首页 > 最新文献

International Conference on Advances in Computing and Artificial Intelligence最新文献

英文 中文
Refjav: tool for automated verification by generating CCS of multithreaded Java system in distributed environment Refjav:在分布式环境下,通过生成CCS自动验证多线程Java系统的工具
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007082
Arpit, Ashwini Kumar
We present here a tool to generate given the CCS automatically for the distributed multithreaded system coded in JAVA. Actually in the current scenario distributed systems are get emphasized and hard fact is to verify these systems. CCS (Concurrent communication system) is one of the ways to write formal specifications for concurrent systems but it is quite difficult to write CCS for given distributed system more over dynamic environment, where threads and processes created at runtime. is quit impossible analyze, audit and codify simultaneous. So as per requirement for verification of distributed system, we developed a tool named as Refjav that takes input a java coded file of system that is to be verified and produced output as its equivalent CCS under the set of reasonable restrictions. In present we worked with synchronization, dynamic thread creation and their communication using RMI in distributed, multithreaded Java program. Paper covers the various constructs of Refjav tool and its methodology. Our work is useful for getting CCS of a given Java distributed multithreaded program, which can be verified easily by model checkers to verify properties, expressed in model μ-calculus. As a result we should be in position to comment on the properties of system such as Deadlock, fairness etc, without actually going through the actual details and constructs of CCS.
我们在这里提供了一个工具来自动生成给定的CCS,用于用JAVA编码的分布式多线程系统。实际上,在当前的场景中,分布式系统得到了强调,而验证这些系统是一个困难的事实。CCS (Concurrent communication system,并发通信系统)是为并发系统编写规范的一种方法,但在动态环境下,对于线程和进程都是在运行时创建的分布式系统,编写CCS是相当困难的。是不可能同时分析、审核和编纂的。因此,根据分布式系统验证的需求,我们开发了一个名为Refjav的工具,在一组合理的限制下,将待验证系统的java编码文件作为其等效的CCS输入并产生输出。目前我们使用RMI在分布式多线程Java程序中实现同步、动态线程创建和它们之间的通信。本文介绍了Refjav工具的各种结构及其方法。我们的工作有助于获得给定Java分布式多线程程序的CCS,可以很容易地通过模型检查器来验证用模型μ微积分表示的属性。因此,我们应该能够评论系统的属性,如死锁、公平性等,而无需深入研究CCS的实际细节和结构。
{"title":"Refjav: tool for automated verification by generating CCS of multithreaded Java system in distributed environment","authors":"Arpit, Ashwini Kumar","doi":"10.1145/2007052.2007082","DOIUrl":"https://doi.org/10.1145/2007052.2007082","url":null,"abstract":"We present here a tool to generate given the CCS automatically for the distributed multithreaded system coded in JAVA. Actually in the current scenario distributed systems are get emphasized and hard fact is to verify these systems. CCS (Concurrent communication system) is one of the ways to write formal specifications for concurrent systems but it is quite difficult to write CCS for given distributed system more over dynamic environment, where threads and processes created at runtime. is quit impossible analyze, audit and codify simultaneous.\u0000 So as per requirement for verification of distributed system, we developed a tool named as Refjav that takes input a java coded file of system that is to be verified and produced output as its equivalent CCS under the set of reasonable restrictions. In present we worked with synchronization, dynamic thread creation and their communication using RMI in distributed, multithreaded Java program. Paper covers the various constructs of Refjav tool and its methodology. Our work is useful for getting CCS of a given Java distributed multithreaded program, which can be verified easily by model checkers to verify properties, expressed in model μ-calculus. As a result we should be in position to comment on the properties of system such as Deadlock, fairness etc, without actually going through the actual details and constructs of CCS.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131374395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error correction in function point estimation using soft computing technique 基于软计算技术的功能点估计误差校正
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007092
K. K. Rao, G. Raju
Project manager is responsible to see the company does not suffer from time overruns and cost overruns, unfortunately accurate forecast of effort estimations stems from mature organizations only, others owing to lack of history databases, when we estimating the total functionality of the project there is a need to form the total complexity matrix for the data and transactional points, at certain point with the increase of one RET and DET the final resulting measurement will not correspond to a sufficiently accurate function point value, for this purpose we are adopting soft computing technique. This work proposes the use of concepts and properties from fuzzy set theory to extend FPA to FFPA (Fuzzy Function Point Analysis). Fuzzy theory seeks to build a formal quantitative structure capable of emulating the imprecision of human knowledge. With the function points generated by FFPA, we can observe the error correction in Function Point Estimation so derived values such as costs and terms of development can be more precisely determined.
