首页 > 最新文献

2013 3rd IEEE International Advance Computing Conference (IACC)最新文献

英文 中文
Design and development of digital PID controller for DC motor drive system using embedded platform for mobile robot 基于嵌入式移动机器人平台的直流电机驱动系统数字PID控制器的设计与开发
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514193
C. S. Gohiya, S. Sadistap, S. A. Akbar, B. Botre
In Agriculture industry, plants are prone to diseases caused by pathogens and environment conditions and it is a prime cause to lose of revenue. It requires continuous monitoring of plants and environment parameters to overcome this problem. A mobile Robotic system for monitoring these parameters using wireless network has been envisaged here and developed based on ARM-Linux platform. Robotic platform consists of ARM9 based S3C2440 processor from SAMSUNG and Linux Kernel , Motor driver, robot mechanical assembly. The farm environment and plant condition such as temperature, humidity soil moisture content etc. are continuously monitored through suitable data acquisition system incorporated in the robotic system. A servo motor based robotic arm is designed for collecting soil sample and test various soil parameters. A closed loop feedback algorithm based on Digital PID controller has been developed for precise position and speed control of mobile robot. The wireless control of mobile robot and monitored data acquisition is accomplished using zigbee wireless protocol. For displaying acquired data on host system a Graphical user interface is designed using qt creater framework. For independent functioning of mobile robot, application program is written in c language and cross compiled using arm-linux-gcc compiler on Ubuntu 10.04 platform and ported on the memory of ARM processor.
在农业工业中,植物容易受到病原体和环境条件的影响,是造成收入损失的主要原因。为了克服这个问题,需要对植物和环境参数进行持续监测。本文设想了一种基于ARM-Linux平台的移动机器人系统,利用无线网络监测这些参数。机器人平台由基于ARM9的三星S3C2440处理器和Linux内核、电机驱动、机器人机械装配组成。通过机器人系统中合适的数据采集系统,持续监测农场环境和植物状况,如温度、湿度、土壤含水量等。设计了一种基于伺服电机的机械臂,用于采集土壤样品和测试各种土壤参数。为了实现移动机器人的精确位置和速度控制,提出了一种基于数字PID控制器的闭环反馈算法。采用zigbee无线协议实现了移动机器人的无线控制和监控数据的采集。为了在主机系统上显示采集到的数据,利用qt creator框架设计了一个图形用户界面。为了实现移动机器人的独立运行,应用程序采用c语言编写,在Ubuntu 10.04平台下使用ARM -linux-gcc编译器进行交叉编译,移植到ARM处理器的内存上。
{"title":"Design and development of digital PID controller for DC motor drive system using embedded platform for mobile robot","authors":"C. S. Gohiya, S. Sadistap, S. A. Akbar, B. Botre","doi":"10.1109/IADCC.2013.6514193","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514193","url":null,"abstract":"In Agriculture industry, plants are prone to diseases caused by pathogens and environment conditions and it is a prime cause to lose of revenue. It requires continuous monitoring of plants and environment parameters to overcome this problem. A mobile Robotic system for monitoring these parameters using wireless network has been envisaged here and developed based on ARM-Linux platform. Robotic platform consists of ARM9 based S3C2440 processor from SAMSUNG and Linux Kernel , Motor driver, robot mechanical assembly. The farm environment and plant condition such as temperature, humidity soil moisture content etc. are continuously monitored through suitable data acquisition system incorporated in the robotic system. A servo motor based robotic arm is designed for collecting soil sample and test various soil parameters. A closed loop feedback algorithm based on Digital PID controller has been developed for precise position and speed control of mobile robot. The wireless control of mobile robot and monitored data acquisition is accomplished using zigbee wireless protocol. For displaying acquired data on host system a Graphical user interface is designed using qt creater framework. For independent functioning of mobile robot, application program is written in c language and cross compiled using arm-linux-gcc compiler on Ubuntu 10.04 platform and ported on the memory of ARM processor.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Model for drain current based on the exponential distribution of tail states for nanocrystalline silicon thin film transistor 基于尾态指数分布的纳米晶硅薄膜晶体管漏极电流模型
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514459
P. Sharma, N. Gupta
In this paper we have modeled the drain current based on the exponential distribution of tail states for nanocrystalline silicon thin film transistor (nc-Si TFT). The degradation of mobility due to the presence of acoustic phonons and interface roughness are taken into account. The model thus developed has been simulated for two different aspect ratios (W/L= 400 μm / 20 μm and W/L = 400 μm / 8 μm), the shape of the curves obtained are similar to the experimental ones validating the developed model.
