首页 > 最新文献

2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)最新文献

英文 中文
Understanding and formulation of various kernel techniques for suport vector machines 理解和表述支持向量机的各种核技术
P. Bohra, Dr Hemant Palivela
Support Vector Machines (SVM's) are supervised learning algorithms which can be used for analyzing patterns and classifying data. This supervised algorithm is applicable for binary class as well as multiclass classification. The core idea is to build a hyperplane which can easily separate the training examples. For binary class, SVM constructs a hyper-plane which can easily separate d-dimensional training examples perfectly into 2-classes. but sometimes, the training examples are not linearly separable. Thus, for non-linear training examples, SVM introduced Kernel functions which transforms the data into high dimensional space where the data can be separated linearly. For minimizing the test error and for improving classification accuracy, kernels functions are used. This paper explains applications of kernels in support vector machine and provide information about the properties of these kernels and situations in which they can be used.
支持向量机(SVM)是一种监督学习算法,可用于分析模式和分类数据。该算法既适用于二类分类,也适用于多类分类。其核心思想是建立一个可以很容易地分离训练样本的超平面。对于二值类,SVM构建了一个超平面,可以很容易地将d维训练样本完美地分离为2类。但是有时候,训练样本不是线性可分的。因此,对于非线性训练样例,SVM引入核函数,将数据转换为高维空间,使数据可以线性分离。为了最小化测试误差和提高分类精度,使用了核函数。本文解释了核在支持向量机中的应用,并提供了有关这些核的性质和它们可以使用的情况的信息。
{"title":"Understanding and formulation of various kernel techniques for suport vector machines","authors":"P. Bohra, Dr Hemant Palivela","doi":"10.1109/ICCIC.2015.7435804","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435804","url":null,"abstract":"Support Vector Machines (SVM's) are supervised learning algorithms which can be used for analyzing patterns and classifying data. This supervised algorithm is applicable for binary class as well as multiclass classification. The core idea is to build a hyperplane which can easily separate the training examples. For binary class, SVM constructs a hyper-plane which can easily separate d-dimensional training examples perfectly into 2-classes. but sometimes, the training examples are not linearly separable. Thus, for non-linear training examples, SVM introduced Kernel functions which transforms the data into high dimensional space where the data can be separated linearly. For minimizing the test error and for improving classification accuracy, kernels functions are used. This paper explains applications of kernels in support vector machine and provide information about the properties of these kernels and situations in which they can be used.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tele-monitoring vehicle system for secured travelling 安全行车远程监控车辆系统
M. Bhille, Namrata D. Hiremath
In real world many people face a lot of problem to contact other people while travelling and inform about their location details; in such cases this application solves the problem by first tracking the location of the person and then sending a text message to other person to the pre-set numbers periodically. An attempt is been made to develop a vehicle for the purpose of detecting the location and position of the vehicle carrying people or any asset. This information can be sent to remote user through global system for mobile communication. It provides a remote monitoring system for secured transportation for local conveyances. The Proposed system is equipped with GPS & GSM enabled embedded system along with microcontroller in the vehicle. GPS-GSM module helps the remote user to continuously track the location of the vehicle and activity of the driver.
