塔四阶(RK-4)得到了可靠的结果。这可以通过求解物理散射问题中常见的二阶微分方程(ODE)来实现。对描述薛定谔方程的若干试函数进行了测试,其中薛定谔方程求解了波动方程的静态场近似。结果显示与RK-4方法相当,但效果较差。可以说,NN方法具有连续估计的优点,但缺乏RK-4方法所能产生的精度。
{"title":"A Neural Network (NN) Approach to Solving a Static-non-exchange Scattering of Electron-Hydrogen","authors":"Mohammad Shazri Bin Shahrir, Kurunathan Ratnavely","doi":"10.1109/CIMSIM.2013.11","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.11","url":null,"abstract":"In this present work is to numerically estimate via neural network the scattering elastic-collision phase shift from electron hydrogen interaction. Previous works have shown reliable results using runge-kutta 4th order (RK-4). This can be achieved by solving the 2nd Order Differential Equation (ODE) that is found commonly in physical scattering problem. A number of trial functions was tested that describe the Schrodinger Equation in which solves the static field approximation of the wave equation. Results have shown comparable but inferior results relatively to the RK-4 method. It can be said that NN approach shows promise with the advantage of continuous estimation but lack the accuracy that can be produced by RK-4.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HIPAA Based Predictive Analytics for an Adaptive and Descriptive Mobile Healthcare System 基于HIPAA的自适应和描述性移动医疗保健系统预测分析
C. Subramaniam, Abhishek Balaji Radhakrishnan, Vignesh Raj Somu, Harshinee Chandraskear, Janani Balasubramaniam
The objective of the research work is to performa predictive analysis of an adaptive and descriptive mobilehealth care system in the context of Health InsurancePortability and Accountability Act (HIPAA). This analyticalstudy has assumed a set of policies encompassing health careorganizations, service providers and the end users. Theelectronic medical records of the patients are clustered so asto fasten the detection and data extraction of records usingmobile ambience. The non-adaptive strategies, mistakes inthe earlier collaboration models and the late enforcementare the basic issues and challenges for the proposed work.The predictability analysis over the scalability of mobilehealth application with several uncertainty nature ofinsurance fraud is performed. The focus is to frame adescriptive logic for an adaptable health care system withuser expected analytics. A case study, Blood Seeker, isdesigned and deployed to substantiate the proposedanalytics over concurrency and reachability of thesystem.
研究工作的目的是在健康保险可移植性和责任法案(HIPAA)的背景下对适应性和描述性移动医疗保健系统进行预测分析。本分析性研究假设了一套涵盖医疗保健组织、服务提供者和最终用户的政策。对患者的电子病历进行聚类处理,以便在移动环境下对病历进行检测和数据提取。非适应性策略、早期合作模式中的错误和后期的执行是本研究面临的基本问题和挑战。对具有几种保险欺诈不确定性的移动医疗应用的可扩展性进行了可预测性分析。重点是为具有用户期望分析的适应性医疗保健系统构建描述性逻辑。设计并部署了一个案例研究,Blood Seeker,以证实对系统并发性和可达性的建议分析。
{"title":"HIPAA Based Predictive Analytics for an Adaptive and Descriptive Mobile Healthcare System","authors":"C. Subramaniam, Abhishek Balaji Radhakrishnan, Vignesh Raj Somu, Harshinee Chandraskear, Janani Balasubramaniam","doi":"10.1109/CIMSIM.2013.32","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.32","url":null,"abstract":"The objective of the research work is to performa predictive analysis of an adaptive and descriptive mobilehealth care system in the context of Health InsurancePortability and Accountability Act (HIPAA). This analyticalstudy has assumed a set of policies encompassing health careorganizations, service providers and the end users. Theelectronic medical records of the patients are clustered so asto fasten the detection and data extraction of records usingmobile ambience. The non-adaptive strategies, mistakes inthe earlier collaboration models and the late enforcementare the basic issues and challenges for the proposed work.The predictability analysis over the scalability of mobilehealth application with several uncertainty nature ofinsurance fraud is performed. The focus is to frame adescriptive logic for an adaptable health care system withuser expected analytics. A case study, Blood Seeker, isdesigned and deployed to substantiate the proposedanalytics over concurrency and reachability of thesystem.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115314467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-factor Authentication Framework for Cloud Computing 面向云计算的多因素认证框架
R. K. Banyal, Pragya Jain, V. K. Jain
Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing environment to the most modern means of attacks. In this paper, we propose a new multi-factor authentication framework for cloud computing. The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system.The proposed framework is verified by developing Cloud Access Management (CAM) system which authenticates the user based on multiple factors. Also using secret-splitting and encrypted value of arithmetic captcha is innovative factor for user authentication for cloud computing environment. Prototype model for cloud computing own cloud server is implemented using open sources technology. The proposed framework shows the close agreement with the standard criteria for security.
