首页 > 最新文献

2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)最新文献

英文 中文
Data hiding in videos using Background Subtraction 使用背景减法在视频中隐藏数据
Dalwinder Singh, Birmohan Singh
Nowadays, Video Steganography has emerged as the popular cover medium for hiding of information because of its storage capacity. The selection of pixels for hiding data is very crucial and should be random for security measures. Therefore, we have explored the natural randomness by using such video sequences which contain dynamic variations as a cover. The embedding is done by measuring motion in the frames. It has been achieved by using background subtraction technique which estimates the background to detect foreground pixels. These foreground pixels are then used for hiding data. The proposed algorithm is tested on public available Star dataset for validation. Experimental results show that the proposed algorithm can be used for hiding data as it provides good storage capacity and video quality.
视频隐写技术因其巨大的存储容量而成为当前流行的信息隐藏掩盖媒介。隐藏数据的像素选择是非常关键的,并且为了安全措施应该是随机的。因此,我们利用这种包含动态变化的视频序列作为掩护来探索自然随机性。嵌入是通过测量帧中的运动来完成的。该算法采用背景相减技术,通过估计背景来检测前景像素。这些前景像素然后用于隐藏数据。在公开可用的Star数据集上对该算法进行了验证。实验结果表明,该算法具有良好的存储容量和视频质量,可用于隐藏数据。
{"title":"Data hiding in videos using Background Subtraction","authors":"Dalwinder Singh, Birmohan Singh","doi":"10.1109/RAECS.2015.7453314","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453314","url":null,"abstract":"Nowadays, Video Steganography has emerged as the popular cover medium for hiding of information because of its storage capacity. The selection of pixels for hiding data is very crucial and should be random for security measures. Therefore, we have explored the natural randomness by using such video sequences which contain dynamic variations as a cover. The embedding is done by measuring motion in the frames. It has been achieved by using background subtraction technique which estimates the background to detect foreground pixels. These foreground pixels are then used for hiding data. The proposed algorithm is tested on public available Star dataset for validation. Experimental results show that the proposed algorithm can be used for hiding data as it provides good storage capacity and video quality.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133785467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effect of utility based functions on fuzzy-AHP based network selection in heterogenous wireless networks 基于效用函数对异构无线网络中基于模糊层次分析法的网络选择的影响
R. Goyal, S. Kaushal
With the growth in the field of wireless technology, internet can be accessed by mobile devices through different wireless interfaces. These devices experience both horizontal and vertical handovers in heterogeneous wireless environments. Multiple Attribute Decision Making (MADM) methods can be used for network selection in heterogeneous wireless networks. Traditional MADM methods calculate the final ratings by considering the normalized values of the attributes. The main disadvantage with the normalized values is that they do not consider the actual usability of the attributes for a particular application. In this paper, a utility based fuzzy-AHP method is applied for selecting a network considering the user preferences, network conditions and energy consumption in a real time scenario like video conferencing. Four networks (WLAN1, WLAN2, WiMax, and UMTS) are considered for network selection in vertical handover scenarios. Utility value of each attribute is calculated from the utility functions. Simple Additive Weighing (SAW) is also analyzed using the utility values. Results show that with the utility based MADM methods, ratings of networks are more suitable with respect to the requirements of the application and unnecessary handovers can be avoided in comparison with traditional MADM methods.
