首页 > 最新文献

2014 World Congress on Computing and Communication Technologies最新文献

英文 中文
Bagging of EEG Signals for Brain Computer Interface 脑机接口中脑电信号的套袋处理
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.42
K. Akilandeswari, G. M. Nasira
Brain-computer interfaces (BCIs) aim to provide a non-muscular channel to communicate with the external world through the use of the brain Electroencephalograph (EEG) activity. A crucial step in such an operation is brain signal processing methods. BCI systems use EEG as it is practical, noninvasive, cheap and has real time capability imaging technology. BCI's efficiency is dependent on brain signal processing methods which classify brain signal patterns accurately in various tasks. The presence of artifacts in raw EEG signal makes it necessary to preprocess the signal for feature extraction. This paper presents a BCI system preprocessing and extracting features from EEG signals through the use of Walsh Hadamard Transform (WHT). Signal classification is done using Bagging techniques.
脑机接口(bci)旨在通过使用脑脑电图(EEG)活动提供与外部世界通信的非肌肉通道。这种手术的关键一步是大脑信号处理方法。脑机接口(BCI)系统采用脑电图(EEG),因为它具有实用、无创、廉价和实时性强的成像技术。脑机接口的工作效率取决于脑信号处理方法能否在各种任务中准确分类脑信号模式。由于原始脑电信号中存在伪影,需要对信号进行预处理以提取特征。提出了一种利用Walsh Hadamard变换(WHT)对脑电信号进行预处理和特征提取的脑机接口系统。信号分类是使用Bagging技术完成的。
{"title":"Bagging of EEG Signals for Brain Computer Interface","authors":"K. Akilandeswari, G. M. Nasira","doi":"10.1109/WCCCT.2014.42","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.42","url":null,"abstract":"Brain-computer interfaces (BCIs) aim to provide a non-muscular channel to communicate with the external world through the use of the brain Electroencephalograph (EEG) activity. A crucial step in such an operation is brain signal processing methods. BCI systems use EEG as it is practical, noninvasive, cheap and has real time capability imaging technology. BCI's efficiency is dependent on brain signal processing methods which classify brain signal patterns accurately in various tasks. The presence of artifacts in raw EEG signal makes it necessary to preprocess the signal for feature extraction. This paper presents a BCI system preprocessing and extracting features from EEG signals through the use of Walsh Hadamard Transform (WHT). Signal classification is done using Bagging techniques.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"111 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115760928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of Retinal Image Features Using Bitplane Separation and Mathematical Morphology 基于位面分离和数学形态学的视网膜图像特征识别
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.44
R. Radha, B. Lakshman
This paper demonstrates a method for the detection and extraction of features like optic disc and macula from the retinal images. Digital fundus images are becoming popular for the diagnosis of ophthalmic pathologies. Due to this, there is an increasing possibility of applying digital image processing techniques and methods in these images to m the make the diagnosis more easier. In this paper first bit plane separation is done to the pre-processed retinal image. To carry the vital information of the location of optic disc and macula are found by bit plane 0 and bit plane 1. The exact boundary is identified by applying mathematical morphology. The proposed algorithm is simple and has been evaluated on the images collected from a reputed eye hospital. An accuracy of 91% was obtained in extracting the optic disc and macula from the retinal image.
