首页 > 最新文献

2013 3rd IEEE International Advance Computing Conference (IACC)最新文献

英文 中文
EMPPC-an evolutionary model based privacy preserving technique for cloud digital data storage emppc——一种基于进化模型的云数字数据存储隐私保护技术
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514200
D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan
This paper spank out the enormity of unknown users hand on web service users' and their data protection level bump up as an issue in cloud users mind. Once hiring a data space in cloud it's the responsibility of both to accustomed the stored information's privacy and preserving it in a secret way. It is noticed by the academicians and researchers oodles and masses of privacy breaches relentlessly observable fact dealt globally. It is one of the hottest research topics. This work targets data privacy and its preservation by proposing an evolutionary approach to safeguard the confidential data stored in the cloud. It also focuses on prominent study of users' privacy need and to preserve data distorted from intermediate digital data thieves.
本文揭示了未知用户对web服务用户及其数据保护水平提升的巨大影响,这是云用户心目中的一个问题。一旦在云中租用了一个数据空间,就有责任习惯存储信息的隐私性,并以一种秘密的方式保护它。学者和研究人员注意到,在全球范围内,有大量的隐私泄露事件无情地发生。这是目前最热门的研究课题之一。这项工作针对数据隐私及其保存,提出了一种渐进的方法来保护存储在云中的机密数据。它还重点研究了用户隐私需求和保护中间数字数据窃贼扭曲的数据。
{"title":"EMPPC-an evolutionary model based privacy preserving technique for cloud digital data storage","authors":"D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan","doi":"10.1109/IADCC.2013.6514200","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514200","url":null,"abstract":"This paper spank out the enormity of unknown users hand on web service users' and their data protection level bump up as an issue in cloud users mind. Once hiring a data space in cloud it's the responsibility of both to accustomed the stored information's privacy and preserving it in a secret way. It is noticed by the academicians and researchers oodles and masses of privacy breaches relentlessly observable fact dealt globally. It is one of the hottest research topics. This work targets data privacy and its preservation by proposing an evolutionary approach to safeguard the confidential data stored in the cloud. It also focuses on prominent study of users' privacy need and to preserve data distorted from intermediate digital data thieves.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach for feature selection method TF-IDF in document clustering 一种新的文档聚类特征选择方法TF-IDF
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514339
L. Patil, M. Atique
Now a day, the text document is spontaneously increasing over the internet, e-mail and web pages and they are stored in the electronic database format. To arrange and browse the document it becomes difficult. To overcome such problem the document preprocessing, term selection, attribute reduction and maintaining the relationship between the important terms using background knowledge, WordNet, becomes an important parameters in data mining. In these paper the different stages are formed, firstly the document preprocessing is done by removing stop words, stemming is performed using porter stemmer algorithm, word net thesaurus is applied for maintaining relationship between the important terms, global unique words, and frequent word sets get generated, Secondly, data matrix is formed, and thirdly terms are extracted from the documents by using term selection approaches tf-idf, tf-df, and tf2 based on their minimum threshold value. Further each and every document terms gets preprocessed, where the frequency of each term within the document is counted for representation. The purpose of this approach is to reduce the attributes and find the effective term selection method using WordNet for better clustering accuracy. Experiments are evaluated on Reuters Transcription Subsets, wheat, trade, money grain, and ship.
