首页 > 最新文献

2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)最新文献

英文 中文
Design of Neuromuscular Stimulation to Supervise Parallelized Arm Using Human-Machine-Human Interaction 基于人机交互的并行手臂神经肌肉刺激监督设计
R. Mangrulkar
Paralyzed person or the person with physical disorders wont be able to move their body parts viz. hand or arm because of abnormal behavior of spinal cord or its injuries. This movement inabilities may result to mental, moral or physical disorder resulting into sometimes cardiovascular diseases, bone demineralization. In such cases, the surgical solution is to use neuroprosthetic arm replacing paralyzed arm. This is expensive and also impact normal human behavior and demoralize him or her. The proposed neuroprosthetics approach avoids the need of replacing the arm and also avoids critical surgery which increase the moral and confidence of patient. The approach involves designing a model that interfaces with living neurons to control a device or for sensory substitution. In proposed approach, human to human interaction using model is required to setup. The design is developed to supervise the parallelised arm under the control of normal human arm. For this, it creates an interface which works in directions given by normal human arm with patients's arm. This interface is designed using microprocessor to compute and process signals and transfer to electrode attached to electrical muscle to stimulate the damaged arm. The electrical signals are generated in controlled manner with effective and enough strength level equivalent to the brain signals required for motor nerves in collaboration with sensor nerves. This helps patient with paralyzed arm to perform directed operations under the governed movement of normal human being. This avoids the use of traditional prosthetic arm surgery and can use proposed nervous bypass system without any surgery.
瘫痪的人或身体有障碍的人不能移动他们的身体部位,如手或手臂,因为脊髓的异常行为或其损伤。这种运动障碍可能会导致精神、道德或身体上的紊乱,有时会导致心血管疾病、骨脱矿。在这种情况下,手术解决方案是使用神经义肢代替瘫痪的手臂。这是昂贵的,也会影响正常的人类行为,使他或她士气低落。提出的神经修复方法避免了更换手臂的需要,也避免了关键的手术,增加了病人的道德和信心。该方法包括设计一个模型,该模型与活神经元连接,以控制设备或进行感官替代。在该方法中,需要使用模型建立人与人之间的交互。该设计是为了在正常人臂的控制下对平行臂进行监督。为此,它创造了一个界面,按照正常人手臂和病人手臂给出的方向工作。该接口使用微处理器计算和处理信号,并将信号传输到附着在电肌肉上的电极上,以刺激受损的手臂。电信号以可控的方式产生,其有效和足够的强度水平相当于运动神经与传感器神经协同所需的脑信号。这可以帮助手臂瘫痪的病人在正常人的控制运动下进行有针对性的手术。这避免了传统义肢手术的使用,并且可以在不进行任何手术的情况下使用拟议的神经搭桥系统。
{"title":"Design of Neuromuscular Stimulation to Supervise Parallelized Arm Using Human-Machine-Human Interaction","authors":"R. Mangrulkar","doi":"10.1109/ICCUBEA.2018.8697505","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697505","url":null,"abstract":"Paralyzed person or the person with physical disorders wont be able to move their body parts viz. hand or arm because of abnormal behavior of spinal cord or its injuries. This movement inabilities may result to mental, moral or physical disorder resulting into sometimes cardiovascular diseases, bone demineralization. In such cases, the surgical solution is to use neuroprosthetic arm replacing paralyzed arm. This is expensive and also impact normal human behavior and demoralize him or her. The proposed neuroprosthetics approach avoids the need of replacing the arm and also avoids critical surgery which increase the moral and confidence of patient. The approach involves designing a model that interfaces with living neurons to control a device or for sensory substitution. In proposed approach, human to human interaction using model is required to setup. The design is developed to supervise the parallelised arm under the control of normal human arm. For this, it creates an interface which works in directions given by normal human arm with patients's arm. This interface is designed using microprocessor to compute and process signals and transfer to electrode attached to electrical muscle to stimulate the damaged arm. The electrical signals are generated in controlled manner with effective and enough strength level equivalent to the brain signals required for motor nerves in collaboration with sensor nerves. This helps patient with paralyzed arm to perform directed operations under the governed movement of normal human being. This avoids the use of traditional prosthetic arm surgery and can use proposed nervous bypass system without any surgery.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128709878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Prediction Models for Heart Failure Risk: A Clinical Perspective 心衰风险预测模型的比较:临床视角