云计算是一种通过互联网提供服务的新范例。数据安全是云计算环境中最关键的问题。身份验证是信息安全的一项关键技术,它是一种建立身份证明以获取系统中信息的机制。传统的密码认证不能为云计算环境中的信息提供足够的安全性,无法抵御最现代的攻击手段。本文提出了一种新的云计算多因素认证框架。该框架提供了一种可行且最有效的机制,可以与传统的认证系统紧密集成。通过开发基于多因素的用户身份认证的云访问管理(CAM)系统对所提框架进行了验证。此外,利用算术验证码的秘密分割和加密值是云计算环境下用户认证的创新因素。采用开源技术实现了云计算自己的云服务器原型模型。所提出的框架显示出与安全标准的密切一致。
{"title":"Multi-factor Authentication Framework for Cloud Computing","authors":"R. K. Banyal, Pragya Jain, V. K. Jain","doi":"10.1109/CIMSIM.2013.25","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.25","url":null,"abstract":"Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing environment to the most modern means of attacks. In this paper, we propose a new multi-factor authentication framework for cloud computing. The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system.The proposed framework is verified by developing Cloud Access Management (CAM) system which authenticates the user based on multiple factors. Also using secret-splitting and encrypted value of arithmetic captcha is innovative factor for user authentication for cloud computing environment. Prototype model for cloud computing own cloud server is implemented using open sources technology. The proposed framework shows the close agreement with the standard criteria for security.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121372708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Modeling Rainfall Prediction Using Data Mining Method: A Bayesian Approach 基于数据挖掘的降水预测建模:贝叶斯方法
V. Nikam, Bandu B. Meshram
Weather forecasting has been one of the most scientifically and technologically challenging problem around the world. Weather data is one of the meteorological data that is rich with important information, which can be used for weather prediction We extract knowledge from weather historical data collected from Indian Meteorological Department (IMD) Pune. From the collected weather data comprising of 36 attributes, only 7 attributes are most relevant to rainfall prediction. We made data preprocessing and data transformation on raw weather data set, so that it shall be possible to work on Bayesian, the data mining, prediction model used for rainfall prediction. The model is trained using the training data set and has been tested for accuracy on available test data. The meteorological centers uses high performance computing and supercomputing power to run weather prediction model. To address the issue of compute intensive rainfall prediction model, we proposed and implemented data intensive model using data mining technique. Our model works with good accuracy and takes moderate compute resources to predict the rainfall. We have used Bayesian approach to prove our model for rainfall prediction, and found to be working well with good accuracy.
