首页 > 最新文献

2016 2nd International Conference on Next Generation Computing Technologies (NGCT)最新文献

英文 中文
On the generation of multiple ℓ-sequences from single WFCSR automaton for cryptographic applications 用于密码学应用的单个WFCSR自动机生成多个r -序列
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877531
Ganesh Akula, Vinod Naik, B. Umadevi
Feedback with carry shift registers (FCSRs) have been proposed as a promising alternate to the Linear feedback shift registers (LFSRs) in recent years. An approach based on traditional matrix representation has been proposed to design a Word oriented FCSR (WFCSR) automaton in [2], [3]. This automaton always generates a fixed ℓ-sequence, which is not desired for some cryptographic applications. In this paper, we present a new WFCSR automaton which enhances the traditional matrix representation by incorporating α-mask and/or β-mask operations on certain blocks (or words) of WFCSR automaton. By applying different α-mask and/or β-mask on certain blocks (or words) of WFCSR automaton, we can generate multiple ℓ-sequences without changing its structure. We can use the proposed approach to design WFCSR automaton in Fibonacci, Galois and Ring representations. The proposed WFCSR automaton can be adopted as a basic primitive to design any pseudo random number generator or stream cipher for cryptographic applications.
近年来,带进位移位寄存器(FCSRs)的反馈被认为是线性反馈移位寄存器(LFSRs)的一种很有前途的替代方案。提出了一种基于传统矩阵表示的方法来设计b[2], b[3]中面向Word的FCSR (WFCSR)自动机。这个自动机总是生成一个固定的序列,这对于某些加密应用来说是不需要的。本文提出了一种新的WFCSR自动机,通过在WFCSR自动机的某些块(或词)上加入α-掩码和/或β-掩码运算,增强了传统的矩阵表示。通过在WFCSR自动机的特定块(或词)上施加不同的α-掩码和/或β-掩码,可以在不改变其结构的情况下生成多个α-序列。我们可以使用提出的方法在斐波那契、伽罗瓦和环表示中设计WFCSR自动机。所提出的WFCSR自动机可以作为设计任何伪随机数生成器或加密应用的流密码的基本原语。
{"title":"On the generation of multiple ℓ-sequences from single WFCSR automaton for cryptographic applications","authors":"Ganesh Akula, Vinod Naik, B. Umadevi","doi":"10.1109/NGCT.2016.7877531","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877531","url":null,"abstract":"Feedback with carry shift registers (FCSRs) have been proposed as a promising alternate to the Linear feedback shift registers (LFSRs) in recent years. An approach based on traditional matrix representation has been proposed to design a Word oriented FCSR (WFCSR) automaton in [2], [3]. This automaton always generates a fixed ℓ-sequence, which is not desired for some cryptographic applications. In this paper, we present a new WFCSR automaton which enhances the traditional matrix representation by incorporating α-mask and/or β-mask operations on certain blocks (or words) of WFCSR automaton. By applying different α-mask and/or β-mask on certain blocks (or words) of WFCSR automaton, we can generate multiple ℓ-sequences without changing its structure. We can use the proposed approach to design WFCSR automaton in Fibonacci, Galois and Ring representations. The proposed WFCSR automaton can be adopted as a basic primitive to design any pseudo random number generator or stream cipher for cryptographic applications.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114566871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer vision based personalized clothing assistance system: A proposed model 基于计算机视觉的个性化服装辅助系统:一个提出的模型
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877438
B. Kalra, Kingshuk Srivastava, M. Prateek
With fashion industry included e-commerce (worldwide) is expected to hit the $35 billion mark by 2020. There's a need for applications which help the user in making intelligent decisions on their day to day online purchases. In this paper, our aim is to build a system that would be able to understand fashion and the user to provide personalized clothing recommendations to the user. Our approach includes Caffe, a deep learning framework for computer vision tasks such as Clothing type classification and Clothing attribute classification. Furthermore we use Conditional Random Fields (CRF) to learn the intricacies of fashion. CRFs also learn the correlations between attributes of the user such as ethnicity, body type etc., expert opinion and the type of outfit. We expect the proposed system would be able to provide personalized recommendations.