本文介绍了一种从视网膜图像中检测和提取视盘、黄斑等特征的方法。数字眼底图像在眼科疾病的诊断中越来越受欢迎。因此,在这些图像中应用数字图像处理技术和方法以使诊断更加容易的可能性越来越大。本文首先对预处理后的视网膜图像进行位平面分离。通过位平面0和位平面1找到视盘和黄斑位置的重要信息。应用数学形态学确定了精确的边界。该算法简单,并在某知名眼科医院采集的图像上进行了验证。从视网膜图像中提取视盘和黄斑的准确率达到91%。
{"title":"Identification of Retinal Image Features Using Bitplane Separation and Mathematical Morphology","authors":"R. Radha, B. Lakshman","doi":"10.1109/WCCCT.2014.44","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.44","url":null,"abstract":"This paper demonstrates a method for the detection and extraction of features like optic disc and macula from the retinal images. Digital fundus images are becoming popular for the diagnosis of ophthalmic pathologies. Due to this, there is an increasing possibility of applying digital image processing techniques and methods in these images to m the make the diagnosis more easier. In this paper first bit plane separation is done to the pre-processed retinal image. To carry the vital information of the location of optic disc and macula are found by bit plane 0 and bit plane 1. The exact boundary is identified by applying mathematical morphology. The proposed algorithm is simple and has been evaluated on the images collected from a reputed eye hospital. An accuracy of 91% was obtained in extracting the optic disc and macula from the retinal image.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125823715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simple Secure Protocol for Wireless Sensor Networks 无线传感器网络的简单安全协议
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.6
B. Manjuprasad, A. Dharani
Security is one of the most important issues in all the fields, wireless sensor networks is not an exception to this. Security in sensor networks can be achieved by data confidentiality, authentication, freshness, and integrity. One of the main mechanisms used for this purpose is encryption and decryption but due to resource constraints of the sensor nodes these mechanism may affect their performance and increase the computational complexity of the nodes. This paper aims to provide a simple secure protocol for providing an efficient secure system with low computational complexity and efficient resource utilization in wireless sensor networks.
安全是各个领域最重要的问题之一,无线传感器网络也不例外。传感器网络的安全性可以通过数据保密性、身份验证、新鲜度和完整性来实现。用于此目的的主要机制之一是加密和解密,但由于传感器节点的资源限制,这些机制可能会影响其性能并增加节点的计算复杂度。本文旨在提供一种简单的安全协议,为无线传感器网络提供一个计算复杂度低、资源利用率高的高效安全系统。
{"title":"Simple Secure Protocol for Wireless Sensor Networks","authors":"B. Manjuprasad, A. Dharani","doi":"10.1109/WCCCT.2014.6","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.6","url":null,"abstract":"Security is one of the most important issues in all the fields, wireless sensor networks is not an exception to this. Security in sensor networks can be achieved by data confidentiality, authentication, freshness, and integrity. One of the main mechanisms used for this purpose is encryption and decryption but due to resource constraints of the sensor nodes these mechanism may affect their performance and increase the computational complexity of the nodes. This paper aims to provide a simple secure protocol for providing an efficient secure system with low computational complexity and efficient resource utilization in wireless sensor networks.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125836248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Approach for Dendroclimatology Using Image Processing Techniques 利用图像处理技术研究树木气候学
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.30
P. Sundari, S. B. R. Kumar
This paper describes an approach for dendroclimatology. Image processing techniques and mathematical models are applied for identifying rings in a tree rings image. Analysing the tree rings pattern is a method of dating the tree, known as dendrochronology. But still the methods have to be improved for better performance. The past climatic changes are recorded in the growth of tree rings. The study of climatic changes in the rings is known as dendroclimatology. The density of tree rings is used to identify the past climate and estimate future also. This paper gives an approach for measuring the distance between two rings which helps for detecting the climate.