S. Tiwaskar, Rutuja U. Gosavi, Riddhima Dubey, S. Jadhav, K. Iyer
India is one of the leading countries facing deaths due to Heart Failure. Prediction of this disease in early stages could be helpful but is posing challenges for researchers. Our purpose is to detect the condition earlier so that the health outcomes of people can be changed in turn improving lifestyle. Whenever doctors know which patients have chances of developing risk of heart failure, medications can be prescribed or lifestyle changes can be recommended that could remit the inception or avoid it entirely. Our goal is to accurately and efficiently classify records into: Presence or Absence of Heart Failure Risk. We aim at presenting a comparative study of Statistical, Machine Learning and Data Mining based techniques for prognosis of Heart Failure Risk. The performance of Statistical evaluation, Decision Tree Classifier, Random forest classifier and Convolution Neural Network (CNN) are compared. The accuracies provided by the models are 85%, 80.1%, 85.38% and 93% respectively. As CNN has not been applied to the Cleveland dataset, it adds value to our empirical study. It is observed that Prediction Accuracy is enhanced by using CNN.
印度是面临心力衰竭死亡的主要国家之一。在早期阶段预测这种疾病可能会有所帮助,但也给研究人员带来了挑战。我们的目的是尽早发现这种情况,从而改变人们的健康状况,从而改善生活方式。只要医生知道哪些病人有可能出现心力衰竭的风险,就可以开出药物处方,或者建议改变生活方式,从而缓解或完全避免心力衰竭。我们的目标是准确有效地将记录分为:存在或不存在心力衰竭风险。我们的目的是提出一项基于统计、机器学习和数据挖掘技术的心力衰竭风险预测的比较研究。比较了统计评价、决策树分类器、随机森林分类器和卷积神经网络(CNN)的性能。模型提供的精度分别为85%、80.1%、85.38%和93%。由于CNN尚未应用于克利夫兰数据集,因此它为我们的实证研究增加了价值。观察到,使用CNN可以提高预测精度。
{"title":"Comparison of Prediction Models for Heart Failure Risk: A Clinical Perspective","authors":"S. Tiwaskar, Rutuja U. Gosavi, Riddhima Dubey, S. Jadhav, K. Iyer","doi":"10.1109/ICCUBEA.2018.8697509","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697509","url":null,"abstract":"India is one of the leading countries facing deaths due to Heart Failure. Prediction of this disease in early stages could be helpful but is posing challenges for researchers. Our purpose is to detect the condition earlier so that the health outcomes of people can be changed in turn improving lifestyle. Whenever doctors know which patients have chances of developing risk of heart failure, medications can be prescribed or lifestyle changes can be recommended that could remit the inception or avoid it entirely. Our goal is to accurately and efficiently classify records into: Presence or Absence of Heart Failure Risk. We aim at presenting a comparative study of Statistical, Machine Learning and Data Mining based techniques for prognosis of Heart Failure Risk. The performance of Statistical evaluation, Decision Tree Classifier, Random forest classifier and Convolution Neural Network (CNN) are compared. The accuracies provided by the models are 85%, 80.1%, 85.38% and 93% respectively. As CNN has not been applied to the Cleveland dataset, it adds value to our empirical study. It is observed that Prediction Accuracy is enhanced by using CNN.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Study and Simulation of Single-Phase to Three-Phase UPF System for Agricultural Applications 农业用单相-三相UPF系统的研究与仿真
Subhash Kumar Ram, A. Abhishek, B. K. Verma, Sachin Devassy, A. Dhakar
This paper describes simulation and design of single-phase to three-phase UPF system for agricultural/household applications. The average current mode control (ACMC) technique is used for Unity Power Factor (UPF) correction of single phase AC-DC boost converter. A comprehensive study and analysis of single-phase to three-phase converter with UPF operation is presented. Closed loop control of single phase AC-DC UPF boost converter is designed. The three phase voltage source inverter with Sinusoidal Pulse Width Modulation (SPWM) technique has been used for dc to 3-phase ac conversion. The voltage mode control of three-phase voltage source SPWM inverter have been designed and simulated. The complete system with the integration of single-phase and three-phase converter has been simulated. The simulation results with their performance such as power factor (pf), Total Harmonic Distortion (THD) and efficiency have been analysed. The simulation results on resistive load is presented in this paper.