本文根据纳米晶硅薄膜晶体管(nc-Si TFT)尾态的指数分布,建立了漏极电流的模型。由于声子和界面粗糙度的存在,迁移率的退化被考虑在内。在宽高比(W/L= 400 μm / 20 μm)和宽高比(W/L= 400 μm / 8 μm)两种情况下,对所建立的模型进行了仿真,得到的曲线形状与验证模型的实验曲线相似。
{"title":"Model for drain current based on the exponential distribution of tail states for nanocrystalline silicon thin film transistor","authors":"P. Sharma, N. Gupta","doi":"10.1109/IADCC.2013.6514459","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514459","url":null,"abstract":"In this paper we have modeled the drain current based on the exponential distribution of tail states for nanocrystalline silicon thin film transistor (nc-Si TFT). The degradation of mobility due to the presence of acoustic phonons and interface roughness are taken into account. The model thus developed has been simulated for two different aspect ratios (W/L= 400 μm / 20 μm and W/L = 400 μm / 8 μm), the shape of the curves obtained are similar to the experimental ones validating the developed model.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124430882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones 在智能手机中使用上下文管理(PTPACM)提出基于配置文件翻译的主动适应
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514250
P. Railkar, P. Mahalle
Mobile technology and Internet is becoming an integral part of our daily life. Various transactions like shopping, ticket booking and banking transactions have been done on the fly. The technology like Smartphone adds portability for these activities. To manage information and applications on Smartphone, user must provide credentials or profiles to service provider with their details filled by logging onto different websites. To this purpose, user's profile resides in control of multiple service providers. Due to this, duplication of data occurs which will leads to a data inconsistency. To overcome these issues, this paper proposes Profile Translation based Proactive Adaption using Context Management (PTPACM) in Smartphones which automatically generates user's profile according to the scenarios. Proposed system allows keeping user's full profile in user domain resulting into centralizing or exchanging the profile information with increase in the consistency of profile information. This paper presents the layered architecture for PTPACM with Context Awareness Layer, Proactive Analyzer Layer and Profile Translation in a system. This paper also presents probabilistic representation of PTPACM as well as pseudo codes for different operations in the functional blocks of presented architecture.