项目经理负责确保公司不遭受时间超支和成本超支,不幸的是,准确的工作量估计预测只源于成熟的组织,其他原因是缺乏历史数据库,当我们估计项目的总功能时,需要形成数据和事务点的总复杂性矩阵。在某一点上,随着RET和DET的增加,最终得到的测量结果将不能对应一个足够精确的功能点值,为此我们采用软计算技术。本工作提出使用模糊集合理论的概念和性质将FPA扩展到FFPA(模糊功能点分析)。模糊理论试图建立一种能够模拟人类知识的不精确性的形式化定量结构。通过FFPA生成的功能点,我们可以观察到功能点估算中的误差修正,从而可以更精确地确定成本和开发期限等衍生值。
{"title":"Error correction in function point estimation using soft computing technique","authors":"K. K. Rao, G. Raju","doi":"10.1145/2007052.2007092","DOIUrl":"https://doi.org/10.1145/2007052.2007092","url":null,"abstract":"Project manager is responsible to see the company does not suffer from time overruns and cost overruns, unfortunately accurate forecast of effort estimations stems from mature organizations only, others owing to lack of history databases, when we estimating the total functionality of the project there is a need to form the total complexity matrix for the data and transactional points, at certain point with the increase of one RET and DET the final resulting measurement will not correspond to a sufficiently accurate function point value, for this purpose we are adopting soft computing technique. This work proposes the use of concepts and properties from fuzzy set theory to extend FPA to FFPA (Fuzzy Function Point Analysis). Fuzzy theory seeks to build a formal quantitative structure capable of emulating the imprecision of human knowledge. With the function points generated by FFPA, we can observe the error correction in Function Point Estimation so derived values such as costs and terms of development can be more precisely determined.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127742880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complexity study on "Carry-along Sort" algorithm “进位排序”算法的复杂度研究
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007078
P. Sethuraman, L. Rajamani
Hierarchy generation is the very familiar and evolving concept in Relational database management system. There are so many methods currently available to generate as well manage hierarchies. But, carry along sort algorithm is the new method which is used to generate hierarchies dynamically and it is the subset of materialized path. In this paper, we are going to perform the complexity study against "Carry-along Sort" Algorithm in terms of time and space so that the efficiency of this algorithm can be compared with other existing methods. Complexity is about performance measures, NOT about the intricacy of programs. The choice of which operations are time critical and what constitutes a space cell varies according to application, as we shall see. Complexity study plays a vital role at the time of choosing an algorithm to solve a given problem.
层次结构生成是关系数据库管理系统中非常熟悉和不断发展的概念。目前有很多方法可用于生成和管理层次结构。而顺位排序算法是一种动态生成层次结构的新方法,是物化路径的子集。在本文中,我们将从时间和空间的角度对“Carry-along Sort”算法进行复杂度研究,从而将该算法的效率与其他现有方法进行比较。复杂性与性能度量有关,与程序的复杂性无关。我们将看到,选择哪些操作是时间关键的,什么构成空间单元因应用而异。在选择解决给定问题的算法时,复杂性研究起着至关重要的作用。
{"title":"Complexity study on \"Carry-along Sort\" algorithm","authors":"P. Sethuraman, L. Rajamani","doi":"10.1145/2007052.2007078","DOIUrl":"https://doi.org/10.1145/2007052.2007078","url":null,"abstract":"Hierarchy generation is the very familiar and evolving concept in Relational database management system. There are so many methods currently available to generate as well manage hierarchies. But, carry along sort algorithm is the new method which is used to generate hierarchies dynamically and it is the subset of materialized path. In this paper, we are going to perform the complexity study against \"Carry-along Sort\" Algorithm in terms of time and space so that the efficiency of this algorithm can be compared with other existing methods. Complexity is about performance measures, NOT about the intricacy of programs. The choice of which operations are time critical and what constitutes a space cell varies according to application, as we shall see. Complexity study plays a vital role at the time of choosing an algorithm to solve a given problem.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123364193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of text based mining 基于文本挖掘的研究
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007054
Ranjna Garg, Heena
Text based Mining is the process of analyzing a document or set of documents to understand the content and meaning of the information they contain. Text Mining enhances human's ability to Process massive quantities of information and it has high Commercial values. Text mining, sometimes alternately referred to as text data mining, roughly, process of deriving high-quality information from text. High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning. It usually involves the process of structuring the input text deriving patterns within the structured data, and finally evaluation and interpretation of the output. 'High quality' in text mining usually refers to some combination of relevance, novelty, and interestingness. Typical text mining tasks include text categorization, text clustering, concept/entity extraction, analysis and entity relation modeling (i.e., learning relations between named entities).