本文介绍了一种研究树木气候学的方法。应用图像处理技术和数学模型对树木年轮图像进行年轮识别。分析树木年轮模式是测定树木年代的一种方法,被称为树木年代学。但是这些方法仍然需要改进以获得更好的性能。树木年轮的生长记录了过去的气候变化。对年轮气候变化的研究被称为树木气候学。树木年轮的密度被用来识别过去的气候和估计未来的气候。本文给出了一种测量两环之间距离的方法,这种方法有助于探测气候。
{"title":"An Approach for Dendroclimatology Using Image Processing Techniques","authors":"P. Sundari, S. B. R. Kumar","doi":"10.1109/WCCCT.2014.30","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.30","url":null,"abstract":"This paper describes an approach for dendroclimatology. Image processing techniques and mathematical models are applied for identifying rings in a tree rings image. Analysing the tree rings pattern is a method of dating the tree, known as dendrochronology. But still the methods have to be improved for better performance. The past climatic changes are recorded in the growth of tree rings. The study of climatic changes in the rings is known as dendroclimatology. The density of tree rings is used to identify the past climate and estimate future also. This paper gives an approach for measuring the distance between two rings which helps for detecting the climate.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DIOS Middleware Architecture for the Identification of Performance Factors in E-Shopping With Complex Event Processing 基于复杂事件处理的电子购物性能因素识别的DIOS中间件体系结构
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.49
V. Anitha, S. Karthikeyan, V. K. Kaliappan
Online shopping is an e-commerce model that enables the customers to buy and vend any products over the internet. There are ubiquitous Web Pages that act as a third party dealer who intercede the buyer and the seller. This makes E-shopping customers to deviate from optimal shopping. A customer who seek to buy a product through e-shopping gives a visit to each site to ensure correct pricing and effective delivery. Each customer desires to buy a product from the consummate dealer, which is very tedious and time consuming. Thus to enhance online shopping, a new Dealer Identity in Online Shopping (DIOS) middleware architecture using complex event processing is designed. The time consumption in online shopping is reduced by the analysis of performance factors. The main intention of DIOS system is to provide the paramount dealers for proficient shopping. DIOS Middleware architecture redeems the optimal dealers to client by means of available criteria's like reputation and feedback. By the use of complex event processing, products pricings are serene from various dealer. The feedbacks parameters like cash on delivery, communications of the dealer, popularity, trustworthiness, quality of the product and delivery time, are unruffled from each buyer. On the basis of DIOS system, the optimal dealer is sorted out when pricing, feedback criteria and reputation parameters are met utterly.
网上购物是一种电子商务模式,它使顾客能够通过互联网购买和销售任何产品。无处不在的Web页面充当第三方经销商,为买方和卖方调解。这使得网上购物的顾客偏离了最优购物。通过网上购物购买产品的客户会访问每个网站,以确保正确的定价和有效的交付。每个客户都希望从完美的经销商那里购买产品,这是非常繁琐和耗时的。为了增强网上购物的能力,设计了一种新的基于复杂事件处理的网上购物经销商身份中间件体系结构。通过对性能因素的分析,减少了网上购物的时间消耗。DIOS系统的主要目的是为最重要的经销商提供熟练的购物。DIOS中间件体系结构通过信誉和反馈等可用标准将最优经销商赎回给客户。通过使用复杂事件处理,从各个经销商处获取产品价格。每个买家的反馈参数,如货到付款、经销商的沟通、知名度、可信度、产品质量、交货时间等,都是不受影响的。在DIOS系统的基础上,在完全满足定价标准、反馈标准和信誉参数的情况下,选出最优经销商。
{"title":"DIOS Middleware Architecture for the Identification of Performance Factors in E-Shopping With Complex Event Processing","authors":"V. Anitha, S. Karthikeyan, V. K. Kaliappan","doi":"10.1109/WCCCT.2014.49","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.49","url":null,"abstract":"Online shopping is an e-commerce model that enables the customers to buy and vend any products over the internet. There are ubiquitous Web Pages that act as a third party dealer who intercede the buyer and the seller. This makes E-shopping customers to deviate from optimal shopping. A customer who seek to buy a product through e-shopping gives a visit to each site to ensure correct pricing and effective delivery. Each customer desires to buy a product from the consummate dealer, which is very tedious and time consuming. Thus to enhance online shopping, a new Dealer Identity in Online Shopping (DIOS) middleware architecture using complex event processing is designed. The time consumption in online shopping is reduced by the analysis of performance factors. The main intention of DIOS system is to provide the paramount dealers for proficient shopping. DIOS Middleware architecture redeems the optimal dealers to client by means of available criteria's like reputation and feedback. By the use of complex event processing, products pricings are serene from various dealer. The feedbacks parameters like cash on delivery, communications of the dealer, popularity, trustworthiness, quality of the product and delivery time, are unruffled from each buyer. On the basis of DIOS system, the optimal dealer is sorted out when pricing, feedback criteria and reputation parameters are met utterly.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115956203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Key Cryptosystems Using Chebyshev Polynomials Based on Edge Information 基于边缘信息的切比雪夫多项式公钥密码体制
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.21
S. Vairachilai, M. Kavithadevi, G Gnanajeyaraman Rajaram
Confidential information exchange electronically in a secure way becomes very important in the age of computers. A newly proposed public key crypto method based on Chebyshev polynomials [16] recommend a new approach to data encryption. This paper provides an overview of three major types of public key cryptosystems mainly Diffie-Hellman Key Exchange Algorithm, the RSA Cryptosystem, the ElGamal Encryption Method and their implementation using Chebyshev Polynomials. During the past decade, there has been tremendous interest world-wide image encryption which is based on edge detail. In this method the image divided into two, one is the image contains edges and another is the image without edges, and encrypt the both images using encryption algorithm. The encrypted images are complex for intruder to decode, so it provides a high level of security.
