首页 > 最新文献

2014 International Conference on Contemporary Computing and Informatics (IC3I)最新文献

英文 中文
A study of recent advances in cache memories 对缓存存储器最新进展的研究
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019786
M. T. Banday, Munis Khan
Registers within a processor, cache within, on, or outside the processor, and virtual memory on the disk drive builds memory hierarchy in modern computer systems. The principle of locality of reference makes this memory hierarchy work efficiently. In recent years, cache organizations and designs have witnessed several advances that have not only improved their performance such as hit rates, speed, latency, energy consumption, etc. but various new designs and organizations for chip multi-processors such as multilevel caches, Non-Uniform Cache Access (NUCA), hybrid caches, etc. have also emerged. This paper presents a study of current competing processors in terms of various factors determining performance and throughput of cache organization and design. To evaluate their performance and viability, it reviews recent cache trends that include hybrid cache memory, non-uniform cache architecture, energy efficient replacement algorithms, cache memory programming, software defined caches and emerging techniques for making cache reliable against soft errors. It discusses the pros and cons of emerging cache architectures and designs.
处理器内的寄存器、处理器内、处理器上或处理器外的缓存以及磁盘驱动器上的虚拟内存在现代计算机系统中构建了内存层次结构。引用的局部性原则使这种内存层次结构有效地工作。近年来,缓存组织和设计取得了一些进步,不仅提高了它们的性能,如命中率、速度、延迟、能耗等,而且还出现了各种新的芯片多处理器设计和组织,如多级缓存、非统一缓存访问(NUCA)、混合缓存等。本文从决定缓存组织和设计的性能和吞吐量的各种因素出发,对当前竞争的处理器进行了研究。为了评估它们的性能和可行性,它回顾了最近的缓存趋势,包括混合缓存,非统一缓存架构,节能替换算法,缓存编程,软件定义的缓存以及使缓存可靠抵御软错误的新兴技术。它讨论了新兴缓存架构和设计的优缺点。
{"title":"A study of recent advances in cache memories","authors":"M. T. Banday, Munis Khan","doi":"10.1109/IC3I.2014.7019786","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019786","url":null,"abstract":"Registers within a processor, cache within, on, or outside the processor, and virtual memory on the disk drive builds memory hierarchy in modern computer systems. The principle of locality of reference makes this memory hierarchy work efficiently. In recent years, cache organizations and designs have witnessed several advances that have not only improved their performance such as hit rates, speed, latency, energy consumption, etc. but various new designs and organizations for chip multi-processors such as multilevel caches, Non-Uniform Cache Access (NUCA), hybrid caches, etc. have also emerged. This paper presents a study of current competing processors in terms of various factors determining performance and throughput of cache organization and design. To evaluate their performance and viability, it reviews recent cache trends that include hybrid cache memory, non-uniform cache architecture, energy efficient replacement algorithms, cache memory programming, software defined caches and emerging techniques for making cache reliable against soft errors. It discusses the pros and cons of emerging cache architectures and designs.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Predicting the risk of newborns based on fuzzy clustering method with prediction risk assessment 基于预测风险评价的模糊聚类方法预测新生儿风险
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019584
Jyothi Thomas, G. Kulanthaivel
The role of the cervix in the pathogenesis of premature delivery is controversial. In a prospective, multicenter study of pregnant women, we used vaginal ultrasonography to measure the length of the cervix; we also documented the incidence of spontaneous delivery before 35 weeks' gestation. We performed vaginal ultrasonography at approximately 24 and 28 weeks of gestation in women with singleton pregnancies. We then assessed the relation between the length of the cervix and the risk of spontaneous preterm delivery. We examined 2915 women at approximately 24 weeks of gestation and 2531 of these women again at approximately 28 weeks. Spontaneous preterm delivery (at less than 35 weeks) occurred in 126 of the women (4.3 percent) examined at 24 weeks. The length of the cervix was normally distributed at 24 and 28 weeks (mean [SD], 35.28.3 mm and 33.78.5 mm, respectively). The relative risk of preterm delivery increased as the length of the cervix decreased. The paper discusses approximation properties of other possible types of nonlinearities that might be implemented by artificial neural networks. The daily registration has N cases that each of the well-known stimulus-answer couples represents. The objective of this work is to develop a function that allows finding the vector of entrance variables t to the vector of exit variables P. F is any function, in this case the electric power consumption. Their modeling with Artificial Neural Network (ANN) is Multi a Perceptron Layer (PMC). Another form of modeling it is using Interpolation Algorithms (AI). For the lengths measured at 28 weeks, the corresponding relative risks were 2.80, 3.52, 5.39, 9.57, 13.88, and 24.94 (P0.001 for values at or below the 50th percentile; P0.003 for values at the 75th percentile). The risk of spontaneous preterm delivery is increased in women who are found to have a short cervix by vaginal ultrasonography during pregnancy.