天气预报一直是世界上最具科学和技术挑战性的问题之一。天气数据是具有丰富重要信息的气象数据之一,可用于天气预报,我们从印度浦那气象局(IMD)收集的天气历史数据中提取知识。在收集到的36个气象属性中,只有7个属性与降雨预测最相关。我们对原始天气数据集进行了数据预处理和数据转换,使其能够运用贝叶斯数据挖掘预测模型进行降雨预测。该模型使用训练数据集进行训练,并在可用的测试数据上进行了准确性测试。气象中心采用高性能计算和超级计算能力运行天气预报模型。为了解决计算强降雨预测模型的问题,提出并利用数据挖掘技术实现了数据密集型模型。我们的模型具有较好的精度,并且需要适度的计算资源来预测降雨。我们已经使用贝叶斯方法来证明我们的模型用于降雨预测,并发现它工作得很好,精度很高。
{"title":"Modeling Rainfall Prediction Using Data Mining Method: A Bayesian Approach","authors":"V. Nikam, Bandu B. Meshram","doi":"10.1109/CIMSIM.2013.29","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.29","url":null,"abstract":"Weather forecasting has been one of the most scientifically and technologically challenging problem around the world. Weather data is one of the meteorological data that is rich with important information, which can be used for weather prediction We extract knowledge from weather historical data collected from Indian Meteorological Department (IMD) Pune. From the collected weather data comprising of 36 attributes, only 7 attributes are most relevant to rainfall prediction. We made data preprocessing and data transformation on raw weather data set, so that it shall be possible to work on Bayesian, the data mining, prediction model used for rainfall prediction. The model is trained using the training data set and has been tested for accuracy on available test data. The meteorological centers uses high performance computing and supercomputing power to run weather prediction model. To address the issue of compute intensive rainfall prediction model, we proposed and implemented data intensive model using data mining technique. Our model works with good accuracy and takes moderate compute resources to predict the rainfall. We have used Bayesian approach to prove our model for rainfall prediction, and found to be working well with good accuracy.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116528465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Approximating Shortest Path in Large-Scale Road Networks with Turn Prohibitions Using Multi-constrained Path Algorithm 基于多约束路径算法的大规模道路网络转弯限制最短路径逼近
K. Girish, Sandeep Sarkar, S. Rajagopalan
Multi-Constrained Path (MCP) algorithms are path finding algorithms, unlike conventional routing algorithms, they not only give a path between source and destination, also verifies whether the path satisfies the given constraints (Right turn, Left turn and U turn). MCP algorithms are NPComplete. The MCP algorithms are aimed to find the shortest path in a road network that satisfies the turn prohibitions and has many applications such as route guidance in Intelligent Transport System (ITS). In this paper, roads are considered as nodes and junctions as edges, as it reduces the amount of data to be processed. The output consists of a list of paths that can be used to reach the destination. The algorithms have be tested and analysed with the real data of Bangalore road network. The results show that the efficiency of MCP is 84.5% better than conventional routing algorithms in terms of execution time.
多约束路径(Multi-Constrained Path, MCP)算法是一种寻路算法,与传统的路由算法不同,它不仅给出源和目的之间的路径,而且验证该路径是否满足给定的约束(右转、左转和U转)。MCP算法是NPComplete的。MCP算法的目标是在道路网络中寻找满足转弯限制的最短路径,在智能交通系统(ITS)中的路径引导等方面有着广泛的应用。在本文中,道路被认为是节点,路口被认为是边缘,因为这样可以减少需要处理的数据量。输出由可用于到达目的地的路径列表组成。用班加罗尔路网的实际数据对算法进行了测试和分析。结果表明,在执行时间上,MCP算法比传统路由算法的效率提高了84.5%。
{"title":"Approximating Shortest Path in Large-Scale Road Networks with Turn Prohibitions Using Multi-constrained Path Algorithm","authors":"K. Girish, Sandeep Sarkar, S. Rajagopalan","doi":"10.1109/CIMSIM.2013.56","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.56","url":null,"abstract":"Multi-Constrained Path (MCP) algorithms are path finding algorithms, unlike conventional routing algorithms, they not only give a path between source and destination, also verifies whether the path satisfies the given constraints (Right turn, Left turn and U turn). MCP algorithms are NPComplete. The MCP algorithms are aimed to find the shortest path in a road network that satisfies the turn prohibitions and has many applications such as route guidance in Intelligent Transport System (ITS). In this paper, roads are considered as nodes and junctions as edges, as it reduces the amount of data to be processed. The output consists of a list of paths that can be used to reach the destination. The algorithms have be tested and analysed with the real data of Bangalore road network. The results show that the efficiency of MCP is 84.5% better than conventional routing algorithms in terms of execution time.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122907678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis of Vertical Strained-SiGe Impact Ionization MOSFET Incorporating Dielectric Pocket (VESIMOS-DP) 介电袋垂直应变-冲击电离MOSFET (VESIMOS-DP)性能分析