在现实世界中,许多人在旅行时遇到很多问题,无法与他人联系并告知他们的位置细节;在这种情况下,这个应用程序解决了这个问题,首先跟踪的人的位置,然后发送文本消息给其他人预设的号码定期。正在尝试开发一种车辆,用于探测运载人员或任何资产的车辆的位置和位置。这些信息可以通过全球移动通信系统发送给远程用户。它为当地运输工具的安全运输提供远程监测系统。该系统配备了GPS和GSM嵌入式系统以及车载微控制器。GPS-GSM模块帮助远程用户持续跟踪车辆的位置和驾驶员的活动。
{"title":"Tele-monitoring vehicle system for secured travelling","authors":"M. Bhille, Namrata D. Hiremath","doi":"10.1109/ICCIC.2015.7435759","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435759","url":null,"abstract":"In real world many people face a lot of problem to contact other people while travelling and inform about their location details; in such cases this application solves the problem by first tracking the location of the person and then sending a text message to other person to the pre-set numbers periodically. An attempt is been made to develop a vehicle for the purpose of detecting the location and position of the vehicle carrying people or any asset. This information can be sent to remote user through global system for mobile communication. It provides a remote monitoring system for secured transportation for local conveyances. The Proposed system is equipped with GPS & GSM enabled embedded system along with microcontroller in the vehicle. GPS-GSM module helps the remote user to continuously track the location of the vehicle and activity of the driver.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design an M-learning framework for smart learning in ad hoc network of Android devices 为Android设备自组织网络中的智能学习设计一个移动学习框架
M. Aljohani, Tanweer Alam
Android smart devices are ubiquitous in our daily life and becoming valuable device with the capabilities of wireless networking that are typically used with an IEEE 802.11 access point. Ad hoc network provides facilities to access devices in infrastructure less system without a centralized approach. Android smart devices are dynamically joined and create an ad hoc network on their own. Android based smart configuration don't need centralized infrastructure for making connection in own created network. smart devices creates the network and start communication. M-learning is a key point for effective learning in this network. The main goal of this paper is to design a new M-learning framework for smart learning in Ad Hoc Network architecture among Android based Wi-Fi devices. Android is an open platform system with the feature of wireless. In our research we select Android and develop Android application for M-Learning through android based smart devices. we developed Android application for connecting android devices together in an ad hoc network without centralized approach. M-learning System has been implemented and results in Wi-Fi and Bluetooth were collected. The proposed system have been tested in android ad hoc network system. Application has been figured in Wi-Fi and Bluetooth ad hoc network environment.
Android智能设备在我们的日常生活中无处不在,并成为具有无线网络功能的宝贵设备,通常与IEEE 802.11接入点一起使用。自组织网络提供了在没有集中方法的基础设施系统中访问设备的设施。Android智能设备动态连接并自行创建一个自组织网络。基于Android的智能配置不需要集中的基础设施来连接自己创建的网络。智能设备创建网络并开始通信。移动学习是该网络中有效学习的关键。本文的主要目标是为基于Android的Wi-Fi设备的Ad Hoc网络架构中的智能学习设计一个新的移动学习框架。Android是一个具有无线特性的开放平台系统。在我们的研究中,我们选择了Android,并通过基于Android的智能设备开发了移动学习的Android应用程序。我们开发了Android应用程序,将Android设备连接在一个非集中式网络中。已经实施了移动学习系统,并收集了Wi-Fi和蓝牙的结果。该系统已在android自组网系统中进行了测试。并在Wi-Fi和蓝牙自组网环境中进行了应用。
{"title":"Design an M-learning framework for smart learning in ad hoc network of Android devices","authors":"M. Aljohani, Tanweer Alam","doi":"10.1109/ICCIC.2015.7435817","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435817","url":null,"abstract":"Android smart devices are ubiquitous in our daily life and becoming valuable device with the capabilities of wireless networking that are typically used with an IEEE 802.11 access point. Ad hoc network provides facilities to access devices in infrastructure less system without a centralized approach. Android smart devices are dynamically joined and create an ad hoc network on their own. Android based smart configuration don't need centralized infrastructure for making connection in own created network. smart devices creates the network and start communication. M-learning is a key point for effective learning in this network. The main goal of this paper is to design a new M-learning framework for smart learning in Ad Hoc Network architecture among Android based Wi-Fi devices. Android is an open platform system with the feature of wireless. In our research we select Android and develop Android application for M-Learning through android based smart devices. we developed Android application for connecting android devices together in an ad hoc network without centralized approach. M-learning System has been implemented and results in Wi-Fi and Bluetooth were collected. The proposed system have been tested in android ad hoc network system. Application has been figured in Wi-Fi and Bluetooth ad hoc network environment.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Rider assistance system with an active safety mechanism 骑手辅助系统与主动安全机制
Gangatharan Kumarasamy, N. Prakash, P. Mohan
This paper discusses on the design and use of emerging technologies to provide a rider assistance system with an integrated safety mechanism for two wheelers (2W). This paper identifies the most frequent causes of two wheeler accidents and how the rider interacts with the vehicle during the pre-crash phase and vehicle behavior by analyzing the two wheeler accident data. Rider Assistance System (RAS) shall identify the existing technologies and safety systems in passenger cars and assess their usability or with modifications in two wheelers. This system shall continuously monitor the approaching path for any stationary or moving obstacles. And also monitors the rider's field of vision for any deviation from the intended path. These inputs shall be achieved either by range sensor based technology or/and a computer vision based technology. These input parameters shall be processed by an Electronic Control Unit (ECU) to take an autonomous decision to avoid a crash or to warn the rider to take an action. The autonomous decision shall be de-accelerating the vehicle by intervening the rider's acceleration inputs. With this autonomous action of the system, a possible crash shall be prevented ensuring rider's safety.
