首页 > 最新文献

2014 World Congress on Computing and Communication Technologies最新文献

英文 中文
Prediction and Diagnosis of Cardio Vascular Disease -- A Critical Survey 心血管疾病的预测和诊断——一项重要调查
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.74
K. Mohan, Ilango Paramasivam, Subhashini Narayan
Cardiovascular diseases related · Coronary heart disease, Angina pectoris, congestive heart failure, Cardiomyopathy, congenital heart disease are the first cause of death in the Asian world. The health care industry collects a huge amount of data which is not properly mined and put into optimum use resulting in these hidden patterns and relationships often going unexploited. Advanced data mining modeling techniques can help overcome these conditions. The health care knowledge management, especially in heart disease, can be improved through the integration of data mining with decision support system. Almost 60% of the world population fall victim to the heart disease. Heart disease management is a complex task requiring much experience and knowledge. Traditional way of predicting heart disease is through physician's examination or a number of medical tests such as ECG Stress test, Heart MRI, CT etc., Computer based information along with advanced data mining techniques are used for appropriate results. The main aim of this study is to detect the various causes of cardiovascular diseases by means of machine-learning techniques with the help of clinical diagnosis. For detecting these image analysis data is used. The aim of this research work is to develop a framework for detecting causes by means of data mining and machine-learning techniques.
心血管疾病相关·冠心病、心绞痛、充血性心力衰竭、心肌病、先天性心脏病是亚洲世界的第一大死亡原因。医疗保健行业收集了大量数据,但这些数据没有得到适当的挖掘和最佳利用,导致这些隐藏的模式和关系往往没有得到利用。先进的数据挖掘建模技术可以帮助克服这些条件。将数据挖掘与决策支持系统相结合,可以提高医疗保健知识管理,特别是心脏病知识管理的水平。世界上几乎60%的人口都是心脏病的受害者。心脏病管理是一项复杂的任务,需要大量的经验和知识。传统的预测心脏病的方法是通过医生的检查或一些医学检查,如心电图压力测试、心脏MRI、CT等,利用计算机为基础的信息和先进的数据挖掘技术来获得适当的结果。本研究的主要目的是在临床诊断的帮助下,利用机器学习技术检测心血管疾病的各种原因。为了检测这些图像,需要使用分析数据。这项研究工作的目的是通过数据挖掘和机器学习技术开发一个检测原因的框架。
{"title":"Prediction and Diagnosis of Cardio Vascular Disease -- A Critical Survey","authors":"K. Mohan, Ilango Paramasivam, Subhashini Narayan","doi":"10.1109/WCCCT.2014.74","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.74","url":null,"abstract":"Cardiovascular diseases related · Coronary heart disease, Angina pectoris, congestive heart failure, Cardiomyopathy, congenital heart disease are the first cause of death in the Asian world. The health care industry collects a huge amount of data which is not properly mined and put into optimum use resulting in these hidden patterns and relationships often going unexploited. Advanced data mining modeling techniques can help overcome these conditions. The health care knowledge management, especially in heart disease, can be improved through the integration of data mining with decision support system. Almost 60% of the world population fall victim to the heart disease. Heart disease management is a complex task requiring much experience and knowledge. Traditional way of predicting heart disease is through physician's examination or a number of medical tests such as ECG Stress test, Heart MRI, CT etc., Computer based information along with advanced data mining techniques are used for appropriate results. The main aim of this study is to detect the various causes of cardiovascular diseases by means of machine-learning techniques with the help of clinical diagnosis. For detecting these image analysis data is used. The aim of this research work is to develop a framework for detecting causes by means of data mining and machine-learning techniques.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127336434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Key Insertion and Splay Tree Encryption Algorithm for Secure Data Outsourcing in Cloud 云环境下安全数据外包的密钥插入和展树加密算法
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.14
A. Mercy, G. Rani, A Marimuthu
Cloud computing is used broadly in various services which contain storage platform and very easy to get to vast calculation. Due to low cost, strength, elasticity and ubiquitous nature, cloud computing changes the path entities to manage their data. In cloud environment, secure outsourcing is one of the active research areas, as the cloud environment can't be trusted. The situation becomes complex when the outsourced data sources in a cloud environment are covenant with multiple outsourcers who are available with different access rights. Key management is one of the important aspects for securing outsourced data in cloud environment. In this paper, a new encryption algorithm called Key Insertion and Splay Tree encryption (KIST) proposed. This algorithm makes use of an asynchronous key series and splay tree for encryption. This encryption approach provides better key management approach for validating the users in the cloud. The experimental result shows that it is very efficient in providing authentication and security to the cloud data.