宫颈在早产发病机制中的作用是有争议的。在一项前瞻性、多中心的孕妇研究中,我们使用阴道超声检查来测量子宫颈的长度;我们还记录了妊娠35周前自然分娩的发生率。我们对单胎妊娠妇女进行了大约24周和28周的阴道超声检查。然后我们评估子宫颈长度与自然早产风险之间的关系。我们对2915名怀孕约24周的妇女和其中2531名怀孕约28周的妇女进行了检查。在24周检查的126名妇女(4.3%)发生自发性早产(少于35周)。宫颈长度在24周和28周呈正态分布(平均[SD]分别为35.28.3 mm和33.78.5 mm)。早产的相对风险随着子宫颈长度的减小而增加。本文讨论了其他可能由人工神经网络实现的非线性的近似性质。每天的登记有N个案例,每个案例都是众所周知的刺激-答案对所代表的。这项工作的目标是开发一个函数,它允许找到入口变量向量t到出口变量向量p的向量F是任何函数,在这种情况下是电力消耗。它们的人工神经网络(ANN)建模是多感知器层(PMC)。另一种建模形式是使用插值算法(AI)。对于28周测量的长度,相应的相对风险为2.80,3.52,5.39,9.57,13.88和24.94 (P0.001值在或低于第50百分位;第75个百分位数的值为P0.003)。在怀孕期间阴道超声检查发现宫颈短的妇女自然早产的风险增加。
{"title":"Predicting the risk of newborns based on fuzzy clustering method with prediction risk assessment","authors":"Jyothi Thomas, G. Kulanthaivel","doi":"10.1109/IC3I.2014.7019584","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019584","url":null,"abstract":"The role of the cervix in the pathogenesis of premature delivery is controversial. In a prospective, multicenter study of pregnant women, we used vaginal ultrasonography to measure the length of the cervix; we also documented the incidence of spontaneous delivery before 35 weeks' gestation. We performed vaginal ultrasonography at approximately 24 and 28 weeks of gestation in women with singleton pregnancies. We then assessed the relation between the length of the cervix and the risk of spontaneous preterm delivery. We examined 2915 women at approximately 24 weeks of gestation and 2531 of these women again at approximately 28 weeks. Spontaneous preterm delivery (at less than 35 weeks) occurred in 126 of the women (4.3 percent) examined at 24 weeks. The length of the cervix was normally distributed at 24 and 28 weeks (mean [SD], 35.28.3 mm and 33.78.5 mm, respectively). The relative risk of preterm delivery increased as the length of the cervix decreased. The paper discusses approximation properties of other possible types of nonlinearities that might be implemented by artificial neural networks. The daily registration has N cases that each of the well-known stimulus-answer couples represents. The objective of this work is to develop a function that allows finding the vector of entrance variables t to the vector of exit variables P. F is any function, in this case the electric power consumption. Their modeling with Artificial Neural Network (ANN) is Multi a Perceptron Layer (PMC). Another form of modeling it is using Interpolation Algorithms (AI). For the lengths measured at 28 weeks, the corresponding relative risks were 2.80, 3.52, 5.39, 9.57, 13.88, and 24.94 (P0.001 for values at or below the 50th percentile; P0.003 for values at the 75th percentile). The risk of spontaneous preterm delivery is increased in women who are found to have a short cervix by vaginal ultrasonography during pregnancy.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"18 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124986849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compression of images represented in hexagonal lattice using wavelet and gabor filter 用小波和gabor滤波器对六边形格子图像进行压缩
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019622
K. Jeevan, S. Krishnakumar
Hexagonal geometry has some advantageous like higher sampling efficiency, consistent connectivity and higher angular resolution. In addition to these advantages, the layout of photo-receptors in the human retina is more closely resembles to the hexagonal structure. It is due to these reasons many researchers have studied the possibility of using a hexagonal structure to represent digital images. Wavelet also have its own advantage and combining wavelet and processing of images in Hexagonal grid, that also will give better performance, because hexagonal wavelet includes the advantages of the hexagonal grid along with the wavelets. In this wok, the wavelet based image compression is performed on both square as well as hexagonal sampled images and the performance is compared using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). Gabor filter is used for the interpolation of hexagonally sampled images. Compression on hexagonal domain gives better results compared to compression on rectangular domain.