移动技术和互联网正在成为我们日常生活中不可或缺的一部分。各种各样的交易,如购物、订票和银行交易都是在飞行中完成的。像智能手机这样的技术为这些活动增加了可移植性。为了管理智能手机上的信息和应用程序,用户必须通过登录不同的网站向服务提供商提供凭据或个人资料,并填写详细信息。为此,用户的配置文件由多个服务提供者控制。因此,会出现数据重复,从而导致数据不一致。为了克服这些问题,本文提出了一种基于情境管理的智能手机配置文件翻译主动适应(PTPACM)方法,该方法可以根据场景自动生成用户的配置文件。该系统允许将用户的全部个人资料保存在用户域,从而实现个人资料信息的集中或交换,增加了个人资料信息的一致性。本文提出了PTPACM的分层体系结构,包括上下文感知层、主动分析器层和配置文件转换层。本文还给出了PTPACM的概率表示,以及在所提出的体系结构的功能块中不同操作的伪代码。
{"title":"Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones","authors":"P. Railkar, P. Mahalle","doi":"10.1109/IADCC.2013.6514250","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514250","url":null,"abstract":"Mobile technology and Internet is becoming an integral part of our daily life. Various transactions like shopping, ticket booking and banking transactions have been done on the fly. The technology like Smartphone adds portability for these activities. To manage information and applications on Smartphone, user must provide credentials or profiles to service provider with their details filled by logging onto different websites. To this purpose, user's profile resides in control of multiple service providers. Due to this, duplication of data occurs which will leads to a data inconsistency. To overcome these issues, this paper proposes Profile Translation based Proactive Adaption using Context Management (PTPACM) in Smartphones which automatically generates user's profile according to the scenarios. Proposed system allows keeping user's full profile in user domain resulting into centralizing or exchanging the profile information with increase in the consistency of profile information. This paper presents the layered architecture for PTPACM with Context Awareness Layer, Proactive Analyzer Layer and Profile Translation in a system. This paper also presents probabilistic representation of PTPACM as well as pseudo codes for different operations in the functional blocks of presented architecture.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RSS based detection and expulsion of malicious users from cooperative sensing in Cognitive Radios 基于RSS的认知无线电协同感知恶意用户检测与驱逐
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514217
S. Yadav, M. Nene
In recent past there has been an increasing interest in wireless communication applications owing to its ease of use, cost effectiveness, maintainability and ease of deployment. Consequently, a number of wireless systems have been developed and deployed, thereby, leading to a belief that frequency spectrum is slowly running out of usable frequencies. Concept of Cognitive Radio (CR) has been proposed to overcome this issue of spectrum scarcity by making use of opportunistic spectrum access. Along with CRs, new types of security threats have evolved e.g. Primary User Emulation Attack (PUEA) and Spectrum Sensing Data Falsification (SSDF) attack. This paper introduces a simple yet efficient technique to counter the SSDF attack. Rigorous survey study shows that a handful of techniques are proposed to counter SSDF attack. The results show that the proposed techniques fail when malicious secondary users outnumber the genuine secondary users, which is a possible threat scenario in CR networks. We propose a technique that is independent of the number of malicious SUs in the network. It makes use of primary user's Received Signal Strength (RSS) at an SU to localize its position and compare this with that calculated using received signal strength of SU transmissions at data fusion center.
近年来,由于无线通信应用的易用性、成本效益、可维护性和易于部署,人们对其越来越感兴趣。因此,已经开发和部署了许多无线系统,从而导致人们相信频谱正在慢慢耗尽可用的频率。认知无线电(CR)概念的提出是为了利用机会性频谱接入来克服频谱稀缺的问题。随着cr的出现,新的安全威胁类型也在不断发展,例如主用户仿真攻击(PUEA)和频谱感知数据伪造(SSDF)攻击。本文介绍了一种简单而有效的对抗SSDF攻击的技术。严格的调查研究表明,提出了一些技术来对抗SSDF攻击。结果表明,当恶意辅助用户数量超过真实辅助用户数量时,所提出的技术失效,这是CR网络中可能存在的威胁场景。我们提出了一种独立于网络中恶意SUs数量的技术。它利用主用户在某一SU处的接收信号强度(RSS)来定位其位置,并将其与在数据融合中心使用SU传输的接收信号强度计算得到的位置进行比较。
{"title":"RSS based detection and expulsion of malicious users from cooperative sensing in Cognitive Radios","authors":"S. Yadav, M. Nene","doi":"10.1109/IADCC.2013.6514217","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514217","url":null,"abstract":"In recent past there has been an increasing interest in wireless communication applications owing to its ease of use, cost effectiveness, maintainability and ease of deployment. Consequently, a number of wireless systems have been developed and deployed, thereby, leading to a belief that frequency spectrum is slowly running out of usable frequencies. Concept of Cognitive Radio (CR) has been proposed to overcome this issue of spectrum scarcity by making use of opportunistic spectrum access. Along with CRs, new types of security threats have evolved e.g. Primary User Emulation Attack (PUEA) and Spectrum Sensing Data Falsification (SSDF) attack. This paper introduces a simple yet efficient technique to counter the SSDF attack. Rigorous survey study shows that a handful of techniques are proposed to counter SSDF attack. The results show that the proposed techniques fail when malicious secondary users outnumber the genuine secondary users, which is a possible threat scenario in CR networks. We propose a technique that is independent of the number of malicious SUs in the network. It makes use of primary user's Received Signal Strength (RSS) at an SU to localize its position and compare this with that calculated using received signal strength of SU transmissions at data fusion center.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121078221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Clustering techniques for streaming data-a survey 流数据的聚类技术——调查