基于文本的挖掘是分析一个文档或一组文档以了解其包含的信息的内容和含义的过程。文本挖掘提高了人类处理海量信息的能力,具有很高的商业价值。文本挖掘,有时也称为文本数据挖掘,大致是指从文本中获取高质量信息的过程。高质量的信息通常是通过设计模式和趋势,通过统计模式学习等手段获得的。它通常涉及结构化输入文本的过程,在结构化数据中派生模式,最后对输出进行评估和解释。文本挖掘中的“高质量”通常是指相关性、新颖性和趣味性的结合。典型的文本挖掘任务包括文本分类、文本聚类、概念/实体提取、分析和实体关系建模(即学习命名实体之间的关系)。
{"title":"Study of text based mining","authors":"Ranjna Garg, Heena","doi":"10.1145/2007052.2007054","DOIUrl":"https://doi.org/10.1145/2007052.2007054","url":null,"abstract":"Text based Mining is the process of analyzing a document or set of documents to understand the content and meaning of the information they contain. Text Mining enhances human's ability to Process massive quantities of information and it has high Commercial values. Text mining, sometimes alternately referred to as text data mining, roughly, process of deriving high-quality information from text. High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning. It usually involves the process of structuring the input text deriving patterns within the structured data, and finally evaluation and interpretation of the output. 'High quality' in text mining usually refers to some combination of relevance, novelty, and interestingness. Typical text mining tasks include text categorization, text clustering, concept/entity extraction, analysis and entity relation modeling (i.e., learning relations between named entities).","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DMX in MANETs: major research trends since 2004 自2004年以来的主要研究趋势
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007063
Bharti Sharma, R. S. Bhatia, Awadhesh Kumar Singh
The last decade has witnessed a tremendous increase in the popularity of mobile ad hoc networks (MANETs). The major computing challenges of distributed environment become more insidious when we try to address them in mobile ad hoc scenario. The distributed mutual exclusion (DMX) is one of the heavily researched topics of distributed computing. Although, a flurry of DMX protocols exists for static as well as cellular mobile distributed systems, the DMX in MANETs is comparatively less explored area of research. In 2004, Benchaiba et al. [7] presented a survey of the topic. Since then a considerable number of protocols have been published. The article presents an overview of the major contributions related to distributed mutual exclusion in MANETs, precisely after publication of the paper [7] in 2004.
