首页 > 最新文献

2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation最新文献

英文 中文
Control of a Class of Nonlinear Systems with Input Delay Using Mean Value Theorem Approach 一类具有输入时滞的非线性系统的均值定理控制
C. Sarkar, A. Sengupta
This work examines controller design based on feedback linearization of a nonlinear system in the presence of time delay. Various analytic constraints make it difficult to design a controller in the conventional manner for a nonlinear system with input delay. Using a input delaydependent feedback linearization algorithm, a nonlinear input delay system having a linear input-output map can be determined. In this work both the nominal and compensating parts of the system are individually handled and then combined to get a complete linear representation of the original system. A controller is designed base on Linear Quadratic regulator (LQR) theory for the linearized system to illustrate the effectiveness of the proposed method. Also sufficient conditions are mentioned which guarantee the stability of the closed loop system with input delay.
这项工作研究了基于反馈线性化的非线性系统在存在时间延迟时的控制器设计。对于具有输入延迟的非线性系统,各种解析约束使得用常规方法设计控制器变得困难。利用与输入延迟相关的反馈线性化算法,可以确定具有线性输入输出映射的非线性输入延迟系统。在这项工作中,系统的标称部分和补偿部分分别处理,然后结合起来得到原始系统的完整线性表示。基于线性二次型调节器(LQR)理论设计了一个线性化系统的控制器,以说明所提方法的有效性。并给出了具有输入时滞的闭环系统稳定性的充分条件。
{"title":"Control of a Class of Nonlinear Systems with Input Delay Using Mean Value Theorem Approach","authors":"C. Sarkar, A. Sengupta","doi":"10.1109/CIMSIM.2013.37","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.37","url":null,"abstract":"This work examines controller design based on feedback linearization of a nonlinear system in the presence of time delay. Various analytic constraints make it difficult to design a controller in the conventional manner for a nonlinear system with input delay. Using a input delaydependent feedback linearization algorithm, a nonlinear input delay system having a linear input-output map can be determined. In this work both the nominal and compensating parts of the system are individually handled and then combined to get a complete linear representation of the original system. A controller is designed base on Linear Quadratic regulator (LQR) theory for the linearized system to illustrate the effectiveness of the proposed method. Also sufficient conditions are mentioned which guarantee the stability of the closed loop system with input delay.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Neural Network (NN) Approach to Solving a Static-non-exchange Scattering of Electron-Hydrogen 求解电子-氢静态非交换散射的神经网络方法
Mohammad Shazri Bin Shahrir, Kurunathan Ratnavely
In this present work is to numerically estimate via neural network the scattering elastic-collision phase shift from electron hydrogen interaction. Previous works have shown reliable results using runge-kutta 4th order (RK-4). This can be achieved by solving the 2nd Order Differential Equation (ODE) that is found commonly in physical scattering problem. A number of trial functions was tested that describe the Schrodinger Equation in which solves the static field approximation of the wave equation. Results have shown comparable but inferior results relatively to the RK-4 method. It can be said that NN approach shows promise with the advantage of continuous estimation but lack the accuracy that can be produced by RK-4.
本文利用神经网络对电子-氢相互作用的散射弹性-碰撞相移进行了数值估计。以前的研究已经用龙格-库塔四阶(RK-4)得到了可靠的结果。这可以通过求解物理散射问题中常见的二阶微分方程(ODE)来实现。对描述薛定谔方程的若干试函数进行了测试,其中薛定谔方程求解了波动方程的静态场近似。结果显示与RK-4方法相当,但效果较差。可以说,NN方法具有连续估计的优点,但缺乏RK-4方法所能产生的精度。
{"title":"A Neural Network (NN) Approach to Solving a Static-non-exchange Scattering of Electron-Hydrogen","authors":"Mohammad Shazri Bin Shahrir, Kurunathan Ratnavely","doi":"10.1109/CIMSIM.2013.11","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.11","url":null,"abstract":"In this present work is to numerically estimate via neural network the scattering elastic-collision phase shift from electron hydrogen interaction. Previous works have shown reliable results using runge-kutta 4th order (RK-4). This can be achieved by solving the 2nd Order Differential Equation (ODE) that is found commonly in physical scattering problem. A number of trial functions was tested that describe the Schrodinger Equation in which solves the static field approximation of the wave equation. Results have shown comparable but inferior results relatively to the RK-4 method. It can be said that NN approach shows promise with the advantage of continuous estimation but lack the accuracy that can be produced by RK-4.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Approximating Shortest Path in Large-Scale Road Networks with Turn Prohibitions Using Multi-constrained Path Algorithm 基于多约束路径算法的大规模道路网络转弯限制最短路径逼近
K. Girish, Sandeep Sarkar, S. Rajagopalan
Multi-Constrained Path (MCP) algorithms are path finding algorithms, unlike conventional routing algorithms, they not only give a path between source and destination, also verifies whether the path satisfies the given constraints (Right turn, Left turn and U turn). MCP algorithms are NPComplete. The MCP algorithms are aimed to find the shortest path in a road network that satisfies the turn prohibitions and has many applications such as route guidance in Intelligent Transport System (ITS). In this paper, roads are considered as nodes and junctions as edges, as it reduces the amount of data to be processed. The output consists of a list of paths that can be used to reach the destination. The algorithms have be tested and analysed with the real data of Bangalore road network. The results show that the efficiency of MCP is 84.5% better than conventional routing algorithms in terms of execution time.
