Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528578
S. Uma, S. Manikandan
This paper focuses on optimization algorithm of wind power tracking control system. Using the system to capture maximum wind power from the wind energy conversion system(WECS). The system consists of variable speed wind turbine with direct drive Permanent Magnet Synchronous Generator (PMSG). The simulation model is developed for the wind turbine power generation system to obtain maximum p o w e r from the incident wind. The PI controller along with Maximum Power Point Tracking (MPPT) is used in the model. The input voltage to the inverter was maintained. Simulation results show that the controller can extract maximum power.
{"title":"Control technique for variable speed wind turbine using PI controller","authors":"S. Uma, S. Manikandan","doi":"10.1109/ICE-CCN.2013.6528578","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528578","url":null,"abstract":"This paper focuses on optimization algorithm of wind power tracking control system. Using the system to capture maximum wind power from the wind energy conversion system(WECS). The system consists of variable speed wind turbine with direct drive Permanent Magnet Synchronous Generator (PMSG). The simulation model is developed for the wind turbine power generation system to obtain maximum p o w e r from the incident wind. The PI controller along with Maximum Power Point Tracking (MPPT) is used in the model. The input voltage to the inverter was maintained. Simulation results show that the controller can extract maximum power.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124095202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528495
A. Kiruthika, A. Rajan, P. Rajalakshmi
Brushless DC motor are rapidly gaining popularity due to its high efficiency and accurate control characteristics. For any industrial and domestic application it is necessary to control the speed accurately. The drawbacks of the conventional PID controllers for the speed control can be minimized using Fuzzy PID controller. This paper aims at the design of Fuzzy PID controller for a BLDC motor inorder to dynamically update the parameters of PID controller. The mathematical modelling of the motor along with the controller is derived for the specific BLDC motor. The simulation is done on MATLAB/SIMULINK environment to verify the control characteristics of the Fuzzy PID controller.
{"title":"Mathematical modelling and speed control of a sensored brushless DC motor using intelligent controller","authors":"A. Kiruthika, A. Rajan, P. Rajalakshmi","doi":"10.1109/ICE-CCN.2013.6528495","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528495","url":null,"abstract":"Brushless DC motor are rapidly gaining popularity due to its high efficiency and accurate control characteristics. For any industrial and domestic application it is necessary to control the speed accurately. The drawbacks of the conventional PID controllers for the speed control can be minimized using Fuzzy PID controller. This paper aims at the design of Fuzzy PID controller for a BLDC motor inorder to dynamically update the parameters of PID controller. The mathematical modelling of the motor along with the controller is derived for the specific BLDC motor. The simulation is done on MATLAB/SIMULINK environment to verify the control characteristics of the Fuzzy PID controller.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528476
A. Koul, A. Bahuguna, A. Singh, A. Pandita, M. K. Pattanshetti, R. Goudar
Internet users in the current digital age are increasingly using world wide web not only for entertainment but also for accessing information related to different topics. Our system aims at developing a web based environment that brings most of the information required by a user at one place. When a user searches a topic on the web, a lot of results are shown to the user which may or may not be relevant to the user. In our system, a user will be able to create shared bookmarks and save the links which would be relevant, so the user can access those links later also. Moreover when a user will search for a topic, the results shown to the user will be intelligently selected from the results that are searched by different users. This system will use concept of multiperspective thinking as well as implementation of intelligent user behavior for showing relevant links for a topic.
{"title":"AWES: Adaptive web exploration system based on similar user behavior and multiperspective thinking","authors":"A. Koul, A. Bahuguna, A. Singh, A. Pandita, M. K. Pattanshetti, R. Goudar","doi":"10.1109/ICE-CCN.2013.6528476","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528476","url":null,"abstract":"Internet users in the current digital age are increasingly using world wide web not only for entertainment but also for accessing information related to different topics. Our system aims at developing a web based environment that brings most of the information required by a user at one place. When a user searches a topic on the web, a lot of results are shown to the user which may or may not be relevant to the user. In our system, a user will be able to create shared bookmarks and save the links which would be relevant, so the user can access those links later also. Moreover when a user will search for a topic, the results shown to the user will be intelligently selected from the results that are searched by different users. This system will use concept of multiperspective thinking as well as implementation of intelligent user behavior for showing relevant links for a topic.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528465
R. Sathish, D. R. Kumar
Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In this paper we survey different efficient algorithms to detect the clone attacks in the Wireless Sensor Networks. We compare these algorithms considering various complexity metrics.
