首页 > 最新文献

2019 Third International Conference on Inventive Systems and Control (ICISC)最新文献

英文 中文
Wavelet transform based approach for EEG feature selection of motor imagery data for braincomputer interfaces 基于小波变换的脑机接口运动图像数据脑电特征选择方法
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036445
Piyush Kant, Jupitara Hazarika, S. Laskar
The Electroencephalogram (EEG) signals recorded during motor imagery (MI) tasks are often used as input in the brain-computer interface (BCI) applications. The adaptation of these EEG signals to control signals depend on the selection of an accurate feature that can provide good classification. The study compared various features of alpha frequency band adapting wavelet-based time-frequency analysis approach. The mean, variance, wavelet energy, Shannon entropy, log energy entropy, kurtosis, and skewness feature were extracted from the EEG signals recorded from symmetrical electrode locations of the motor cortex and their performance accuracies were evaluated using SVM and KNN classification algorithms. In results, the Shannon entropy showed the highest classification accuracy of 86.4 % with SVM classifier. Findings of this study establish Shannon entropy as a potential feature to use in EEG-based BCI analysis along with SVM classification algorithm.
在运动想象(MI)任务中记录的脑电图(EEG)信号常被用作脑机接口(BCI)应用的输入。这些脑电信号对控制信号的适应依赖于能够提供良好分类的准确特征的选择。采用基于小波的时频分析方法,比较了α频带的各种特征。从运动皮质对称电极位置记录的脑电信号中提取均值、方差、小波能量、香农熵、对数能量熵、峰度和偏度特征,并利用SVM和KNN分类算法对其性能精度进行评价。结果表明,SVM分类器的Shannon熵分类准确率最高,达到86.4%。本研究的发现将香农熵作为一种潜在的特征,与支持向量机分类算法一起用于基于脑电图的脑机接口分析。
{"title":"Wavelet transform based approach for EEG feature selection of motor imagery data for braincomputer interfaces","authors":"Piyush Kant, Jupitara Hazarika, S. Laskar","doi":"10.1109/ICISC44355.2019.9036445","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036445","url":null,"abstract":"The Electroencephalogram (EEG) signals recorded during motor imagery (MI) tasks are often used as input in the brain-computer interface (BCI) applications. The adaptation of these EEG signals to control signals depend on the selection of an accurate feature that can provide good classification. The study compared various features of alpha frequency band adapting wavelet-based time-frequency analysis approach. The mean, variance, wavelet energy, Shannon entropy, log energy entropy, kurtosis, and skewness feature were extracted from the EEG signals recorded from symmetrical electrode locations of the motor cortex and their performance accuracies were evaluated using SVM and KNN classification algorithms. In results, the Shannon entropy showed the highest classification accuracy of 86.4 % with SVM classifier. Findings of this study establish Shannon entropy as a potential feature to use in EEG-based BCI analysis along with SVM classification algorithm.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126970129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
FPGA Implementation of Multiplier-Accumulator Unit using Vedic multiplier and Reversible gates 使用Vedic乘法器和可逆门的乘法器-累加器单元的FPGA实现
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036345
K. Rajesh, G. Reddy
The design of Multiplier-Accumulator (MAC) unit can be implemented by using the Vedic multiplier along with the reversible logic gates. The designing of Vedic multiplier is designed by using the new sutra called “Urdhava Triyagbhayam”. The performance of the MAC operation depends on the multiplier unit and the adder units. Here the designing of a multiplier and an adder can be designed by using the reversible gates to get the high speed of operation and also a Vedic multiplier is used for the higher performance, lesser area and to reduce the partial products. Nowadays reversible computing will take a more preferable for low power dissipation, higher speed of operation. Here, we proposed an 8, 16, 32, 64-bit Vedic multiplier is designed by using the carry save adder(CSA), the kogge stone adder(KSA) and the DKG adder out of these the proposed DKG gate adder is having the high speed of operation. The comparative analysis is carried out among the ripple carry adder (RCA), carry save adder, kogge stone adder. Finally, it has been proved that the proposed DKG gate with Vedic multiplier-adder is having the high speed of operation. The overall Simulation and synthesis process is carried out with Xilinx ISE 14.7 and is dumped on the FPGA Zynq board.