六边形几何具有较高的采样效率、一致的连通性和较高的角分辨率等优点。除了这些优点,光感受器在人类视网膜的布局更接近于六边形结构。正是由于这些原因,许多研究人员研究了使用六边形结构来表示数字图像的可能性。小波也有自己的优点,将小波与六边形网格中的图像处理结合起来,也会有更好的表现,因为六边形小波在小波的同时也包含了六边形网格的优点。在本研究中,对方形和六边形采样图像进行了基于小波的图像压缩,并使用均方误差(MSE)和峰值信噪比(PSNR)对性能进行了比较。Gabor滤波器用于六边形采样图像的插值。六边形域上的压缩比矩形域上的压缩效果更好。
{"title":"Compression of images represented in hexagonal lattice using wavelet and gabor filter","authors":"K. Jeevan, S. Krishnakumar","doi":"10.1109/IC3I.2014.7019622","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019622","url":null,"abstract":"Hexagonal geometry has some advantageous like higher sampling efficiency, consistent connectivity and higher angular resolution. In addition to these advantages, the layout of photo-receptors in the human retina is more closely resembles to the hexagonal structure. It is due to these reasons many researchers have studied the possibility of using a hexagonal structure to represent digital images. Wavelet also have its own advantage and combining wavelet and processing of images in Hexagonal grid, that also will give better performance, because hexagonal wavelet includes the advantages of the hexagonal grid along with the wavelets. In this wok, the wavelet based image compression is performed on both square as well as hexagonal sampled images and the performance is compared using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). Gabor filter is used for the interpolation of hexagonally sampled images. Compression on hexagonal domain gives better results compared to compression on rectangular domain.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An unsupervised intelligent system to detect fabrication in photocopy document using variations in Bounding Box features 一种无监督的智能系统,利用边界盒特征的变化来检测复印文件中的伪造
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019814
Suman V. Patgar, K. Rani, T. Vasudev
Photocopy documents are very common in our normal life. People are permitted to carry and produce photocopied documents frequently, to avoid damages or losing the original documents. But this provision is misused for temporary benefits by fabricating fake photocopied documents. When a photocopied document is produced, it may be required to check for its authenticity. An attempt is made in this direction to detect such fabricated photocopied documents. This paper proposes a system to detect fabricated photocopied document using Bounding box. The work in this paper mainly focuses on detecting fabrication of photocopied document in which some contents are manipulated by smearing whitener over the original content and writing new contents above it and manipulate the content through cut and paste technique. A detailed experimental study has been performed using a collected sample set of considerable size and a decision model is developed for classification. Testing is performed on set of collected testing samples resulted in an average detection rate close to 86%.