本文讨论了新兴技术的设计和使用,以提供具有集成安全机制的两轮车(2W)乘员辅助系统。本文通过对两轮车事故数据的分析,确定了两轮车事故最常见的原因,以及在碰撞前阶段骑手与车辆的相互作用和车辆的行为。乘客辅助系统(RAS)应识别乘用车的现有技术和安全系统,并评估其可用性或对两轮车进行修改。该系统应持续监测接近的路径中任何静止或移动的障碍物。它还能监控骑手的视野是否偏离预定路线。这些输入将通过基于距离传感器的技术或/和基于计算机视觉的技术来实现。这些输入参数将由电子控制单元(ECU)进行处理,以自动做出避免碰撞或警告乘客采取行动的决定。自主决策应该是通过干预骑手的加速输入来降低车辆的加速度。有了这个系统的自主行动,可以防止可能的碰撞,确保乘客的安全。
{"title":"Rider assistance system with an active safety mechanism","authors":"Gangatharan Kumarasamy, N. Prakash, P. Mohan","doi":"10.1109/ICCIC.2015.7435675","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435675","url":null,"abstract":"This paper discusses on the design and use of emerging technologies to provide a rider assistance system with an integrated safety mechanism for two wheelers (2W). This paper identifies the most frequent causes of two wheeler accidents and how the rider interacts with the vehicle during the pre-crash phase and vehicle behavior by analyzing the two wheeler accident data. Rider Assistance System (RAS) shall identify the existing technologies and safety systems in passenger cars and assess their usability or with modifications in two wheelers. This system shall continuously monitor the approaching path for any stationary or moving obstacles. And also monitors the rider's field of vision for any deviation from the intended path. These inputs shall be achieved either by range sensor based technology or/and a computer vision based technology. These input parameters shall be processed by an Electronic Control Unit (ECU) to take an autonomous decision to avoid a crash or to warn the rider to take an action. The autonomous decision shall be de-accelerating the vehicle by intervening the rider's acceleration inputs. With this autonomous action of the system, a possible crash shall be prevented ensuring rider's safety.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and analysis of a 16-bit 10MHz pipeline ADC in 0.25μ CMOS 0.25μ CMOS 16位10MHz流水线ADC的设计与分析
C. S. Datta, G. Prasad, V. Shiva, Prasad Nayak, G. Bhargav
This paper discusses the design and analysis of a 16-bit 10MHz pipeline Analog to Digital Converter (ADC). A system and circuit level design of each component of the ADC was created in Cadence. Features of ADC were simulated in Matlab to test and examine its basic functionality. Transient analysis of the design was conducted to verify the performance of the ADC. Methods to correct non-linarites were identified and investigated. The goal of this Major Qualifying Project is to design and fabricate a 16-bit 10MHz Pipeline Analog to Digital Converter (ADC) using 0.25μm CMOS. The motivation for designing a Pipeline ADC comes from the desire to characterize and test the functionality of the novel "Split ADC" Architecture concept [3] using a non-algorithmic ADC. We successfully characterized the System-level functionality of a Pipeline ADC by simulating its features through Matlab. A major part of the analog subsystem of the ADC was designed in Cadence. The simulation work corroborates with our theory and helped us to analyze the design block. It has provided us an opportunity to compare and contrast the ideal and non-ideal behavior of an ADC. Once the layout of the IC has been designed and fabricated, we shall move on to further work needed for data acquisition using a software package similar to LabView or Python.