如今,文本文档在互联网、电子邮件和网页上自发地增加,并以电子数据库格式存储。整理和浏览文档变得很困难。为了克服这一问题,利用背景知识WordNet对文档进行预处理、词选择、属性约简以及维护重要词之间的关系,成为数据挖掘中的一个重要参数。本文首先对文档进行预处理,去除停止词,使用波特stemmer算法进行词干提取,利用词网主题词表维护重要词与全局唯一词之间的关系,生成频繁词集;其次,形成数据矩阵;第三,采用基于最小阈值的词选择方法tf-idf、tf-df和tf2从文档中提取词。此外,每个文档术语都要进行预处理,其中计算文档中每个术语的频率以进行表示。该方法的目的是利用WordNet减少属性并找到有效的词选择方法,以获得更好的聚类精度。实验在路透社转录子集、小麦、贸易、货币谷物和船舶上进行评估。
{"title":"A novel approach for feature selection method TF-IDF in document clustering","authors":"L. Patil, M. Atique","doi":"10.1109/IADCC.2013.6514339","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514339","url":null,"abstract":"Now a day, the text document is spontaneously increasing over the internet, e-mail and web pages and they are stored in the electronic database format. To arrange and browse the document it becomes difficult. To overcome such problem the document preprocessing, term selection, attribute reduction and maintaining the relationship between the important terms using background knowledge, WordNet, becomes an important parameters in data mining. In these paper the different stages are formed, firstly the document preprocessing is done by removing stop words, stemming is performed using porter stemmer algorithm, word net thesaurus is applied for maintaining relationship between the important terms, global unique words, and frequent word sets get generated, Secondly, data matrix is formed, and thirdly terms are extracted from the documents by using term selection approaches tf-idf, tf-df, and tf2 based on their minimum threshold value. Further each and every document terms gets preprocessed, where the frequency of each term within the document is counted for representation. The purpose of this approach is to reduce the attributes and find the effective term selection method using WordNet for better clustering accuracy. Experiments are evaluated on Reuters Transcription Subsets, wheat, trade, money grain, and ship.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"679 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122975028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A noise robust edge detector for color images using Hilbert Transform 基于希尔伯特变换的彩色图像噪声鲁棒边缘检测器
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514399
A. Gupta, A. Ganguly, V. Bhateja
This paper proposes a noise robust technique to facilitate edge detection in color images contaminated with Gaussian and Speckle noises. The proposed edge detector uses the concept of Hilbert transform to perform edge sharpening and enhancement. Bilateral Filtering assists in smoothening noisy pixels without affecting high frequency edge contents. Using Bilateral Filtering as a precursor to Hilbert Transform, drastically improves the degree of noise robustness. Simulations have been carried out on medical images and the results have been validated in Gaussian and Speckle noise environment.
针对高斯噪声和散斑噪声污染的彩色图像,提出了一种噪声鲁棒性检测方法。提出的边缘检测器使用希尔伯特变换的概念进行边缘锐化和增强。双边滤波有助于平滑噪声像素而不影响高频边缘内容。利用双边滤波作为希尔伯特变换的前驱,极大地提高了噪声鲁棒性。对医学图像进行了仿真,并在高斯噪声和散斑噪声环境下对仿真结果进行了验证。
{"title":"A noise robust edge detector for color images using Hilbert Transform","authors":"A. Gupta, A. Ganguly, V. Bhateja","doi":"10.1109/IADCC.2013.6514399","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514399","url":null,"abstract":"This paper proposes a noise robust technique to facilitate edge detection in color images contaminated with Gaussian and Speckle noises. The proposed edge detector uses the concept of Hilbert transform to perform edge sharpening and enhancement. Bilateral Filtering assists in smoothening noisy pixels without affecting high frequency edge contents. Using Bilateral Filtering as a precursor to Hilbert Transform, drastically improves the degree of noise robustness. Simulations have been carried out on medical images and the results have been validated in Gaussian and Speckle noise environment.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123038274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Learning algorithms For intelligent agents based e-learning system 基于智能代理的电子学习系统的学习算法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514369
N. Pandey, Shashank Sahu, R. K. Tyagi, A. Dwivedi
Requirements are the basic entity which makes the project to be successfully implemented. In the development of the software, theses requirements must be measured accurately and correctly. The requirements of the end users may be changed with respect to different individual personality. As different requirements are given by different customers, all of them cannot be processed by single software system. In such a case, it is essential to make the changes in the software systems automatically which fulfills all the requirements of the user. Such condition is met by the systems with intelligent agents. In this paper, algorithms of intelligent agents adviser agent, personalization agent and content managing agent are proposed to automatically gather the requirements of the students and fulfill them. The algorithms are structured using reinforcement learning. Theses algorithm makes the agents to sense the needs of the students and evolve in the course of their operation. These intelligent agents are applied after the deployment of the e-learning software. All the algorithms have been implemented successfully.