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514355
Y. Yogita, Durga Toshniwal
Nowadays many applications are generating streaming data for an example real-time surveillance, internet traffic, sensor data, health monitoring systems, communication networks, online transactions in the financial market and so on. Data Streams are temporally ordered, fast changing, massive, and potentially infinite sequence of data. Data Stream mining is a very challenging problem. This is due to the fact that data streams are of tremendous volume and flows at very high speed which makes it impossible to store and scan streaming data multiple time. Concept evolution in streaming data further magnifies the challenge of working with streaming data. Clustering is a data stream mining task which is very useful to gain insight of data and data characteristics. Clustering is also used as a pre-processing step in over all mining process for an example clustering is used for outlier detection and for building classification model. In this paper we will focus on the challenges and necessary features of data stream clustering techniques, review and compare the literature for data stream clustering by example and variable, describe some real world applications of data stream clustering, and tools for data stream clustering.
如今,许多应用都在生成流数据,例如实时监控、互联网流量、传感器数据、健康监测系统、通信网络、金融市场在线交易等。数据流是暂时有序的、快速变化的、大量的、可能无限的数据序列。数据流挖掘是一个非常具有挑战性的问题。这是因为数据流具有巨大的容量和非常高的速度,因此不可能多次存储和扫描流数据。流数据中的概念演变进一步放大了处理流数据的挑战。聚类是一种数据流挖掘任务,对于深入了解数据和数据特征非常有用。聚类也被用作整体挖掘过程的预处理步骤,例如聚类用于异常点检测和分类模型的建立。在本文中,我们将重点讨论数据流聚类技术的挑战和必要特征,通过实例和变量对数据流聚类的文献进行回顾和比较,描述数据流聚类的一些实际应用,以及数据流聚类的工具。
{"title":"Clustering techniques for streaming data-a survey","authors":"Y. Yogita, Durga Toshniwal","doi":"10.1109/IADCC.2013.6514355","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514355","url":null,"abstract":"Nowadays many applications are generating streaming data for an example real-time surveillance, internet traffic, sensor data, health monitoring systems, communication networks, online transactions in the financial market and so on. Data Streams are temporally ordered, fast changing, massive, and potentially infinite sequence of data. Data Stream mining is a very challenging problem. This is due to the fact that data streams are of tremendous volume and flows at very high speed which makes it impossible to store and scan streaming data multiple time. Concept evolution in streaming data further magnifies the challenge of working with streaming data. Clustering is a data stream mining task which is very useful to gain insight of data and data characteristics. Clustering is also used as a pre-processing step in over all mining process for an example clustering is used for outlier detection and for building classification model. In this paper we will focus on the challenges and necessary features of data stream clustering techniques, review and compare the literature for data stream clustering by example and variable, describe some real world applications of data stream clustering, and tools for data stream clustering.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Prevention of ARP spoofing: A probe packet based technique 防止ARP欺骗:一种基于探测包的技术
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514211
P. Pandey
In today's competitive world consideration of maintaining the security of information is must. Nowadays LAN is generally the most common and popular network domain. Network domains are always prone to number of network attacks. One of the most dangerous form of such network attacks is ARP Cache Poisoning also known as ARP Spoofing. ARP is a stateless protocol and ARP Spoofing takes place mainly because it lacks any mechanism of verifying the identity of sending host. It has been seen that most of the LAN attacks results from ARP Spoofing. So prevention, detection and mitigation of this problem can stop number of network attacks. ARP Spoofing is the act of vindictively changing the IP,MAC associations stored in ARP cache of any network host. In this paper we have proposed a probe based technique with an Enhanced Spoof Detection Engine (E- SDE) which not only detects ARP Spoofing but also identifies the genuine IP,MAC association. ARP and ICMP packets have been used as probe packets. Working of E-SDE is explained with the help of algorithm. We have also proposed an attacking model to clearly understand the incremental development of E-SDE to work effectively against most of the type of attackers. We have also measured the network traffic added by the proposed technique.