本文讨论了一种16位10MHz流水线式模数转换器(ADC)的设计与分析。在Cadence中创建了ADC的每个组件的系统和电路级设计。在Matlab中对ADC的特性进行仿真,测试和检验其基本功能。对设计进行了瞬态分析,验证了ADC的性能。对非线性曲线的校正方法进行了识别和研究。该主要合格项目的目标是设计和制造一个使用0.25μm CMOS的16位10MHz管道模数转换器(ADC)。设计流水线ADC的动机来自于使用非算法ADC表征和测试新颖的“分割ADC”架构概念[3]功能的愿望。通过Matlab对流水线ADC的特性进行仿真,成功表征了流水线ADC的系统级功能。模数转换器模拟子系统的主要部分是在Cadence中设计的。仿真结果证实了我们的理论,并帮助我们对设计块进行了分析。它为我们提供了一个比较和对比ADC的理想和非理想性能的机会。一旦IC的布局被设计和制造,我们将继续使用类似于LabView或Python的软件包进行数据采集所需的进一步工作。
{"title":"Design and analysis of a 16-bit 10MHz pipeline ADC in 0.25μ CMOS","authors":"C. S. Datta, G. Prasad, V. Shiva, Prasad Nayak, G. Bhargav","doi":"10.1109/ICCIC.2015.7435769","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435769","url":null,"abstract":"This paper discusses the design and analysis of a 16-bit 10MHz pipeline Analog to Digital Converter (ADC). A system and circuit level design of each component of the ADC was created in Cadence. Features of ADC were simulated in Matlab to test and examine its basic functionality. Transient analysis of the design was conducted to verify the performance of the ADC. Methods to correct non-linarites were identified and investigated. The goal of this Major Qualifying Project is to design and fabricate a 16-bit 10MHz Pipeline Analog to Digital Converter (ADC) using 0.25μm CMOS. The motivation for designing a Pipeline ADC comes from the desire to characterize and test the functionality of the novel \"Split ADC\" Architecture concept [3] using a non-algorithmic ADC. We successfully characterized the System-level functionality of a Pipeline ADC by simulating its features through Matlab. A major part of the analog subsystem of the ADC was designed in Cadence. The simulation work corroborates with our theory and helped us to analyze the design block. It has provided us an opportunity to compare and contrast the ideal and non-ideal behavior of an ADC. Once the layout of the IC has been designed and fabricated, we shall move on to further work needed for data acquisition using a software package similar to LabView or Python.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance comparison of various clustering techniques for diagnosis of breast cancer 各种聚类技术在乳腺癌诊断中的性能比较
R. Delshi Howsalya Devi, P. Deepika
Breast Cancer is a decisive disease when compared to all other cancers in worldwide. Diagnosis of breast cancer is normally clinical and biological in nature. In general we used some of the data mining clustering techniques to predict breast cancer. The objective of this paper is to compare the performance of different Clustering techniques to diagnosis the cancer either benign or malignant. According to the results of our experimental work, we compared five clustering techniques such as DBSCAN, Farthest first, canopy, LVQ and hierarchical clustering in Weka software and comparison results show that Farthest First clustering has higher prediction accuracy i.e. 72% than DBSCAN, Canopy, LVQ and Hierarchical clustering methods.