需求是使项目得以成功实施的基本实体。在软件开发过程中,必须准确、正确地测量这些需求。最终用户的需求可能会根据不同的个体个性而改变。由于不同的客户有不同的需求,单个软件系统无法处理所有的需求。在这种情况下,必须在软件系统中自动进行更改,以满足用户的所有需求。具有智能主体的系统可以满足这一条件。本文提出了智能代理顾问代理、个性化代理和内容管理代理的算法来自动收集和满足学生的需求。算法是使用强化学习构建的。这些算法使智能体能够感知学生的需求,并在其运行过程中不断进化。这些智能代理是在部署电子学习软件后应用的。所有算法均已成功实现。
{"title":"Learning algorithms For intelligent agents based e-learning system","authors":"N. Pandey, Shashank Sahu, R. K. Tyagi, A. Dwivedi","doi":"10.1109/IADCC.2013.6514369","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514369","url":null,"abstract":"Requirements are the basic entity which makes the project to be successfully implemented. In the development of the software, theses requirements must be measured accurately and correctly. The requirements of the end users may be changed with respect to different individual personality. As different requirements are given by different customers, all of them cannot be processed by single software system. In such a case, it is essential to make the changes in the software systems automatically which fulfills all the requirements of the user. Such condition is met by the systems with intelligent agents. In this paper, algorithms of intelligent agents adviser agent, personalization agent and content managing agent are proposed to automatically gather the requirements of the students and fulfill them. The algorithms are structured using reinforcement learning. Theses algorithm makes the agents to sense the needs of the students and evolve in the course of their operation. These intelligent agents are applied after the deployment of the e-learning software. All the algorithms have been implemented successfully.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
E-business strategies to cut back cost of business enterprise 降低企业成本的电子商务策略
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514280
A. Siddiqui, A. F. Basha
As the time is passing and the world is becoming more virtual and online than physical. This is the time to re-establish the business and to reach more and more people throughout the world. The idea is that it should reach to maximum people living around the world i.e. the business needs to be global and online. Aim of this research paper was to find out the various ways and resources from where we can save the money in traditional business while converting it into e-business. So, the motto is to find out the areas where we can save the money in traditional business. The paper is totally based on personnel observations, others experience and own thoughts etc. Found various areas where we can save good amount of money and also the business can perform in better way. In this paper, the possibility of reducing the business cost through e-business is being explored.