本文介绍了农业/家庭用单相到三相UPF系统的仿真与设计。采用平均电流模式控制(ACMC)技术对单相交直流升压变换器进行统一功率因数(UPF)校正。对UPF运行的单相到三相变换器进行了全面的研究和分析。设计了单相交直流UPF升压变换器的闭环控制。采用正弦脉宽调制(SPWM)技术的三相电压源逆变器已被用于直流到三相交流转换。设计并仿真了三相电压源SPWM逆变器的电压模式控制。并对单相和三相变换器集成的整个系统进行了仿真。仿真结果分析了其功率因数(pf)、总谐波失真(THD)和效率等性能。文中给出了电阻性负载的仿真结果。
{"title":"Study and Simulation of Single-Phase to Three-Phase UPF System for Agricultural Applications","authors":"Subhash Kumar Ram, A. Abhishek, B. K. Verma, Sachin Devassy, A. Dhakar","doi":"10.1109/ICCUBEA.2018.8697367","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697367","url":null,"abstract":"This paper describes simulation and design of single-phase to three-phase UPF system for agricultural/household applications. The average current mode control (ACMC) technique is used for Unity Power Factor (UPF) correction of single phase AC-DC boost converter. A comprehensive study and analysis of single-phase to three-phase converter with UPF operation is presented. Closed loop control of single phase AC-DC UPF boost converter is designed. The three phase voltage source inverter with Sinusoidal Pulse Width Modulation (SPWM) technique has been used for dc to 3-phase ac conversion. The voltage mode control of three-phase voltage source SPWM inverter have been designed and simulated. The complete system with the integration of single-phase and three-phase converter has been simulated. The simulation results with their performance such as power factor (pf), Total Harmonic Distortion (THD) and efficiency have been analysed. The simulation results on resistive load is presented in this paper.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130565958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart Surveillance System Using Histogram of Oriented Gradients (HOG) Algorithm and Haar Cascade Algorithm 基于梯度直方图(HOG)算法和哈尔级联算法的智能监控系统
Hitanshu A. Patel, Ritesh D. Rajput
In today's world, everything is transforming into automation. From basic households work to major industries work, from basic machinery to steering and stabilization of ships, aircraft and other applications and vehicles. Our main objective of this project is to control surveillance system completely without human intervention not only in steady or particular allotted or settled area but which can move to remote places and restricted area where human entry is not feasible. We have demonstrated our idea using a moving car with a mounted camera and processor and which can move autonomously or can be controlled remotely via remote/website/android app. The images which are captured by a camera can be processed by a processor and digital image processing (DIP) algorithms can be done for human detection or object detection. Boosted cascade, Haar cascade, anisotropic diffusion, Hausdorff distance, colour processing, background subtraction statistics of parts, pulse coupled neural networks, single correlation filter, these are various algorithms used for human/object detection.