复印文件在我们的日常生活中很常见。市民可经常携带及出示影印文件,以免损坏或遗失正本文件。但是,这一规定被滥用于临时利益,通过伪造影印文件。出示影印文件时,可以要求检查其真实性。试图在这个方向上发现这种伪造的影印文件。提出了一种基于边界框的伪造影印文件检测系统。本文的工作主要是检测影印文件的伪造,即通过在原始内容上涂抹增白剂并在其上书写新的内容,以及通过剪切粘贴技术对内容进行操纵。详细的实验研究已经进行了使用收集的样本集相当大的规模和决策模型开发的分类。对收集的一组测试样本进行测试,平均检出率接近86%。
{"title":"An unsupervised intelligent system to detect fabrication in photocopy document using variations in Bounding Box features","authors":"Suman V. Patgar, K. Rani, T. Vasudev","doi":"10.1109/IC3I.2014.7019814","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019814","url":null,"abstract":"Photocopy documents are very common in our normal life. People are permitted to carry and produce photocopied documents frequently, to avoid damages or losing the original documents. But this provision is misused for temporary benefits by fabricating fake photocopied documents. When a photocopied document is produced, it may be required to check for its authenticity. An attempt is made in this direction to detect such fabricated photocopied documents. This paper proposes a system to detect fabricated photocopied document using Bounding box. The work in this paper mainly focuses on detecting fabrication of photocopied document in which some contents are manipulated by smearing whitener over the original content and writing new contents above it and manipulate the content through cut and paste technique. A detailed experimental study has been performed using a collected sample set of considerable size and a decision model is developed for classification. Testing is performed on set of collected testing samples resulted in an average detection rate close to 86%.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131515706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Survey on skin based face detection on different illumination, poses and occlusion 不同光照、姿态和遮挡下基于皮肤的人脸检测研究
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019746
J. Rajeshwari, K. Karibasappa, M. T. Gopalkrishna
Face detection is used to locate and as well as identify the human faces in the image or video in different illumination, pose, orientation, in-plane rotation, position. Since face is the centre of attraction in video and images, it is used in several applications such as security, retrieval, video compression, recognition technology. Face detection is having a high degree of variance in its appearance which makes difficult problem in computer vision. Most of the images or videos are corrupted, hence a complete study of face detection based on skin is required. This paper presents a comparison on different methods used to detect the face for different illumination, pose and occlusion on skin based. By reviewing existing algorithms better algorithms can be developed for computer vision problems.
人脸检测用于对图像或视频中不同光照、姿态、方向、面内旋转、位置的人脸进行定位和识别。由于人脸是视频和图像中吸引人的中心,它被应用于安全、检索、视频压缩、识别等技术中。人脸检测在外观上具有高度的差异性,这给计算机视觉带来了难题。大多数图像或视频都是损坏的,因此需要对基于皮肤的人脸检测进行完整的研究。本文对基于皮肤的不同光照、姿态和遮挡的人脸检测方法进行了比较。通过回顾现有的算法,可以开发出更好的算法来解决计算机视觉问题。
{"title":"Survey on skin based face detection on different illumination, poses and occlusion","authors":"J. Rajeshwari, K. Karibasappa, M. T. Gopalkrishna","doi":"10.1109/IC3I.2014.7019746","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019746","url":null,"abstract":"Face detection is used to locate and as well as identify the human faces in the image or video in different illumination, pose, orientation, in-plane rotation, position. Since face is the centre of attraction in video and images, it is used in several applications such as security, retrieval, video compression, recognition technology. Face detection is having a high degree of variance in its appearance which makes difficult problem in computer vision. Most of the images or videos are corrupted, hence a complete study of face detection based on skin is required. This paper presents a comparison on different methods used to detect the face for different illumination, pose and occlusion on skin based. By reviewing existing algorithms better algorithms can be developed for computer vision problems.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Opinion based book recommendation using Naive Bayes classifier 基于意见的基于朴素贝叶斯分类器的图书推荐
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019672
Anand Shanker Tewari, T. S. Ansari, A. Barman
In the rapidly increasing field of E-commerce, buyer is surrounded by many product information. However, search engines like Google, Baidu, can't satisfy the demands of buyer because the information about the product that the users want can't be obtain quickly, easily and correctly. So buyer has to spend lots of time in removing the unnecessary information. Many e-commerce website often request buyers to review products that they have already purchased. As the popularity of e-commerce is increasing day by day, the reviews from customers about the product receives also increasing heavily. As a result of this it is difficult for a buyer to read all the reviews to make a decision about the product purchase. In this paper, we extracted, summarize and categorize all the customer reviews of a book. This paper proposes a book recommendation technique based on opinion mining and Naïve Bayes classifier to recommend top ranking books to buyers. This paper also considered the important factor like price of the book while recommendation and presented a novel tabular efficient method for recommending books to the buyer, especially when the buyer is coming first time to the website.