与世界上所有其他癌症相比,乳腺癌是一种决定性的疾病。乳腺癌的诊断通常是临床和生物学性质的。一般来说,我们使用一些数据挖掘聚类技术来预测乳腺癌。本文的目的是比较不同聚类技术在诊断良性和恶性肿瘤方面的性能。根据实验结果,我们在Weka软件中比较了DBSCAN、最远first、canopy、LVQ和分层聚类5种聚类方法,结果表明最远first聚类的预测精度比DBSCAN、canopy、LVQ和分层聚类方法高72%。
{"title":"Performance comparison of various clustering techniques for diagnosis of breast cancer","authors":"R. Delshi Howsalya Devi, P. Deepika","doi":"10.1109/ICCIC.2015.7435711","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435711","url":null,"abstract":"Breast Cancer is a decisive disease when compared to all other cancers in worldwide. Diagnosis of breast cancer is normally clinical and biological in nature. In general we used some of the data mining clustering techniques to predict breast cancer. The objective of this paper is to compare the performance of different Clustering techniques to diagnosis the cancer either benign or malignant. According to the results of our experimental work, we compared five clustering techniques such as DBSCAN, Farthest first, canopy, LVQ and hierarchical clustering in Weka software and comparison results show that Farthest First clustering has higher prediction accuracy i.e. 72% than DBSCAN, Canopy, LVQ and Hierarchical clustering methods.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124849339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Speech emotion recognition using DWT 基于小波变换的语音情感识别
S. Lalitha, Anoop Mudupu, Bala Visali Nandyala, Renuka Munagala
Emotion recognition from speech helps us in improving the effectiveness of human-machine interaction. This paper presents a method to identify suitable features in DWT domain and improve good accuracy. In this work, 7 emotions (Berlin Database) are recognized using Support Vector Machine (SVM) classifier. Entropy of Teager Energy operated Discrete Wavelet Transform (DWT) coefficients, Linear Predictive Cepstral Coefficients(LPCC), Mel Energy Spectral Dynamic Coefficients(MEDC), Zero Crossing Rate (ZCR), shimmer, spectral roll off, spectral flux, spectral centroid, pitch, short time energy and Harmonic to Noise Ratio (HNR) are considered as features. The obtained average accuracy is 82.14 % Earlier work done on emotion recognition using DWT coefficients yielded an accuracy of 63.63 % and 68.5% for 4 emotions on Berlin and Malayalam databases respectively. The proposed algorithm shows a significant increase in accuracy of about 15% to 20% for 7 emotions on Berlin database. Also, 100% efficiency has been achieved for four emotions with Simple Logistic classifier of WEKA 3.6 tool.
语音情感识别有助于提高人机交互的有效性。提出了一种在小波变换域中识别合适特征并提高识别精度的方法。在这项工作中,使用支持向量机(SVM)分类器识别7种情绪(柏林数据库)。以Teager能量操作的离散小波变换(DWT)系数熵、线性预测倒谱系数(LPCC)、Mel能量谱动态系数(MEDC)、过零率(ZCR)、闪烁、谱滚转、谱通量、谱质心、基音、短时间能量和谐波噪声比(HNR)为特征。先前使用DWT系数进行情绪识别的工作在Berlin和Malayalam数据库中对4种情绪的准确率分别为63.63%和68.5%。该算法在Berlin数据库中对7种情绪的识别准确率显著提高了15% ~ 20%。使用WEKA 3.6工具的Simple Logistic分类器对四种情绪的分类效率达到100%。
{"title":"Speech emotion recognition using DWT","authors":"S. Lalitha, Anoop Mudupu, Bala Visali Nandyala, Renuka Munagala","doi":"10.1109/ICCIC.2015.7435630","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435630","url":null,"abstract":"Emotion recognition from speech helps us in improving the effectiveness of human-machine interaction. This paper presents a method to identify suitable features in DWT domain and improve good accuracy. In this work, 7 emotions (Berlin Database) are recognized using Support Vector Machine (SVM) classifier. Entropy of Teager Energy operated Discrete Wavelet Transform (DWT) coefficients, Linear Predictive Cepstral Coefficients(LPCC), Mel Energy Spectral Dynamic Coefficients(MEDC), Zero Crossing Rate (ZCR), shimmer, spectral roll off, spectral flux, spectral centroid, pitch, short time energy and Harmonic to Noise Ratio (HNR) are considered as features. The obtained average accuracy is 82.14 % Earlier work done on emotion recognition using DWT coefficients yielded an accuracy of 63.63 % and 68.5% for 4 emotions on Berlin and Malayalam databases respectively. The proposed algorithm shows a significant increase in accuracy of about 15% to 20% for 7 emotions on Berlin database. Also, 100% efficiency has been achieved for four emotions with Simple Logistic classifier of WEKA 3.6 tool.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"44 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129680150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET) 安全增强对自主移动网状网络(AMMNET)的影响
Rishikesh J. Teke, M. Chaudhari, R. Prasad
The Mobile Ad-hoc Networks (MANET) are suffering from network partitioning when there is group mobility and thus cannot efficiently provide connectivity to all nodes in the network. Autonomous Mobile Mesh Network (AMMNET) is a new class of MANET which will overcome the weakness of MANET, especially from network partitioning. However, AMMNET is vulnerable to routing attacks such as Blackhole attack in which malicious node can make itself as intragroup, intergroup or intergroup bridge router and disrupt the network. In AMMNET, To maintain connectivity, network survivability is an important aspect of reliable communication. Maintaning security is a challenge in the self organising nature of the topology. To address this weakness proposed approach measured the performance of the impact of security enhancement on AMMNET with the basis of bait detection scheme. Modified bait approach that will prevent blackhole node entering into the network and helps to maintain the reliability of the network. The proposed scheme uses the idea of Wumpus World concept from Artificial Intelligence. Modified bait scheme will prevent the blackhole attack and secures network.