在过去的十年中,移动自组织网络(manet)的普及程度有了巨大的增长。当我们试图在移动临时场景中解决这些问题时,分布式环境的主要计算挑战变得更加隐蔽。分布式互斥(DMX)是分布式计算研究的热点之一。尽管在静态和蜂窝移动分布式系统中存在一系列DMX协议,但在manet中的DMX是一个相对较少探索的研究领域。2004年,Benchaiba等人[7]对该主题进行了调查。从那时起,已经出版了相当数量的协议。本文概述了2004年论文[7]发表后,与manet中分布式互斥相关的主要贡献。
{"title":"DMX in MANETs: major research trends since 2004","authors":"Bharti Sharma, R. S. Bhatia, Awadhesh Kumar Singh","doi":"10.1145/2007052.2007063","DOIUrl":"https://doi.org/10.1145/2007052.2007063","url":null,"abstract":"The last decade has witnessed a tremendous increase in the popularity of mobile ad hoc networks (MANETs). The major computing challenges of distributed environment become more insidious when we try to address them in mobile ad hoc scenario. The distributed mutual exclusion (DMX) is one of the heavily researched topics of distributed computing. Although, a flurry of DMX protocols exists for static as well as cellular mobile distributed systems, the DMX in MANETs is comparatively less explored area of research. In 2004, Benchaiba et al. [7] presented a survey of the topic. Since then a considerable number of protocols have been published. The article presents an overview of the major contributions related to distributed mutual exclusion in MANETs, precisely after publication of the paper [7] in 2004.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modeling and designing of machine learning procedures as applied to game playing using artificial intelligence 机器学习程序的建模和设计,应用于使用人工智能玩游戏
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007080
A. Dhawan, Jaswinder Singh
In this paper, we are proposing a method which is different from many practical computer programs have been developed to exhibit useful types of learning. For problems such as speech recognition, different algorithms based on machine learning outperform all other approaches that have been attempted to date. In the field known as data mining, machine learning algorithms are being used commonly to discover valuable knowledge from large commercial databases containing equipment maintenance records, loan applications, financial transactions, medical records etc. Thus, it seems inevitable that machine learning will play an integral role in computer science and computer technology. In this paper, modeling and designing of a general learning system is proposed that presents new machine learning procedures used to arrive at "knowledgeable" static evaluators for checker board positions. The static evaluators are compared with each other, and with the linear polynomial using two different numerical indices reflecting the extent to which they agree with the choices of checker experts in the course of tabulated book games. The new static evaluators are found to perform about equally well, despite the relative simplicity of the second; and they perform noticeably better than the linear polynomial.
在本文中,我们提出了一种不同于许多实际计算机程序的方法来展示有用的学习类型。对于语音识别等问题,基于机器学习的不同算法比迄今为止尝试过的所有其他方法都要好。在数据挖掘领域,机器学习算法通常用于从包含设备维护记录、贷款申请、金融交易、医疗记录等的大型商业数据库中发现有价值的知识。因此,机器学习在计算机科学和计算机技术中扮演不可或缺的角色似乎是不可避免的。在本文中,提出了一个通用学习系统的建模和设计,该系统提出了新的机器学习过程,用于到达棋盘位置的“知识渊博”静态评估器。用两种不同的数值指标对静态评价者进行了比较,并与线性多项式进行了比较,反映了他们在表格游戏过程中与跳棋专家的选择的一致程度。尽管第二种方法相对简单,但人们发现新的静态评估器的表现同样良好;它们的性能明显优于线性多项式。
{"title":"Modeling and designing of machine learning procedures as applied to game playing using artificial intelligence","authors":"A. Dhawan, Jaswinder Singh","doi":"10.1145/2007052.2007080","DOIUrl":"https://doi.org/10.1145/2007052.2007080","url":null,"abstract":"In this paper, we are proposing a method which is different from many practical computer programs have been developed to exhibit useful types of learning. For problems such as speech recognition, different algorithms based on machine learning outperform all other approaches that have been attempted to date. In the field known as data mining, machine learning algorithms are being used commonly to discover valuable knowledge from large commercial databases containing equipment maintenance records, loan applications, financial transactions, medical records etc. Thus, it seems inevitable that machine learning will play an integral role in computer science and computer technology.\u0000 In this paper, modeling and designing of a general learning system is proposed that presents new machine learning procedures used to arrive at \"knowledgeable\" static evaluators for checker board positions. The static evaluators are compared with each other, and with the linear polynomial using two different numerical indices reflecting the extent to which they agree with the choices of checker experts in the course of tabulated book games. The new static evaluators are found to perform about equally well, despite the relative simplicity of the second; and they perform noticeably better than the linear polynomial.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in real time multimedia data based on generalized keys 基于广义密钥的实时多媒体数据安全
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007071
Raj Kumar, Divya Gupta
In this paper, address the problem of encryption/decryption regions of interest in a video sequence for the purpose of security in video data. The proposed an efficient solution based on 3D encryption/decryption based. More specifically the videos files breaks different frames as 2D based digital images, after 2D based images encrypt/decrypt by the 2D generalized algorithms. The simulation results show that the mechanism can be successfully applied to obscure information in regions of the interest in the scene which provides the different level of security. Further, the keys values are flexible and allow choosing different types for security purpose.