在快速发展的电子商务领域,买家被大量的产品信息所包围。然而,像谷歌、百度这样的搜索引擎不能满足购买者的需求,因为用户想要的产品信息不能快速、方便、正确地获得。因此,买家不得不花费大量的时间来删除不必要的信息。许多电子商务网站经常要求买家对他们已经购买的产品进行评论。随着电子商务的日益普及,顾客对产品的评论也越来越多。因此,买家很难阅读所有的评论来做出购买产品的决定。在本文中,我们提取,总结和分类所有的客户评论的一本书。本文提出了一种基于意见挖掘和Naïve贝叶斯分类器的图书推荐技术,向购买者推荐排名靠前的图书。本文还考虑了图书价格等重要的推荐因素,提出了一种新颖的表格式高效的推荐方法,特别适用于首次访问网站的买家。
{"title":"Opinion based book recommendation using Naive Bayes classifier","authors":"Anand Shanker Tewari, T. S. Ansari, A. Barman","doi":"10.1109/IC3I.2014.7019672","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019672","url":null,"abstract":"In the rapidly increasing field of E-commerce, buyer is surrounded by many product information. However, search engines like Google, Baidu, can't satisfy the demands of buyer because the information about the product that the users want can't be obtain quickly, easily and correctly. So buyer has to spend lots of time in removing the unnecessary information. Many e-commerce website often request buyers to review products that they have already purchased. As the popularity of e-commerce is increasing day by day, the reviews from customers about the product receives also increasing heavily. As a result of this it is difficult for a buyer to read all the reviews to make a decision about the product purchase. In this paper, we extracted, summarize and categorize all the customer reviews of a book. This paper proposes a book recommendation technique based on opinion mining and Naïve Bayes classifier to recommend top ranking books to buyers. This paper also considered the important factor like price of the book while recommendation and presented a novel tabular efficient method for recommending books to the buyer, especially when the buyer is coming first time to the website.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Neuro-fuzzy design of a fuzzy PI controller with real-time implementation on a speed control system 在速度控制系统上实时实现模糊PI控制器的神经模糊设计
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019689
Arijit Ghosh, Satyaki Sen, C. Dey
Linguistic modelling of complex and nonlinear system constitutes to be the heart of many control and decision-making process. In this area, fuzzy logic is one of the most effective tools to build such linguistic models. Here, initially a fuzzy PI controller is designed with expert defined 49 rules to achieve desirable performance for a speed control system. Thereafter, a neuro-fuzzy controller is developed through back propagation training based on the input-output data set obtained from the previously designed fuzzy controller. Performance of the proposed neuro-fuzzy PI controller is tested through simulation study as well as real time experimentation on a DC servo speed control system. Both the simulation and experimental results substantiate the suitability of the designed neuro-fuzzy controller for closely approximating the behaviour of nonlinear fuzzy controller.