多约束路径(Multi-Constrained Path, MCP)算法是一种寻路算法,与传统的路由算法不同,它不仅给出源和目的之间的路径,而且验证该路径是否满足给定的约束(右转、左转和U转)。MCP算法是NPComplete的。MCP算法的目标是在道路网络中寻找满足转弯限制的最短路径,在智能交通系统(ITS)中的路径引导等方面有着广泛的应用。在本文中,道路被认为是节点,路口被认为是边缘,因为这样可以减少需要处理的数据量。输出由可用于到达目的地的路径列表组成。用班加罗尔路网的实际数据对算法进行了测试和分析。结果表明,在执行时间上,MCP算法比传统路由算法的效率提高了84.5%。
{"title":"Approximating Shortest Path in Large-Scale Road Networks with Turn Prohibitions Using Multi-constrained Path Algorithm","authors":"K. Girish, Sandeep Sarkar, S. Rajagopalan","doi":"10.1109/CIMSIM.2013.56","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.56","url":null,"abstract":"Multi-Constrained Path (MCP) algorithms are path finding algorithms, unlike conventional routing algorithms, they not only give a path between source and destination, also verifies whether the path satisfies the given constraints (Right turn, Left turn and U turn). MCP algorithms are NPComplete. The MCP algorithms are aimed to find the shortest path in a road network that satisfies the turn prohibitions and has many applications such as route guidance in Intelligent Transport System (ITS). In this paper, roads are considered as nodes and junctions as edges, as it reduces the amount of data to be processed. The output consists of a list of paths that can be used to reach the destination. The algorithms have be tested and analysed with the real data of Bangalore road network. The results show that the efficiency of MCP is 84.5% better than conventional routing algorithms in terms of execution time.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122907678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
HIPAA Based Predictive Analytics for an Adaptive and Descriptive Mobile Healthcare System 基于HIPAA的自适应和描述性移动医疗保健系统预测分析
C. Subramaniam, Abhishek Balaji Radhakrishnan, Vignesh Raj Somu, Harshinee Chandraskear, Janani Balasubramaniam
The objective of the research work is to performa predictive analysis of an adaptive and descriptive mobilehealth care system in the context of Health InsurancePortability and Accountability Act (HIPAA). This analyticalstudy has assumed a set of policies encompassing health careorganizations, service providers and the end users. Theelectronic medical records of the patients are clustered so asto fasten the detection and data extraction of records usingmobile ambience. The non-adaptive strategies, mistakes inthe earlier collaboration models and the late enforcementare the basic issues and challenges for the proposed work.The predictability analysis over the scalability of mobilehealth application with several uncertainty nature ofinsurance fraud is performed. The focus is to frame adescriptive logic for an adaptable health care system withuser expected analytics. A case study, Blood Seeker, isdesigned and deployed to substantiate the proposedanalytics over concurrency and reachability of thesystem.