在当今竞争激烈的世界中,维护信息安全是必须考虑的问题。局域网是当今最普遍、最流行的网络领域。网络域是网络攻击的多发区域。这种网络攻击中最危险的形式之一是ARP缓存中毒,也称为ARP欺骗。ARP是一种无状态协议,ARP欺骗的发生主要是因为它缺乏验证发送主机身份的机制。我们已经看到,大多数局域网攻击都是ARP欺骗的结果。因此,对该问题的预防、检测和缓解可以阻止大量的网络攻击。ARP欺骗是报复性地改变存储在任何网络主机的ARP缓存中的IP,MAC关联的行为。本文提出了一种基于探针的增强型欺骗检测引擎(E- SDE)技术,该技术不仅可以检测ARP欺骗,还可以识别真实的IP、MAC关联。已经使用ARP和ICMP报文作为探测报文。借助算法对E-SDE的工作原理进行了说明。我们还提出了一个攻击模型,以清楚地理解E-SDE的增量发展,从而有效地对抗大多数类型的攻击者。我们还测量了该技术所增加的网络流量。
{"title":"Prevention of ARP spoofing: A probe packet based technique","authors":"P. Pandey","doi":"10.1109/IADCC.2013.6514211","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514211","url":null,"abstract":"In today's competitive world consideration of maintaining the security of information is must. Nowadays LAN is generally the most common and popular network domain. Network domains are always prone to number of network attacks. One of the most dangerous form of such network attacks is ARP Cache Poisoning also known as ARP Spoofing. ARP is a stateless protocol and ARP Spoofing takes place mainly because it lacks any mechanism of verifying the identity of sending host. It has been seen that most of the LAN attacks results from ARP Spoofing. So prevention, detection and mitigation of this problem can stop number of network attacks. ARP Spoofing is the act of vindictively changing the IP,MAC associations stored in ARP cache of any network host. In this paper we have proposed a probe based technique with an Enhanced Spoof Detection Engine (E- SDE) which not only detects ARP Spoofing but also identifies the genuine IP,MAC association. ARP and ICMP packets have been used as probe packets. Working of E-SDE is explained with the help of algorithm. We have also proposed an attacking model to clearly understand the incremental development of E-SDE to work effectively against most of the type of attackers. We have also measured the network traffic added by the proposed technique.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An efficient wavelet based approach for texture classification with feature analysis 基于小波特征分析的纹理分类方法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514389
M. Shaikhji Zaid, R. Jagadish Jadhav, P. Deore
Textures play important roles in many image processing applications, since images of real objects often do not exhibit regions of uniform and smooth intensities, but variations of intensities with certain repeated structures or patterns, referred to as visual texture. The textural patterns or structures mainly result from the physical surface properties, such as roughness or oriented structured of a tactile quality. It is widely recognized that a visual texture, which can easily perceive, is very difficult to define. The difficulty results mainly from the fact that different people can define textures in applications dependent ways or with different perceptual motivations, and they are not generally agreed upon single definition of texture [1]. The development in multi-resolution analysis such as Gabor and wavelet transform help to overcome this difficulty [2]. In this paper it describes that, texture classification using Wavelet Statistical Features (WSF), Wavelet Co-occurrence Features (WCF) and to combine both the features namely Wavelet Statistical Features and Wavelet Co-occurrence Features of wavelet transformed images with different feature databases can results better [2]. And further the Features are analyzed introducing Noise (Gaussian, Poisson, Salt n Paper and Speckle) in the image to be classified. The result suggests that the efficiency of Wavelet Statistical Feature is higher in classification even in noise as compared to other Features efficiency. Wavelet based decomposing is used to classify the image with code prepared in MATLAB.