云计算被广泛应用于各种包含存储平台的服务中,并且非常容易进行大量的计算。由于低成本、强度、弹性和无处不在的特性,云计算改变了实体管理其数据的路径。在云环境中,由于云环境的不可信任性,安全外包成为研究的热点之一。当云环境中的外包数据源与具有不同访问权限的多个外包商签订契约时,情况就变得复杂了。密钥管理是确保云环境中外包数据安全的重要方面之一。本文提出了一种新的加密算法——密钥插入和散列树加密(KIST)。该算法使用异步密钥序列和展开树进行加密。这种加密方法为验证云中的用户提供了更好的密钥管理方法。实验结果表明,该算法在为云数据提供认证和安全性方面是非常有效的。
{"title":"Key Insertion and Splay Tree Encryption Algorithm for Secure Data Outsourcing in Cloud","authors":"A. Mercy, G. Rani, A Marimuthu","doi":"10.1109/WCCCT.2014.14","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.14","url":null,"abstract":"Cloud computing is used broadly in various services which contain storage platform and very easy to get to vast calculation. Due to low cost, strength, elasticity and ubiquitous nature, cloud computing changes the path entities to manage their data. In cloud environment, secure outsourcing is one of the active research areas, as the cloud environment can't be trusted. The situation becomes complex when the outsourced data sources in a cloud environment are covenant with multiple outsourcers who are available with different access rights. Key management is one of the important aspects for securing outsourced data in cloud environment. In this paper, a new encryption algorithm called Key Insertion and Splay Tree encryption (KIST) proposed. This algorithm makes use of an asynchronous key series and splay tree for encryption. This encryption approach provides better key management approach for validating the users in the cloud. The experimental result shows that it is very efficient in providing authentication and security to the cloud data.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126716114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Approach for Diagnosis of Diabetes and Prediction of Cancer Using ANFIS 利用ANFIS诊断糖尿病和预测癌症的新方法
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.66
C. Kalaiselvi, G. M. Nasira
The multi factorial, chronic, severe diseases like diabetes and cancer have complex relationship. When the glucose level of the body goes to abnormal level, it will lead to Blindness, Heart disease, Kidney failure and also Cancer. Epidemiological studies have proved that several cancer types are possible in patients having diabetes. Many researchers proposed methods to diagnose diabetes and cancer. To improve the classification accuracy and to achieve better efficiency a new approach like Adaptive Neuro Fuzzy Inference System (ANFIS) is proposed.
糖尿病、癌症等多因素、慢性、重症疾病的发病关系复杂。当体内的葡萄糖水平达到异常水平时,会导致失明、心脏病、肾衰竭甚至癌症。流行病学研究已经证明,糖尿病患者可能罹患几种癌症。许多研究人员提出了诊断糖尿病和癌症的方法。为了提高分类精度和提高分类效率,提出了一种新的方法——自适应神经模糊推理系统(ANFIS)。
{"title":"A New Approach for Diagnosis of Diabetes and Prediction of Cancer Using ANFIS","authors":"C. Kalaiselvi, G. M. Nasira","doi":"10.1109/WCCCT.2014.66","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.66","url":null,"abstract":"The multi factorial, chronic, severe diseases like diabetes and cancer have complex relationship. When the glucose level of the body goes to abnormal level, it will lead to Blindness, Heart disease, Kidney failure and also Cancer. Epidemiological studies have proved that several cancer types are possible in patients having diabetes. Many researchers proposed methods to diagnose diabetes and cancer. To improve the classification accuracy and to achieve better efficiency a new approach like Adaptive Neuro Fuzzy Inference System (ANFIS) is proposed.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116588346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
An Effective Algorithm for Edges and Veins Detection in Leaf Images 一种有效的叶片图像边缘和纹理检测算法
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.1
R. Radha, S. Jeyalakshmi
Nutrient status of a plant can be diagnosed by detecting the edges and veins of the leaf images since the deficiency symptoms are generally found in interveinal areas and along the edges. This paper proposes an effective algorithm for detecting the edges and veins in leaf images. The proposed algorithm was developed using Canny edge detection method. The algorithm provides accurate and positive results and may prove to be an effective tool in nutrient deficiency detection in leaves.