包括时尚产业在内的电子商务(全球)预计到2020年将达到350亿美元大关。有一种应用程序可以帮助用户在日常在线购物中做出明智的决定。在本文中,我们的目标是建立一个能够理解时尚和用户的系统,为用户提供个性化的服装推荐。我们的方法包括Caffe,这是一个用于计算机视觉任务(如服装类型分类和服装属性分类)的深度学习框架。此外,我们使用条件随机场(CRF)来学习时尚的复杂性。crf还了解用户的种族、体型等属性、专家意见和服装类型之间的相关性。我们期望拟议的系统能够提供个性化的推荐。
{"title":"Computer vision based personalized clothing assistance system: A proposed model","authors":"B. Kalra, Kingshuk Srivastava, M. Prateek","doi":"10.1109/NGCT.2016.7877438","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877438","url":null,"abstract":"With fashion industry included e-commerce (worldwide) is expected to hit the $35 billion mark by 2020. There's a need for applications which help the user in making intelligent decisions on their day to day online purchases. In this paper, our aim is to build a system that would be able to understand fashion and the user to provide personalized clothing recommendations to the user. Our approach includes Caffe, a deep learning framework for computer vision tasks such as Clothing type classification and Clothing attribute classification. Furthermore we use Conditional Random Fields (CRF) to learn the intricacies of fashion. CRFs also learn the correlations between attributes of the user such as ethnicity, body type etc., expert opinion and the type of outfit. We expect the proposed system would be able to provide personalized recommendations.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121457922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A secure virtualized cloud environment with pseudo-hypervisor IP based technology 使用基于伪虚拟机监控程序IP技术的安全虚拟化云环境
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877488
K. Babu, P. Kiran
Now a day, Cloud computing is one of the most stimulating on demand service oriented technology. Virtualization is an emerging approach utilizing resources effectively in cloud computing environment. Virtualization has an intellectual abstraction layer which hides the complexity of essential hardware or software. Virtualization technology is not a novel technology possessing security issues that can be inherited in cloud environment. It is required now to devise a strong security system for safe and secure cloud architecture. To give a remedy for secure cloud, we have proposed a secure paradigm called pseudo-hypervisor IP based virtualization technology. The proposed architecture will monitor encrypted IP address eventually and restrict unauthorized entries. The key point to maintain secure cloud environment is a pseudo number, which is generated randomly by the pseudo-hypervisor auditor (PHA) and monitor by the pseudo-hypervisor monitor (PHM).
如今,云计算是当今最具启发性的按需服务导向技术之一。虚拟化是在云计算环境中有效利用资源的一种新兴方法。虚拟化有一个智能抽象层,它隐藏了基本硬件或软件的复杂性。虚拟化技术并不是一项具有云环境中可以继承的安全问题的新技术。现在需要为安全可靠的云架构设计一个强大的安全体系。为了给安全云提供补救,我们提出了一种称为基于伪虚拟机监控程序IP的虚拟化技术的安全范例。该架构将最终监控加密的IP地址并限制未经授权的入口。维护安全云环境的关键是伪数字,伪数字由伪系统管理程序审计员(PHA)随机生成,并由伪系统管理程序监控器(PHM)监控。
{"title":"A secure virtualized cloud environment with pseudo-hypervisor IP based technology","authors":"K. Babu, P. Kiran","doi":"10.1109/NGCT.2016.7877488","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877488","url":null,"abstract":"Now a day, Cloud computing is one of the most stimulating on demand service oriented technology. Virtualization is an emerging approach utilizing resources effectively in cloud computing environment. Virtualization has an intellectual abstraction layer which hides the complexity of essential hardware or software. Virtualization technology is not a novel technology possessing security issues that can be inherited in cloud environment. It is required now to devise a strong security system for safe and secure cloud architecture. To give a remedy for secure cloud, we have proposed a secure paradigm called pseudo-hypervisor IP based virtualization technology. The proposed architecture will monitor encrypted IP address eventually and restrict unauthorized entries. The key point to maintain secure cloud environment is a pseudo number, which is generated randomly by the pseudo-hypervisor auditor (PHA) and monitor by the pseudo-hypervisor monitor (PHM).","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116586771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A dynamic successive interference cancellation (Dsic) scheme for latency reduction in Mc-Cdma multiuser detection 一种用于减少Mc-Cdma多用户检测延迟的动态连续干扰抵消(Dsic)方案