纹理在许多图像处理应用中起着重要的作用,因为真实物体的图像通常不会表现出均匀和平滑的强度区域,而是具有某些重复结构或模式的强度变化,称为视觉纹理。纹理模式或结构主要是由物理表面特性造成的,如粗糙度或触觉质量的定向结构。人们普遍认为视觉纹理很容易被感知,但却很难被定义。困难的主要原因是,不同的人可以根据不同的应用程序或不同的感知动机来定义纹理,他们并不普遍同意单一的纹理定义[1]。Gabor和小波变换等多分辨率分析的发展有助于克服这一困难。本文描述了利用小波统计特征(WSF)、小波共生特征(WCF)以及将小波变换图像的小波统计特征和小波共生特征与不同的特征库结合起来进行纹理分类可以得到更好的[2]。在此基础上,对待分类图像进行特征分析,并引入高斯噪声、泊松噪声、盐纸噪声和散斑噪声。结果表明,小波统计特征在噪声下的分类效率高于其他特征。采用小波分解对图像进行分类,并在MATLAB中编写代码。
{"title":"An efficient wavelet based approach for texture classification with feature analysis","authors":"M. Shaikhji Zaid, R. Jagadish Jadhav, P. Deore","doi":"10.1109/IADCC.2013.6514389","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514389","url":null,"abstract":"Textures play important roles in many image processing applications, since images of real objects often do not exhibit regions of uniform and smooth intensities, but variations of intensities with certain repeated structures or patterns, referred to as visual texture. The textural patterns or structures mainly result from the physical surface properties, such as roughness or oriented structured of a tactile quality. It is widely recognized that a visual texture, which can easily perceive, is very difficult to define. The difficulty results mainly from the fact that different people can define textures in applications dependent ways or with different perceptual motivations, and they are not generally agreed upon single definition of texture [1]. The development in multi-resolution analysis such as Gabor and wavelet transform help to overcome this difficulty [2]. In this paper it describes that, texture classification using Wavelet Statistical Features (WSF), Wavelet Co-occurrence Features (WCF) and to combine both the features namely Wavelet Statistical Features and Wavelet Co-occurrence Features of wavelet transformed images with different feature databases can results better [2]. And further the Features are analyzed introducing Noise (Gaussian, Poisson, Salt n Paper and Speckle) in the image to be classified. The result suggests that the efficiency of Wavelet Statistical Feature is higher in classification even in noise as compared to other Features efficiency. Wavelet based decomposing is used to classify the image with code prepared in MATLAB.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125091732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Intelligent computing in a system of systems environment: A case of tourism industrial analysis and policy making 系统环境下的智能计算:旅游产业分析与决策案例
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514195
L. Bai
As computer and information technologies advance, intelligent computing begins to play more and more important role in industrial management. However, new phenomena continue to emerge in many industries' evolution processes, thereby limiting the effectiveness of conventional systems approaches as a basis for intelligent computing applications. Therefore, it becomes critical to recognize the nature and manifestation of a system of systems (SoS) environment, and to develop a corresponding pathway to holistic intelligent computing methodology. This paper discusses the intelligence computing process and suggests that the key application fields in challenging system of systems environment include SoS complexity, indistinction of component boundaries, hidden systems processes, holistic emergent behaviors, uncertainty and unpredictability. Furthermore, taking tourism as an example of typical complex industrial SoS, a technical system of systems engineering framework is presented as a basis for industrial analysis and policy making process. The framework focuses: 1) SoS virtualization through geographical intelligent computing; 2) SoS process simulation using network algorithms; 3) SoS evaluation though progressive analysis approach. This integrated methodology is to be tested in empirical study. Though SoS engineering remains full of challenges and opportunities, exploration of its role and its coupling with intelligent computing in complex task of managing industrial systems will have tremendous influence to management discipline.