利用吠陀乘法器和可逆逻辑门,可以实现乘数-累加器(MAC)单元的设计。吠陀乘数的设计是通过使用新的经典“Urdhava Triyagbhayam”来设计的。MAC操作的性能取决于乘法器和加法器。利用可逆门设计乘法器和加法器,可以获得较高的运算速度,同时利用吠陀乘法器获得更高的性能、更小的面积和更少的局部积。目前,可逆计算更倾向于低功耗、高运算速度。在这里,我们提出了一个8,16,32位的吠陀乘法器,通过使用进位保存加法器(CSA), kogge石加法器(KSA)和DKG加法器来设计,其中所提出的DKG门加法器具有较高的运行速度。对波纹进位加法器(RCA)、进位加法器、柯格石加法器进行了比较分析。最后,实验证明了所提出的带有吠陀乘加器的DKG门具有较高的运算速度。整个仿真和合成过程使用Xilinx ISE 14.7进行,并将其转储在FPGA Zynq板上。
{"title":"FPGA Implementation of Multiplier-Accumulator Unit using Vedic multiplier and Reversible gates","authors":"K. Rajesh, G. Reddy","doi":"10.1109/ICISC44355.2019.9036345","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036345","url":null,"abstract":"The design of Multiplier-Accumulator (MAC) unit can be implemented by using the Vedic multiplier along with the reversible logic gates. The designing of Vedic multiplier is designed by using the new sutra called “Urdhava Triyagbhayam”. The performance of the MAC operation depends on the multiplier unit and the adder units. Here the designing of a multiplier and an adder can be designed by using the reversible gates to get the high speed of operation and also a Vedic multiplier is used for the higher performance, lesser area and to reduce the partial products. Nowadays reversible computing will take a more preferable for low power dissipation, higher speed of operation. Here, we proposed an 8, 16, 32, 64-bit Vedic multiplier is designed by using the carry save adder(CSA), the kogge stone adder(KSA) and the DKG adder out of these the proposed DKG gate adder is having the high speed of operation. The comparative analysis is carried out among the ripple carry adder (RCA), carry save adder, kogge stone adder. Finally, it has been proved that the proposed DKG gate with Vedic multiplier-adder is having the high speed of operation. The overall Simulation and synthesis process is carried out with Xilinx ISE 14.7 and is dumped on the FPGA Zynq board.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114328293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Visual Cryptography for colour images using multilevel thresholding 彩色图像的多级阈值视觉密码学
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036432
Pooja Kashyap, A. Renuka
Visual Cryptography Scheme, is even known as VCS. It is actually a cryptography method to encrypt an image by dividing it in parts called shares, where decryption is performed using Human Visual System (HVS), only by overlapping all these shares. The image to be encrypted is called a secret image. Visual Cryptography can be used for binary image, grayscale image as well as colour image. This paper implements visual cryptography technique for colour images, by using multilevel thresholding so as to enhance the obtained quality contrast of reconstructed image.
可视化加密方案,甚至被称为VCS。它实际上是一种加密方法,通过将图像分成称为共享的部分来加密图像,其中使用人类视觉系统(HVS)执行解密,仅通过重叠所有这些共享。要加密的映像称为秘密映像。视觉密码可以用于二值图像、灰度图像和彩色图像。本文实现了彩色图像的视觉密码技术,采用多级阈值法,提高了重建图像的质量对比度。
{"title":"Visual Cryptography for colour images using multilevel thresholding","authors":"Pooja Kashyap, A. Renuka","doi":"10.1109/ICISC44355.2019.9036432","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036432","url":null,"abstract":"Visual Cryptography Scheme, is even known as VCS. It is actually a cryptography method to encrypt an image by dividing it in parts called shares, where decryption is performed using Human Visual System (HVS), only by overlapping all these shares. The image to be encrypted is called a secret image. Visual Cryptography can be used for binary image, grayscale image as well as colour image. This paper implements visual cryptography technique for colour images, by using multilevel thresholding so as to enhance the obtained quality contrast of reconstructed image.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Statistical investigations on hybrid frame assessment tactics for video compression 视频压缩中混合帧评估策略的统计研究
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036393
D. J. Dolly, D. J. Jagannath, J. Dinesh Peter
Video compression is very important for the latest field of science and technology. This paper reports about seven different algorithms which were experimented for video compression. Investigations based on various frame assessment strategy for compressing video is statistically analyzed to demonstrate the best among the seven algorithms. With the purpose to confirm the result, Inter-group analysis in the midst of the some inspected algorithms was estimated using ANOVA test. Amid the verified algorithms, multiple comparisons were evaluated based on the statistical Tukey's honest significant difference analysis to decide the best method among seven algorithms.