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877452
Tamasdeep Kaur, Mamta Arora
In this paper, a modified successive interference cancellation (SIC) scheme is designed for multiuser detection in multicarrier code division multiple access (MC-CDMA) communication systems. Successive interference cancellation (SIC) is used to mitigate the multiple access interference (MAI) which occurs in MC-CDMA systems. SIC uses the decision feedback concept where the signal from a user is regenerated and then subtracted from the received signal to cancel the interference. SIC is a near far resistant system. On the contrary, the problem of latency occurs in the system at each stage of regeneration due to which its practical implementation is not useful. Thus, a modified scheme called dynamic SIC (dSIC) is designed to reduce the latency of the system by half which also gives a lower bit error rate (BER).
针对多载波码分多址(MC-CDMA)通信系统中的多用户检测问题,设计了一种改进的逐次干扰抵消(SIC)方案。采用逐次干扰消除技术(SIC)来缓解MC-CDMA系统中的多址干扰(MAI)。SIC使用决策反馈概念,其中来自用户的信号被重新生成,然后从接收到的信号中减去以消除干扰。SIC是一种抗近抗远的体系。相反,系统在再生的每个阶段都存在延迟问题,因此它的实际实现是无用的。因此,设计了一种称为动态SIC (dSIC)的改进方案,可以将系统的延迟减少一半,同时还可以降低误码率(BER)。
{"title":"A dynamic successive interference cancellation (Dsic) scheme for latency reduction in Mc-Cdma multiuser detection","authors":"Tamasdeep Kaur, Mamta Arora","doi":"10.1109/NGCT.2016.7877452","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877452","url":null,"abstract":"In this paper, a modified successive interference cancellation (SIC) scheme is designed for multiuser detection in multicarrier code division multiple access (MC-CDMA) communication systems. Successive interference cancellation (SIC) is used to mitigate the multiple access interference (MAI) which occurs in MC-CDMA systems. SIC uses the decision feedback concept where the signal from a user is regenerated and then subtracted from the received signal to cancel the interference. SIC is a near far resistant system. On the contrary, the problem of latency occurs in the system at each stage of regeneration due to which its practical implementation is not useful. Thus, a modified scheme called dynamic SIC (dSIC) is designed to reduce the latency of the system by half which also gives a lower bit error rate (BER).","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116658637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CloudBox — A virtual machine manager for KVM based virtual machines CloudBox—基于KVM的虚拟机的虚拟机管理器
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877482
Akshay Sharma, A. R. Ahmad, Divyashish Singh, J. Patni
The project aims to develop a professional Virtual Machine Manager for the KVM hypervisor. It will be a libvirt-based Web Interface for managing virtual machines. It allows creating and configuring new domains, and adjusting a domain's allocation of the underlying hardware resources. A VNC viewer will present a full graphical console to the end-users in the guest domain. To work with this service you will need the OS Linux and Web browser with installed VNC client plugin. An intuitive web interface, any system administrator can handle it with basic qualifications. The service will work with a data encrypted network connection. The Service has access only to the KVM hypervisor via the libvirt library and not to the entire OS, which improves the security of the server. End-user will have the full control of the virtualization and the virtualised hardware resource. Creating, installation, shutdown, snapshots — all this and more features are incorporated with in the virtual machines. All actions are logged. Also security features based on IAM and secure data transmission between users and the server will be incorporated in the VM manager.