I. Saad, Mohd Zuhir Bin Hamzah, C. B. Seng, K. A. Mohamad, B. Ghosh, N. Bolong, R. Ismail
The Vertical Strained Silicon Germanium (SiGe) Impact Ionization MOSFET with Dielectric Pocket (VESIMOS-DP) has been successfully developed and analyzed in this paper. The comparison between VESIMOS and VESIMOS-DP was done to show the advantages of incorporating dielectric pocket (DP) to the performance of the device. An improved stability of threshold voltage, VTH was found for VESIMOS-DP device of various DP size ranging from 20nm to 80nm. The stability is due to the reducing charge sharing effects between source and drain region. However, the presence of DP layer has introduced another potential barrier in addition to the delta p+ (dp+) triangular potential barrier. Thus, increased amount of gate voltage needed to overcome those barriers and allows the electrons to flow from source to drain. Moreover, the DP layer has suppressed the parasitic bipolar transistor effect (PBT) with higher breakdown voltage as compared to without DP layer. Hence, the incorporation of DP into VESIMOS has enhanced its performance and presents elevated characteristics for nano-electronics device.
本文成功研制了具有介电袋的垂直应变硅锗冲击电离MOSFET (VESIMOS-DP)。通过对VESIMOS和VESIMOS-DP的比较,说明了加入介质袋(DP)对器件性能的影响。对于20nm ~ 80nm不同尺寸的VESIMOS-DP器件,其阈值电压VTH具有较好的稳定性。这种稳定性是由于源极和漏极之间电荷分担效应的减少。然而,除了δ p+ (DP +)三角形势垒外,DP层的存在还引入了另一个势垒。因此,增加的栅极电压需要克服这些障碍,并允许电子从源流向漏。此外,与没有DP层相比,DP层抑制了寄生双极晶体管效应,击穿电压更高。因此,将DP加入到VESIMOS中,提高了VESIMOS的性能,提高了VESIMOS的纳米电子器件性能。
{"title":"Performance Analysis of Vertical Strained-SiGe Impact Ionization MOSFET Incorporating Dielectric Pocket (VESIMOS-DP)","authors":"I. Saad, Mohd Zuhir Bin Hamzah, C. B. Seng, K. A. Mohamad, B. Ghosh, N. Bolong, R. Ismail","doi":"10.1109/CIMSIM.2013.66","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.66","url":null,"abstract":"The Vertical Strained Silicon Germanium (SiGe) Impact Ionization MOSFET with Dielectric Pocket (VESIMOS-DP) has been successfully developed and analyzed in this paper. The comparison between VESIMOS and VESIMOS-DP was done to show the advantages of incorporating dielectric pocket (DP) to the performance of the device. An improved stability of threshold voltage, VTH was found for VESIMOS-DP device of various DP size ranging from 20nm to 80nm. The stability is due to the reducing charge sharing effects between source and drain region. However, the presence of DP layer has introduced another potential barrier in addition to the delta p+ (dp+) triangular potential barrier. Thus, increased amount of gate voltage needed to overcome those barriers and allows the electrons to flow from source to drain. Moreover, the DP layer has suppressed the parasitic bipolar transistor effect (PBT) with higher breakdown voltage as compared to without DP layer. Hence, the incorporation of DP into VESIMOS has enhanced its performance and presents elevated characteristics for nano-electronics device.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pipelining Acoustic Model Training for Speech Recognition Using Storm 基于Storm的语音识别管道声学模型训练
D. Sitaram, Haripriya Srinivasaraghavan, Kapish Agarwal, Amritanshu Agrawal, N. Joshi, Debraj Ray
Speech recognition has been increasingly used on mobile devices, which has in turn increased the need for creation of new acoustic models for various languages, dialects, accents, speakers and environmental conditions. This involves training and adapting a huge number of acoustic models, some of them in real-time. Training acoustic models is thus essential for speech recognition because these models determine the accuracy and quality of the recognition process. This paper, discusses the use of Storm, a distributed real time computational system, to pipeline the creation of acoustic models by CMU Sphinx, an open-source software project for speech recognition and training. Software pipelining reduces the time required for training and optimizes system resource utilization, thus enabling huge amounts of data to be trained in considerably less amount of time than taken by the conventional sequential process. Pipelining is achieved by grouping the stages of the training process into a set of five stages, and running each stage on individual nodes in a Storm cluster. Thus acoustic models are created by training multiple streams of speech samples using the same SphinxTrain setup, also resulting in improvement of training time and throughput.