随着时间的流逝,世界变得更加虚拟和在线而不是实体。现在是时候重新建立业务,并接触到世界各地越来越多的人。这个想法是,它应该达到最大的人生活在世界各地,即业务需要全球化和在线。本研究的目的是找出各种方法和资源,让我们在将传统业务转化为电子商务的同时节省资金。所以,我们的座右铭是找出我们可以在传统业务中节省资金的领域。本文完全是根据个人观察、别人的经验和自己的想法等。发现各个领域,我们可以节省大量的钱,也可以更好地开展业务。本文探讨了通过电子商务降低企业成本的可能性。
{"title":"E-business strategies to cut back cost of business enterprise","authors":"A. Siddiqui, A. F. Basha","doi":"10.1109/IADCC.2013.6514280","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514280","url":null,"abstract":"As the time is passing and the world is becoming more virtual and online than physical. This is the time to re-establish the business and to reach more and more people throughout the world. The idea is that it should reach to maximum people living around the world i.e. the business needs to be global and online. Aim of this research paper was to find out the various ways and resources from where we can save the money in traditional business while converting it into e-business. So, the motto is to find out the areas where we can save the money in traditional business. The paper is totally based on personnel observations, others experience and own thoughts etc. Found various areas where we can save good amount of money and also the business can perform in better way. In this paper, the possibility of reducing the business cost through e-business is being explored.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Clustering analysis in social network using Covering Based Rough Set 基于覆盖粗糙集的社交网络聚类分析
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514272
A. Mitra, S. R. Satapathy, S. Paul
This paper focuses on solving the problem of classification and clustering in social network by using Rough Set. When the data set consists of missing or uncertain data then the Rough set is proved to be an efficient tool. To solve a problem under the domain of social network, the problem must satisfy the fundamental property of rough set i.e., the attribute of the problem must holds true for equivalence relation. Hence, before implementing rough set to the specific problem of social network, it must be redefined in a way that properties of transitive, symmetric and reflexive should holds true. In this paper, we have studied on the concept of Fiksel's societal network and used it for redefining the social network problem in terms of equivalence relationships. Further, we had defined the Social network in terms of graph theory and mathematical relations. We had proceeded further in defining the Fiksel's societal network and social network with respect to rough set. Fiksel had defined the social network in terms of structural equivalence. We have discussed on the limitation of Rough set and observed that use of Covering Based Rough Set as an extension of Pawlak's rough set seems to be a better alternative. There are six types of covering based rough set. To keep continuity in this paper, we have mentioned about Covering based rough sets. Covering based rough set extends from partitioning in rough sets to covering of the universe and is flexible, when compared with rigid equivalence relation.
本文主要研究利用粗糙集方法解决社会网络中的分类聚类问题。当数据集包含缺失数据或不确定数据时,粗糙集被证明是一种有效的工具。要解决社会网络域下的问题,该问题必须满足粗糙集的基本性质,即该问题的属性必须对等价关系成立。因此,在将粗糙集应用于社交网络的具体问题之前,必须对粗糙集进行重新定义,使其具有传递性、对称性和自反性。本文研究了菲克塞尔社会网络的概念,并用它从等价关系的角度重新定义了社会网络问题。此外,我们从图论和数学关系的角度定义了社交网络。我们进一步对菲克塞尔社会网络和粗糙集社会网络进行了定义。菲克塞尔从结构对等的角度定义了社会网络。我们已经讨论了粗糙集的局限性,并观察到使用基于覆盖的粗糙集作为Pawlak粗糙集的扩展似乎是一个更好的选择。基于覆盖的粗糙集有六种类型。为了保持本文的连续性,我们提到了基于覆盖的粗糙集。基于覆盖的粗糙集从粗糙集的划分扩展到对全域的覆盖,与刚性等价关系相比具有灵活性。
{"title":"Clustering analysis in social network using Covering Based Rough Set","authors":"A. Mitra, S. R. Satapathy, S. Paul","doi":"10.1109/IADCC.2013.6514272","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514272","url":null,"abstract":"This paper focuses on solving the problem of classification and clustering in social network by using Rough Set. When the data set consists of missing or uncertain data then the Rough set is proved to be an efficient tool. To solve a problem under the domain of social network, the problem must satisfy the fundamental property of rough set i.e., the attribute of the problem must holds true for equivalence relation. Hence, before implementing rough set to the specific problem of social network, it must be redefined in a way that properties of transitive, symmetric and reflexive should holds true. In this paper, we have studied on the concept of Fiksel's societal network and used it for redefining the social network problem in terms of equivalence relationships. Further, we had defined the Social network