视频压缩是一个非常重要的最新科学技术领域。本文报道了7种不同的视频压缩算法。统计分析了基于各种帧评估策略的调查结果,以证明七种算法中的最佳算法。为了证实结果,使用方差分析检验估计了一些被检验算法中间的组间分析。在验证的算法中,根据统计Tukey的诚实显著差异分析进行多次比较评估,以确定七种算法中的最佳方法。
{"title":"Statistical investigations on hybrid frame assessment tactics for video compression","authors":"D. J. Dolly, D. J. Jagannath, J. Dinesh Peter","doi":"10.1109/ICISC44355.2019.9036393","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036393","url":null,"abstract":"Video compression is very important for the latest field of science and technology. This paper reports about seven different algorithms which were experimented for video compression. Investigations based on various frame assessment strategy for compressing video is statistically analyzed to demonstrate the best among the seven algorithms. With the purpose to confirm the result, Inter-group analysis in the midst of the some inspected algorithms was estimated using ANOVA test. Amid the verified algorithms, multiple comparisons were evaluated based on the statistical Tukey's honest significant difference analysis to decide the best method among seven algorithms.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124218910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Android Based Restaurant Automation System with Touch Screen 基于Android的触摸屏餐厅自动化系统
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036365
Renjith V. Ravi, Amrutha N R, Amritha E, Haneena P., Jaseena T.
In this paper, we propose an android based restaurant automation system. The main aim of the project is to make the restaurant management easier. Recently in most of the restaurants, the ordering and delivery of food items are doing manually, the disadvantages are huge time consumption, and in some cases the customers arent delivered the right item at right time these cause many problems. Hence we thought of automating this procedure using modern electronic technology. Here the individual tables in the restaurant are provided with a touch screen, represent each individual digital menu, and it facilitates the ordering. The customer can see all the available food items with its cost in the digital menu and can select the item. The order from each table is received in the kitchen wirelessly by Bluetooth. The electronic menu system helps the people to select the food from the rolling screen of android touch screen and to see the cost and recent availability of food items, and showing table number also. By using a thermal printer taking bill from the kitchen and the hotel staff can read the items from each table. If the food is ready in the kitchen it can be indicated to corresponding customers table by an LED glow.
