首页 > 最新文献

2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)最新文献

英文 中文
E-health application using network coding based caching for Information-centric networking (ICN) 为信息中心网络(ICN)使用基于网络编码的缓存的电子卫生应用程序
Kumari Nidhi Lal, Anoj Kumar
Beginning with the recent availability of wireless medical sensor prototype and growing, the need for E-health care application record databases, we analyze the requirement of a unified communication framework in overcoming generation network. This paper proposes Information-centric networking based framework over WBAN as the primary enabler for E-health applications. If users of wireless body area network (WBAN) use IP network, they face many issues such as packet loss, security etc. So, Information-centric network (ICN) is proposed to solve such problems with exploitation many advantages like efficient resource management, scalability, reduction of traffic and security. ICN router has the caching capability to cache the contents. In this way, users of ICN-based WBAN do not need to directly connect with the hospital server to access patient data. Further, we propose a protocol for ICN-WBAN to provide a secure, efficient and reliable E-health application services to meet the required needs of the current IP protocol stack and devices.
从近年来无线医疗传感器原型的可用性和日益增长的对电子医疗应用记录数据库的需求出发,分析了在克服生成网络时对统一通信框架的要求。本文提出了一种基于WBAN的以信息为中心的网络框架,作为电子医疗应用的主要使能器。无线体域网络(WBAN)用户在使用IP网络时,面临着丢包、安全等诸多问题。因此,以信息为中心的网络(Information-centric network, ICN)利用其高效的资源管理、可扩展性、减少流量和安全性等优点来解决这些问题。ICN路由器具有缓存功能,可以缓存内容。这样,基于icn的WBAN用户就不需要直接连接到医院服务器来访问患者数据。为满足当前IP协议栈和设备的需求,提出了一种ICN-WBAN协议,提供安全、高效、可靠的电子医疗应用服务。
{"title":"E-health application using network coding based caching for Information-centric networking (ICN)","authors":"Kumari Nidhi Lal, Anoj Kumar","doi":"10.1109/ICRITO.2017.8342464","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342464","url":null,"abstract":"Beginning with the recent availability of wireless medical sensor prototype and growing, the need for E-health care application record databases, we analyze the requirement of a unified communication framework in overcoming generation network. This paper proposes Information-centric networking based framework over WBAN as the primary enabler for E-health applications. If users of wireless body area network (WBAN) use IP network, they face many issues such as packet loss, security etc. So, Information-centric network (ICN) is proposed to solve such problems with exploitation many advantages like efficient resource management, scalability, reduction of traffic and security. ICN router has the caching capability to cache the contents. In this way, users of ICN-based WBAN do not need to directly connect with the hospital server to access patient data. Further, we propose a protocol for ICN-WBAN to provide a secure, efficient and reliable E-health application services to meet the required needs of the current IP protocol stack and devices.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125188345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Human identification and verification based on signature, fingerprint and iris integration 基于签名、指纹和虹膜一体化的人体身份识别与验证
Vikramaditya Agarwal, A. Sahai, Akshay Gupta, Nidhi Jain
Fingerprint, Signature, Iris biometric identification are some of the best authentication system used nowadays. Biometric system finds its application in fields like passport, banking, mobiles or laptops (i.e. gadgets), houses, offices, Aadhaar Card, forensic depts. etc. The aim of this paper is to discuss the Steps involved in identifying and verifying users using biometric systems along with their advantages and disadvantages. This paper also discusses about various performance parameters, applications and future scope of these biometric systems.