植物的营养状况可以通过检测叶片图像的边缘和叶脉来诊断,因为缺乏症状通常出现在叶脉间区域和边缘。提出了一种有效的叶片图像边缘和纹理检测算法。该算法采用Canny边缘检测方法。该算法结果准确、阳性,可作为叶片营养缺乏症检测的有效工具。
{"title":"An Effective Algorithm for Edges and Veins Detection in Leaf Images","authors":"R. Radha, S. Jeyalakshmi","doi":"10.1109/WCCCT.2014.1","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.1","url":null,"abstract":"Nutrient status of a plant can be diagnosed by detecting the edges and veins of the leaf images since the deficiency symptoms are generally found in interveinal areas and along the edges. This paper proposes an effective algorithm for detecting the edges and veins in leaf images. The proposed algorithm was developed using Canny edge detection method. The algorithm provides accurate and positive results and may prove to be an effective tool in nutrient deficiency detection in leaves.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125388855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Handwritten Digit Recognition Using K-Nearest Neighbour Classifier 基于k -最近邻分类器的手写数字识别
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.7
Ravi Babu, Venkateswarlu Professor, Head, Aneel Kumar Chintha
This paper presents a new approach to off-line handwritten digit recognition based on structural features which is not required thinning operation and size normalization technique. In this paper uses four different types of structural features namely, number of holes, water reservoirs in four directions, maximum profile distances in four directions, and fill-hole density for the recognition of digits. The digit recognition system mainly depends on which kinds of features are used. The main objective of this paper is to provide efficient and reliable techniques for recognition of handwritten digits. A Euclidean minimum distance criterion is used to find minimum distances and k-nearest neighbor classifier is used to classify the digits. A MNIST database is used for both training and testing the system. 5000 images are used to test the proposed method a total 5000 numeral images are tested and got 96.94% recognition rate.
本文提出了一种基于结构特征的离线手写数字识别方法,该方法不需要细化操作和尺寸归一化技术。本文采用四种不同类型的构造特征,即孔数、四个方向的水库、四个方向的最大剖面距离和填孔密度进行数字识别。数字识别系统主要取决于所使用的特征类型。本文的主要目的是提供高效可靠的手写数字识别技术。使用欧几里得最小距离准则寻找最小距离,使用k近邻分类器对数字进行分类。MNIST数据库用于训练和测试系统。用5000张数字图像对该方法进行了测试,共测试了5000张数字图像,识别率达到96.94%。
{"title":"Handwritten Digit Recognition Using K-Nearest Neighbour Classifier","authors":"Ravi Babu, Venkateswarlu Professor, Head, Aneel Kumar Chintha","doi":"10.1109/WCCCT.2014.7","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.7","url":null,"abstract":"This paper presents a new approach to off-line handwritten digit recognition based on structural features which is not required thinning operation and size normalization technique. In this paper uses four different types of structural features namely, number of holes, water reservoirs in four directions, maximum profile distances in four directions, and fill-hole density for the recognition of digits. The digit recognition system mainly depends on which kinds of features are used. The main objective of this paper is to provide efficient and reliable techniques for recognition of handwritten digits. A Euclidean minimum distance criterion is used to find minimum distances and k-nearest neighbor classifier is used to classify the digits. A MNIST database is used for both training and testing the system. 5000 images are used to test the proposed method a total 5000 numeral images are tested and got 96.94% recognition rate.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
A Comparative Analysis of Decision Making Methodologies in Sales Data Mart 销售数据集市中决策方法的比较分析
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.28
A. Prema, V. Clara, A. Pethalakshmi
Data marts are nominated to accomplish the role of tactical decision support for managers accountable for a specific business area. The data from data marts is typically gathered and made offered for business analysis. A planned ETL process populates data marts within the focus on precise data warehouse information. Extract-Transform-Load (ETL) functions as a process which is used to receive information from one or more sources. The next step is to normalize information into a convenient schema and information is appended into some other repository. This paper analyses the three decision making methods and find out the best decision making methodology to improve sales promotion in sales data mart by using arithmetic mean and rank matrix methods.