在计算机时代,以安全的方式以电子方式交换机密信息变得非常重要。一种新的基于切比雪夫多项式的公钥加密方法[16]为数据加密提供了一种新的途径。本文概述了三种主要类型的公钥密码系统:Diffie-Hellman密钥交换算法、RSA密码系统、ElGamal加密方法及其使用Chebyshev多项式的实现。近十年来,基于边缘细节的图像加密在世界范围内引起了极大的兴趣。该方法将图像分为两种,一种是包含边缘的图像,另一种是没有边缘的图像,并使用加密算法对这两种图像进行加密。加密的图像对于入侵者来说是复杂的,因此它提供了高级别的安全性。
{"title":"Public Key Cryptosystems Using Chebyshev Polynomials Based on Edge Information","authors":"S. Vairachilai, M. Kavithadevi, G Gnanajeyaraman Rajaram","doi":"10.1109/WCCCT.2014.21","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.21","url":null,"abstract":"Confidential information exchange electronically in a secure way becomes very important in the age of computers. A newly proposed public key crypto method based on Chebyshev polynomials [16] recommend a new approach to data encryption. This paper provides an overview of three major types of public key cryptosystems mainly Diffie-Hellman Key Exchange Algorithm, the RSA Cryptosystem, the ElGamal Encryption Method and their implementation using Chebyshev Polynomials. During the past decade, there has been tremendous interest world-wide image encryption which is based on edge detail. In this method the image divided into two, one is the image contains edges and another is the image without edges, and encrypt the both images using encryption algorithm. The encrypted images are complex for intruder to decode, so it provides a high level of security.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120972087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallel Processing of Big Data Using Power Iteration Clustering over MapReduce 基于MapReduce的功率迭代聚类的大数据并行处理
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.16
D. Jayalatchumy, P. Thambidurai, A. A. Vasumathi
Extracting useful information from dataset measuring in gigabytes and tetra bytes is a real challenge for data miners. Clustering algorithm have the problem of scalability while dealing with big data. The problem can be handled using parallel algorithm by executing them along with input data on high performance computer. The problem with graph based application requires much time for computation. PIC is an algorithm that is simple, fast, relatively scalable which requires the data and its associated matrix to fit in memory and this becomes infeasible for big data applications. Scalability has been increased using p-PIC and this paper focus on exploring different parallelization strategies for minimizing and compelling communication cost. The algorithm works on with a parallel framework MapReduce. P-PIC algorithm deals with Hadoop cloud a parallel store and computing platform implementing p-PIC using Hadoop framework.