随着无线技术领域的发展,移动设备可以通过不同的无线接口访问互联网。这些设备在异构无线环境中经历水平和垂直切换。多属性决策(MADM)方法可用于异构无线网络的网络选择。传统的MADM方法通过考虑属性的归一化值来计算最终评级。规范化值的主要缺点是它们没有考虑特定应用程序属性的实际可用性。本文采用基于效用的模糊层次分析法,在视频会议等实时场景下,综合考虑用户偏好、网络条件和能耗等因素进行网络选择。在垂直切换场景下,需要考虑WLAN1、WLAN2、WiMax和UMTS四种网络进行网络选择。每个属性的效用值由效用函数计算得出。用实用价值分析了简单加量法。结果表明,与传统的MADM方法相比,基于效用的MADM方法对网络的评级更符合应用需求,避免了不必要的切换。
{"title":"Effect of utility based functions on fuzzy-AHP based network selection in heterogenous wireless networks","authors":"R. Goyal, S. Kaushal","doi":"10.1109/RAECS.2015.7453366","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453366","url":null,"abstract":"With the growth in the field of wireless technology, internet can be accessed by mobile devices through different wireless interfaces. These devices experience both horizontal and vertical handovers in heterogeneous wireless environments. Multiple Attribute Decision Making (MADM) methods can be used for network selection in heterogeneous wireless networks. Traditional MADM methods calculate the final ratings by considering the normalized values of the attributes. The main disadvantage with the normalized values is that they do not consider the actual usability of the attributes for a particular application. In this paper, a utility based fuzzy-AHP method is applied for selecting a network considering the user preferences, network conditions and energy consumption in a real time scenario like video conferencing. Four networks (WLAN1, WLAN2, WiMax, and UMTS) are considered for network selection in vertical handover scenarios. Utility value of each attribute is calculated from the utility functions. Simple Additive Weighing (SAW) is also analyzed using the utility values. Results show that with the utility based MADM methods, ratings of networks are more suitable with respect to the requirements of the application and unnecessary handovers can be avoided in comparison with traditional MADM methods.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114485985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
ACI (automated Continuous Integration) using Jenkins: Key for successful embedded Software development 使用Jenkins的ACI(自动化持续集成):成功的嵌入式软件开发的关键
Nikita Seth, Rishi Khare
Continuous Integration (CI) is the most common practice among software developers where they integrate their work into a baseline frequently. The industry is facing huge challenges while developing Software (S/W)s at multiple sites and tested on multiple platforms. The best way to make CI faster and more efficient is to automate the build and testing process. Jenkins is a CI tool that helps in automating the complete process, reducing the work of a developer and check the development at each and every step of S/W evolution. In this paper, we discuss the implementation of Jenkins for software patch integration and release to client. We consider a real-life scenario, how the software development is carried out in corporate ventures and how Jenkins can save developers/integrators crucial work hours by automating the complete process. In this paper, Jenkins is implemented in a master/slave architecture where master node is the Jenkins server and slaves are the Jenkins clients. We discuss the usage of various plug-ins available that allow Jenkins to be used with any environment of software development.
持续集成(CI)是软件开发人员中最常见的实践,他们经常将他们的工作集成到基线中。在多个站点开发软件并在多个平台上进行测试时,行业面临着巨大的挑战。使CI更快、更高效的最佳方法是自动化构建和测试过程。Jenkins是一个持续集成工具,可以帮助实现整个过程的自动化,减少开发人员的工作,并在S/W演进的每一步检查开发。在本文中,我们讨论了Jenkins软件补丁集成和发布到客户端的实现。我们考虑一个现实的场景,软件开发是如何在企业风险中进行的,以及Jenkins如何通过自动化整个过程来节省开发人员/集成商的关键工作时间。在本文中,Jenkins采用主/从架构实现,其中主节点是Jenkins服务器,从节点是Jenkins客户端。我们讨论了各种插件的用法,这些插件允许Jenkins与任何软件开发环境一起使用。
{"title":"ACI (automated Continuous Integration) using Jenkins: Key for successful embedded Software development","authors":"Nikita Seth, Rishi Khare","doi":"10.1109/RAECS.2015.7453279","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453279","url":null,"abstract":"Continuous Integration (CI) is the most common practice among software developers where they integrate their work into a baseline frequently. The industry is facing huge challenges while developing Software (S/W)s at multiple sites and tested on multiple platforms. The best way to make CI faster and more efficient is to automate the build and testing process. Jenkins is a CI tool that helps in automating the complete process, reducing the work of a developer and check the development at each and every step of S/W evolution. In this paper, we discuss the implementation of Jenkins for software patch integration and release to client. We consider a real-life scenario, how the software development is carried out in corporate ventures and how Jenkins can save developers/integrators crucial work hours by automating the complete process. In this paper, Jenkins is implemented in a master/slave architecture where master node is the Jenkins server and slaves are the Jenkins clients. We discuss the usage of various plug-ins available that allow Jenkins to be used with any environment of software development.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114625299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
A Rigid Relationship Based Key Security (RRBKS) algorithm for WSN's 基于刚性关系的无线传感器网络密钥安全算法
Arpandeep Kaur, Harwinder Singh Sohal, A. Sharma, K. Kaur
Wireless Sensor Network (WSN) are used in military, weather, industrial and many other industrial applications. WSN consists of the low configuration nodes with limited battery life. The security issues are one of the major concerns for the sensor networks. Therefore, the sensor nodes must be capable of mitigating the attacks along with minimizing the trade-off between energy consumption and performance. A quick encryption method namely, Rigid Relationship Based Key Security (RRBKS) is proposed in this paper. RRBKS was implemented by using the lightweight randomized keys from the two-column table to provide the best level security. The results of RRBKS were evaluated against the existing model explicitly called, Elliptic Curve Public Key Cryptography (ECPKC). The experimental results marked that the proposed model outperforms the existing model.