in terms of graph theory and mathematical relations. We had proceeded further in defining the Fiksel's societal network and social network with respect to rough set. Fiksel had defined the social network in terms of structural equivalence. We have discussed on the limitation of Rough set and observed that use of Covering Based Rough Set as an extension of Pawlak's rough set seems to be a better alternative. There are six types of covering based rough set. To keep continuity in this paper, we have mentioned about Covering based rough sets. Covering based rough set extends from partitioning in rough sets to covering of the universe and is flexible, when compared with rigid equivalence relation.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Write stability analysis of 8-T novel SRAM cell for high speed application 高速应用新型8-T SRAM单元的写入稳定性分析
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514460
P. Upadhyay, S. Chhotray, R. Kar, D. Mandal, S. Ghoshal
This paper presents on the stability analysis of the proposed 8-T low power SRAM cell for write operation. Here we propose a novel low power 8-T SRAM cell and compare its stability with conventional 6-T standard models. In the proposed structure we use two voltage sources, one connected with the Bit line and the other connected with the Bit bar line for reducing the voltage swing during the write “0” or write “1” operation. We use 65 nm CMOS technology with 1 volt power supply. Simulation is carried out in Microwind 3.1 by using BSim4 model. We use the approach of write static noise margin, bitline voltage write margin and wordline voltage write margin for analyzing the stability of the proposed SRAM cell. These two extra voltage sources can control the voltage swing at the output node and improve the noise margin during the write operation. The simulation results and the comparison made with that of conventional 6T SRAM justify the efficacy of the superiority of the proposed SRAM structure.
本文对所提出的用于写操作的8-T低功耗SRAM单元的稳定性进行了分析。本文提出了一种新型的低功耗8-T SRAM单元,并将其稳定性与传统的6-T标准模型进行了比较。在所提出的结构中,我们使用两个电压源,一个与比特线连接,另一个与比特条线连接,以减少写“0”或写“1”操作期间的电压摆动。我们采用65纳米CMOS技术和1伏电源。在Microwind 3.1中使用BSim4模型进行仿真。我们使用写入静态噪声裕度、位线电压写入裕度和字线电压写入裕度的方法来分析所提出的SRAM单元的稳定性。这两个额外的电压源可以控制输出节点的电压摆动,并改善写操作期间的噪声裕度。仿真结果以及与传统6T SRAM的比较验证了该SRAM结构的优越性。
{"title":"Write stability analysis of 8-T novel SRAM cell for high speed application","authors":"P. Upadhyay, S. Chhotray, R. Kar, D. Mandal, S. Ghoshal","doi":"10.1109/IADCC.2013.6514460","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514460","url":null,"abstract":"This paper presents on the stability analysis of the proposed 8-T low power SRAM cell for write operation. Here we propose a novel low power 8-T SRAM cell and compare its stability with conventional 6-T standard models. In the proposed structure we use two voltage sources, one connected with the Bit line and the other connected with the Bit bar line for reducing the voltage swing during the write “0” or write “1” operation. We use 65 nm CMOS technology with 1 volt power supply. Simulation is carried out in Microwind 3.1 by using BSim4 model. We use the approach of write static noise margin, bitline voltage write margin and wordline voltage write margin for analyzing the stability of the proposed SRAM cell. These two extra voltage sources can control the voltage swing at the output node and improve the noise margin during the write operation. The simulation results and the comparison made with that of conventional 6T SRAM justify the efficacy of the superiority of the proposed SRAM structure.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deterministic compressed-sensing matrix from grassmannian matrix: Application to speech processing 基于格拉斯曼矩阵的确定性压缩感知矩阵:在语音处理中的应用
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514392
V. Abrol, Pulkit Sharma, S. Budhiraja
Reconstruction of a signal based on Compressed Sensing (CS) framework relies on the knowledge of the sparse basis & measurement matrix used for sensing. While most of the studies so far focus on the prominent random Gaussian, Bernoulli or Fourier matrices, we have proposed construction of efficient sensing matrix we call Grassgram Matrix using Grassmannian matrices. This work shows how to construct effective deterministic sensing matrices for any known sparse basis which can fulfill incoherence or RIP conditions with high probability. The performance of proposed approach is evaluated for speech signals. Our results shows that these deterministic matrices out performs other popular matrices.