随着计算机和信息技术的发展,智能计算开始在工业管理中发挥越来越重要的作用。然而,在许多行业的发展过程中不断出现新的现象,从而限制了传统系统方法作为智能计算应用基础的有效性。因此,认识系统的系统(SoS)环境的性质和表现,并开发相应的整体智能计算方法的途径变得至关重要。本文讨论了智能计算过程,提出了系统环境下挑战性系统的关键应用领域包括系统复杂性、组件边界不区分、隐藏系统过程、整体涌现行为、不确定性和不可预测性。并以旅游业为例,提出了一个系统工程框架的技术体系,作为产业分析和决策过程的基础。该框架的重点是:1)通过地理智能计算实现SoS虚拟化;2)基于网络算法的SoS过程仿真;3)采用递进分析法进行SoS评价。这种综合方法有待于实证研究的检验。尽管SoS工程仍然充满挑战和机遇,但探索其在复杂的工业系统管理任务中的作用及其与智能计算的耦合将对管理学科产生巨大影响。
{"title":"Intelligent computing in a system of systems environment: A case of tourism industrial analysis and policy making","authors":"L. Bai","doi":"10.1109/IADCC.2013.6514195","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514195","url":null,"abstract":"As computer and information technologies advance, intelligent computing begins to play more and more important role in industrial management. However, new phenomena continue to emerge in many industries' evolution processes, thereby limiting the effectiveness of conventional systems approaches as a basis for intelligent computing applications. Therefore, it becomes critical to recognize the nature and manifestation of a system of systems (SoS) environment, and to develop a corresponding pathway to holistic intelligent computing methodology. This paper discusses the intelligence computing process and suggests that the key application fields in challenging system of systems environment include SoS complexity, indistinction of component boundaries, hidden systems processes, holistic emergent behaviors, uncertainty and unpredictability. Furthermore, taking tourism as an example of typical complex industrial SoS, a technical system of systems engineering framework is presented as a basis for industrial analysis and policy making process. The framework focuses: 1) SoS virtualization through geographical intelligent computing; 2) SoS process simulation using network algorithms; 3) SoS evaluation though progressive analysis approach. This integrated methodology is to be tested in empirical study. Though SoS engineering remains full of challenges and opportunities, exploration of its role and its coupling with intelligent computing in complex task of managing industrial systems will have tremendous influence to management discipline.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"33 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Visual Cryptographic shares using Public Key Encryption 使用公钥加密保护可视化加密共享
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514382
K. Kaur, V. Khemchandani
The Visual Cryptography Scheme is a secure method that encrypts a secret document or image by breaking it into shares. A distinctive property of Visual Cryptography Scheme is that one can visually decode the secret image by superimposing shares without computation. By taking the advantage of this property, third person can easily retrieve the secret image if shares are passing in sequence over the network. The project presents an approach for encrypting visual cryptographically generated image shares using Public Key Encryption. RSA algorithm is used for providing the double security of secret document. Thus secret share are not available in their actual form for any alteration by the adversaries who try to create fake shares. The scheme provides more secure secret shares that are robust against a number of attacks & the system provides a strong security for the handwritten text, images and printed documents over the public network.