指纹、签名、虹膜等生物识别技术是目前使用的最好的认证系统。生物识别系统在护照,银行,手机或笔记本电脑(即小工具),房屋,办公室,Aadhaar卡,法医部门等领域得到了应用。等。本文的目的是讨论使用生物识别系统识别和验证用户所涉及的步骤以及它们的优缺点。本文还讨论了这些生物识别系统的各种性能参数、应用和未来的范围。
{"title":"Human identification and verification based on signature, fingerprint and iris integration","authors":"Vikramaditya Agarwal, A. Sahai, Akshay Gupta, Nidhi Jain","doi":"10.1109/ICRITO.2017.8342470","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342470","url":null,"abstract":"Fingerprint, Signature, Iris biometric identification are some of the best authentication system used nowadays. Biometric system finds its application in fields like passport, banking, mobiles or laptops (i.e. gadgets), houses, offices, Aadhaar Card, forensic depts. etc. The aim of this paper is to discuss the Steps involved in identifying and verifying users using biometric systems along with their advantages and disadvantages. This paper also discusses about various performance parameters, applications and future scope of these biometric systems.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115202270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The relationship between user preferences in interactive information retrieval evaluation 交互式信息检索评价中用户偏好的关系
Tanisha Gahlawat, P. Bhatia, D. Mehrotra
The paper investigates various factors (System Reliability, User Efficacy, User behavior and User cognitive skills) that affect a user while retrieving information. These factors can be used to improve the efficiency of the system. In this research, we have created a model improving the classical IR model. The factors that affect the user are clubbed together to form a User Characteristic Data (UCD). The system interacts with the UCD to obtain the results as per the user query. The model takes in user's relevance feedback to update the UCD. The objective here is to retrieve better results every time the user wants some information. Therefore, the IIR models should consider these factors while evaluating the documents for the query given by the user for his information need.
本文研究了影响用户检索信息的各种因素(系统可靠性、用户效能、用户行为和用户认知技能)。这些因素可以用来提高系统的效率。在本研究中,我们建立了一个改进经典红外模型的模型。影响用户的因素组合在一起形成用户特征数据(UCD)。系统与UCD交互以根据用户查询获得结果。该模型采用用户的相关性反馈来更新UCD。这里的目标是每次用户需要某些信息时检索更好的结果。因此,IIR模型在为用户提供的信息需求的查询评估文档时应该考虑这些因素。
{"title":"The relationship between user preferences in interactive information retrieval evaluation","authors":"Tanisha Gahlawat, P. Bhatia, D. Mehrotra","doi":"10.1109/ICRITO.2017.8342463","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342463","url":null,"abstract":"The paper investigates various factors (System Reliability, User Efficacy, User behavior and User cognitive skills) that affect a user while retrieving information. These factors can be used to improve the efficiency of the system. In this research, we have created a model improving the classical IR model. The factors that affect the user are clubbed together to form a User Characteristic Data (UCD). The system interacts with the UCD to obtain the results as per the user query. The model takes in user's relevance feedback to update the UCD. The objective here is to retrieve better results every time the user wants some information. Therefore, the IIR models should consider these factors while evaluating the documents for the query given by the user for his information need.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129591272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation based non local means filter for denoising MRI 基于非局部均值滤波分割的MRI去噪方法
N. Joshi, Sarika Jain, Amit Agarwal
Magnetic resonance images contain various types of noise which become an obstacle in the correct diagnosis of any disease. Therefore noise reduction becomes a major task while working with MRI. Denoising of MR images removes the undesirable noise but simultaneously preserves the image features too. Various noise removal techniques have been proposed for handling MR Images. The task of denoising becomes less complex if segmentation is performed along with. This paper suggests a novel method for reducing the effect of noise by amalgamating segmentation technique with a group of denoising filters. The denoising filters include the use of median filter, wiener filter and the Non local means filter.
磁共振图像包含各种类型的噪声,这成为正确诊断任何疾病的障碍。因此,降噪成为MRI工作的主要任务。核磁共振图像去噪在去除不需要的噪声的同时,也保持了图像的特征。各种去噪技术已被提出用于处理磁共振图像。如果同时进行分割,则去噪任务变得不那么复杂。本文提出了一种将分割技术与一组去噪滤波器相结合来降低噪声影响的新方法。去噪滤波器包括中值滤波器、维纳滤波器和非局部均值滤波器。
{"title":"Segmentation based non local means filter for denoising MRI","authors":"N. Joshi, Sarika Jain, Amit Agarwal","doi":"10.1109/ICRITO.2017.8342506","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342506","url":null,"abstract":"Magnetic resonance images contain various types of noise which become an obstacle in the correct diagnosis of any disease. Therefore noise reduction becomes a major task while working with MRI. Denoising of MR images removes the undesirable noise but simultaneously preserves the image features too. Various noise removal techniques have been proposed for handling MR Images. The task of denoising becomes less complex if segmentation is performed along with. This paper suggests a novel method for reducing the effect of noise by amalgamating segmentation technique with a group of denoising filters. The denoising filters include the use of median filter, wiener filter and the Non local means filter.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and analysis of symmetrical notch S shape patch antenna for wideband applications 宽带对称陷波S型贴片天线的设计与分析
Shipra Singh, R. Verma
Herein the analysis anddesign of symmetrical Notch S Shape patch Antenna which has wideband applications. Nowadays Wireless Communication requires such antennas which can be serve for multiple bands instead of a particular band as in conventional antenna system. This is achieved by creating notch in patch. For design of proposed antenna FR-4 having a thickness of 1.6 mm is used as a substrate material. HFSS software is used to design and simulate the proposed antenna. The return loss below −10db is achieved at frequency range from 3.5 GHz to 12 GHz.