复杂非线性系统的语言建模是许多控制和决策过程的核心。在这一领域,模糊逻辑是构建语言模型最有效的工具之一。本文首先设计了一个具有专家定义的49条规则的模糊PI控制器,以达到速度控制系统的理想性能。然后,基于从先前设计的模糊控制器中获得的输入输出数据集,通过反向传播训练开发神经模糊控制器。通过仿真研究和直流伺服速度控制系统的实时实验,验证了所提出的神经模糊PI控制器的性能。仿真和实验结果都证明了所设计的神经模糊控制器能很好地逼近非线性模糊控制器的行为。
{"title":"Neuro-fuzzy design of a fuzzy PI controller with real-time implementation on a speed control system","authors":"Arijit Ghosh, Satyaki Sen, C. Dey","doi":"10.1109/IC3I.2014.7019689","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019689","url":null,"abstract":"Linguistic modelling of complex and nonlinear system constitutes to be the heart of many control and decision-making process. In this area, fuzzy logic is one of the most effective tools to build such linguistic models. Here, initially a fuzzy PI controller is designed with expert defined 49 rules to achieve desirable performance for a speed control system. Thereafter, a neuro-fuzzy controller is developed through back propagation training based on the input-output data set obtained from the previously designed fuzzy controller. Performance of the proposed neuro-fuzzy PI controller is tested through simulation study as well as real time experimentation on a DC servo speed control system. Both the simulation and experimental results substantiate the suitability of the designed neuro-fuzzy controller for closely approximating the behaviour of nonlinear fuzzy controller.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A distributed approach for selection of optimal actor nodes in wireless sensor and actor networks 无线传感器和参与网络中最优参与节点的分布式选择方法
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019702
V. Ranga, M. Dave, A. Verma
In this research paper we study the problem of optimal actor nodes selection based on mutual exclusion in the context of wireless sensor and actor network (WSAN) and propose a novel distributed approach to solve it. The major requirements for any proposed approach in such scenario are: (1) the proposed approach should select the minimum number of actor nodes to act on the given incident event region, (2) the overlaps between acting ranges should be minimum to avoid redundant action by actor nodes i.e. wastage of resources should be minimal, and finally, whole event region must be covered by one or more than one actors as per their availability in the network i.e. full coverage should be achieved. We have proposed one novel approach called Distributed Optimal Actor nodes Selection based on Mutual Exclusion approach (DOASME) in this research paper. The simulation results show the performance in terms of size of actor cover set, overlapped region, non-overlapped region and maximum actor coverage degree. We have also compared our simulated results with previously proposed benchmark algorithms.
本文研究了无线传感器与行动者网络(WSAN)中基于互斥的行动者节点最优选择问题,并提出了一种新的分布式方法来解决该问题。任何建议的方法的主要要求在这样的场景中:(1)该方法应选择演员的最小数量节点按照给定的事件事件的地区,(2)代理之间的重叠范围应该最小,避免多余的动作演员节点即浪费的资源应该是最小的,最后,整个事件区域必须由一个或多个参与者根据他们的可用性在网络即应实现全覆盖。本文提出了一种基于互斥方法的分布式最优参与者节点选择方法(DOASME)。仿真结果表明,该算法在行动者覆盖集的大小、重叠区域、非重叠区域和最大行动者覆盖度方面具有良好的性能。我们还将模拟结果与先前提出的基准算法进行了比较。
{"title":"A distributed approach for selection of optimal actor nodes in wireless sensor and actor networks","authors":"V. Ranga, M. Dave, A. Verma","doi":"10.1109/IC3I.2014.7019702","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019702","url":null,"abstract":"In this research paper we study the problem of optimal actor nodes selection based on mutual exclusion in the context of wireless sensor and actor network (WSAN) and propose a novel distributed approach to solve it. The major requirements for any proposed approach in such scenario are: (1) the proposed approach should select the minimum number of actor nodes to act on the given incident event region, (2) the overlaps between acting ranges should be minimum to avoid redundant action by actor nodes i.e. wastage of resources should be minimal, and finally, whole event region must be covered by one or more than one actors as per their availability in the network i.e. full coverage should be achieved. We have proposed one novel approach called Distributed Optimal Actor nodes Selection based on Mutual Exclusion approach (DOASME) in this research paper. The simulation results show the performance in terms of size of actor cover set, overlapped region, non-overlapped region and maximum actor coverage degree. We have also compared our simulated results with previously proposed benchmark algorithms.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114926948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security analysis of TLS authentication TLS认证的安全性分析
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019737
A. Ranjan, Vijay Kumar, M. Hussain
TLS is the cryptographic protocol used in the internet. It consists of set of protocols which are used for negotiation of cryptographic parameters, encryption-decryption and reporting errors during the process. Security Analysis of any cryptographic protocol is very much needed to discover vulnerability and to evaluate its security properties. First we theoretically analysed the protocol using automated tool scyther and draw important conclusion. After that we have performed one real time experiment to identify the loopholes with TLS authentication. We gathered the data and prepared the record of it then we have analysed the reasons behind it and suggested some generic countermeasures to handle them. In this paper we intend to find out the loopholes of TLS and found that certificate forging could be considered as a loophole of TLS security mechanism and discovered its cause and proposed the countermeasures.