在当今世界,一切都在向自动化转变。从基本的家庭工作到主要的工业工作,从基本的机械到船舶、飞机和其他应用和车辆的转向和稳定。我们这个项目的主要目标是在没有人为干预的情况下完全控制监测系统,不仅在稳定或特定的分配或定居区域,而且可以移动到偏远地区和限制区域,人类进入是不可行的。我们已经用一辆装有摄像头和处理器的移动汽车展示了我们的想法,它可以自主移动,也可以通过远程/网站/安卓应用程序远程控制。摄像头捕获的图像可以通过处理器处理,数字图像处理(DIP)算法可以用于人类检测或物体检测。增强级联,哈尔级联,各向异性扩散,豪斯多夫距离,颜色处理,背景减去统计部分,脉冲耦合神经网络,单相关滤波器,这些都是用于人体/物体检测的各种算法。
{"title":"Smart Surveillance System Using Histogram of Oriented Gradients (HOG) Algorithm and Haar Cascade Algorithm","authors":"Hitanshu A. Patel, Ritesh D. Rajput","doi":"10.1109/ICCUBEA.2018.8697464","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697464","url":null,"abstract":"In today's world, everything is transforming into automation. From basic households work to major industries work, from basic machinery to steering and stabilization of ships, aircraft and other applications and vehicles. Our main objective of this project is to control surveillance system completely without human intervention not only in steady or particular allotted or settled area but which can move to remote places and restricted area where human entry is not feasible. We have demonstrated our idea using a moving car with a mounted camera and processor and which can move autonomously or can be controlled remotely via remote/website/android app. The images which are captured by a camera can be processed by a processor and digital image processing (DIP) algorithms can be done for human detection or object detection. Boosted cascade, Haar cascade, anisotropic diffusion, Hausdorff distance, colour processing, background subtraction statistics of parts, pulse coupled neural networks, single correlation filter, these are various algorithms used for human/object detection.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Actor-Critic: Reinforcement Learning Based Radio Resource Scheduling for LTE-Advanced 基于强化学习的LTE-Advanced无线资源调度
Pallavi K. Tathe, M. Sharma
This paper proposes, an Actor-Critic Reinforcement learning based radio resource scheduling policy in downlink Transmission for Long Term Evaluation Advanced (LTE-A) radio resource technology. The scheduling technique uses the neural network (NN) based actor critic architecture in order to propose proper scheduling rules at each Transmission Time Interval (TTI). The objective is to improve system capacity, system throughput and spectral efficiency. NN based Actor-critic Reinforcement learning is proposed to accomplish the resource scheduling efficiently by maintaining best QoS capabilities and user fairness. The simulation results indicate that the proposed method achieves desired throughput and increased convergence capability.
提出了一种基于Actor-Critic强化学习的LTE-A下行传输无线资源调度策略。调度技术采用基于神经网络的演员评价体系结构,在每个传输时间间隔(TTI)提出合适的调度规则。目标是提高系统容量、系统吞吐量和频谱效率。提出了基于神经网络的Actor-critic强化学习,通过保持最佳的QoS能力和用户公平性来有效地完成资源调度。仿真结果表明,该方法达到了预期的吞吐量,提高了收敛能力。
{"title":"Dynamic Actor-Critic: Reinforcement Learning Based Radio Resource Scheduling for LTE-Advanced","authors":"Pallavi K. Tathe, M. Sharma","doi":"10.1109/ICCUBEA.2018.8697808","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697808","url":null,"abstract":"This paper proposes, an Actor-Critic Reinforcement learning based radio resource scheduling policy in downlink Transmission for Long Term Evaluation Advanced (LTE-A) radio resource technology. The scheduling technique uses the neural network (NN) based actor critic architecture in order to propose proper scheduling rules at each Transmission Time Interval (TTI). The objective is to improve system capacity, system throughput and spectral efficiency. NN based Actor-critic Reinforcement learning is proposed to accomplish the resource scheduling efficiently by maintaining best QoS capabilities and user fairness. The simulation results indicate that the proposed method achieves desired throughput and increased convergence capability.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126618392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Fog Correction Using Exponential Contrast Restoration 使用指数对比恢复雾校正
Sunayana Suryawanshi, S. Danve
This implementation is step ahead for the current image processing applications which captures degraded contrast and establishes error prone images in fog condition. Long distance images has low visibility. The variation in fog density with distance is responsible for atmospheric veil factor. The implementation includes the single image processing for quantifiable and approximate calculations to construct fog-free images with the use of atmospheric veil to rebuild the contrast the in homogeneous or heterogeneous conditions.