本文分析和设计了一种适用于宽带的对称陷波S型贴片天线。目前,无线通信需要的是能够服务于多个频段的天线,而不是传统天线系统中的特定频段。这是通过在贴片中创建缺口来实现的。在天线设计中,采用厚度为1.6 mm的FR-4作为衬底材料。利用HFSS软件对天线进行了设计和仿真。在3.5 GHz到12 GHz的频率范围内,回波损耗低于- 10db。
{"title":"Design and analysis of symmetrical notch S shape patch antenna for wideband applications","authors":"Shipra Singh, R. Verma","doi":"10.1109/ICRITO.2017.8342477","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342477","url":null,"abstract":"Herein the analysis anddesign of symmetrical Notch S Shape patch Antenna which has wideband applications. Nowadays Wireless Communication requires such antennas which can be serve for multiple bands instead of a particular band as in conventional antenna system. This is achieved by creating notch in patch. For design of proposed antenna FR-4 having a thickness of 1.6 mm is used as a substrate material. HFSS software is used to design and simulate the proposed antenna. The return loss below −10db is achieved at frequency range from 3.5 GHz to 12 GHz.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114824083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A detailed study of clustering algorithms 详细研究了聚类算法
Kamalpreet Bindra, Dr Anuranjan Misra
The foremost illustrative task in data mining process is clustering. It plays an exceedingly important role in the entire KDD process also as categorizing data is one of the most rudimentary steps in knowledge discovery. It is an unsupervised learning task used for exploratory data analysis to find some unrevealed patterns which are present in data but cannot be categorized clearly. Sets of data can be designated or grouped together based on some common characteristics and termed clusters, the mechanism involved in cluster analysis are essentially dependent upon the primary task of keeping objects with in a cluster more closer than objects belonging to other groups or clusters. Depending on the data and expected cluster characteristics there are different types of clustering paradigms. In the very recent times many new algorithms have emerged which aim towards bridging the different approaches towards clustering and merging different clustering algorithms given the requirement of handling sequential, extensive data with multiple relationships in many applications across a broad spectrum. Various clustering algorithms have been developed under different paradigms for grouping scattered data points and forming efficient cluster shapes with minimal outliers. This paper attempts to address the problem of creating evenly shaped clusters in detail and aims to study, review and analyze few clustering algorithms falling under different categories of clustering paradigms and presents a detailed comparison of their efficiency, advantages and disadvantages on some common grounds. This study also contributes in correlating some very important characteristics of an efficient clustering algorithm.