在本文中,为了视频数据的安全性,解决了视频序列中感兴趣的加密/解密区域问题。提出了一种基于三维加密/解密的高效解决方案。更具体地说,视频文件将不同的帧分解为基于2D的数字图像,然后通过2D广义算法对基于2D的图像进行加密/解密。仿真结果表明,该机制可以成功地应用于场景中感兴趣区域的信息模糊,提供了不同级别的安全性。此外,键值是灵活的,允许出于安全目的选择不同的类型。
{"title":"Security in real time multimedia data based on generalized keys","authors":"Raj Kumar, Divya Gupta","doi":"10.1145/2007052.2007071","DOIUrl":"https://doi.org/10.1145/2007052.2007071","url":null,"abstract":"In this paper, address the problem of encryption/decryption regions of interest in a video sequence for the purpose of security in video data. The proposed an efficient solution based on 3D encryption/decryption based. More specifically the videos files breaks different frames as 2D based digital images, after 2D based images encrypt/decrypt by the 2D generalized algorithms. The simulation results show that the mechanism can be successfully applied to obscure information in regions of the interest in the scene which provides the different level of security. Further, the keys values are flexible and allow choosing different types for security purpose.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparative study of ICA algorithms for ECG signal processing 心电信号处理中ICA算法的比较研究
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007079
M. Sarfraz, Francis F. Li, Mohammad Javed
Electro Cardiogram (ECG) signals are affected by various kinds of noise and artifacts that may hide important information of interest. Independent component analysis is a new technique suitable for separating independent component from ECG complexes. This paper compares the various Independent Component Analysis (ICA) algorithms with respect to their capability to remove noise from ECG. The data bases of ECG samples attributing to different beat types were sampled from MIT-BIH arrhythmia database for experiment. We compare the signal to noise ratio (SNR) improvement in the real ECG data with different ICA algorithms also we compare the SNR for simulated ECG signal on matlab; giving the selection choice of various ICA algorithms for different database.
心电图(ECG)信号受到各种噪声和伪影的影响,这些噪声和伪影可能会隐藏重要的感兴趣的信息。独立分量分析是一种适用于分离心电图复合体中独立分量的新技术。本文比较了各种独立分量分析(ICA)算法去除心电噪声的能力。从MIT-BIH心律失常数据库中抽取不同心跳类型的心电图样本数据库进行实验。比较了不同ICA算法对真实心电数据信噪比的改善,并在matlab上比较了模拟心电信号的信噪比;给出了针对不同数据库的ICA算法的选择选择。
{"title":"A comparative study of ICA algorithms for ECG signal processing","authors":"M. Sarfraz, Francis F. Li, Mohammad Javed","doi":"10.1145/2007052.2007079","DOIUrl":"https://doi.org/10.1145/2007052.2007079","url":null,"abstract":"Electro Cardiogram (ECG) signals are affected by various kinds of noise and artifacts that may hide important information of interest. Independent component analysis is a new technique suitable for separating independent component from ECG complexes. This paper compares the various Independent Component Analysis (ICA) algorithms with respect to their capability to remove noise from ECG. The data bases of ECG samples attributing to different beat types were sampled from MIT-BIH arrhythmia database for experiment. We compare the signal to noise ratio (SNR) improvement in the real ECG data with different ICA algorithms also we compare the SNR for simulated ECG signal on matlab; giving the selection choice of various ICA algorithms for different database.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"33 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A model for estimating efforts required to make changes in a software development project 用于估计在软件开发项目中进行更改所需的工作量的模型
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007088
K. Jeet, R. Dhir
Research on software quality is as old as software project management. As in other engineering and science disciplines, one approach to understand and control this issue is the use of models. These, quality models have become a well-accepted means to describe and manage software quality. Statistical techniques like Bayesians Networks are used to access and predict software quality by using these quality models. But they are not very accurate. These models lack clarity and operation. In this paper, we propose to develop software model that uses a fuzzy inference approach to access and predict software quality. This model indicates the impact of implementation, quality assurance and analysis on maintenance (an important factor for measuring quality) and the result is studied by the impact on indicator like average efforts required to maintain a project.