研究工作的目的是在健康保险可移植性和责任法案(HIPAA)的背景下对适应性和描述性移动医疗保健系统进行预测分析。本分析性研究假设了一套涵盖医疗保健组织、服务提供者和最终用户的政策。对患者的电子病历进行聚类处理,以便在移动环境下对病历进行检测和数据提取。非适应性策略、早期合作模式中的错误和后期的执行是本研究面临的基本问题和挑战。对具有几种保险欺诈不确定性的移动医疗应用的可扩展性进行了可预测性分析。重点是为具有用户期望分析的适应性医疗保健系统构建描述性逻辑。设计并部署了一个案例研究,Blood Seeker,以证实对系统并发性和可达性的建议分析。
{"title":"HIPAA Based Predictive Analytics for an Adaptive and Descriptive Mobile Healthcare System","authors":"C. Subramaniam, Abhishek Balaji Radhakrishnan, Vignesh Raj Somu, Harshinee Chandraskear, Janani Balasubramaniam","doi":"10.1109/CIMSIM.2013.32","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.32","url":null,"abstract":"The objective of the research work is to performa predictive analysis of an adaptive and descriptive mobilehealth care system in the context of Health InsurancePortability and Accountability Act (HIPAA). This analyticalstudy has assumed a set of policies encompassing health careorganizations, service providers and the end users. Theelectronic medical records of the patients are clustered so asto fasten the detection and data extraction of records usingmobile ambience. The non-adaptive strategies, mistakes inthe earlier collaboration models and the late enforcementare the basic issues and challenges for the proposed work.The predictability analysis over the scalability of mobilehealth application with several uncertainty nature ofinsurance fraud is performed. The focus is to frame adescriptive logic for an adaptable health care system withuser expected analytics. A case study, Blood Seeker, isdesigned and deployed to substantiate the proposedanalytics over concurrency and reachability of thesystem.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115314467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-factor Authentication Framework for Cloud Computing 面向云计算的多因素认证框架
R. K. Banyal, Pragya Jain, V. K. Jain
Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing environment to the most modern means of attacks. In this paper, we propose a new multi-factor authentication framework for cloud computing. The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system.The proposed framework is verified by developing Cloud Access Management (CAM) system which authenticates the user based on multiple factors. Also using secret-splitting and encrypted value of arithmetic captcha is innovative factor for user authentication for cloud computing environment. Prototype model for cloud computing own cloud server is implemented using open sources technology. The proposed framework shows the close agreement with the standard criteria for security.
云计算是一种通过互联网提供服务的新范例。数据安全是云计算环境中最关键的问题。身份验证是信息安全的一项关键技术,它是一种建立身份证明以获取系统中信息的机制。传统的密码认证不能为云计算环境中的信息提供足够的安全性,无法抵御最现代的攻击手段。本文提出了一种新的云计算多因素认证框架。该框架提供了一种可行且最有效的机制,可以与传统的认证系统紧密集成。通过开发基于多因素的用户身份认证的云访问管理(CAM)系统对所提框架进行了验证。此外,利用算术验证码的秘密分割和加密值是云计算环境下用户认证的创新因素。采用开源技术实现了云计算自己的云服务器原型模型。所提出的框架显示出与安全标准的密切一致。
{"title":"Multi-factor Authentication Framework for Cloud Computing","authors":"R. K. Banyal, Pragya Jain, V. K. Jain","doi":"10.1109/CIMSIM.2013.25","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.25","url":null,"abstract":"Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing environment to the most modern means of attacks. In this paper, we propose a new multi-factor authentication framework for cloud computing. The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system.The proposed framework is verified by developing Cloud Access Management (CAM) system which authenticates the user based on multiple factors. Also using secret-splitting and encrypted value of arithmetic captcha is innovative factor for user authentication for cloud computing environment. Prototype model for cloud computing own cloud server is implemented using open sources technology. The proposed framework shows the close agreement with the standard criteria for security.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121372708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Modeling Rainfall Prediction Using Data Mining Method: A Bayesian Approach 基于数据挖掘的降水预测建模:贝叶斯方法
V. Nikam, Bandu B. Meshram
Weather forecasting has been one of the most scientifically and technologically challenging problem around the world. Weather data is one of the meteorological data that is rich with important information, which can be used for weather prediction We extract knowledge from weather historical data collected from Indian Meteorological Department (IMD) Pune. From the collected weather data comprising of 36 attributes, only 7 attributes are most relevant to rainfall prediction. We made data preprocessing and data transformation on raw weather data set, so that it shall be possible to work on Bayesian, the data mining, prediction model used for rainfall prediction. The model is trained using the training data set and has been tested for accuracy on available test data. The meteorological centers uses high performance computing and supercomputing power to run weather prediction model. To address the issue of compute intensive rainfall prediction model, we proposed and implemented data intensive model using data mining technique. Our model works with good accuracy and takes moderate compute resources to predict the rainfall. We have used Bayesian approach to prove our model for rainfall prediction, and found to be working well with good accuracy.