无线传感器网络(WSN)用于军事、气象、工业和许多其他工业应用。无线传感器网络由低配置节点和有限的电池寿命组成。安全问题是传感器网络的主要问题之一。因此,传感器节点必须能够减轻攻击,同时最大限度地减少能耗和性能之间的权衡。本文提出了一种快速加密方法——基于刚性关系的密钥安全(RRBKS)。RRBKS通过使用来自两列表的轻量级随机密钥来实现,以提供最佳级别的安全性。RRBKS的结果是根据现有的明确称为椭圆曲线公钥加密(ECPKC)的模型进行评估的。实验结果表明,所提模型优于现有模型。
{"title":"A Rigid Relationship Based Key Security (RRBKS) algorithm for WSN's","authors":"Arpandeep Kaur, Harwinder Singh Sohal, A. Sharma, K. Kaur","doi":"10.1109/RAECS.2015.7453423","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453423","url":null,"abstract":"Wireless Sensor Network (WSN) are used in military, weather, industrial and many other industrial applications. WSN consists of the low configuration nodes with limited battery life. The security issues are one of the major concerns for the sensor networks. Therefore, the sensor nodes must be capable of mitigating the attacks along with minimizing the trade-off between energy consumption and performance. A quick encryption method namely, Rigid Relationship Based Key Security (RRBKS) is proposed in this paper. RRBKS was implemented by using the lightweight randomized keys from the two-column table to provide the best level security. The results of RRBKS were evaluated against the existing model explicitly called, Elliptic Curve Public Key Cryptography (ECPKC). The experimental results marked that the proposed model outperforms the existing model.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"66 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123524289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design optimization of permanent magnet synchronous machine for vertical axis wind turbine using gravitational search algorithm 基于引力搜索算法的垂直轴风力机永磁同步电机设计优化
V. Puri, Y. Chauhan, Nidhi Singh
This paper presents the design of permanent magnet synchronous machine (PMSM) used as a generator at medium speed in vertical axis wind turbine. The designed PMSM is used as inner rotor configuration. This paper addresses optimization of objective function as weight of PMSM, which is a paramount aspect using proposed designs and compares their performance indices using different approaches such as gravitational search algorithm (GSA) and its hybridization with particle swarm optimization (PSO). The formulated optimization problem is programmed in MATLAB and results using GSA and GSA-PSO have been obtained and compared in detail. The GSA-PSO provides better results at reduced weight with increased efficiency and minimum regulation.