对软件质量的研究与软件项目管理一样古老。正如在其他工程和科学学科中一样,理解和控制这个问题的一种方法是使用模型。这些质量模型已经成为一种被广泛接受的描述和管理软件质量的方法。像贝叶斯网络这样的统计技术通过使用这些质量模型来访问和预测软件质量。但它们不是很准确。这些模型缺乏清晰度和可操作性。在本文中,我们提出了一个使用模糊推理方法来访问和预测软件质量的软件模型。该模型表明了实施、质量保证和分析对维护(衡量质量的一个重要因素)的影响,并通过对维护项目所需的平均工作量等指标的影响来研究结果。
{"title":"A model for estimating efforts required to make changes in a software development project","authors":"K. Jeet, R. Dhir","doi":"10.1145/2007052.2007088","DOIUrl":"https://doi.org/10.1145/2007052.2007088","url":null,"abstract":"Research on software quality is as old as software project management. As in other engineering and science disciplines, one approach to understand and control this issue is the use of models. These, quality models have become a well-accepted means to describe and manage software quality. Statistical techniques like Bayesians Networks are used to access and predict software quality by using these quality models. But they are not very accurate. These models lack clarity and operation. In this paper, we propose to develop software model that uses a fuzzy inference approach to access and predict software quality. This model indicates the impact of implementation, quality assurance and analysis on maintenance (an important factor for measuring quality) and the result is studied by the impact on indicator like average efforts required to maintain a project.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adapting intelligence in robot using fuzzy logic 基于模糊逻辑的机器人智能自适应
Pub Date : 2011-07-21 DOI: 10.1145/2007052.2007084
Vaishali Sood
Research in robot motion control offers research opportunities that will emulate human decision making capabilities to perfection in years to come. Autonomous robots roles are increasing in different aspects of engineering and everyday life. This paper describes an autonomous robot motion control system based on fuzzy logic Proportional Integral Derivative (PID) controller. Fuzzy rules are embedded in the controller to tune the gain parameters of PID and to make them helpful in real time applications. This paper discusses the design aspects of fuzzy PID controller for mobile robot that decrease rise time, remove steady sate error quickly and avoids overshoot. The performance of robot design has been verified with rule based evaluation using Matlab and results obtained have been found to be robust. Overall, the performances criteria in terms of its response towards rise time, steady sate error and overshoot have been found to be good.
在机器人运动控制的研究提供了研究机会,将模仿人类的决策能力,以完善在未来几年。自主机器人在工程和日常生活的各个方面的作用越来越大。介绍了一种基于模糊比例积分导数(PID)控制器的机器人自主运动控制系统。在控制器中嵌入模糊规则对PID的增益参数进行整定,使其在实时应用中更有帮助。本文讨论了移动机器人模糊PID控制器的设计要点,以减少上升时间,快速消除稳态安全误差,避免超调。利用Matlab对机器人设计的性能进行了基于规则的评估验证,结果具有鲁棒性。总体而言,其对上升时间响应、稳态安全误差和超调量的性能指标是良好的。
{"title":"Adapting intelligence in robot using fuzzy logic","authors":"Vaishali Sood","doi":"10.1145/2007052.2007084","DOIUrl":"https://doi.org/10.1145/2007052.2007084","url":null,"abstract":"Research in robot motion control offers research opportunities that will emulate human decision making capabilities to perfection in years to come. Autonomous robots roles are increasing in different aspects of engineering and everyday life. This paper describes an autonomous robot motion control system based on fuzzy logic Proportional Integral Derivative (PID) controller. Fuzzy rules are embedded in the controller to tune the gain parameters of PID and to make them helpful in real time applications. This paper discusses the design aspects of fuzzy PID controller for mobile robot that decrease rise time, remove steady sate error quickly and avoids overshoot. The performance of robot design has been verified with rule based evaluation using Matlab and results obtained have been found to be robust. Overall, the performances criteria in terms of its response towards rise time, steady sate error and overshoot have been found to be good.","PeriodicalId":348804,"journal":{"name":"International Conference on Advances in Computing and Artificial Intelligence","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132668991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Advances in Computing and Artificial Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1