天气预报一直是世界上最具科学和技术挑战性的问题之一。天气数据是具有丰富重要信息的气象数据之一,可用于天气预报,我们从印度浦那气象局(IMD)收集的天气历史数据中提取知识。在收集到的36个气象属性中,只有7个属性与降雨预测最相关。我们对原始天气数据集进行了数据预处理和数据转换,使其能够运用贝叶斯数据挖掘预测模型进行降雨预测。该模型使用训练数据集进行训练,并在可用的测试数据上进行了准确性测试。气象中心采用高性能计算和超级计算能力运行天气预报模型。为了解决计算强降雨预测模型的问题,提出并利用数据挖掘技术实现了数据密集型模型。我们的模型具有较好的精度,并且需要适度的计算资源来预测降雨。我们已经使用贝叶斯方法来证明我们的模型用于降雨预测,并发现它工作得很好,精度很高。
{"title":"Modeling Rainfall Prediction Using Data Mining Method: A Bayesian Approach","authors":"V. Nikam, Bandu B. Meshram","doi":"10.1109/CIMSIM.2013.29","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.29","url":null,"abstract":"Weather forecasting has been one of the most scientifically and technologically challenging problem around the world. Weather data is one of the meteorological data that is rich with important information, which can be used for weather prediction We extract knowledge from weather historical data collected from Indian Meteorological Department (IMD) Pune. From the collected weather data comprising of 36 attributes, only 7 attributes are most relevant to rainfall prediction. We made data preprocessing and data transformation on raw weather data set, so that it shall be possible to work on Bayesian, the data mining, prediction model used for rainfall prediction. The model is trained using the training data set and has been tested for accuracy on available test data. The meteorological centers uses high performance computing and supercomputing power to run weather prediction model. To address the issue of compute intensive rainfall prediction model, we proposed and implemented data intensive model using data mining technique. Our model works with good accuracy and takes moderate compute resources to predict the rainfall. We have used Bayesian approach to prove our model for rainfall prediction, and found to be working well with good accuracy.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116528465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Performance Analysis of Vertical Strained-SiGe Impact Ionization MOSFET Incorporating Dielectric Pocket (VESIMOS-DP) 介电袋垂直应变-冲击电离MOSFET (VESIMOS-DP)性能分析
I. Saad, Mohd Zuhir Bin Hamzah, C. B. Seng, K. A. Mohamad, B. Ghosh, N. Bolong, R. Ismail
The Vertical Strained Silicon Germanium (SiGe) Impact Ionization MOSFET with Dielectric Pocket (VESIMOS-DP) has been successfully developed and analyzed in this paper. The comparison between VESIMOS and VESIMOS-DP was done to show the advantages of incorporating dielectric pocket (DP) to the performance of the device. An improved stability of threshold voltage, VTH was found for VESIMOS-DP device of various DP size ranging from 20nm to 80nm. The stability is due to the reducing charge sharing effects between source and drain region. However, the presence of DP layer has introduced another potential barrier in addition to the delta p+ (dp+) triangular potential barrier. Thus, increased amount of gate voltage needed to overcome those barriers and allows the electrons to flow from source to drain. Moreover, the DP layer has suppressed the parasitic bipolar transistor effect (PBT) with higher breakdown voltage as compared to without DP layer. Hence, the incorporation of DP into VESIMOS has enhanced its performance and presents elevated characteristics for nano-electronics device.