{"title":"Proficient algorithms for replication attack detection in Wireless Sensor Networks — A survey","authors":"R. Sathish, D. R. Kumar","doi":"10.1109/ICE-CCN.2013.6528465","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528465","url":null,"abstract":"Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In this paper we survey different efficient algorithms to detect the clone attacks in the Wireless Sensor Networks. We compare these algorithms considering various complexity metrics.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128462110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528605
N. Nishanth, B. Sathyabhama
The clock system consisting of clock distribution networks and sequential elements is most power consuming VLSI components. Reductions of flip flop, power consumption have a deep impact on the total power consumption. Since power consumption is a major bottleneck of system performance, the clock load should be reduced to reduce the power consumption. The clock distribution network distributes the clock signal from a common point to all the elements that need it. Since this function is vital to synchronous system, much attention has been given to the characteristics of these clock signal and the electrical networks used in their distribution. In synchronous system clock distribution networks consumes a large amount of total power because of high operation frequency of highest capacitance. An effective way to reduce capacity of clock load is by minimizing number of clocked transistor. In low swing differential capturing flip flop system clock distribution networks consumes a large amount of chip power and there exist a more number of clocked transistor. Hence by a novel approach, clocked paired shared flip flop is used to reduce the number of local clocked transistors.
{"title":"Design of low power sequential circuit using clocked pair shared flip flop","authors":"N. Nishanth, B. Sathyabhama","doi":"10.1109/ICE-CCN.2013.6528605","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528605","url":null,"abstract":"The clock system consisting of clock distribution networks and sequential elements is most power consuming VLSI components. Reductions of flip flop, power consumption have a deep impact on the total power consumption. Since power consumption is a major bottleneck of system performance, the clock load should be reduced to reduce the power consumption. The clock distribution network distributes the clock signal from a common point to all the elements that need it. Since this function is vital to synchronous system, much attention has been given to the characteristics of these clock signal and the electrical networks used in their distribution. In synchronous system clock distribution networks consumes a large amount of total power because of high operation frequency of highest capacitance. An effective way to reduce capacity of clock load is by minimizing number of clocked transistor. In low swing differential capturing flip flop system clock distribution networks consumes a large amount of chip power and there exist a more number of clocked transistor. Hence by a novel approach, clocked paired shared flip flop is used to reduce the number of local clocked transistors.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528553
U. Yadav, P. Mohod
Most of the existing authentication system has certain drawbacks for that reason graphical passwords are most preferable authentication system where users click on images to authenticate themselves. An important usability goal of an authentication system is to support users for selecting the better password. User creates memorable password which is easy to guess by an attacker and strong system assigned passwords are difficult to memorize. So researchers of modern days gone through different alternative methods and conclude that graphical passwords are most preferable authentication system. The proposed system combines the existing cued click point technique with the persuasive feature to influence user choice, encouraging user to select more random click point which is difficult to guess.
{"title":"Adding persuasive features in graphical password to increase the capacity of KBAM","authors":"U. Yadav, P. Mohod","doi":"10.1109/ICE-CCN.2013.6528553","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528553","url":null,"abstract":"Most of the existing authentication system has certain drawbacks for that reason graphical passwords are most preferable authentication system where users click on images to authenticate themselves. An important usability goal of an authentication system is to support users for selecting the better password. User creates memorable password which is easy to guess by an attacker and strong system assigned passwords are difficult to memorize. So researchers of modern days gone through different alternative methods and conclude that graphical passwords are most preferable authentication system. The proposed system combines the existing cued click point technique with the persuasive feature to influence user choice, encouraging user to select more random click point which is difficult to guess.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122114932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528494
P. Jayakrishnan, P. V. A. Lincy, R. Niyas
The demand for better quality pictures, smaller sizes, lower energy consumption, lower cost of appliances has been a fuel for creation of better compression standards and great compression rate. The outstanding compression competence of H.264/AVC is extensively used for video conferencing, online streaming and for HD television. Context Adaptive Binary Arithmetic Coding (CABAC) encoder is a vital part in H.264/AVC (Advanced Video Coding) main and high profiles that provides a real time encoding video of ultra high resolution. CABAC compresses the components in the video signal according to the probability of those elements in a given context. CABAC encoder provides great compression rate over Context-Adaptive Variable Length Coding (CAVLC) baseline entropy encoder. An entropy encoder is a scheme used for lossless compression. A video sequence is a combination of bits which is referred as syntax element. The allocation of bits in various Syntax Elements (SE) [3] is analysed for the reduction in large amount of bit level operations involved and computational complexity involved. An optimised scheme for accessing the contexts and a Binary Arithmetic Encoder (BAE) capable of processing four bits simultaneously is presented. Hence parallelism and throughput is achieved by the means of reduction in syntax and bit level dependency. The proposed fully hardwired encoder is synthesised towards a 90nm CMOS cell library in ASIC flow using Cadence RTL Compiler.