数据集市被指定为负责特定业务领域的管理人员完成战术决策支持的角色。通常从数据集市收集数据并提供给业务分析。计划好的ETL流程填充数据集市,重点关注精确的数据仓库信息。提取-转换-加载(ETL)作为一个过程,用于从一个或多个源接收信息。下一步是将信息规范化为方便的模式,并将信息附加到其他存储库中。本文对这三种决策方法进行了分析,并运用算术均值法和秩矩阵法找出了在销售数据集市中促进销售的最佳决策方法。
{"title":"A Comparative Analysis of Decision Making Methodologies in Sales Data Mart","authors":"A. Prema, V. Clara, A. Pethalakshmi","doi":"10.1109/WCCCT.2014.28","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.28","url":null,"abstract":"Data marts are nominated to accomplish the role of tactical decision support for managers accountable for a specific business area. The data from data marts is typically gathered and made offered for business analysis. A planned ETL process populates data marts within the focus on precise data warehouse information. Extract-Transform-Load (ETL) functions as a process which is used to receive information from one or more sources. The next step is to normalize information into a convenient schema and information is appended into some other repository. This paper analyses the three decision making methods and find out the best decision making methodology to improve sales promotion in sales data mart by using arithmetic mean and rank matrix methods.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"27 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Wireless Sensor Networks: Key Management Module in EECBKM 无线传感器网络的安全性:EECBKM中的密钥管理模块
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.12
Dr. T. Lalitha, A. J. Devi
Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. By simulation results, we show that our proposed technique efficiently increases packet delivery ratio with reduced energy consumption.
无线传感器网络(WSN)容易受到节点捕获攻击,攻击者可以捕获一个或多个传感器节点并泄露存储的所有安全信息,从而使其能够破坏WSN通信的一部分。由于无线传感器网络中传感器节点数量众多,且缺乏传感器节点的部署和硬件能力信息,使得无线传感器网络中的密钥管理成为一项复杂的任务。有限的内存资源和能量约束是无线传感器网络中密钥管理的另一个问题。因此,需要一种有效的密钥管理方案,以减少节点捕获攻击的影响并减少能量消耗。仿真结果表明,该方法在降低能耗的同时,有效地提高了数据包的传输率。
{"title":"Security in Wireless Sensor Networks: Key Management Module in EECBKM","authors":"Dr. T. Lalitha, A. J. Devi","doi":"10.1109/WCCCT.2014.12","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.12","url":null,"abstract":"Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. By simulation results, we show that our proposed technique efficiently increases packet delivery ratio with reduced energy consumption.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"27 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114143882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
VHDL Implementation of Scheduled Dataflow Architecture and the Impact of Efficient Way of Passing of Data 计划数据流体系结构的VHDL实现及其对数据高效传递方式的影响
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.62
J. Arul, Han-Yao Ko, Hwa-Yuan Chung
Since the invention of microprocessors around 1970, CPU performance improvement together with the Instruction Level Parallelism (ILP) had been the main focus of the computer industry. Recently, ILP seemed to have reached its limit and together with the problem of power consumption and heat dissipation, emerged the multi-core era. The focus had shifted from ILP to Thread Level Parallelism (TLP) and efficient use of multi-core processors. However, the detection of RAW hazard technique relies on complex hardware in the current computers, which may cause the designers to make the CPU consume lot of energy and the design to be more complex. By using dataflow paradigm, this can naturally eliminate the RAW hazards. This new architecture uses a paradigm, to closely link the ILP and TLP by combining the sequential and dataflow approach. It is designed using VHDL language and tested on Alter a DE2 board. With just two register sets, tremendous amount of performance improvement can be gained. This architecture not only reduces the latency of memory accesses, but also can be suitable for multithreaded multi-core platforms.