这种实现对于当前的图像处理应用来说是领先一步的,它可以捕获对比度降低的图像,并在雾条件下建立容易出错的图像。远距离图像能见度低。雾密度随距离的变化是造成雾幕因子的主要原因。该实现包括对单幅图像进行可量化和近似计算的处理,以构建无雾图像,利用大气面纱重建均匀或非均匀条件下的对比度。
{"title":"Fog Correction Using Exponential Contrast Restoration","authors":"Sunayana Suryawanshi, S. Danve","doi":"10.1109/ICCUBEA.2018.8697424","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697424","url":null,"abstract":"This implementation is step ahead for the current image processing applications which captures degraded contrast and establishes error prone images in fog condition. Long distance images has low visibility. The variation in fog density with distance is responsible for atmospheric veil factor. The implementation includes the single image processing for quantifiable and approximate calculations to construct fog-free images with the use of atmospheric veil to rebuild the contrast the in homogeneous or heterogeneous conditions.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123232006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Detection and Prevention of DDoS in Cloud Computing Environment 云计算环境下DDoS的有效检测与防范
Vrushali Tajane, Deepak H. Sharma
Due to expansion of Internet and huge dataset, many organizations started to use cloud. But in the cloud it has to face many security issues like distributed denial of service attack (DDoS). This attack makes a network or system unavailable to legitimate users. DDoS attack over cloud does not any changes in data but bring out a correspondent attacks in cloud resource, cloud service, framework to absorb it. This paper discusses various defence mechanisms to prevent these attacks. This work gives exhaustive study on advanced confidence based filtering called N-CBF method to detect and prevent DDoS in cloud. It collects the packets, extract their attributes and then make pairs of attributes. It adjusts weight dynamically for each attribute pair and threshold value for each attribute. It increases the detection rate and also provides more security in cloud. This paper gives simulation for N-CBF method and provides more security by adding RSA algorithm.
由于互联网的扩展和庞大的数据集,许多组织开始使用云。但是在云中,它必须面对许多安全问题,如分布式拒绝服务攻击(DDoS)。这种攻击使网络或系统对合法用户不可用。基于云的DDoS攻击不会对数据造成任何改变,而是在云资源、云服务、框架中引发相应的攻击来吸收。本文讨论了防止这些攻击的各种防御机制。本文详细研究了基于N-CBF方法的高级置信度过滤,以检测和防止云中的DDoS。它收集数据包,提取其属性,然后生成属性对。它动态地调整每个属性对的权重和每个属性的阈值。它提高了检测率,并在云中提供了更多的安全性。本文对N-CBF算法进行了仿真,并通过加入RSA算法提高了算法的安全性。
{"title":"Effective Detection and Prevention of DDoS in Cloud Computing Environment","authors":"Vrushali Tajane, Deepak H. Sharma","doi":"10.1109/ICCUBEA.2018.8697346","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697346","url":null,"abstract":"Due to expansion of Internet and huge dataset, many organizations started to use cloud. But in the cloud it has to face many security issues like distributed denial of service attack (DDoS). This attack makes a network or system unavailable to legitimate users. DDoS attack over cloud does not any changes in data but bring out a correspondent attacks in cloud resource, cloud service, framework to absorb it. This paper discusses various defence mechanisms to prevent these attacks. This work gives exhaustive study on advanced confidence based filtering called N-CBF method to detect and prevent DDoS in cloud. It collects the packets, extract their attributes and then make pairs of attributes. It adjusts weight dynamically for each attribute pair and threshold value for each attribute. It increases the detection rate and also provides more security in cloud. This paper gives simulation for N-CBF method and provides more security by adding RSA algorithm.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126404379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Two Sliding Window Control Based High Utility Pattern Mining 基于高实用模式挖掘的两滑动窗口控制
Swapnali Londhe, Rupesh Mahajan