本文提出了一种基于android的餐饮自动化系统。该项目的主要目的是使餐厅管理更容易。最近在大多数餐馆,食品的订购和交付都是手工完成的,缺点是巨大的时间消耗,在某些情况下,客户没有在正确的时间交付正确的项目,这些导致了许多问题。因此,我们想到利用现代电子技术使这一程序自动化。在这里,餐厅里的每个桌子都有一个触摸屏,代表每个单独的数字菜单,方便点餐。顾客可以在数字菜单上看到所有可用的食品及其价格,并可以选择食品。厨房通过蓝牙无线接收来自每张餐桌的订单。电子菜单系统帮助人们从android触摸屏的滚动屏幕中选择食物,并看到食物的价格和最近的可用性,并显示桌子号。通过使用热敏打印机从厨房取出账单,酒店工作人员可以从每张桌子上读取项目。如果食物在厨房里准备好了,它可以通过LED灯指示相应的客户桌子。
{"title":"An Android Based Restaurant Automation System with Touch Screen","authors":"Renjith V. Ravi, Amrutha N R, Amritha E, Haneena P., Jaseena T.","doi":"10.1109/ICISC44355.2019.9036365","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036365","url":null,"abstract":"In this paper, we propose an android based restaurant automation system. The main aim of the project is to make the restaurant management easier. Recently in most of the restaurants, the ordering and delivery of food items are doing manually, the disadvantages are huge time consumption, and in some cases the customers arent delivered the right item at right time these cause many problems. Hence we thought of automating this procedure using modern electronic technology. Here the individual tables in the restaurant are provided with a touch screen, represent each individual digital menu, and it facilitates the ordering. The customer can see all the available food items with its cost in the digital menu and can select the item. The order from each table is received in the kitchen wirelessly by Bluetooth. The electronic menu system helps the people to select the food from the rolling screen of android touch screen and to see the cost and recent availability of food items, and showing table number also. By using a thermal printer taking bill from the kitchen and the hotel staff can read the items from each table. If the food is ready in the kitchen it can be indicated to corresponding customers table by an LED glow.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121712296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Internet of Things in Retail Using Fuzzy Logic for Customer Loyalty 基于模糊逻辑的零售物联网客户忠诚度研究
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036449
S. Sharma, Laxmi Ahuja, S. Som, S. Khatri
Internet of thing in retail should focus their assets and capacities to improve customer loyalty with the end goal to hold existing clients and pull in new clients. Because loyal customer is a good source of revenue. In any case, there are few studies on customer loyalty using Internet of Thing. The aim of this study is to use sensing device that examine customer loyalty and transmit that data to cloud for further study of customer satisfaction retail industries. To test the research model fuzzy logic approach is included. The result will help to launch loyalty programs, companies to improve the customer equity, to boost the clients' esteem and benefit of organizations
零售业中的物联网应该集中自己的资产和能力来提高客户忠诚度,最终目标是留住现有客户并吸引新客户。因为忠实的客户是一个很好的收入来源。无论如何,利用物联网对客户忠诚度的研究很少。本研究的目的是使用感应装置来检测顾客忠诚度,并将该数据传输到云端,以进一步研究零售行业的顾客满意度。为了检验研究模型,采用了模糊逻辑方法。其结果将有助于推出忠诚度计划,公司提高客户权益,提高客户的尊重和组织的利益
{"title":"Internet of Things in Retail Using Fuzzy Logic for Customer Loyalty","authors":"S. Sharma, Laxmi Ahuja, S. Som, S. Khatri","doi":"10.1109/ICISC44355.2019.9036449","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036449","url":null,"abstract":"Internet of thing in retail should focus their assets and capacities to improve customer loyalty with the end goal to hold existing clients and pull in new clients. Because loyal customer is a good source of revenue. In any case, there are few studies on customer loyalty using Internet of Thing. The aim of this study is to use sensing device that examine customer loyalty and transmit that data to cloud for further study of customer satisfaction retail industries. To test the research model fuzzy logic approach is included. The result will help to launch loyalty programs, companies to improve the customer equity, to boost the clients' esteem and benefit of organizations","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125341297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Pyramid type Wide Band Dielectric Resonator Antenna Using DGS 基于DGS的金字塔型宽带介质谐振器天线设计
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036335
Piyush Sharma, A. Vaish, Rajveer Singh Yadhuvanshi
This paper presents pyramid type of wide-band Dielectric Resonator Antenna(DRA). In this antenna pyramid type of structure is erected over Defective Ground Structure (DGS) to augment the bandwidth of antenna. Pyramid structure of different height of steps is merged. The wide improvement in bandwidth of the DRA is presented with the help of the proper mixing of several modes and is found to be in well agreement for Wide band applications.