介绍了垂直轴风力发电机组中速发电机用永磁同步电机的设计。所设计的永磁同步电机作为内转子结构。本文将目标函数的优化作为PMSM的权重,这是所提出设计的一个重要方面,并比较了不同方法的性能指标,如引力搜索算法(GSA)及其与粒子群优化(PSO)的杂交。在MATLAB中编写了公式优化问题,并对采用GSA和GSA- pso的优化结果进行了详细比较。GSA-PSO在减轻重量、提高效率和最小调节的情况下提供了更好的结果。
{"title":"Design optimization of permanent magnet synchronous machine for vertical axis wind turbine using gravitational search algorithm","authors":"V. Puri, Y. Chauhan, Nidhi Singh","doi":"10.1109/RAECS.2015.7453327","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453327","url":null,"abstract":"This paper presents the design of permanent magnet synchronous machine (PMSM) used as a generator at medium speed in vertical axis wind turbine. The designed PMSM is used as inner rotor configuration. This paper addresses optimization of objective function as weight of PMSM, which is a paramount aspect using proposed designs and compares their performance indices using different approaches such as gravitational search algorithm (GSA) and its hybridization with particle swarm optimization (PSO). The formulated optimization problem is programmed in MATLAB and results using GSA and GSA-PSO have been obtained and compared in detail. The GSA-PSO provides better results at reduced weight with increased efficiency and minimum regulation.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123674274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Oversampled Sigma Delta ADC decimation filter: Design techniques, challenges, tradeoffs and optimization 过采样Sigma Delta ADC抽取滤波器:设计技术,挑战,权衡和优化
Nasir N. Hurrah, Zubair Jan, A. Bhardwaj, S. A. Parah, A. Pandit
With the rapid developments in the IC technology and signal processing oversampled Sigma Delta (ΣΔ) ADCs have become the absolute choice among the competent data converters due to their efficient architectures and ease of implementation in VLSI technology. Their efficiency lies in the schemes to decrease area, reduce power consumption and ways to improve frequency response without putting any stress on design cost and compatibility factor. They have their own issues which need to be improved or optimized in order to run neck by neck for being compatible for the efficient designs. Decimation filter being the important block in the ΣΔ ADCs needs some improvements in some areas for meeting the demands of an efficient design. This paper presents a brief overview of ΣΔ ADCs, various techniques of decimation filter design and different architectures, design methods, and practical issues, solutions and tradeoffs.
随着IC技术和信号处理技术的快速发展,过采样Sigma Delta (ΣΔ) adc因其高效的架构和易于在VLSI技术中实现而成为胜任数据转换器的绝对选择。它们的效率在于在不考虑设计成本和兼容性因素的情况下,减小面积、降低功耗和改善频率响应的方案。它们都有自己的问题需要改进或优化,以便与高效设计相兼容。抽取滤波器作为ΣΔ数模转换器的重要模块,需要在某些方面进行改进,以满足高效设计的要求。本文简要介绍了ΣΔ adc,各种抽取滤波器设计技术和不同的架构,设计方法,以及实际问题,解决方案和权衡。
{"title":"Oversampled Sigma Delta ADC decimation filter: Design techniques, challenges, tradeoffs and optimization","authors":"Nasir N. Hurrah, Zubair Jan, A. Bhardwaj, S. A. Parah, A. Pandit","doi":"10.1109/RAECS.2015.7453347","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453347","url":null,"abstract":"With the rapid developments in the IC technology and signal processing oversampled Sigma Delta (ΣΔ) ADCs have become the absolute choice among the competent data converters due to their efficient architectures and ease of implementation in VLSI technology. Their efficiency lies in the schemes to decrease area, reduce power consumption and ways to improve frequency response without putting any stress on design cost and compatibility factor. They have their own issues which need to be improved or optimized in order to run neck by neck for being compatible for the efficient designs. Decimation filter being the important block in the ΣΔ ADCs needs some improvements in some areas for meeting the demands of an efficient design. This paper presents a brief overview of ΣΔ ADCs, various techniques of decimation filter design and different architectures, design methods, and practical issues, solutions and tradeoffs.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121954449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance analysis of implicit security mechanisms for cloud storage system 云存储系统隐式安全机制的性能分析
Makhan Singh, Sarbjeet Singh
Cloud Computing is considered as next generation architecture of computing. It is the collection of interconnected servers which are provisioned dynamically on demand for execution of applications. The data stored in servers of datacenters of cloud system is generally protected through firewalls and encryption techniques. These techniques come under explicit security mechanisms. In this paper, implicit security mechanisms like Information Dispersal Algorithms and secret sharing schemes have been analyzed which provide implicit data security, reliability and availability to information. The paper also presents the performance analysis of various Information Dispersal Algorithms on the basis of their storage, availability, redundancy and security features.