Value of the item set is considered as a utility of that item set and find out the high utility of the item set is the aim of utility mining. Some time database parameters are considered to find out high utility pattern eg. Profit, cost etc. In proposed approach utility value of particular items used for utility mining. In day to day life high utility pattern mining play important role in applications. It's current hot topic in today's research area. Different existing algorithms are present in this area. It first of all identify the candidate itemset's by using their utilities, and simultaneously identify the exact utility of that candidate pattern. Problem of using this algorithm is large number of candidate itemset's are generated. But after computing exact utility it's clear that most of the candidate having no high utility. For generating profitable product manufacturing plan it's very important to understanding the customer preferences in industrial area. Sliding Window based pattern mining approach which considering the quantity, quality and cost of each product for generating high profitable product set, which employed to find out high utility pattern. For establishing highly profitable manufacturing plan, which allow corporation to maximize its revenue, high utility pattern mining is important aspect. Large amount of stream data related to customer purchase behavior used for establishing manufacturing plan. Recent preference of the customers also helps in generating manufacturing plans. This paper contains Two Sliding Windows Pattern mining Algorithm (TSW) scans complete dataset And divide it in to two parts. Both parts scan simultaneously in order to improve the search space. The proposed algorithm (TSW) scans the text using two sliding windows, allowing multiple alignments in the searching process. Introducing A list structure and a novel algorithm for generating high utility pattern over large data, with the help of Sliding Window Control Method. This approach avoid the generation of candidate pattern. Due to reducing candidate pattern, algorithm not required large amount of memory space as well as computational resources for verifying candidate patterns. By considering all this parameters, it's an efficient approach.
项目集的价值被认为是该项目集的效用,找出项目集的最高效用是效用挖掘的目的。考虑一些时间数据库参数来寻找高效用模式。利润、成本等。在建议的方法中,用于公用事业开采的特定项目的效用价值。在日常生活中,高效用模式挖掘在应用中发挥着重要作用。这是当今研究领域的热门话题。在这一领域存在不同的现有算法。它首先通过使用候选项集的实用程序来识别候选项集,同时识别候选模式的确切实用程序。使用该算法的问题是产生了大量的候选项集。但在计算了确切的效用之后,很明显,大多数候选人都没有高效用。在工业领域,了解客户的偏好对于制定有利可图的产品制造计划是非常重要的。基于滑动窗口的模式挖掘方法,综合考虑每个产品的数量、质量和成本,生成高利润的产品集,并利用该方法寻找高效用模式。为了制定高利润的制造计划,使企业实现收益最大化,高效用模式的挖掘是一个重要方面。与客户购买行为相关的大量流数据用于制定制造计划。客户最近的偏好也有助于制定生产计划。两滑动窗口模式挖掘算法(TSW)扫描完整的数据集并将其分成两部分。两个部分同时扫描,以提高搜索空间。提出的算法(TSW)使用两个滑动窗口扫描文本,允许在搜索过程中多次对齐。介绍了一种利用滑动窗口控制方法在大数据上生成高效用模式的表结构和新算法。该方法避免了候选模式的生成。由于候选模式的减少,算法不需要大量的内存空间和计算资源来验证候选模式。考虑到所有这些参数,这是一种有效的方法。
{"title":"Two Sliding Window Control Based High Utility Pattern Mining","authors":"Swapnali Londhe, Rupesh Mahajan","doi":"10.1109/ICCUBEA.2018.8697635","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697635","url":null,"abstract":"Value of the item set is considered as a utility of that item set and find out the high utility of the item set is the aim of utility mining. Some time database parameters are considered to find out high utility pattern eg. Profit, cost etc. In proposed approach utility value of particular items used for utility mining. In day to day life high utility pattern mining play important role in applications. It's current hot topic in today's research area. Different existing algorithms are present in this area. It first of all identify the candidate itemset's by using their utilities, and simultaneously identify the exact utility of that candidate pattern. Problem of using this algorithm is large number of candidate itemset's are generated. But after computing exact utility it's clear that most of the candidate having no high utility. For generating profitable product manufacturing plan it's very important to understanding