该项目旨在为KVM管理程序开发一个专业的虚拟机管理器。它将是一个基于libvirt的Web界面,用于管理虚拟机。它允许创建和配置新域,以及调整域对底层硬件资源的分配。VNC查看器将向来宾域中的最终用户显示一个完整的图形化控制台。要使用此服务,您将需要操作系统Linux和Web浏览器,并安装VNC客户端插件。一个直观的web界面,任何系统管理员可以处理它的基本资格。该服务将与数据加密的网络连接一起工作。Service只能通过libvirt库访问KVM虚拟化环境,不能访问整个操作系统,提高了服务器的安全性。最终用户将完全控制虚拟化和虚拟化的硬件资源。创建、安装、关闭、快照——所有这些以及更多的特性都包含在虚拟机中。所有操作都被记录下来。此外,基于IAM的安全特性和用户与服务器之间的安全数据传输将被纳入VM管理器。
{"title":"CloudBox — A virtual machine manager for KVM based virtual machines","authors":"Akshay Sharma, A. R. Ahmad, Divyashish Singh, J. Patni","doi":"10.1109/NGCT.2016.7877482","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877482","url":null,"abstract":"The project aims to develop a professional Virtual Machine Manager for the KVM hypervisor. It will be a libvirt-based Web Interface for managing virtual machines. It allows creating and configuring new domains, and adjusting a domain's allocation of the underlying hardware resources. A VNC viewer will present a full graphical console to the end-users in the guest domain. To work with this service you will need the OS Linux and Web browser with installed VNC client plugin. An intuitive web interface, any system administrator can handle it with basic qualifications. The service will work with a data encrypted network connection. The Service has access only to the KVM hypervisor via the libvirt library and not to the entire OS, which improves the security of the server. End-user will have the full control of the virtualization and the virtualised hardware resource. Creating, installation, shutdown, snapshots — all this and more features are incorporated with in the virtual machines. All actions are logged. Also security features based on IAM and secure data transmission between users and the server will be incorporated in the VM manager.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123115510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved email spam classification method using integrated particle swarm optimization and decision tree 基于粒子群优化和决策树的垃圾邮件分类方法的改进
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877470
H. Kaur, Ajay Sharma
E-mails have become the best way to communicate formal documents over internet among users. But many people have started sending the unwanted mails to others, also called email spam. It is found that many techniques have been proposed so far to efficient mine the emails as spam or non-spammed. In existing techniques, the use of unsupervised filtering to filter the input data set is ignored by the most of the existing researchers. The use of hybridization of data mining techniques is ignored in instruct to improve the accuracy rate further for Detection of fraudulent emails. The majority of the existing techniques are limited to various significant features of emails therefore utilising more features may provide more significant results. To handle above stated limitations a new technique is proposed in this paper. The proposed technique has integrated particle swarm optimization based on Decision Tree algorithm with unsupervised filtering to enhance the accuracy rate further. The comparative analyses have clearly pointed to better results than the available techniques.