从以千兆字节和四字节为单位的数据集中提取有用的信息对数据挖掘者来说是一个真正的挑战。聚类算法在处理大数据时存在可扩展性问题。该问题可以通过并行算法在高性能计算机上与输入数据一起执行来解决。基于图的应用程序需要大量的计算时间。PIC是一种简单、快速、相对可扩展的算法,它要求数据及其相关矩阵适合内存,这对于大数据应用来说是不可行的。使用p-PIC提高了可伸缩性,本文重点探讨了最小化和强制通信成本的不同并行化策略。该算法与并行框架MapReduce一起工作。P-PIC算法处理Hadoop云,一个并行存储和计算平台,使用Hadoop框架实现P-PIC。
{"title":"Parallel Processing of Big Data Using Power Iteration Clustering over MapReduce","authors":"D. Jayalatchumy, P. Thambidurai, A. A. Vasumathi","doi":"10.1109/WCCCT.2014.16","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.16","url":null,"abstract":"Extracting useful information from dataset measuring in gigabytes and tetra bytes is a real challenge for data miners. Clustering algorithm have the problem of scalability while dealing with big data. The problem can be handled using parallel algorithm by executing them along with input data on high performance computer. The problem with graph based application requires much time for computation. PIC is an algorithm that is simple, fast, relatively scalable which requires the data and its associated matrix to fit in memory and this becomes infeasible for big data applications. Scalability has been increased using p-PIC and this paper focus on exploring different parallelization strategies for minimizing and compelling communication cost. The algorithm works on with a parallel framework MapReduce. P-PIC algorithm deals with Hadoop cloud a parallel store and computing platform implementing p-PIC using Hadoop framework.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133023764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identification of Multiple Paths in Smarter Buildings Networks 智能建筑网络中的多路径识别
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.38
S. Rajaraajeswari, R. Selvarani, P. Raj
There are software solutions for automating most of the processes and functionalities associated with the automation and management of a variety of our living environments such as homes, buildings, apartments, offices, manufacturing plants, hospitals, etc. Smarter services, systems and networks collectively play a very compelling role in visualizing and establishing next-generation personal as well as professional environments. However there are several notable challenges in implementing smarter networks which aid in crafting people-centric and adaptive applications and services. One among them is the network path optimization requirement. There are several methods and mechanisms in place for optimizing network path identification. The current approaches need to improve to suit for smarter buildings networks to live up to their expectations. In this paper, we have taken up the popular and proven Dijkstra algorithm and come out with a much-improved algorithm for realizing the much-anticipated flexibility and controllability in network path identification and optimization.
有一些软件解决方案可以自动化与各种生活环境(如家庭、建筑物、公寓、办公室、制造工厂、医院等)的自动化和管理相关的大多数过程和功能。智能服务、系统和网络共同在可视化和建立下一代个人和职业环境方面发挥着非常引人注目的作用。然而,在实现更智能的网络方面存在一些显著的挑战,这些网络有助于打造以人为本的自适应应用和服务。其中之一是网络路径优化需求。有几种方法和机制可用于优化网络路径识别。目前的方法需要改进,以适应更智能的建筑网络,以达到他们的期望。在本文中,我们采用了流行的和被证明的Dijkstra算法,并提出了一个改进的算法,以实现人们期待的网络路径识别和优化的灵活性和可控制性。
{"title":"Identification of Multiple Paths in Smarter Buildings Networks","authors":"S. Rajaraajeswari, R. Selvarani, P. Raj","doi":"10.1109/WCCCT.2014.38","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.38","url":null,"abstract":"There are software solutions for automating most of the processes and functionalities associated with the automation and management of a variety of our living environments such as homes, buildings, apartments, offices, manufacturing plants, hospitals, etc. Smarter services, systems and networks collectively play a very compelling role in visualizing and establishing next-generation personal as well as professional environments. However there are several notable challenges in implementing smarter networks which aid in crafting people-centric and adaptive applications and services. One among them is the network path optimization requirement. There are several methods and mechanisms in place for optimizing network path identification. The current approaches need to improve to suit for smarter buildings networks to live up to their expectations. In this paper, we have taken up the popular and proven Dijkstra algorithm and come out with a much-improved algorithm for realizing the much-anticipated flexibility and controllability in network path identification and optimization.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129521040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of MLPFF Neural Network Back Propagation Training Algorithms for Time Series Data 时间序列数据的MLPFF神经网络反向传播训练算法性能分析
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.47
D. A. Kumar, T. Yu, K. Huarng
This paper investigates the various training algorithm with Multi-Layer Perceptron Feed Forward Neural Network (MLPFFNN) and identify the best training algorithm for Indian Stock Exchange Market especially for BSE100 and NIFTY MIDCAP50. The forecasting accuracy is analyzed and measured with reference to an Indian stock market index such as Bombay Stock Exchange (BSE) and NIFTY MIDCAP50 in this study and it is found that the best training algorithm is Levenberg-Marquardt. All Training algorithms uses the 1-5-1 MLPFFNN architecture and its various parameter such as epochs, learning rate, etc are studied and the results are tabulated for the data division ratio 60%, 20% and 20% which represents training, validating and testing for all training algorithm.