the customer preferences in industrial area. Sliding Window based pattern mining approach which considering the quantity, quality and cost of each product for generating high profitable product set, which employed to find out high utility pattern. For establishing highly profitable manufacturing plan, which allow corporation to maximize its revenue, high utility pattern mining is important aspect. Large amount of stream data related to customer purchase behavior used for establishing manufacturing plan. Recent preference of the customers also helps in generating manufacturing plans. This paper contains Two Sliding Windows Pattern mining Algorithm (TSW) scans complete dataset And divide it in to two parts. Both parts scan simultaneously in order to improve the search space. The proposed algorithm (TSW) scans the text using two sliding windows, allowing multiple alignments in the searching process. Introducing A list structure and a novel algorithm for generating high utility pattern over large data, with the help of Sliding Window Control Method. This approach avoid the generation of candidate pattern. Due to reducing candidate pattern, algorithm not required large amount of memory space as well as computational resources for verifying candidate patterns. By considering all this parameters, it's an efficient approach.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126364260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Driver Alertness Detection Algorithm 驾驶员警觉性检测算法
W. Kulkarni, Sai Ramtirth, M. Ambaskar, Sanika Patki, Milind Kulkarni
Studies show that reason behind 20% of the road accidents is because of driver fatigue and almost 50% of those are fatal. Over a period of time, a certain amount of nonintrusive systems have been developed for the detection of the driver's alertness. Most of them showed about 80% success rate. The presented work describes a novel method for the detection of driver's alertness. Since the eyelid movement is vertical, the change is vertical. The proposed algorithm uses Fourier Transform to detect this vertical change along the y-axis. Using Fourier Transform, unique features for all the three cases considered - full open eyelids, half-open eyelids, and full closed eyelids - are obtained. Thus, eyelid positions can be differentiated effectively. The testing and cross-validation for real-time data against trained images are done using real-time environment in Python2.7. The proposed algorithm produces 96% of accuracy.
研究表明,20%的交通事故是由于驾驶员疲劳造成的,其中近50%是致命的。在过去的一段时间里,已经开发了一定数量的非侵入式系统来检测驾驶员的警觉性。大多数的成功率都在80%左右。本文描述了一种检测驾驶员警觉性的新方法。因为眼睑的运动是垂直的,所以变化也是垂直的。该算法使用傅里叶变换来检测沿y轴的垂直变化。利用傅里叶变换,得到了眼睑全开、半开和全闭三种情况下的特征。因此,可以有效地区分眼睑位置。针对训练图像的实时数据的测试和交叉验证是使用Python2.7中的实时环境完成的。该算法的准确率达到96%。
{"title":"Driver Alertness Detection Algorithm","authors":"W. Kulkarni, Sai Ramtirth, M. Ambaskar, Sanika Patki, Milind Kulkarni","doi":"10.1109/ICCUBEA.2018.8697365","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697365","url":null,"abstract":"Studies show that reason behind 20% of the road accidents is because of driver fatigue and almost 50% of those are fatal. Over a period of time, a certain amount of nonintrusive systems have been developed for the detection of the driver's alertness. Most of them showed about 80% success rate. The presented work describes a novel method for the detection of driver's alertness. Since the eyelid movement is vertical, the change is vertical. The proposed algorithm uses Fourier Transform to detect this vertical change along the y-axis. Using Fourier Transform, unique features for all the three cases considered - full open eyelids, half-open eyelids, and full closed eyelids - are obtained. Thus, eyelid positions can be differentiated effectively. The testing and cross-validation for real-time data against trained images are done using real-time environment in Python2.7. The proposed algorithm produces 96% of accuracy.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"9 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120894478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Classification of Users Navigation and Behavior Using Web Server Logs 基于Web服务器日志的用户导航和行为大数据分类