可视化加密方案是一种安全的方法,它通过将秘密文档或图像分解为共享来加密它。视觉密码学方案的一个独特的特性是可以在不计算的情况下,通过叠加共享来视觉解码秘密图像。通过利用这一特性,如果共享在网络上按顺序传递,第三方可以很容易地检索到秘密图像。该项目提出了一种使用公钥加密对可视化加密生成的图像共享进行加密的方法。采用RSA算法对机密文件进行双重安全保护。因此,秘密共享无法以其实际形式被试图创建虚假共享的对手进行任何更改。该方案提供了更安全的秘密共享,可以抵御多种攻击&该系统为公共网络上的手写文本,图像和打印文档提供了强大的安全性。
{"title":"Securing Visual Cryptographic shares using Public Key Encryption","authors":"K. Kaur, V. Khemchandani","doi":"10.1109/IADCC.2013.6514382","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514382","url":null,"abstract":"The Visual Cryptography Scheme is a secure method that encrypts a secret document or image by breaking it into shares. A distinctive property of Visual Cryptography Scheme is that one can visually decode the secret image by superimposing shares without computation. By taking the advantage of this property, third person can easily retrieve the secret image if shares are passing in sequence over the network. The project presents an approach for encrypting visual cryptographically generated image shares using Public Key Encryption. RSA algorithm is used for providing the double security of secret document. Thus secret share are not available in their actual form for any alteration by the adversaries who try to create fake shares. The scheme provides more secure secret shares that are robust against a number of attacks & the system provides a strong security for the handwritten text, images and printed documents over the public network.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122892760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Goodwill based scheduling algorithm for economy grid 基于商誉的经济网格调度算法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514194
S. Bansal, C. Hota
The conventional deadline and budget constrained scheduling heuristics for economics-based computational grids do not consider goodwill of resources, that could lead to an increase in application cost and execution time. This paper proposes a new scheduling algorithm that not only considers resource cost and time but also considers goodwill when resources are selected. Resources goodwill is calculated based on their past performances. Goodwill is broader and more representative characteristic than reliability of a resource to use as criterion for selecting the resource for execution. Goodwill criterion takes into account “on time performance” of a resource calculated as real time basis where reliability criterion works on a predefined static term expressed by the system designer. The Gridsim toolkit, standard workload model and resource configuration was used to simulate the grid environment and application. The experimental results show that the average overall time and cost of parallel tasks are lesser than existing approaches.
传统的基于经济的计算网格的截止日期和预算约束调度启发式方法没有考虑资源的商度,这可能导致应用程序成本和执行时间的增加。本文提出了一种既考虑资源成本和时间又考虑商誉的调度算法。资源商誉是根据其过去的业绩计算的。作为选择执行资源的标准,商誉是比资源的可靠性更广泛和更具代表性的特征。商誉准则考虑资源的“准时性能”作为实时计算的基础,而可靠性准则是在系统设计者表示的预定义静态项上工作的。使用Gridsim工具包、标准工作负载模型和资源配置来模拟网格环境和应用程序。实验结果表明,并行任务的平均总时间和成本比现有方法要小。
{"title":"Goodwill based scheduling algorithm for economy grid","authors":"S. Bansal, C. Hota","doi":"10.1109/IADCC.2013.6514194","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514194","url":null,"abstract":"The conventional deadline and budget constrained scheduling heuristics for economics-based computational grids do not consider goodwill of resources, that could lead to an increase in application cost and execution time. This paper proposes a new scheduling algorithm that not only considers resource cost and time but also considers goodwill when resources are selected. Resources goodwill is calculated based on their past performances. Goodwill is broader and more representative characteristic than reliability of a resource to use as criterion for selecting the resource for execution. Goodwill criterion takes into account “on time performance” of a resource calculated as real time basis where reliability criterion works on a predefined static term expressed by the system designer. The Gridsim toolkit, standard workload model and resource configuration was used to simulate the grid environment and application. The experimental results show that the average overall time and cost of parallel tasks are lesser than existing approaches.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2013 3rd IEEE International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1