自1970年左右微处理器发明以来,CPU性能的改进以及指令级并行性(ILP)一直是计算机行业的主要焦点。最近,ILP似乎已经达到了极限,再加上功耗和散热问题,多核时代出现了。重点已经从ILP转移到线程级并行(TLP)和多核处理器的有效使用。然而,在当前的计算机中,RAW危害检测技术依赖于复杂的硬件,这可能会导致设计者使CPU消耗大量的能量,使设计更加复杂。通过使用数据流范式,这可以自然地消除RAW的危害。这种新架构使用了一种范式,通过结合顺序和数据流方法,将ILP和TLP紧密地联系在一起。采用VHDL语言进行设计,并在altera DE2板上进行了测试。仅使用两个寄存器集,就可以获得巨大的性能改进。这种架构不仅减少了内存访问的延迟,而且适合多线程多核平台。
{"title":"VHDL Implementation of Scheduled Dataflow Architecture and the Impact of Efficient Way of Passing of Data","authors":"J. Arul, Han-Yao Ko, Hwa-Yuan Chung","doi":"10.1109/WCCCT.2014.62","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.62","url":null,"abstract":"Since the invention of microprocessors around 1970, CPU performance improvement together with the Instruction Level Parallelism (ILP) had been the main focus of the computer industry. Recently, ILP seemed to have reached its limit and together with the problem of power consumption and heat dissipation, emerged the multi-core era. The focus had shifted from ILP to Thread Level Parallelism (TLP) and efficient use of multi-core processors. However, the detection of RAW hazard technique relies on complex hardware in the current computers, which may cause the designers to make the CPU consume lot of energy and the design to be more complex. By using dataflow paradigm, this can naturally eliminate the RAW hazards. This new architecture uses a paradigm, to closely link the ILP and TLP by combining the sequential and dataflow approach. It is designed using VHDL language and tested on Alter a DE2 board. With just two register sets, tremendous amount of performance improvement can be gained. This architecture not only reduces the latency of memory accesses, but also can be suitable for multithreaded multi-core platforms.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124919295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact on Social Filtering and Meta Filtering in Recommender Systems 对推荐系统中社会过滤和元过滤的影响
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.11
K. Thangadurai, M. Venkatesan
Recommender systems are one among the most powerful tools in this digital world, usually providing explanations to their recommendations to help the web users to find their products, peoples, even their missing friends in these social communities. Until now there are various methods and approaches implemented in this recommender system. The most widely used approaches are content-based and collaborative approaches. These approaches may be studied to have the most personalized approaches and to have the best recommendations for the end users. In this paper, the filtering technique is considered as the background of every recommender system approaches. Here, the Social Filtering and Meta Filtering are presented which is mostly like to be the better recommendation in the social networking websites like facebook.com, googleplus.com, etc., as well as in the blogging websites such as blogger.com, wordpress.com, etc.