数据挖掘过程中最重要的说明性任务是聚类。它在整个KDD过程中扮演着极其重要的角色,因为对数据进行分类是知识发现中最基本的步骤之一。它是一种用于探索性数据分析的无监督学习任务,目的是发现数据中存在但无法清晰分类的一些未揭示的模式。数据集可以根据一些共同的特征被指定或分组在一起,并称为聚类,聚类分析中涉及的机制基本上依赖于保持集群中的对象比属于其他组或集群的对象更接近的主要任务。根据数据和预期的聚类特征,有不同类型的聚类范式。最近出现了许多新的算法,旨在弥合不同的聚类方法,并合并不同的聚类算法,以满足在广泛范围内的许多应用程序中处理具有多个关系的连续、广泛数据的需求。各种聚类算法在不同的范式下被开发出来,用于对分散的数据点进行分组,并形成具有最小离群值的有效聚类形状。本文试图详细地解决均匀形聚类的生成问题,旨在研究、回顾和分析不同聚类范式下的几种聚类算法,并在一些共同点的基础上详细地比较它们的效率和优缺点。该研究还有助于将高效聚类算法的一些非常重要的特征联系起来。
{"title":"A detailed study of clustering algorithms","authors":"Kamalpreet Bindra, Dr Anuranjan Misra","doi":"10.1109/CTCEEC.2017.8454973","DOIUrl":"https://doi.org/10.1109/CTCEEC.2017.8454973","url":null,"abstract":"The foremost illustrative task in data mining process is clustering. It plays an exceedingly important role in the entire KDD process also as categorizing data is one of the most rudimentary steps in knowledge discovery. It is an unsupervised learning task used for exploratory data analysis to find some unrevealed patterns which are present in data but cannot be categorized clearly. Sets of data can be designated or grouped together based on some common characteristics and termed clusters, the mechanism involved in cluster analysis are essentially dependent upon the primary task of keeping objects with in a cluster more closer than objects belonging to other groups or clusters. Depending on the data and expected cluster characteristics there are different types of clustering paradigms. In the very recent times many new algorithms have emerged which aim towards bridging the different approaches towards clustering and merging different clustering algorithms given the requirement of handling sequential, extensive data with multiple relationships in many applications across a broad spectrum. Various clustering algorithms have been developed under different paradigms for grouping scattered data points and forming efficient cluster shapes with minimal outliers. This paper attempts to address the problem of creating evenly shaped clusters in detail and aims to study, review and analyze few clustering algorithms falling under different categories of clustering paradigms and presents a detailed comparison of their efficiency, advantages and disadvantages on some common grounds. This study also contributes in correlating some very important characteristics of an efficient clustering algorithm.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Cloud security architecture based on user authentication and symmetric key cryptographic techniques 基于用户认证和对称密钥加密技术的云安全架构
Abdul Raoof Wani, Q. P. Rana, Nitin Pandey
Cloud computing environment gives people to share resources, services and information. This environment is adopted by large number of organizations, so the rapid transition towards the cloud has fuelled concerns on security perspective. Encryption algorithms play main role in solving such kind of problems in the cloud computing environment. This paper proposes the structure for cloud security with efficient security in communication system and AES based file encryption system. This security architecture can be easily applied on PaaS, IaaS and SaaS and one time password provides extra security in the authenticating users. This paper presents the security of whole cloud computing environment.
云计算环境使人们能够共享资源、服务和信息。这种环境被大量组织采用,因此向云的快速过渡引发了对安全性的担忧。在云计算环境下,加密算法是解决这类问题的主要方法。本文提出了具有高效安全的通信系统和基于AES的文件加密系统的云安全结构。这种安全架构可以很容易地应用于PaaS、IaaS和SaaS,并且一次性密码在验证用户时提供了额外的安全性。本文介绍了整个云计算环境的安全性。
{"title":"Cloud security architecture based on user authentication and symmetric key cryptographic techniques","authors":"Abdul Raoof Wani, Q. P. Rana, Nitin Pandey","doi":"10.1109/ICRITO.2017.8342485","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342485","url":null,"abstract":"Cloud computing environment gives people to share resources, services and information. This environment is adopted by large number of organizations, so the rapid transition towards the cloud has fuelled concerns on security perspective. Encryption algorithms play main role in solving such kind of problems in the cloud computing environment. This paper proposes the structure for cloud security with efficient security in communication system and AES based file encryption system. This security architecture can be easily applied on PaaS, IaaS and SaaS and one time password provides extra security in the authenticating users. This paper presents the security of whole cloud computing environment.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"8 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115676381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An analytical model for performance analysis of mobile ad hoc network using queueing approach 基于排队方法的移动自组网性能分析模型
Dr. Aleem Ali, Neeta Singh
This paper analyses analytical model M/M/1/K/K for Mobile Adhoc Network (MANET) with a finite number of packets and a finite number of nodes. The service disciple for the packets is taken to be First Come First Serve (FCFS). The expression for the various performance measures such as the mean number of packets in the node, Average Waiting Time (AWT), Node Utilization (NU), Queue length distribution, Packet Drop Probability (PDP) and throughput are obtained. Numerical results are presented to facilitate the significance of the model.