本文介绍了一种金字塔型宽带介质谐振器天线。在这种天线中,在缺陷地面结构(DGS)上建立金字塔型结构来增加天线的带宽。不同台阶高度的金字塔结构被合并。通过几种模式的适当混合,DRA的带宽得到了大幅度的提高,并与宽带应用非常吻合。
{"title":"Design of Pyramid type Wide Band Dielectric Resonator Antenna Using DGS","authors":"Piyush Sharma, A. Vaish, Rajveer Singh Yadhuvanshi","doi":"10.1109/ICISC44355.2019.9036335","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036335","url":null,"abstract":"This paper presents pyramid type of wide-band Dielectric Resonator Antenna(DRA). In this antenna pyramid type of structure is erected over Defective Ground Structure (DGS) to augment the bandwidth of antenna. Pyramid structure of different height of steps is merged. The wide improvement in bandwidth of the DRA is presented with the help of the proper mixing of several modes and is found to be in well agreement for Wide band applications.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence Based Path Finding and Decision Making in First Person Shooting Game 基于人工智能的第一人称射击游戏寻径与决策
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036471
Kunal Singh, A. Singh, S. Khatri, S. Som
Artificial Intelligence (AI) is one of the essential parts of gaming industry. In this paper, we have examined how Artificial intelligence technology is effectively used to solve the problems that arise while developing a game and integrate new features to the game. In this research paper, two algorithms are examined they are, path finding of the bots and bots decision making. Few AI techniques are discussed in this paper and how these techniques are used to provide solution to the problems that occur in the games. These techniques are also taken into consideration to provide new features into the computer games. This paper aims to discuss on the Finite State Machine and A* methodologies, which helps in the decision making of a bot and also to find the path towards the goal.
人工智能(AI)是游戏产业的重要组成部分之一。在本文中,我们研究了如何有效地使用人工智能技术来解决游戏开发过程中出现的问题,并将新功能整合到游戏中。本文主要研究了机器人的寻径算法和机器人的决策算法。本文很少讨论AI技术,以及如何使用这些技术为游戏中出现的问题提供解决方案。这些技术也被考虑到为电脑游戏提供新的功能。本文旨在讨论有限状态机和A*方法,这有助于机器人的决策,并找到通往目标的路径。
{"title":"Artificial Intelligence Based Path Finding and Decision Making in First Person Shooting Game","authors":"Kunal Singh, A. Singh, S. Khatri, S. Som","doi":"10.1109/ICISC44355.2019.9036471","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036471","url":null,"abstract":"Artificial Intelligence (AI) is one of the essential parts of gaming industry. In this paper, we have examined how Artificial intelligence technology is effectively used to solve the problems that arise while developing a game and integrate new features to the game. In this research paper, two algorithms are examined they are, path finding of the bots and bots decision making. Few AI techniques are discussed in this paper and how these techniques are used to provide solution to the problems that occur in the games. These techniques are also taken into consideration to provide new features into the computer games. This paper aims to discuss on the Finite State Machine and A* methodologies, which helps in the decision making of a bot and also to find the path towards the goal.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"87 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of Gesture Recognition and Writing Text Virtually Using Finger 手势识别与虚拟手指书写的设计与实现
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036450
K. Sivamani, R. Seetharaman, D. Nedumaran
This paper deals with real time gesture recognition and writing alphanumeric letters over the air using fingertip. The human and machine interaction lays an important role in gesture recognition. The proposed method contains two parts: First, a video camera is used to acquire the image for gesture recognition and then the fingertip is recognized from the live video frames. In this work, the Optical Character Recognition (OCR) algorithm is applied to plot the alphanumeric characters with respect to the finger movement. As a result, we can eliminate the requirements of the input devices like keypad, mouse, stylus, stick, and glove or pen and so on. Using Python language coding, we have obtained the text on the screen. Further, recognition of gesture does not require sensors or any hardware other than a camera. Since, the proposed work is a simulation based approach; hence the developed algorithm executes the recognition task in a simple, fast and lucid manner.