移动自组织网络(MANET)在具有组移动性的情况下存在网络分区问题,无法有效地为网络中的所有节点提供连接。自治移动网状网络(AMMNET)是一种新型的移动网络,它克服了移动网络的缺点,特别是网络分区的缺点。然而,amnet容易受到路由攻击,如黑洞攻击,恶意节点可以将自己伪装成组内、组间或组间的桥接路由器,从而破坏网络。为了保持连通性,网络的生存性是可靠通信的一个重要方面。在拓扑的自组织特性中,维护安全性是一个挑战。针对这一缺点,本文提出的方法在诱饵检测方案的基础上,测量了安全增强对AMMNET的影响。改进诱饵方法,防止黑洞节点进入网络,保持网络的可靠性。该方案采用了人工智能中的Wumpus World概念。改进诱饵方案,防止黑洞攻击,保障网络安全。
{"title":"Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)","authors":"Rishikesh J. Teke, M. Chaudhari, R. Prasad","doi":"10.1109/ICCIC.2015.7435739","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435739","url":null,"abstract":"The Mobile Ad-hoc Networks (MANET) are suffering from network partitioning when there is group mobility and thus cannot efficiently provide connectivity to all nodes in the network. Autonomous Mobile Mesh Network (AMMNET) is a new class of MANET which will overcome the weakness of MANET, especially from network partitioning. However, AMMNET is vulnerable to routing attacks such as Blackhole attack in which malicious node can make itself as intragroup, intergroup or intergroup bridge router and disrupt the network. In AMMNET, To maintain connectivity, network survivability is an important aspect of reliable communication. Maintaning security is a challenge in the self organising nature of the topology. To address this weakness proposed approach measured the performance of the impact of security enhancement on AMMNET with the basis of bait detection scheme. Modified bait approach that will prevent blackhole node entering into the network and helps to maintain the reliability of the network. The proposed scheme uses the idea of Wumpus World concept from Artificial Intelligence. Modified bait scheme will prevent the blackhole attack and secures network.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132106295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel Bi-level Artificial Bee Colony algorithm and its application to image segmentation 一种新的双层人工蜂群算法及其在图像分割中的应用
B. A. Dakshitha, V. Deekshitha, K. Manikantan
Image segmentation requires optimum multilevel threshold values obtained from the image in order to partition it into multiple regions. Estimating these thresholds poses a great challenge. In this paper, we propose a novel swarm intelligence technique, namely Bi-level Artificial Bee Colony (BABC) algorithm, to obtain the optimum thresholds by using the Tsallis Entropy as an objective function. BABC is used, along with a Sinusoidal Evaluation of Fitness Function (SEFF), to ensure that all the threshold values of the image are examined before arriving at the best possible solution. Experimental results show the promising performance of BABC for image segmentation as compared to other optimization algorithms like Particle Swarm Optimization (PSO), Genetic Algorithm (GA) and Bacterial Foraging (BF) Algorithm.