本文成功研制了具有介电袋的垂直应变硅锗冲击电离MOSFET (VESIMOS-DP)。通过对VESIMOS和VESIMOS-DP的比较,说明了加入介质袋(DP)对器件性能的影响。对于20nm ~ 80nm不同尺寸的VESIMOS-DP器件,其阈值电压VTH具有较好的稳定性。这种稳定性是由于源极和漏极之间电荷分担效应的减少。然而,除了δ p+ (DP +)三角形势垒外,DP层的存在还引入了另一个势垒。因此,增加的栅极电压需要克服这些障碍,并允许电子从源流向漏。此外,与没有DP层相比,DP层抑制了寄生双极晶体管效应,击穿电压更高。因此,将DP加入到VESIMOS中,提高了VESIMOS的性能,提高了VESIMOS的纳米电子器件性能。
{"title":"Performance Analysis of Vertical Strained-SiGe Impact Ionization MOSFET Incorporating Dielectric Pocket (VESIMOS-DP)","authors":"I. Saad, Mohd Zuhir Bin Hamzah, C. B. Seng, K. A. Mohamad, B. Ghosh, N. Bolong, R. Ismail","doi":"10.1109/CIMSIM.2013.66","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.66","url":null,"abstract":"The Vertical Strained Silicon Germanium (SiGe) Impact Ionization MOSFET with Dielectric Pocket (VESIMOS-DP) has been successfully developed and analyzed in this paper. The comparison between VESIMOS and VESIMOS-DP was done to show the advantages of incorporating dielectric pocket (DP) to the performance of the device. An improved stability of threshold voltage, VTH was found for VESIMOS-DP device of various DP size ranging from 20nm to 80nm. The stability is due to the reducing charge sharing effects between source and drain region. However, the presence of DP layer has introduced another potential barrier in addition to the delta p+ (dp+) triangular potential barrier. Thus, increased amount of gate voltage needed to overcome those barriers and allows the electrons to flow from source to drain. Moreover, the DP layer has suppressed the parasitic bipolar transistor effect (PBT) with higher breakdown voltage as compared to without DP layer. Hence, the incorporation of DP into VESIMOS has enhanced its performance and presents elevated characteristics for nano-electronics device.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pipelining Acoustic Model Training for Speech Recognition Using Storm 基于Storm的语音识别管道声学模型训练
D. Sitaram, Haripriya Srinivasaraghavan, Kapish Agarwal, Amritanshu Agrawal, N. Joshi, Debraj Ray
Speech recognition has been increasingly used on mobile devices, which has in turn increased the need for creation of new acoustic models for various languages, dialects, accents, speakers and environmental conditions. This involves training and adapting a huge number of acoustic models, some of them in real-time. Training acoustic models is thus essential for speech recognition because these models determine the accuracy and quality of the recognition process. This paper, discusses the use of Storm, a distributed real time computational system, to pipeline the creation of acoustic models by CMU Sphinx, an open-source software project for speech recognition and training. Software pipelining reduces the time required for training and optimizes system resource utilization, thus enabling huge amounts of data to be trained in considerably less amount of time than taken by the conventional sequential process. Pipelining is achieved by grouping the stages of the training process into a set of five stages, and running each stage on individual nodes in a Storm cluster. Thus acoustic models are created by training multiple streams of speech samples using the same SphinxTrain setup, also resulting in improvement of training time and throughput.
语音识别在移动设备上的应用越来越多,这反过来又增加了为各种语言、方言、口音、说话者和环境条件创建新的声学模型的需求。这包括训练和调整大量的声学模型,其中一些是实时的。因此,训练声学模型对于语音识别至关重要,因为这些模型决定了识别过程的准确性和质量。本文讨论了CMU Sphinx(一个用于语音识别和训练的开源软件项目)使用分布式实时计算系统Storm来流水线创建声学模型。软件流水线减少了训练所需的时间,并优化了系统资源的利用,因此,与传统的顺序过程相比,可以在相当短的时间内训练大量的数据。流水线是通过将训练过程的阶段分组为一组五个阶段,并在Storm集群中的单个节点上运行每个阶段来实现的。因此,声学模型是通过使用相同的SphinxTrain设置训练多个语音样本流来创建的,这也导致了训练时间和吞吐量的改善。
{"title":"Pipelining Acoustic Model Training for Speech Recognition Using Storm","authors":"D. Sitaram, Haripriya Srinivasaraghavan, Kapish Agarwal, Amritanshu Agrawal, N. Joshi, Debraj Ray","doi":"10.1109/CIMSIM.2013.42","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.42","url":null,"abstract":"Speech recognition has been increasingly used on mobile devices, which has in turn increased the need for creation of new acoustic models for various languages, dialects, accents, speakers and environmental conditions. This involves training and adapting a huge number of acoustic models, some of them in real-time. Training acoustic models is thus essential for speech recognition because these models determine the accuracy and quality of the recognition process. This paper, discusses the use of Storm, a distributed real time computational system, to pipeline the creation of acoustic models by CMU Sphinx, an open-source software project for speech recognition and training. Software pipelining reduces the time required for training and optimizes system resource utilization, thus enabling huge amounts of data to be trained in considerably less amount of time than taken by the conventional sequential process. Pipelining is achieved by grouping the stages of the training process into a set of five stages, and running each stage on individual nodes in a Storm cluster. Thus acoustic models are created by training multiple streams of speech samples using the same SphinxTrain setup, also resulting in improvement of training time and throughput.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Malignant Melanoma and Benign Nevi from Skin Lesions Based on Support Vector Machine 基于支持向量机的皮肤病变恶性黑色素瘤和良性痣分类
M. A. Mahmoud, Adel Al-Jumaily, Y. Maali, K. Anam
This paper proposes an automated system for discrimination between melanocytic nevi and malignantmelanoma. The proposed system used a number of featuresextracted from histo-pathological images of skin lesionsthrough image processing techniques which consisted of aspatially adaptive color median filter for filtering and a Kmeansclustering for segmentation. The extracted featureswere reduced by using sequential feature selection and thenclassified by using support vector machine (SVM) to diagnoseskin biopsies from patients as either malignant melanoma orbenign nevi. The proposed system was able to achieve a goodresult with classification accuracy of 88.9%, sensitivity of87.5% and specificity of 100%.