推荐系统是这个数字世界中最强大的工具之一,通常会为他们的推荐提供解释,以帮助网络用户在这些社交社区中找到他们的产品、人,甚至是他们失踪的朋友。到目前为止,在这个推荐系统中实现了各种方法和途径。最广泛使用的方法是基于内容的方法和协作方法。可以研究这些方法,以获得最个性化的方法,并为最终用户提供最佳建议。本文将过滤技术作为每一种推荐系统方法的背景。这里介绍的是Social Filtering和Meta Filtering,它们在社交网站如facebook.com, googleplus.com等,以及博客网站如blogger.com, wordpress.com等中都是比较好的推荐。
{"title":"Impact on Social Filtering and Meta Filtering in Recommender Systems","authors":"K. Thangadurai, M. Venkatesan","doi":"10.1109/WCCCT.2014.11","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.11","url":null,"abstract":"Recommender systems are one among the most powerful tools in this digital world, usually providing explanations to their recommendations to help the web users to find their products, peoples, even their missing friends in these social communities. Until now there are various methods and approaches implemented in this recommender system. The most widely used approaches are content-based and collaborative approaches. These approaches may be studied to have the most personalized approaches and to have the best recommendations for the end users. In this paper, the filtering technique is considered as the background of every recommender system approaches. Here, the Social Filtering and Meta Filtering are presented which is mostly like to be the better recommendation in the social networking websites like facebook.com, googleplus.com, etc., as well as in the blogging websites such as blogger.com, wordpress.com, etc.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129235113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Frequent Trajectory Path Mining Using Bit Mask Search and UP Growth+ Algorithm 基于位掩码搜索和向上增长+算法的频繁轨迹挖掘
Pub Date : 2014-04-03 DOI: 10.1109/WCCCT.2014.36
P. Geetha, E. Raj
Mining is a great service entities in trajectory database that indicates to the exposure of entities with huge service like acquisition. The extensive number of contender entities degrades the mining achievement in terms of execution time and space stipulation. The position may become worse when the database consists of endless lengthy transactions or lengthy huge utility entity sets. In this paper, UP -Growth+ algorithm is consider, for mining huge utility entities with a set of adequate approaches for pruning contender entities. The previous algorithms do not contribute any compaction or compression mechanism with respect to density in bit vector regions. To raise the density in bit-vector the Bit Mask Search (BM Search) starts with an array list. From root node, a BM Search representation for each frequent pattern is designed which gives an acceptable compression and compaction in bit search measure than UP Growth+ algorithms. The comparative analysis of UP Growth+ and BM Search are described in this paper. An experimental result shows that BM search produces better result than UP Growth + algorithm.
挖掘是轨迹数据库中一项重要的服务实体,它意味着像获取一样具有巨大服务的实体的暴露。大量的竞争者实体在执行时间和空间规定方面降低了挖掘成果。当数据库包含无尽的冗长事务或冗长的大型实用程序实体集时,情况可能会变得更糟。本文考虑UP -Growth+算法,通过一组适当的方法来修剪竞争者实体,以挖掘巨大的公用事业实体。先前的算法不提供任何关于比特向量区域密度的压缩或压缩机制。为了提高位向量的密度,位掩码搜索(BM搜索)从一个数组列表开始。从根节点出发,设计了每个频繁模式的BM搜索表示,该表示在位搜索度量上比UP Growth+算法提供了可接受的压缩和压缩。本文对UP Growth+和BM Search进行了比较分析。实验结果表明,BM搜索结果优于UP Growth +算法。
{"title":"A Frequent Trajectory Path Mining Using Bit Mask Search and UP Growth+ Algorithm","authors":"P. Geetha, E. Raj","doi":"10.1109/WCCCT.2014.36","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.36","url":null,"abstract":"Mining is a great service entities in trajectory database that indicates to the exposure of entities with huge service like acquisition. The extensive number of contender entities degrades the mining achievement in terms of execution time and space stipulation. The position may become worse when the database consists of endless lengthy transactions or lengthy huge utility entity sets. In this paper, UP -Growth+ algorithm is consider, for mining huge utility entities with a set of adequate approaches for pruning contender entities. The previous algorithms do not contribute any compaction or compression mechanism with respect to density in bit vector regions. To raise the density in bit-vector the Bit Mask Search (BM Search) starts with an array list. From root node, a BM Search representation for each frequent pattern is designed which gives an acceptable compression and compaction in bit search measure than UP Growth+ algorithms. The comparative analysis of UP Growth+ and BM Search are described in this paper. An experimental result shows that BM search produces better result than UP Growth + algorithm.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131032882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 World Congress on Computing and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1