基于压缩感知(CS)框架的信号重构依赖于用于感知的稀疏基和测量矩阵的知识。到目前为止,大多数研究都集中在突出的随机高斯矩阵,伯努利矩阵或傅立叶矩阵上,我们提出了使用格拉斯曼矩阵构建高效的传感矩阵,我们称之为格拉斯曼矩阵。这项工作展示了如何为任何已知的稀疏基构建有效的确定性感知矩阵,该矩阵可以高概率地满足非相干或RIP条件。最后对该方法在语音信号下的性能进行了评价。我们的结果表明,这些确定性矩阵优于其他流行的矩阵。
{"title":"Deterministic compressed-sensing matrix from grassmannian matrix: Application to speech processing","authors":"V. Abrol, Pulkit Sharma, S. Budhiraja","doi":"10.1109/IADCC.2013.6514392","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514392","url":null,"abstract":"Reconstruction of a signal based on Compressed Sensing (CS) framework relies on the knowledge of the sparse basis & measurement matrix used for sensing. While most of the studies so far focus on the prominent random Gaussian, Bernoulli or Fourier matrices, we have proposed construction of efficient sensing matrix we call Grassgram Matrix using Grassmannian matrices. This work shows how to construct effective deterministic sensing matrices for any known sparse basis which can fulfill incoherence or RIP conditions with high probability. The performance of proposed approach is evaluated for speech signals. Our results shows that these deterministic matrices out performs other popular matrices.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127037817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Finding zeros for linear phase FIR filters 寻找线性相位FIR滤波器的零点
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514381
Priyanka, Brishbhan Singh, Panwar Shiv, Dutt Joshi, Iit Delhi
This paper presents a new technique to find zeros of a real, linear phase, FIR filter. Properties of Z-transform and constraints on location of zeros for this type of filter have been used to reduce search space for zeros. Furthermore, the obtained information on zeros is subsequently used in WDK formulas to obtain more accurate and precise location of zeros. Simulation results validating the proposed technique are also presented.
本文提出了一种求实线性相位FIR滤波器零点的新方法。利用z变换的性质和对这类滤波器零点位置的约束来减少零点的搜索空间。然后,将获得的零点信息用于WDK公式中,以获得更准确和精确的零点位置。仿真结果验证了该方法的有效性。
{"title":"Finding zeros for linear phase FIR filters","authors":"Priyanka, Brishbhan Singh, Panwar Shiv, Dutt Joshi, Iit Delhi","doi":"10.1109/IADCC.2013.6514381","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514381","url":null,"abstract":"This paper presents a new technique to find zeros of a real, linear phase, FIR filter. Properties of Z-transform and constraints on location of zeros for this type of filter have been used to reduce search space for zeros. Furthermore, the obtained information on zeros is subsequently used in WDK formulas to obtain more accurate and precise location of zeros. Simulation results validating the proposed technique are also presented.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121135216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tumbling Multilevel Channel Conflicts in Mobile Ad Hoc Networks 移动自组织网络中翻滚的多层信道冲突
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514216
Mohamed Abd Elhamid Abbas, Husain Shahnawaz
Due to the huge compulsion in which collective wireless technologies should act below an abstinent awning. Mobile Ad Hoc Networks are leaving to accomplish this mandate. Wireless technologies are abstruse in itself along with we are going to adhere them in an abstinent awning they inherited the clashes form their parental technologies and frequent additional confrontations will broaden. WiMax / UMTS infrastructure is observing for expediency of Mobile Ad Hoc Networks. The core analysis challenge in WiMax is about the anode allowance. additionally destined to deficient anode affiliate and bulky amplification in mobile consumers, the difficulty of contest free channels allocation dovetails very arrogant. Hence, the main objective of this paper is to reduce the Multilevel Channel Conflicts in Mobile Ad Hoc Networks .Channel allowance is an elementary affair of resource activity that aggregates the comprehension and extent of attendants. As dormant channel apportionment misses the heuristic applications to allot the channels to the cages. headed channel assignment behaves beneficially inferior leaden traffic. assiduous channel allowance apprise behaves inferior brightness as well as alleviated traffic. To advance the benefit of the channel chunk we try an alloyed application for channel allowance in which FCA and DCA apprises coupled will work concomitantly. The results depict that the proposed mechanism is able to allot the conflict free channels to all enclosures according to the constraint of the enclosures. This allocation is able to reduce the conflicts in multi level channels in ad hock networks. For replication we apprise only four cells clusters architecture and seven cells cluster arrangement and consequences arises that allocated channels are conflict free and based on the compatibility matrix which is allocation methodology.