本文分析了有限分组数量和有限节点数量的移动自组网(MANET)的M/M/1/K/K分析模型。数据包的服务门徒被认为是先到先得(FCFS)。得到了节点中平均数据包数、平均等待时间(AWT)、节点利用率(NU)、队列长度分布、丢包概率(PDP)和吞吐量等性能指标的表达式。为了说明模型的意义,给出了数值结果。
{"title":"An analytical model for performance analysis of mobile ad hoc network using queueing approach","authors":"Dr. Aleem Ali, Neeta Singh","doi":"10.1109/ICRITO.2017.8342458","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342458","url":null,"abstract":"This paper analyses analytical model M/M/1/K/K for Mobile Adhoc Network (MANET) with a finite number of packets and a finite number of nodes. The service disciple for the packets is taken to be First Come First Serve (FCFS). The expression for the various performance measures such as the mean number of packets in the node, Average Waiting Time (AWT), Node Utilization (NU), Queue length distribution, Packet Drop Probability (PDP) and throughput are obtained. Numerical results are presented to facilitate the significance of the model.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129835520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of radix-4,16,32 approx booth multiplier using Error Tolerant Application 基于容错应用的基数4,16,32近似乘法器设计
G. Jain, Meenal Jain, Gaurav Gupta
Approximate computing has a very important contribution in the multimedia world. Approximate computing consists of arithmetic circuits such as adder, multiplier etc. Which are based on the approximate technique or error tolerant application. These arithmetic circuits have high efficiency and better performance, but less accurate. In an electronic world, many applications are used such as signal processing, network signaling, image processing, neural networks where multiplier is used as an arithmetic circuit. In this way, approximate multiplier shows some mean error which is not so important at large. This multiplier makes significant improvements in power, delay, and area at the expense of reducing accuracy. The approximate multiplier is to use less power and area than conventional truncated multiplier, and keep high speed. Its main purpose is to speed up the speed of arithmetic circuits as well as spend low power. A lot of process is being taken to fulfill this objective Like ETM (Error tolerant Multiplier), UDM (Under designed Multiplier), AWTM (Approx Wallace Tree Multiplier), AM (Approx Multiplier). In this paper, the approximate Booth Multiplier has been designed which works on error tolerant multiplication (ETM) technology and provides high performance for the DSP application. This Error Tolerant Application easily restrict on accuracy and achieve various improvement in power consumption and speed accuracy. A new type of approximate multiplier has been designed in this multiplier which can increase the speed by reducing the partial product of the traditional multiplier. According to this paper is to design such a high-speed radix signed approximate booth multiplier which provides significant improvements in power, delay and area at low cost performance in accuracy.
近似计算在多媒体领域有着非常重要的贡献。近似计算由加法器、乘法器等算术电路组成。它们都是基于近似技术或容错应用。这些算法电路效率高,性能好,但精度较低。在电子世界中,许多应用被使用,如信号处理、网络信号、图像处理、神经网络,其中乘法器被用作算术电路。这样,近似乘法器显示了一些平均误差,这在总体上并不那么重要。这种乘法器在功率、延迟和面积上有了显著的改进,但代价是降低了精度。近似乘法器比传统的截尾乘法器消耗更小的功率和面积,并保持较高的速度。其主要目的是提高运算电路的速度,同时降低功耗。为了实现这一目标,采用了很多方法,比如ETM(容错乘法器)、UDM(设计下乘法器)、AWTM(近似华莱士树乘法器)、AM(近似乘法器)。本文设计了基于容错乘法(ETM)技术的近似布斯乘法器,为DSP应用提供了高性能。这种容错应用很容易限制精度,并实现功耗和速度精度的各种改进。该乘法器设计了一种新型的近似乘法器,通过减少传统乘法器的偏积来提高速度。本文所要设计的就是这样一种高速的基数近似亭乘法器,它在功耗、延迟和面积上都有显著的改进,而且在精度上的性价比很低。
{"title":"Design of radix-4,16,32 approx booth multiplier using Error Tolerant Application","authors":"G. Jain, Meenal Jain, Gaurav Gupta","doi":"10.1109/ICRITO.2017.8342444","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342444","url":null,"abstract":"Approximate computing has a very important contribution in the multimedia world. Approximate computing consists of arithmetic circuits such as adder, multiplier etc. Which are based on the approximate technique or error tolerant application. These arithmetic circuits have high efficiency and better performance, but less accurate. In an electronic world, many applications are used such as signal processing, network signaling, image processing, neural