电子邮件已经成为用户在互联网上交流正式文件的最佳方式。但许多人已经开始向他人发送不需要的邮件,也被称为垃圾邮件。研究发现,目前已经提出了许多有效挖掘垃圾邮件和非垃圾邮件的技术。在现有的技术中,使用无监督滤波对输入数据集进行过滤被大多数现有的研究人员所忽略。为了进一步提高欺诈性电子邮件检测的准确率,在指导中忽略了混合数据挖掘技术的使用。大多数现有技术仅限于电子邮件的各种重要特征,因此利用更多的特征可能会提供更重要的结果。为了克服上述局限性,本文提出了一种新的技术。该方法将基于决策树算法的粒子群优化与无监督滤波相结合,进一步提高了准确率。对比分析清楚地指出了比现有技术更好的结果。
{"title":"Improved email spam classification method using integrated particle swarm optimization and decision tree","authors":"H. Kaur, Ajay Sharma","doi":"10.1109/NGCT.2016.7877470","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877470","url":null,"abstract":"E-mails have become the best way to communicate formal documents over internet among users. But many people have started sending the unwanted mails to others, also called email spam. It is found that many techniques have been proposed so far to efficient mine the emails as spam or non-spammed. In existing techniques, the use of unsupervised filtering to filter the input data set is ignored by the most of the existing researchers. The use of hybridization of data mining techniques is ignored in instruct to improve the accuracy rate further for Detection of fraudulent emails. The majority of the existing techniques are limited to various significant features of emails therefore utilising more features may provide more significant results. To handle above stated limitations a new technique is proposed in this paper. The proposed technique has integrated particle swarm optimization based on Decision Tree algorithm with unsupervised filtering to enhance the accuracy rate further. The comparative analyses have clearly pointed to better results than the available techniques.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"64 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Network on chip simulator: Design, implementation and comparison of Mesh, Torus and RiCoBiT topologies 片上网络模拟器:Mesh, Torus和RiCoBiT拓扑的设计,实现和比较
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877388
Nikhil Baby, S. Mathew, Sarah Abraham, S. Ravindranath, V. Sanju
The introduction of billions of transisters onto a single chip has resulted in the increase in complexity of the common System-on-Chip(SoC) architecture. The bus based architecture of SoC is limiting, mainly due to scalability issues. The solution for this communication problem is the use of embedded switching network, called Network On Chip(NoC). NoC has inherent redundancy which helps to tolerate faults and deal with communication bottleneck. In this paper we discuss about the design and implementation of different Network On Chip (NOC) based topologies. The topologies that we consider here are 2D Mesh, Torus and RiCoBiT. This paper compares the performance parameters of the above three topologies and thus it would help the network designers to design a high performance system.
在单个芯片上引入数十亿个晶体管导致了通用片上系统(SoC)架构的复杂性增加。基于总线的SoC架构是有限的,主要是由于可扩展性问题。这种通信问题的解决方案是使用嵌入式交换网络,称为片上网络(NoC)。NoC具有固有的冗余性,有助于容错和处理通信瓶颈。在本文中,我们讨论了不同的基于片上网络(NOC)拓扑的设计和实现。我们在这里考虑的拓扑是2D Mesh, Torus和RiCoBiT。本文比较了上述三种拓扑的性能参数,为网络设计者设计高性能系统提供了参考。
{"title":"Network on chip simulator: Design, implementation and comparison of Mesh, Torus and RiCoBiT topologies","authors":"Nikhil Baby, S. Mathew, Sarah Abraham, S. Ravindranath, V. Sanju","doi":"10.1109/NGCT.2016.7877388","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877388","url":null,"abstract":"The introduction of billions of transisters onto a single chip has resulted in the increase in complexity of the common System-on-Chip(SoC) architecture. The bus based architecture of SoC is limiting, mainly due to scalability issues. The solution for this communication problem is the use of embedded switching network, called Network On Chip(NoC). NoC has inherent redundancy which helps to tolerate faults and deal with communication bottleneck. In this paper we discuss about the design and implementation of different Network On Chip (NOC) based topologies. The topologies that we consider here are 2D Mesh, Torus and RiCoBiT. This paper compares the performance parameters of the above three topologies and thus it would help the network designers to design a high performance system.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Real time sentiment analysis of tweets using Naive Bayes 使用朴素贝叶斯对推文进行实时情感分析
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877424
Ankur Goel, J. Gautam, Sitesh Kumar
Twitter1 is a micro-blogging website which provides platform for people to share and express their views about topics, happenings, products and other services. Tweets can be classified into different classes based on their relevance with the topic searched. Various Machine Learning algorithms are currently employed in classification of tweets into positive and negative classes based on their sentiments, such as Baseline, Naive Bayes Classifier, Support Vector Machine etc. This paper contains implementation of Naive Bayes using sentiment140 training data using Twitter database and propose a method to improve classification. Use of SentiWordNet along with Naive Bayes can improve accuracy of classification of tweets, by providing positivity, negativity and objectivity score of words present in tweets. For actual implementation of this system python with NLTK and python-Twitter APIs are used.