语音识别在移动设备上的应用越来越多,这反过来又增加了为各种语言、方言、口音、说话者和环境条件创建新的声学模型的需求。这包括训练和调整大量的声学模型,其中一些是实时的。因此,训练声学模型对于语音识别至关重要,因为这些模型决定了识别过程的准确性和质量。本文讨论了CMU Sphinx(一个用于语音识别和训练的开源软件项目)使用分布式实时计算系统Storm来流水线创建声学模型。软件流水线减少了训练所需的时间,并优化了系统资源的利用,因此,与传统的顺序过程相比,可以在相当短的时间内训练大量的数据。流水线是通过将训练过程的阶段分组为一组五个阶段,并在Storm集群中的单个节点上运行每个阶段来实现的。因此,声学模型是通过使用相同的SphinxTrain设置训练多个语音样本流来创建的,这也导致了训练时间和吞吐量的改善。
{"title":"Pipelining Acoustic Model Training for Speech Recognition Using Storm","authors":"D. Sitaram, Haripriya Srinivasaraghavan, Kapish Agarwal, Amritanshu Agrawal, N. Joshi, Debraj Ray","doi":"10.1109/CIMSIM.2013.42","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.42","url":null,"abstract":"Speech recognition has been increasingly used on mobile devices, which has in turn increased the need for creation of new acoustic models for various languages, dialects, accents, speakers and environmental conditions. This involves training and adapting a huge number of acoustic models, some of them in real-time. Training acoustic models is thus essential for speech recognition because these models determine the accuracy and quality of the recognition process. This paper, discusses the use of Storm, a distributed real time computational system, to pipeline the creation of acoustic models by CMU Sphinx, an open-source software project for speech recognition and training. Software pipelining reduces the time required for training and optimizes system resource utilization, thus enabling huge amounts of data to be trained in considerably less amount of time than taken by the conventional sequential process. Pipelining is achieved by grouping the stages of the training process into a set of five stages, and running each stage on individual nodes in a Storm cluster. Thus acoustic models are created by training multiple streams of speech samples using the same SphinxTrain setup, also resulting in improvement of training time and throughput.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the Effect of Different Mode's Attributes on the Subjective Classification in the Case of TCM 评价不同模式属性对中医主观分类的影响
Ying Dai
This paper proposes a method for assessing the subjective classifications of traditional Chinese medicine (TCM) and investigating the influence of attributes on them, while these attributes are extracted from multi-sensors and represented by different modes. In TCM, a person's health states can be represented by 13 Zhengs that are not entirely independent, while the diagnosis data given by TCM doctors are subjective. Accordingly, the influence of the modes and the attributes extracted from the multimodal sensor data on the Zheng's classification is validated by a defined aggregation function called aas. Moreover, the conditions of removing the weak modes are proposed based on the correlation between the attributes of modes and the number of the attributes close to the Zhengs. The simulation results verify the adequacy of the above aas and conditions in evaluating the effect of attributes on the classification performance.