TLS是互联网上使用的加密协议。它由一组协议组成,用于协商加密参数、加解密和报告过程中的错误。任何加密协议都需要对其进行安全分析,以便发现漏洞并评估其安全特性。首先利用自动工具镰刀对协议进行了理论分析,并得出了重要结论。在此之后,我们进行了一个实时实验,以识别TLS身份验证的漏洞。我们收集了数据并准备了记录,然后我们分析了背后的原因,并提出了一些一般性的对策来处理它们。本文试图找出TLS安全机制的漏洞,发现证书伪造可以看作是TLS安全机制的一个漏洞,并找出其产生的原因,提出相应的对策。
{"title":"Security analysis of TLS authentication","authors":"A. Ranjan, Vijay Kumar, M. Hussain","doi":"10.1109/IC3I.2014.7019737","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019737","url":null,"abstract":"TLS is the cryptographic protocol used in the internet. It consists of set of protocols which are used for negotiation of cryptographic parameters, encryption-decryption and reporting errors during the process. Security Analysis of any cryptographic protocol is very much needed to discover vulnerability and to evaluate its security properties. First we theoretically analysed the protocol using automated tool scyther and draw important conclusion. After that we have performed one real time experiment to identify the loopholes with TLS authentication. We gathered the data and prepared the record of it then we have analysed the reasons behind it and suggested some generic countermeasures to handle them. In this paper we intend to find out the loopholes of TLS and found that certificate forging could be considered as a loophole of TLS security mechanism and discovered its cause and proposed the countermeasures.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115134136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Using K-means cluster based techniques in external plagiarism detection 基于k均值聚类技术的外部抄袭检测
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019659
Rajiv Yerra, Yiu-Kai Ng
Text document categorization is one of the rapidly emerging research fields, where documents are identified, differentiated and classified manually or algorithmically. The paper focuses on application of automatic text document categorization in plagiarism detection domain. In today's world plagiarism has become a prime concern, especially in research and educational fields. This paper aims on the study and comparison of different methods of document categorization in external plagiarism detection. Here the primary focus is to explore the unsupervised document categorization/ clustering methods using different variations of K-means algorithm and compare it with the general N-gram based method and Vector Space Model based method. Finally the analysis and evaluation is done using data set from PAN-20131 and performance is compared based on precision, recall and efficiency in terms of time taken for algorithm execution.
文本文档分类是一个新兴的研究领域,主要是通过人工或算法对文档进行识别、区分和分类。本文主要研究了文本自动分类在抄袭检测领域的应用。在当今世界,剽窃已经成为一个主要问题,特别是在研究和教育领域。本文旨在对外部抄袭检测中不同的文献分类方法进行研究和比较。本文的主要重点是探索使用K-means算法的不同变体的无监督文档分类/聚类方法,并将其与基于n图的通用方法和基于向量空间模型的方法进行比较。最后使用PAN-20131的数据集进行分析和评估,并根据算法执行时间的精度,召回率和效率进行性能比较。
{"title":"Using K-means cluster based techniques in external plagiarism detection","authors":"Rajiv Yerra, Yiu-Kai Ng","doi":"10.1109/IC3I.2014.7019659","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019659","url":null,"abstract":"Text document categorization is one of the rapidly emerging research fields, where documents are identified, differentiated and classified manually or algorithmically. The paper focuses on application of automatic text document categorization in plagiarism detection domain. In today's world plagiarism has become a prime concern, especially in research and educational fields. This paper aims on the study and comparison of different methods of document categorization in external plagiarism detection. Here the primary focus is to explore the unsupervised document categorization/ clustering methods using different variations of K-means algorithm and compare it with the general N-gram based method and Vector Space Model based method. Finally the analysis and evaluation is done using data set from PAN-20131 and performance is compared based on precision, recall and efficiency in terms of time taken for algorithm execution.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116983927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
2014 International Conference on Contemporary Computing and Informatics (IC3I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1