由于集体无线技术应该在节制的遮阳篷下行动的巨大强迫。移动自组织网络正在离开以完成这一任务。无线技术本身就很深奥,我们要把它们放在一个节制的天篷里,它们从它们的母体技术那里继承了冲突,而且频繁的额外对抗将会扩大。WiMax / UMTS基础设施正在观察移动自组织网络的便利性。WiMax的核心分析挑战是关于阳极余量。另外注定了在移动消费者中阳极关联不足和扩大化,竞争免费渠道分配的难度非常自大。因此,本文的主要目标是减少移动自组织网络中的多级信道冲突。信道允许是资源活动的基本事务,它聚集了参与者的理解和程度。由于休眠通道分配错过了启发式应用程序来分配通道到笼子。头信道分配有利于低铅通信。刻苦的信道允许通知表现为低亮度以及减轻了交通。为了提高信道块的效益,我们尝试了一种用于信道许可的合金应用程序,其中FCA和DCA通知耦合将同时工作。结果表明,该机制能够根据机壳的约束将无冲突通道分配给所有机壳。这种分配方式能够有效地减少多级信道间的冲突。对于复制,我们只通知四个细胞集群架构和七个细胞集群安排,结果是分配的通道是无冲突的,并且基于兼容性矩阵,这是分配方法。
{"title":"Tumbling Multilevel Channel Conflicts in Mobile Ad Hoc Networks","authors":"Mohamed Abd Elhamid Abbas, Husain Shahnawaz","doi":"10.1109/IADCC.2013.6514216","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514216","url":null,"abstract":"Due to the huge compulsion in which collective wireless technologies should act below an abstinent awning. Mobile Ad Hoc Networks are leaving to accomplish this mandate. Wireless technologies are abstruse in itself along with we are going to adhere them in an abstinent awning they inherited the clashes form their parental technologies and frequent additional confrontations will broaden. WiMax / UMTS infrastructure is observing for expediency of Mobile Ad Hoc Networks. The core analysis challenge in WiMax is about the anode allowance. additionally destined to deficient anode affiliate and bulky amplification in mobile consumers, the difficulty of contest free channels allocation dovetails very arrogant. Hence, the main objective of this paper is to reduce the Multilevel Channel Conflicts in Mobile Ad Hoc Networks .Channel allowance is an elementary affair of resource activity that aggregates the comprehension and extent of attendants. As dormant channel apportionment misses the heuristic applications to allot the channels to the cages. headed channel assignment behaves beneficially inferior leaden traffic. assiduous channel allowance apprise behaves inferior brightness as well as alleviated traffic. To advance the benefit of the channel chunk we try an alloyed application for channel allowance in which FCA and DCA apprises coupled will work concomitantly. The results depict that the proposed mechanism is able to allot the conflict free channels to all enclosures according to the constraint of the enclosures. This allocation is able to reduce the conflicts in multi level channels in ad hock networks. For replication we apprise only four cells clusters architecture and seven cells cluster arrangement and consequences arises that allocated channels are conflict free and based on the compatibility matrix which is allocation methodology.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 3rd IEEE International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1