本文提出了一种评估中医主观分类的方法,并研究了属性对中医主观分类的影响,同时从多传感器中提取这些属性并用不同的模式表示。在中医中,一个人的健康状态可以用13个“正”来代表,这些“正”并不是完全独立的,而中医医生给出的诊断数据是主观的。因此,从多模态传感器数据中提取的模态和属性对郑氏分类的影响通过定义的聚合函数aas进行验证。此外,根据模态属性与接近正数的属性数之间的相关性,提出了去除弱模态的条件。仿真结果验证了上述准则和条件在评价属性对分类性能影响方面的充分性。
{"title":"Evaluating the Effect of Different Mode's Attributes on the Subjective Classification in the Case of TCM","authors":"Ying Dai","doi":"10.1109/CIMSIM.2013.35","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.35","url":null,"abstract":"This paper proposes a method for assessing the subjective classifications of traditional Chinese medicine (TCM) and investigating the influence of attributes on them, while these attributes are extracted from multi-sensors and represented by different modes. In TCM, a person's health states can be represented by 13 Zhengs that are not entirely independent, while the diagnosis data given by TCM doctors are subjective. Accordingly, the influence of the modes and the attributes extracted from the multimodal sensor data on the Zheng's classification is validated by a defined aggregation function called aas. Moreover, the conditions of removing the weak modes are proposed based on the correlation between the attributes of modes and the number of the attributes close to the Zhengs. The simulation results verify the adequacy of the above aas and conditions in evaluating the effect of attributes on the classification performance.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Human Motion Data Definition for 3D Characters 3D人物的人体运动数据定义
Myeong-Won Lee, Chul-Hee Jung, C. Park
We define a human motion data format for providing a character model with motion so that any motion capture data can be used to generate exchangeable human animation sequences through networks of heterogeneous computer systems. We have extended the ISO/IEC 19774 H-Anim specification to include motion definition in order to meet this objective. A character model can be prepared with any general graphics tool according to the hierarchical structure defined in the extended H-Anim specification. We can provide the character model with any captured motion data using the interfaces for motion parameters defined in the extended H-Anim specification, even when the data is not relevant to the character model initially. Several kinds of motion capture data can be applied to generate animation sequences for a character model; conversely, one kind of motion capture data can be applied to several different character models. New Joint and Motion nodes are defined for animation exchange in the H-Anim specification. Schema expansion and validation are also included.
我们定义了一种人体运动数据格式,用于提供具有运动的角色模型,以便任何动作捕捉数据都可以用于通过异构计算机系统网络生成可交换的人体动画序列。我们已经扩展了ISO/IEC 19774 h - animm规范,以包括运动定义,以满足这一目标。根据扩展h - animm规范中定义的层次结构,可以使用任何通用图形工具来准备角色模型。我们可以使用扩展h - animm规范中定义的运动参数接口为角色模型提供任何捕获的运动数据,即使数据最初与角色模型无关。几种运动捕捉数据可以应用于为角色模型生成动画序列;相反,一种动作捕捉数据可以应用于几种不同的角色模型。在h - animm规范中为动画交换定义了新的关节和运动节点。模式扩展和验证也包括在内。
{"title":"Human Motion Data Definition for 3D Characters","authors":"Myeong-Won Lee, Chul-Hee Jung, C. Park","doi":"10.1109/CIMSIM.2013.23","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.23","url":null,"abstract":"We define a human motion data format for providing a character model with motion so that any motion capture data can be used to generate exchangeable human animation sequences through networks of heterogeneous computer systems. We have extended the ISO/IEC 19774 H-Anim specification to include motion definition in order to meet this objective. A character model can be prepared with any general graphics tool according to the hierarchical structure defined in the extended H-Anim specification. We can provide the character model with any captured motion data using the interfaces for motion parameters defined in the extended H-Anim specification, even when the data is not relevant to the character model initially. Several kinds of motion capture data can be applied to generate animation sequences for a character model; conversely, one kind of motion capture data can be applied to several different character models. New Joint and Motion nodes are defined for animation exchange in the H-Anim specification. Schema expansion and validation are also included.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1