Twitter1是一个微博网站,它为人们提供了一个分享和表达他们对话题、事件、产品和其他服务的看法的平台。Tweets可以根据它们与搜索主题的相关性被划分为不同的类别。目前有各种各样的机器学习算法用于根据tweet的情绪将其分类为积极和消极类,例如Baseline,朴素贝叶斯分类器,支持向量机等。本文利用Twitter数据库的sentiment140训练数据实现了朴素贝叶斯算法,并提出了一种改进分类的方法。使用SentiWordNet和朴素贝叶斯可以提高推文分类的准确性,通过提供推文中存在的词的积极性,消极性和客观性评分。对于该系统的实际实现,使用了带有NLTK和python- twitter api的python。
{"title":"Real time sentiment analysis of tweets using Naive Bayes","authors":"Ankur Goel, J. Gautam, Sitesh Kumar","doi":"10.1109/NGCT.2016.7877424","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877424","url":null,"abstract":"Twitter1 is a micro-blogging website which provides platform for people to share and express their views about topics, happenings, products and other services. Tweets can be classified into different classes based on their relevance with the topic searched. Various Machine Learning algorithms are currently employed in classification of tweets into positive and negative classes based on their sentiments, such as Baseline, Naive Bayes Classifier, Support Vector Machine etc. This paper contains implementation of Naive Bayes using sentiment140 training data using Twitter database and propose a method to improve classification. Use of SentiWordNet along with Naive Bayes can improve accuracy of classification of tweets, by providing positivity, negativity and objectivity score of words present in tweets. For actual implementation of this system python with NLTK and python-Twitter APIs are used.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
Security enhancement in OCDMA system using multicode keying and data randomisers 使用多码密钥和数据随机器增强OCDMA系统的安全性
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877533
Upinderjit Kaur, Harjeevan Singh
In this work, a super secure OCDMA system is presented which consists of data randomiser XOR gate and cipher key text generator. A new technique is demonstrated for designing of data randomiser in optical domain by using cheap components. In this a secure transmitter is designed to prevent signal loss by eavesdropper. Randomiser is placed to scramble bits after cipher text and remove sequence of consecutive three 0's and 1's to enhance performance security. The basic model of randomiser is based on XOR operation and shifting of data. Randomiser remove the long sequences, it change one bit into another bit. Advantage of randomiser is that it can be used with continuous and digital data. However encryption can only be done for digital data. For eavesdropper, it become different to tap the right data, he steal shuffle data. So security of OCDMA is enhanced.