对更高质量的图像、更小的尺寸、更低的能耗、更低的设备成本的需求已经成为创造更好的压缩标准和更高压缩率的燃料。H.264/AVC出色的压缩能力被广泛应用于视频会议、在线流媒体和高清电视。自适应二进制算术编码(CABAC)编码器是H.264/AVC (Advanced Video Coding,高级视频编码)中重要的组成部分,可提供超高分辨率的实时编码视频。CABAC根据这些元素在给定环境中的概率压缩视频信号中的分量。CABAC编码器提供了比上下文自适应变长度编码(CAVLC)基线熵编码器更高的压缩率。熵编码器是一种用于无损压缩的方案。视频序列是被称为语法元素的位的组合。分析了各种语法元素(Syntax Elements, SE)[3]中的位分配,以减少涉及的大量位级操作和涉及的计算复杂性。提出了一种访问上下文的优化方案和一种能够同时处理4位的二进制算术编码器(BAE)。因此,并行性和吞吐量是通过减少语法和位依赖来实现的。采用Cadence RTL编译器在ASIC流中将所提出的全硬连线编码器合成为90nm CMOS单元库。
{"title":"A high speed real time multi-bin CABAC encoder for ultra high resolution video","authors":"P. Jayakrishnan, P. V. A. Lincy, R. Niyas","doi":"10.1109/ICE-CCN.2013.6528494","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528494","url":null,"abstract":"The demand for better quality pictures, smaller sizes, lower energy consumption, lower cost of appliances has been a fuel for creation of better compression standards and great compression rate. The outstanding compression competence of H.264/AVC is extensively used for video conferencing, online streaming and for HD television. Context Adaptive Binary Arithmetic Coding (CABAC) encoder is a vital part in H.264/AVC (Advanced Video Coding) main and high profiles that provides a real time encoding video of ultra high resolution. CABAC compresses the components in the video signal according to the probability of those elements in a given context. CABAC encoder provides great compression rate over Context-Adaptive Variable Length Coding (CAVLC) baseline entropy encoder. An entropy encoder is a scheme used for lossless compression. A video sequence is a combination of bits which is referred as syntax element. The allocation of bits in various Syntax Elements (SE) [3] is analysed for the reduction in large amount of bit level operations involved and computational complexity involved. An optimised scheme for accessing the contexts and a Binary Arithmetic Encoder (BAE) capable of processing four bits simultaneously is presented. Hence parallelism and throughput is achieved by the means of reduction in syntax and bit level dependency. The proposed fully hardwired encoder is synthesised towards a 90nm CMOS cell library in ASIC flow using Cadence RTL Compiler.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528540
S. K. Karthikumar, M. Preethi, P. Chitra
Grid computing is becoming an important technology in distributed environment. The Main issues consider in grid computing is Load balancing, Fault tolerance and Fault recovery. This paper Focuses on Load balancing and Fault tolerance. Load balancing is an important technique by maintaining the workload properly in the sites. This article designs a Grid Scheduler, which selects the Minimum Loaded Site for the candidate set of nearest sites, Execute the job within the Grid. Then the job is dispatched to the Fault Detector based on the availability of the site. The load balancing task in the grid environment will significantly improve the performance of the grid environment. Fault tolerance is a main technique in grid environment. This technique will used to execute the job from the processor failure. To achieve high throughput and resource utilization we propose a Fair scheduling algorithm. Trails for the proposed system are conducted using Grid Simulation Toolkit (GridSim).