networks where multiplier is used as an arithmetic circuit. In this way, approximate multiplier shows some mean error which is not so important at large. This multiplier makes significant improvements in power, delay, and area at the expense of reducing accuracy. The approximate multiplier is to use less power and area than conventional truncated multiplier, and keep high speed. Its main purpose is to speed up the speed of arithmetic circuits as well as spend low power. A lot of process is being taken to fulfill this objective Like ETM (Error tolerant Multiplier), UDM (Under designed Multiplier), AWTM (Approx Wallace Tree Multiplier), AM (Approx Multiplier). In this paper, the approximate Booth Multiplier has been designed which works on error tolerant multiplication (ETM) technology and provides high performance for the DSP application. This Error Tolerant Application easily restrict on accuracy and achieve various improvement in power consumption and speed accuracy. A new type of approximate multiplier has been designed in this multiplier which can increase the speed by reducing the partial product of the traditional multiplier. According to this paper is to design such a high-speed radix signed approximate booth multiplier which provides significant improvements in power, delay and area at low cost performance in accuracy.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129157527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Finding similarity in articles using various clustering techniques 使用各种聚类技术查找文章的相似性
Deeksha, Shashank Sahu
Clustering is a vital method within which bunching of articles occurred in the groups in such how that articles of a similar group contain a lot of similarity than the articles into other groups. This paper discussed numerous clustering techniques for finding similarity in articles. These clustering techniques are Hierarchical, K-means, and K-medoids clustering. In this paper, the research focus is to compare several distance measures and find out appropriate distance measure that is used to check the similarity in articles. Distance measure performs a crucial role in the performance of these algorithms. We use different distance measure methods of Hierarchical, K-means, and K-medoids clustering. Here, an experimental examines are performed in Matlab and results show that in Hierarchical clustering Euclidean distance measure, in K-means clustering Correlation distance measure, and in K-medoids clustering City block distance measure provides better results.
聚类是一种重要的方法,其中聚类的文章发生在组中,使相似组的文章比其他组的文章包含很多相似之处。本文讨论了用于寻找文章相似性的多种聚类技术。这些聚类技术是分层聚类、K-means聚类和k - medioids聚类。本文的研究重点是比较几种距离度量,找出合适的距离度量来检验文章的相似度。距离度量在这些算法的性能中起着至关重要的作用。我们使用了分层聚类、K-means聚类和k - mediids聚类的不同距离度量方法。本文在Matlab中进行了实验检验,结果表明在分层聚类中欧几里得距离度量,在K-means聚类中相关距离度量,在K-medoids聚类中城市街区距离度量具有较好的效果。
{"title":"Finding similarity in articles using various clustering techniques","authors":"Deeksha, Shashank Sahu","doi":"10.1109/ICRITO.2017.8342449","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342449","url":null,"abstract":"Clustering is a vital method within which bunching of articles occurred in the groups in such how that articles of a similar group contain a lot of similarity than the articles into other groups. This paper discussed numerous clustering techniques for finding similarity in articles. These clustering techniques are Hierarchical, K-means, and K-medoids clustering. In this paper, the research focus is to compare several distance measures and find out appropriate distance measure that is used to check the similarity in articles. Distance measure performs a crucial role in the performance of these algorithms. We use different distance measure methods of Hierarchical, K-means, and K-medoids clustering. Here, an experimental examines are performed in Matlab and results show that in Hierarchical clustering Euclidean distance measure, in K-means clustering Correlation distance measure, and in K-medoids clustering City block distance measure provides better results.","PeriodicalId":357118,"journal":{"name":"2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121508797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1