本文提出了一种由数据随机器、异或门和密码文本发生器组成的超安全OCDMA系统。提出了一种利用廉价元件设计光域数据随机化器的新方法。为了防止窃听者丢失信号,设计了一种安全的发射机。在密文后放置随机器来打乱位,并删除连续三个0和1的序列,以提高性能安全性。随机化器的基本模型是基于异或运算和数据移位。随机器移除长序列,它将一个比特变成另一个比特。随机化的优点是它可以与连续和数字数据一起使用。然而,加密只能对数字数据进行。对于窃听者来说,窃听正确的数据变得不同,他窃取的是洗牌数据。从而提高了OCDMA的安全性。
{"title":"Security enhancement in OCDMA system using multicode keying and data randomisers","authors":"Upinderjit Kaur, Harjeevan Singh","doi":"10.1109/NGCT.2016.7877533","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877533","url":null,"abstract":"In this work, a super secure OCDMA system is presented which consists of data randomiser XOR gate and cipher key text generator. A new technique is demonstrated for designing of data randomiser in optical domain by using cheap components. In this a secure transmitter is designed to prevent signal loss by eavesdropper. Randomiser is placed to scramble bits after cipher text and remove sequence of consecutive three 0's and 1's to enhance performance security. The basic model of randomiser is based on XOR operation and shifting of data. Randomiser remove the long sequences, it change one bit into another bit. Advantage of randomiser is that it can be used with continuous and digital data. However encryption can only be done for digital data. For eavesdropper, it become different to tap the right data, he steal shuffle data. So security of OCDMA is enhanced.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design simulation and performance assessment of yield and loss forecasting for 100 KWp grid connected solar PV system 100kwp并网太阳能光伏系统产损预测设计仿真及性能评估
Pub Date : 2016-10-01 DOI: 10.1109/NGCT.2016.7877472
A. Raj, Manoj Gupta, Sampurna Panda
Yield and loss forecasting plays a significant role in efficient planning and operation of solar photovoltaic system. Performance of solar photovoltaic system depends on geographical location, system design, horizon, and orientation of solar panels in the given system. Several forecasting tools are available which are used by professionals for efficient planning and forecasting of grid connected as well as standalone solar photovoltaic system. In this paper we have developed equivalent mathematical model for 100 KWp grid connected solar photovoltaic system has been developed which is installed at Poornima University, Jaipur. Performance parameters, Yield and losses has been forecasted for equivalent model by help of PV Syst design tool. Monthly yield and losses as well as yearly yield and losses have been synthesized. For performance assessment of the forecasted data, we have compared forecasted yield for the month of April with the real data recorded from Sunny Web Box. Forecasted data can serve as important tool for analyzing location and seasonal specific losses. Comparative analysis of simulated data with real experimental data is important for predicting tolerance and error related with forecasting tool.
产损预测对太阳能光伏发电系统的高效规划和运行具有重要意义。太阳能光伏系统的性能取决于给定系统中的地理位置、系统设计、水平和太阳能电池板的朝向。有几种预测工具可供专业人员使用,用于有效地规划和预测并网和独立的太阳能光伏系统。本文建立了安装在斋浦尔普尔尼玛大学的100kwp并网太阳能光伏发电系统的等效数学模型。利用光伏系统设计工具对等效模型的性能参数、产量和损耗进行了预测。合成了月产量和损失以及年产量和损失。为了对预测数据进行性能评估,我们将4月份的预测产量与Sunny Web Box记录的实际数据进行了比较。预测数据可以作为分析地点和季节特定损失的重要工具。仿真数据与实际实验数据的对比分析对于预测与预测工具相关的公差和误差具有重要意义。
{"title":"Design simulation and performance assessment of yield and loss forecasting for 100 KWp grid connected solar PV system","authors":"A. Raj, Manoj Gupta, Sampurna Panda","doi":"10.1109/NGCT.2016.7877472","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877472","url":null,"abstract":"Yield and loss forecasting plays a significant role in efficient planning and operation of solar photovoltaic system. Performance of solar photovoltaic system depends on geographical location, system design, horizon, and orientation of solar panels in the given system. Several forecasting tools are available which are used by professionals for efficient planning and forecasting of grid connected as well as standalone solar photovoltaic system. In this paper we have developed equivalent mathematical model for 100 KWp grid connected solar photovoltaic system has been developed which is installed at Poornima University, Jaipur. Performance parameters, Yield and losses has been forecasted for equivalent model by help of PV Syst design tool. Monthly yield and losses as well as yearly yield and losses have been synthesized. For performance assessment of the forecasted data, we have compared forecasted yield for the month of April with the real data recorded from Sunny Web Box. Forecasted data can serve as important tool for analyzing location and seasonal specific losses. Comparative analysis of simulated data with real experimental data is important for predicting tolerance and error related with forecasting tool.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133768807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2016 2nd International Conference on Next Generation Computing Technologies (NGCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1