云计算被认为是下一代计算体系结构。它是一组相互连接的服务器,可以根据应用程序的执行需求进行动态配置。存储在云系统数据中心服务器上的数据通常通过防火墙和加密技术进行保护。这些技术属于明确的安全机制。本文分析了信息分散算法和秘密共享方案等隐式安全机制,为信息提供隐式数据安全性、可靠性和可用性。本文还从存储、可用性、冗余性和安全性等方面分析了各种信息分散算法的性能。
{"title":"Performance analysis of implicit security mechanisms for cloud storage system","authors":"Makhan Singh, Sarbjeet Singh","doi":"10.1109/RAECS.2015.7453416","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453416","url":null,"abstract":"Cloud Computing is considered as next generation architecture of computing. It is the collection of interconnected servers which are provisioned dynamically on demand for execution of applications. The data stored in servers of datacenters of cloud system is generally protected through firewalls and encryption techniques. These techniques come under explicit security mechanisms. In this paper, implicit security mechanisms like Information Dispersal Algorithms and secret sharing schemes have been analyzed which provide implicit data security, reliability and availability to information. The paper also presents the performance analysis of various Information Dispersal Algorithms on the basis of their storage, availability, redundancy and security features.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting telecommunications data with Autoregressive Integrated Moving Average models 用自回归综合移动平均模型预测电信数据
N. Nalawade, Minakshee M. Pawar
Forecasting of telecommunication data find difficult according to International Telecommunication Union (ITU) due to uncertainty involved and the continuous growth of data in telecommunication markets as it helps them in planning and determining their networks. So, there is a need of good forecasting model to predict the future. In this paper, Autoregressive Integrated Moving Average model is utilized for forecasting telecommunication data. This model adaptively uses auto regression, moving average or combined together if required. The major steps involved in the ARIMA model is identification, estimation and forecasting. The adaptive ARIMA model is then applied to M3-Competition Data to do forecasting of telecommunication data. The performance of the model is found out using the evaluation metrics such as Sum of Squared Regression, Root Mean Square Error, Mean Absolute Deviation, Mean Absolute Percentage Error and Maximum Absolute Error. The results proved that the ARIMA models provide 7.6% improvement than the neural network method in forecasting performance.
根据国际电信联盟(ITU)的说法,由于所涉及的不确定性和电信市场数据的持续增长,电信数据的预测很难,因为这有助于他们规划和确定其网络。因此,需要一个好的预测模型来预测未来。本文采用自回归综合移动平均模型对电信数据进行预测。该模型自适应地使用自回归、移动平均或必要时组合使用。ARIMA模型的主要步骤是识别、估计和预测。将自适应ARIMA模型应用于M3-Competition Data,对电信数据进行预测。利用平方和回归、均方根误差、平均绝对偏差、平均绝对百分比误差和最大绝对误差等评价指标来评价模型的性能。结果表明,ARIMA模型的预测性能比神经网络方法提高了7.6%。
{"title":"Forecasting telecommunications data with Autoregressive Integrated Moving Average models","authors":"N. Nalawade, Minakshee M. Pawar","doi":"10.1109/RAECS.2015.7453427","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453427","url":null,"abstract":"Forecasting of telecommunication data find difficult according to International Telecommunication Union (ITU) due to uncertainty involved and the continuous growth of data in telecommunication markets as it helps them in planning and determining their networks. So, there is a need of good forecasting model to predict the future. In this paper, Autoregressive Integrated Moving Average model is utilized for forecasting telecommunication data. This model adaptively uses auto regression, moving average or combined together if required. The major steps involved in the ARIMA model is identification, estimation and forecasting. The adaptive ARIMA model is then applied to M3-Competition Data to do forecasting of telecommunication data. The performance of the model is found out using the evaluation metrics such as Sum of Squared Regression, Root Mean Square Error, Mean Absolute Deviation, Mean Absolute Percentage Error and Maximum Absolute Error. The results proved that the ARIMA models provide 7.6% improvement than the neural network method in forecasting performance.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient design of radar waveforms using novel multiobjective optimization technique 基于新型多目标优化技术的雷达波形高效设计
V. Baghel, G. Panda, S. Verma
Optimal choice of the parameters of stepped frequency train of linear frequency modulated pulses (SFT-LFM) can substantially improve the detection potentiality of radar target. In this paper this challenging signal design problem has been formulated as a two objectives optimization problem. A minor variant of existing MOEA/D known as multiobjective evolutionary algorithm based on normalize Tchebycheff decomposition (MOEA/NTD) is developed and employed to achieve various best possible combinations of these parameters. Through simulation study the effects of the chosen parameters on mainlobe width, grating lobes and sidelobes of compressed SFT-LFM have been demonstrated. The comparison of the simulation results exhibit that the optimization performance of proposed MOEA/NTD is superior to those obtained by the MOEA/D based method.