本文研究了多层感知器前馈神经网络(MLPFFNN)的各种训练算法,并确定了印度证券交易所市场特别是BSE100和NIFTY MIDCAP50的最佳训练算法。本研究参照印度股票市场指数如Bombay stock Exchange (BSE)和NIFTY MIDCAP50对预测精度进行了分析和测量,发现最好的训练算法是Levenberg-Marquardt。所有的训练算法都采用了1-5-1 MLPFFNN架构,并对其各个参数如epoch、学习率等进行了研究,结果以数据分割率60%、20%和20%为表,分别代表对所有训练算法的训练、验证和测试。
{"title":"Performance Analysis of MLPFF Neural Network Back Propagation Training Algorithms for Time Series Data","authors":"D. A. Kumar, T. Yu, K. Huarng","doi":"10.1109/WCCCT.2014.47","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.47","url":null,"abstract":"This paper investigates the various training algorithm with Multi-Layer Perceptron Feed Forward Neural Network (MLPFFNN) and identify the best training algorithm for Indian Stock Exchange Market especially for BSE100 and NIFTY MIDCAP50. The forecasting accuracy is analyzed and measured with reference to an Indian stock market index such as Bombay Stock Exchange (BSE) and NIFTY MIDCAP50 in this study and it is found that the best training algorithm is Levenberg-Marquardt. All Training algorithms uses the 1-5-1 MLPFFNN architecture and its various parameter such as epochs, learning rate, etc are studied and the results are tabulated for the data division ratio 60%, 20% and 20% which represents training, validating and testing for all training algorithm.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Secure Localized Node Positioning in Mobile Ad-Hoc Networks Using PSO 基于粒子群算法的移动Ad-Hoc网络中的安全节点定位
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.29
V. Subburaj, K. Chitra
The result of various routing protocol of mobile ad-hoc networks use the concept of Euclidean space. Such approaches of this system will avail the mobile nodes position from previously used distance which measures static and dynamic mobile node positioning. The number of security issues increase when node position is known in advance. To put forth this, our strategy is to defect such security breaches using PSO and make an effective IDS. The simulated result portrays DREAM protocol to shoot out Sybil attack that replicates mobile id within the boundary. Our assumption is that the mobile boundary has the account of mobile node and its neighbor with their distance measurement taken from routing protocol. The usage of PSO provides fitness value that tends to identify the mobile node neighbor within the boundary and thus enhances secure zone for ad-hoc transmission.
各种移动自组网路由协议的结果都使用了欧几里得空间的概念。该方法将利用先前使用的测量静态和动态移动节点定位的距离来获取移动节点位置。如果提前知道节点位置,安全问题的数量就会增加。为了实现这一点,我们的策略是使用PSO来缺陷此类安全漏洞并制作有效的IDS。仿真结果描述了DREAM协议在边界内拦截复制移动id的Sybil攻击。我们的假设是移动边界由移动节点和它的邻居组成,它们的距离测量来自路由协议。利用粒子群算法提供的适应度值倾向于识别边界内的移动节点邻居,从而增强了ad-hoc传输的安全区域。
{"title":"Secure Localized Node Positioning in Mobile Ad-Hoc Networks Using PSO","authors":"V. Subburaj, K. Chitra","doi":"10.1109/WCCCT.2014.29","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.29","url":null,"abstract":"The result of various routing protocol of mobile ad-hoc networks use the concept of Euclidean space. Such approaches of this system will avail the mobile nodes position from previously used distance which measures static and dynamic mobile node positioning. The number of security issues increase when node position is known in advance. To put forth this, our strategy is to defect such security breaches using PSO and make an effective IDS. The simulated result portrays DREAM protocol to shoot out Sybil attack that replicates mobile id within the boundary. Our assumption is that the mobile boundary has the account of mobile node and its neighbor with their distance measurement taken from routing protocol. The usage of PSO provides fitness value that tends to identify the mobile node neighbor within the boundary and thus enhances secure zone for ad-hoc transmission.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124338467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 World Congress on Computing and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1