Prajakta Ghavare, Prashant G. Ahire
Digital marketing is growing faster to increase business and sale products. All Ecommerce sites send recommendations of products or newly updated product list to the user. They also send exciting offers to users. We need to study and understand behavior and interest of user to recommend products, this is important to adapt to requirements of customer in ecommerce website. The information about users behavior is stored into server log file. We extract log file to get behavior and do pre-processing to get session action details. To analyze log files, proposed system implements a linear-temporal logic to analyze web server logs of ecommerce website. Web server logs are mapped to event logs by process of mapping log records, to capture behavior of customer. To find different behavioral patterns that refers to different action performed by users in session, different predefined queries are performed. We proposed the use of Temporal Logic and model checking approach as an alternative to traditional data mining techniques using and to use it in structured e-commerce websites. The goal of system is to analyze the usage of e-commerce websites and to extract customers behavioral patterns with the use of temporal logic formulas and to describe user behavior against the log model. The system can determine user behavior and interests, it will associate users with each other for better recommendation system.
数字营销在增加业务和销售产品方面发展得更快。所有的电子商务网站都会向用户发送产品推荐或最新更新的产品列表。他们还向用户发送令人兴奋的优惠。我们需要研究和了解用户的行为和兴趣来推荐产品,这对于适应电子商务网站客户的需求是很重要的。用户行为信息存储在服务器日志文件中。我们提取日志文件以获取行为,并进行预处理以获取会话操作细节。为了分析日志文件,本系统实现了一个线性时间逻辑来分析电子商务网站的web服务器日志。通过映射日志记录的过程,将Web服务器日志映射到事件日志,以捕获客户的行为。为了找到引用用户在会话中执行的不同操作的不同行为模式,需要执行不同的预定义查询。我们建议使用时间逻辑和模型检查方法作为传统数据挖掘技术的替代方法,并在结构化电子商务网站中使用它。系统的目标是分析电子商务网站的使用情况,利用时间逻辑公式提取用户行为模式,并根据日志模型描述用户行为。该系统可以判断用户的行为和兴趣,并将用户相互关联,以便更好地推荐系统。
{"title":"Big Data Classification of Users Navigation and Behavior Using Web Server Logs","authors":"Prajakta Ghavare, Prashant G. Ahire","doi":"10.1109/ICCUBEA.2018.8697606","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697606","url":null,"abstract":"Digital marketing is growing faster to increase business and sale products. All Ecommerce sites send recommendations of products or newly updated product list to the user. They also send exciting offers to users. We need to study and understand behavior and interest of user to recommend products, this is important to adapt to requirements of customer in ecommerce website. The information about users behavior is stored into server log file. We extract log file to get behavior and do pre-processing to get session action details. To analyze log files, proposed system implements a linear-temporal logic to analyze web server logs of ecommerce website. Web server logs are mapped to event logs by process of mapping log records, to capture behavior of customer. To find different behavioral patterns that refers to different action performed by users in session, different predefined queries are performed. We proposed the use of Temporal Logic and model checking approach as an alternative to traditional data mining techniques using and to use it in structured e-commerce websites. The goal of system is to analyze the usage of e-commerce websites and to extract customers behavioral patterns with the use of temporal logic formulas and to describe user behavior against the log model. The system can determine user behavior and interests, it will associate users with each other for better recommendation system.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115952677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1