图像分割需要从图像中获得最优的多级阈值,以便将图像划分为多个区域。估计这些阈值是一个巨大的挑战。本文提出了一种新的群体智能技术,即双水平人工蜂群(BABC)算法,该算法以Tsallis熵为目标函数来获取最优阈值。BABC与正弦适应度评估函数(SEFF)一起使用,以确保在到达最佳可能解决方案之前检查图像的所有阈值。实验结果表明,与粒子群算法(Particle Swarm optimization, PSO)、遗传算法(Genetic Algorithm, GA)和细菌觅食算法(Bacterial Foraging, BF)等优化算法相比,BABC算法在图像分割方面具有良好的性能。
{"title":"A novel Bi-level Artificial Bee Colony algorithm and its application to image segmentation","authors":"B. A. Dakshitha, V. Deekshitha, K. Manikantan","doi":"10.1109/ICCIC.2015.7435656","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435656","url":null,"abstract":"Image segmentation requires optimum multilevel threshold values obtained from the image in order to partition it into multiple regions. Estimating these thresholds poses a great challenge. In this paper, we propose a novel swarm intelligence technique, namely Bi-level Artificial Bee Colony (BABC) algorithm, to obtain the optimum thresholds by using the Tsallis Entropy as an objective function. BABC is used, along with a Sinusoidal Evaluation of Fitness Function (SEFF), to ensure that all the threshold values of the image are examined before arriving at the best possible solution. Experimental results show the promising performance of BABC for image segmentation as compared to other optimization algorithms like Particle Swarm Optimization (PSO), Genetic Algorithm (GA) and Bacterial Foraging (BF) Algorithm.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Control parameter adaptation strategies for mutation and crossover rates of differential evolution algorithm - An insight 差分进化算法中变异和交叉率的控制参数自适应策略
P. Pranav, G. Jeyakumar
Differential Evolution (DE), an optimization algorithm under the roof of Evolutionary Algorithms (EAs), is well known for its efficiency in solving optimization problems which are non-linear and non-differentiable. DE has many good qualities such as algorithmic simplicity, robustness and reliability. DE also has the quality of solving the given problem with few control parameters (NP - population size, F - mutation rate and Cr - crossover rate). However, suitable setting of values to these parameters is a complicated task. Hence, various adaptation strategies to tune these parameters during the run of DE algorithm are proposed in the literature. Choosing the right adaptation strategy itself is another difficult task, which need in-depth understanding of existing adaptation strategies. The aim of this paper is to summarize various adaptation strategies proposed in DE literature for adapting F and Cr. The adaptation strategies are categorized based on the logic used by the authors for adaptation, and brief insights about each of the categories along with the corresponding adaptation strategies are presented.
差分进化算法是进化算法中的一种优化算法,以其解决非线性和不可微优化问题的效率而闻名。DE具有算法简单、鲁棒性和可靠性等优点。DE还具有用较少的控制参数(NP -种群规模、F -突变率和Cr -交叉率)求解给定问题的特性。然而,为这些参数设置合适的值是一项复杂的任务。因此,文献中提出了各种自适应策略来调整DE算法运行过程中的这些参数。选择合适的适应策略本身也是一项艰巨的任务,需要深入了解现有的适应策略。本文的目的是总结DE文献中提出的适应F和Cr的各种适应策略,并根据作者的适应逻辑对适应策略进行分类,并简要介绍每种类型的适应策略以及相应的适应策略。
{"title":"Control parameter adaptation strategies for mutation and crossover rates of differential evolution algorithm - An insight","authors":"P. Pranav, G. Jeyakumar","doi":"10.1109/ICCIC.2015.7435788","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435788","url":null,"abstract":"Differential Evolution (DE), an optimization algorithm under the roof of Evolutionary Algorithms (EAs), is well known for its efficiency in solving optimization problems which are non-linear and non-differentiable. DE has many good qualities such as algorithmic simplicity, robustness and reliability. DE also has the quality of solving the given problem with few control parameters (NP - population size, F - mutation rate and Cr - crossover rate). However, suitable setting of values to these parameters is a complicated task. Hence, various adaptation strategies to tune these parameters during the run of DE algorithm are proposed in the literature. Choosing the right adaptation strategy itself is another difficult task, which need in-depth understanding of existing adaptation strategies. The aim of this paper is to summarize various adaptation strategies proposed in DE literature for adapting F and Cr. The adaptation strategies are categorized based on the logic used by the authors for adaptation, and brief insights about each of the categories along with the corresponding adaptation strategies are presented.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126508970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1