本文研究了实时手势识别和用指尖在空中书写字母数字字母。人机交互在手势识别中占有重要地位。该方法包括两个部分:首先,利用摄像机获取图像进行手势识别,然后从实时视频帧中识别指纹。在这项工作中,光学字符识别(OCR)算法应用于绘制相对于手指运动的字母数字字符。因此,我们可以消除输入设备的要求,如键盘,鼠标,手写笔,手写棒,手套或笔等。使用Python语言编码,我们获得了屏幕上的文本。此外,手势识别不需要传感器或除摄像头以外的任何硬件。由于所提出的工作是基于仿真的方法;因此,所开发的算法以简单、快速、清晰的方式执行识别任务。
{"title":"Design and Implementation of Gesture Recognition and Writing Text Virtually Using Finger","authors":"K. Sivamani, R. Seetharaman, D. Nedumaran","doi":"10.1109/ICISC44355.2019.9036450","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036450","url":null,"abstract":"This paper deals with real time gesture recognition and writing alphanumeric letters over the air using fingertip. The human and machine interaction lays an important role in gesture recognition. The proposed method contains two parts: First, a video camera is used to acquire the image for gesture recognition and then the fingertip is recognized from the live video frames. In this work, the Optical Character Recognition (OCR) algorithm is applied to plot the alphanumeric characters with respect to the finger movement. As a result, we can eliminate the requirements of the input devices like keypad, mouse, stylus, stick, and glove or pen and so on. Using Python language coding, we have obtained the text on the screen. Further, recognition of gesture does not require sensors or any hardware other than a camera. Since, the proposed work is a simulation based approach; hence the developed algorithm executes the recognition task in a simple, fast and lucid manner.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Workload and SLA Violation Prediction in Cloud Computing 云计算中的工作负载和SLA冲突预测
Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036437
R. Anitha, C. Vidyaraj
Recently, cloud computing has come up as an evolving technology in various real-time computing field and widely adopted in several real-time computing systems. Due to its advantages of pay-as-you go services where users need not consider other factors such as hardware and platforms. Due to increasing demand of these applications, providing efficient resource and managing these resources is a crucial task because wastages of resources can lead towards the economic loss to the users and service providers. In order to deal with these issues, we focus on the workload prediction and SLA violation prediction approach for improving the overall performance. According to the proposed model, we develop a workload prediction model using clustering approach where similar workload patterns are grouped together to reduce the overhead and later SLA violation scheme is applied which is used for reducing the violations using Naïve Bayes classification approach. Finally, comparative experimental study is carried out which shows that the proposed approach archives better performance when compared with the state-of-art techniques.
近年来,云计算作为一种新兴的实时计算技术出现在各个实时计算领域,并被广泛应用于多种实时计算系统中。由于它的即用即付服务的优势,用户不需要考虑硬件和平台等其他因素。由于这些应用的需求不断增加,提供有效的资源和管理这些资源是一项至关重要的任务,因为资源的浪费可能导致用户和服务提供商的经济损失。为了解决这些问题,我们重点研究了工作负载预测和SLA违反预测方法,以提高整体性能。根据所提出的模型,我们使用聚类方法开发了一个工作负载预测模型,其中将相似的工作负载模式分组在一起以减少开销,并使用Naïve贝叶斯分类方法应用后来的SLA违规方案来减少违规。最后,进行了对比实验研究,结果表明该方法与现有方法相比具有更好的性能。
{"title":"Workload and SLA Violation Prediction in Cloud Computing","authors":"R. Anitha, C. Vidyaraj","doi":"10.1109/ICISC44355.2019.9036437","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036437","url":null,"abstract":"Recently, cloud computing has come up as an evolving technology in various real-time computing field and widely adopted in several real-time computing systems. Due to its advantages of pay-as-you go services where users need not consider other factors such as hardware and platforms. Due to increasing demand of these applications, providing efficient resource and managing these resources is a crucial task because wastages of resources can lead towards the economic loss to the users and service providers. In order to deal with these issues, we focus on the workload prediction and SLA violation prediction approach for improving the overall performance. According to the proposed model, we develop a workload prediction model using clustering approach where similar workload patterns are grouped together to reduce the overhead and later SLA violation scheme is applied which is used for reducing the violations using Naïve Bayes classification approach. Finally, comparative experimental study is carried out which shows that the proposed approach archives better performance when compared with the state-of-art techniques.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126224378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 Third International Conference on Inventive Systems and Control (ICISC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1