本文提出了一种自动识别黑素细胞痣和恶性黑色素瘤的系统。该系统通过图像处理技术从皮肤病变的组织病理图像中提取许多特征,其中包括用于滤波的空间自适应颜色中值滤波器和用于分割的kmeans聚类。通过序列特征选择对提取的特征进行约简,然后使用支持向量机(SVM)进行分类,将患者的皮肤活检诊断为恶性黑色素瘤或良性痣。该系统的分类准确率为88.9%,灵敏度为87.5%,特异性为100%。
{"title":"Classification of Malignant Melanoma and Benign Nevi from Skin Lesions Based on Support Vector Machine","authors":"M. A. Mahmoud, Adel Al-Jumaily, Y. Maali, K. Anam","doi":"10.1109/CIMSIM.2013.45","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.45","url":null,"abstract":"This paper proposes an automated system for discrimination between melanocytic nevi and malignantmelanoma. The proposed system used a number of featuresextracted from histo-pathological images of skin lesionsthrough image processing techniques which consisted of aspatially adaptive color median filter for filtering and a Kmeansclustering for segmentation. The extracted featureswere reduced by using sequential feature selection and thenclassified by using support vector machine (SVM) to diagnoseskin biopsies from patients as either malignant melanoma orbenign nevi. The proposed system was able to achieve a goodresult with classification accuracy of 88.9%, sensitivity of87.5% and specificity of 100%.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
OFDM Timing Offset Estimation with Efficient Methodology and Observation of Different Modulation Schemes 基于有效方法的OFDM时间偏移估计及不同调制方案的观察
Sayeed Islam, S. Rahman, Billal Hossain, Aliyu Ahmed
In this paper, a new and efficient approach for Orthogonal Frequency-Division Multiplexing (OFDM) timing offset error estimation has been presented without using pilot signal. The effect of timing offset on bit error rate (BER) has been analyzed using BPSK, QPSK, 8-PSK modulation scheme and an analytical expression has been derived using probabilistic equation to estimate timing offset. This will guide us to determine the best modulation scheme and also the actual length of CP which allows more spectral efficient OFDM system. Simulation results show that when SNR is decreased BER increases and BPSK shows superior performance among other modulation schemes, when SNR is lower and in presence and absence of timing offset. The analytically derived estimator is precise and useful.
本文提出了一种新的、有效的不使用导频信号的正交频分复用(OFDM)时偏误差估计方法。采用BPSK、QPSK、8-PSK调制方案分析了定时偏置对误码率的影响,并利用概率方程推导了估计定时偏置的解析表达式。这将指导我们确定最佳调制方案和CP的实际长度,从而使频谱效率更高的OFDM系统。仿真结果表明,当信噪比较低、信噪比较低、存在或不存在时序偏移时,误码率增加和BPSK的性能优于其他调制方案。解析导出的估计量是精确和有用的。
{"title":"OFDM Timing Offset Estimation with Efficient Methodology and Observation of Different Modulation Schemes","authors":"Sayeed Islam, S. Rahman, Billal Hossain, Aliyu Ahmed","doi":"10.1109/CIMSIM.2013.64","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.64","url":null,"abstract":"In this paper, a new and efficient approach for Orthogonal Frequency-Division Multiplexing (OFDM) timing offset error estimation has been presented without using pilot signal. The effect of timing offset on bit error rate (BER) has been analyzed using BPSK, QPSK, 8-PSK modulation scheme and an analytical expression has been derived using probabilistic equation to estimate timing offset. This will guide us to determine the best modulation scheme and also the actual length of CP which allows more spectral efficient OFDM system. Simulation results show that when SNR is decreased BER increases and BPSK shows superior performance among other modulation schemes, when SNR is lower and in presence and absence of timing offset. The analytically derived estimator is precise and useful.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128083180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1