线性调频脉冲(SFT-LFM)阶跃频率序列参数的优化选择可以显著提高雷达目标的探测潜力。本文将这一具有挑战性的信号设计问题表述为一个双目标优化问题。在现有MOEA/D的基础上,开发了基于归一化Tchebycheff分解的多目标进化算法(MOEA/NTD),并将其用于实现这些参数的各种最佳可能组合。通过仿真研究,证明了所选参数对压缩SFT-LFM的主瓣宽度、光栅瓣和副瓣的影响。仿真结果的对比表明,所提出的MOEA/NTD优化性能优于基于MOEA/D方法的优化性能。
{"title":"Efficient design of radar waveforms using novel multiobjective optimization technique","authors":"V. Baghel, G. Panda, S. Verma","doi":"10.1109/RAECS.2015.7453330","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453330","url":null,"abstract":"Optimal choice of the parameters of stepped frequency train of linear frequency modulated pulses (SFT-LFM) can substantially improve the detection potentiality of radar target. In this paper this challenging signal design problem has been formulated as a two objectives optimization problem. A minor variant of existing MOEA/D known as multiobjective evolutionary algorithm based on normalize Tchebycheff decomposition (MOEA/NTD) is developed and employed to achieve various best possible combinations of these parameters. Through simulation study the effects of the chosen parameters on mainlobe width, grating lobes and sidelobes of compressed SFT-LFM have been demonstrated. The comparison of the simulation results exhibit that the optimization performance of proposed MOEA/NTD is superior to those obtained by the MOEA/D based method.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124874948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust median-mean filter for impulse noise suppression 一种用于脉冲噪声抑制的鲁棒中均值滤波器
Manpreet Singh, H. Kaur
All the communication channels are prone to noise, which makes it difficult to recover the original data or image at the receiving end. Noise can never be completely suppressed in the channel part, this makes it even more challenging for the engineers to design the receiver that can regenerate the original data stream from the noise affected one. In this paper an impulse noise suppression median-mean filter (INSMF) is designed that works with three different window sizes to reduce the error between original and recovered values. In order to achieve a high degree of accuracy, not only the benefits of median filtering but also Normalized Euclidean Distance and mean value replacement are explored. Theoretical analysis and experimental results are drawn by taking different noise levels present in channel that determines the effectiveness of the proposed filtering method.
所有的通信信道都容易产生噪声,这使得接收端的原始数据或图像难以恢复。在信道部分,噪声永远不可能被完全抑制,这使得设计能够从受噪声影响的接收器中重新生成原始数据流的工程师更具挑战性。本文设计了一种脉冲噪声抑制中值滤波器(INSMF),该滤波器具有三种不同的窗口大小,以减小原始值与恢复值之间的误差。为了达到较高的精度,不仅探讨了中值滤波的优点,还探讨了归一化欧氏距离和均值替换的优点。通过选取信道中存在的不同噪声水平,得出了理论分析和实验结果,从而确定了所提出滤波方法的有效性。
{"title":"A robust median-mean filter for impulse noise suppression","authors":"Manpreet Singh, H. Kaur","doi":"10.1109/RAECS.2015.7453404","DOIUrl":"https://doi.org/10.1109/RAECS.2015.7453404","url":null,"abstract":"All the communication channels are prone to noise, which makes it difficult to recover the original data or image at the receiving end. Noise can never be completely suppressed in the channel part, this makes it even more challenging for the engineers to design the receiver that can regenerate the original data stream from the noise affected one. In this paper an impulse noise suppression median-mean filter (INSMF) is designed that works with three different window sizes to reduce the error between original and recovered values. In order to achieve a high degree of accuracy, not only the benefits of median filtering but also Normalized Euclidean Distance and mean value replacement are explored. Theoretical analysis and experimental results are drawn by taking different noise levels present in channel that determines the effectiveness of the proposed filtering method.","PeriodicalId":256314,"journal":{"name":"2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132015428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1