{"title":"Fair scheduling approach for Load balancing and Fault tolerant in grid environment","authors":"S. K. Karthikumar, M. Preethi, P. Chitra","doi":"10.1109/ICE-CCN.2013.6528540","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528540","url":null,"abstract":"Grid computing is becoming an important technology in distributed environment. The Main issues consider in grid computing is Load balancing, Fault tolerance and Fault recovery. This paper Focuses on Load balancing and Fault tolerance. Load balancing is an important technique by maintaining the workload properly in the sites. This article designs a Grid Scheduler, which selects the Minimum Loaded Site for the candidate set of nearest sites, Execute the job within the Grid. Then the job is dispatched to the Fault Detector based on the availability of the site. The load balancing task in the grid environment will significantly improve the performance of the grid environment. Fault tolerance is a main technique in grid environment. This technique will used to execute the job from the processor failure. To achieve high throughput and resource utilization we propose a Fair scheduling algorithm. Trails for the proposed system are conducted using Grid Simulation Toolkit (GridSim).","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123720034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528544
A. E. Bangera, S. Kulkarni
The paper considers modeling and analysis of a circular diaphragm Single Walled Carbon Nanotube (SWCNT) piezoresistive pressure sensor using COMSOL Multiphysics. Initially, the analysis of piezoresistivity in SWCNT by the application of strain is done both by analytical and numerical approach using MATLAB and COMSOL respectively. It is observed that both results are comparable. Thus, the analysis of the structural deformation of the piezoresistive SWCNT placed above the diaphragm which results in the change of resistance in SWCNT, which is in direct accordance with the applied pressure is performed in COMSOL Multiphysis. The simulations show that the results obtained are linear and the sensitivity of the sensor is adequate.
{"title":"Modeling and analysis of a SWCNT piezoresistive pressure sensor","authors":"A. E. Bangera, S. Kulkarni","doi":"10.1109/ICE-CCN.2013.6528544","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528544","url":null,"abstract":"The paper considers modeling and analysis of a circular diaphragm Single Walled Carbon Nanotube (SWCNT) piezoresistive pressure sensor using COMSOL Multiphysics. Initially, the analysis of piezoresistivity in SWCNT by the application of strain is done both by analytical and numerical approach using MATLAB and COMSOL respectively. It is observed that both results are comparable. Thus, the analysis of the structural deformation of the piezoresistive SWCNT placed above the diaphragm which results in the change of resistance in SWCNT, which is in direct accordance with the applied pressure is performed in COMSOL Multiphysis. The simulations show that the results obtained are linear and the sensitivity of the sensor is adequate.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127891120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528603
P. K. A. Chitra, S. Appavu
Classification in data mining is a procedure in which individual items are placed into groups based on quantitative information on one or more characteristics items and based on a training set of previously labeled items. The objective of this paper is to introduce, explain and compare the performance of the single - labeled supervised learning algorithms in R language on benchmark single labeled data set. The traditional classification algorithms like Decision Tree, Naïve Bayes, Support Vector Machine, Random Forest, Classification and Regression Trees are used under inspection. The R language is chosen to see the classification performances. Four measures (sensitivity, specificity, accuracy, F - measure) of performance here considered are based on confusion matrix, table of counts revealing the performance of algorithm's confusion regarding the true classifications. The observation of all the four performance measures lead to infer that the Decision Tree outperforms than other classification methods.
{"title":"Benchmark evaluation of classification methods for single label learning with R","authors":"P. K. A. Chitra, S. Appavu","doi":"10.1109/ICE-CCN.2013.6528603","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528603","url":null,"abstract":"Classification in data mining is a procedure in which individual items are placed into groups based on quantitative information on one or more characteristics items and based on a training set of previously labeled items. The objective of this paper is to introduce, explain and compare the performance of the single - labeled supervised learning algorithms in R language on benchmark single labeled data set. The traditional classification algorithms like Decision Tree, Naïve Bayes, Support Vector Machine, Random Forest, Classification and Regression Trees are used under inspection. The R language is chosen to see the classification performances. Four measures (sensitivity, specificity, accuracy, F - measure) of performance here considered are based on confusion matrix, table of counts revealing the performance of algorithm's confusion regarding the true classifications. The observation of all the four performance measures lead to infer that the Decision Tree outperforms than other classification methods.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124660276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}