首页 > 最新文献

2014 International Conference on Contemporary Computing and Informatics (IC3I)最新文献

英文 中文
Data aggregation using doped turbo codes 利用掺杂涡轮码进行数据聚合
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019719
A. R. Kulkarni, A. Pallavi
Modified data aggregation at MAC layer of 4G technology using dynamic aggregation technique, wherein the data from neighboring nodes is embedded in the turbo encoded payload of the selected node is proposed in this paper. This model developed on NS3 platform is compared to the existing AFR techniques and is found to have a lower encoded data bit rate. This scheme integrates aggregation & reliability (low bit error rate resulting from usage of Turbo codes) using the same basic architecture leading to a reduction in the power consumption. The proposed embedding scheme (of 1/3 rate) detailed in our paper results in a BER which is better than that of rate ½ turbo codes.
本文提出了一种利用动态聚合技术改进4G技术MAC层数据聚合的方法,将来自相邻节点的数据嵌入到所选节点的turbo编码载荷中。在NS3平台上开发的该模型与现有的AFR技术进行了比较,发现具有更低的编码数据比特率。该方案使用相同的基本架构集成了聚合和可靠性(使用Turbo码导致的低误码率),从而降低了功耗。本文提出的嵌入方案(1/3码率)的误码率优于1/ 2码率的turbo码。
{"title":"Data aggregation using doped turbo codes","authors":"A. R. Kulkarni, A. Pallavi","doi":"10.1109/IC3I.2014.7019719","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019719","url":null,"abstract":"Modified data aggregation at MAC layer of 4G technology using dynamic aggregation technique, wherein the data from neighboring nodes is embedded in the turbo encoded payload of the selected node is proposed in this paper. This model developed on NS3 platform is compared to the existing AFR techniques and is found to have a lower encoded data bit rate. This scheme integrates aggregation & reliability (low bit error rate resulting from usage of Turbo codes) using the same basic architecture leading to a reduction in the power consumption. The proposed embedding scheme (of 1/3 rate) detailed in our paper results in a BER which is better than that of rate ½ turbo codes.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on skin based face detection on different illumination, poses and occlusion 不同光照、姿态和遮挡下基于皮肤的人脸检测研究
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019746
J. Rajeshwari, K. Karibasappa, M. T. Gopalkrishna
Face detection is used to locate and as well as identify the human faces in the image or video in different illumination, pose, orientation, in-plane rotation, position. Since face is the centre of attraction in video and images, it is used in several applications such as security, retrieval, video compression, recognition technology. Face detection is having a high degree of variance in its appearance which makes difficult problem in computer vision. Most of the images or videos are corrupted, hence a complete study of face detection based on skin is required. This paper presents a comparison on different methods used to detect the face for different illumination, pose and occlusion on skin based. By reviewing existing algorithms better algorithms can be developed for computer vision problems.
人脸检测用于对图像或视频中不同光照、姿态、方向、面内旋转、位置的人脸进行定位和识别。由于人脸是视频和图像中吸引人的中心,它被应用于安全、检索、视频压缩、识别等技术中。人脸检测在外观上具有高度的差异性,这给计算机视觉带来了难题。大多数图像或视频都是损坏的,因此需要对基于皮肤的人脸检测进行完整的研究。本文对基于皮肤的不同光照、姿态和遮挡的人脸检测方法进行了比较。通过回顾现有的算法,可以开发出更好的算法来解决计算机视觉问题。
{"title":"Survey on skin based face detection on different illumination, poses and occlusion","authors":"J. Rajeshwari, K. Karibasappa, M. T. Gopalkrishna","doi":"10.1109/IC3I.2014.7019746","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019746","url":null,"abstract":"Face detection is used to locate and as well as identify the human faces in the image or video in different illumination, pose, orientation, in-plane rotation, position. Since face is the centre of attraction in video and images, it is used in several applications such as security, retrieval, video compression, recognition technology. Face detection is having a high degree of variance in its appearance which makes difficult problem in computer vision. Most of the images or videos are corrupted, hence a complete study of face detection based on skin is required. This paper presents a comparison on different methods used to detect the face for different illumination, pose and occlusion on skin based. By reviewing existing algorithms better algorithms can be developed for computer vision problems.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A distributed approach for selection of optimal actor nodes in wireless sensor and actor networks 无线传感器和参与网络中最优参与节点的分布式选择方法
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019702
V. Ranga, M. Dave, A. Verma
In this research paper we study the problem of optimal actor nodes selection based on mutual exclusion in the context of wireless sensor and actor network (WSAN) and propose a novel distributed approach to solve it. The major requirements for any proposed approach in such scenario are: (1) the proposed approach should select the minimum number of actor nodes to act on the given incident event region, (2) the overlaps between acting ranges should be minimum to avoid redundant action by actor nodes i.e. wastage of resources should be minimal, and finally, whole event region must be covered by one or more than one actors as per their availability in the network i.e. full coverage should be achieved. We have proposed one novel approach called Distributed Optimal Actor nodes Selection based on Mutual Exclusion approach (DOASME) in this research paper. The simulation results show the performance in terms of size of actor cover set, overlapped region, non-overlapped region and maximum actor coverage degree. We have also compared our simulated results with previously proposed benchmark algorithms.
本文研究了无线传感器与行动者网络(WSAN)中基于互斥的行动者节点最优选择问题,并提出了一种新的分布式方法来解决该问题。任何建议的方法的主要要求在这样的场景中:(1)该方法应选择演员的最小数量节点按照给定的事件事件的地区,(2)代理之间的重叠范围应该最小,避免多余的动作演员节点即浪费的资源应该是最小的,最后,整个事件区域必须由一个或多个参与者根据他们的可用性在网络即应实现全覆盖。本文提出了一种基于互斥方法的分布式最优参与者节点选择方法(DOASME)。仿真结果表明,该算法在行动者覆盖集的大小、重叠区域、非重叠区域和最大行动者覆盖度方面具有良好的性能。我们还将模拟结果与先前提出的基准算法进行了比较。
{"title":"A distributed approach for selection of optimal actor nodes in wireless sensor and actor networks","authors":"V. Ranga, M. Dave, A. Verma","doi":"10.1109/IC3I.2014.7019702","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019702","url":null,"abstract":"In this research paper we study the problem of optimal actor nodes selection based on mutual exclusion in the context of wireless sensor and actor network (WSAN) and propose a novel distributed approach to solve it. The major requirements for any proposed approach in such scenario are: (1) the proposed approach should select the minimum number of actor nodes to act on the given incident event region, (2) the overlaps between acting ranges should be minimum to avoid redundant action by actor nodes i.e. wastage of resources should be minimal, and finally, whole event region must be covered by one or more than one actors as per their availability in the network i.e. full coverage should be achieved. We have proposed one novel approach called Distributed Optimal Actor nodes Selection based on Mutual Exclusion approach (DOASME) in this research paper. The simulation results show the performance in terms of size of actor cover set, overlapped region, non-overlapped region and maximum actor coverage degree. We have also compared our simulated results with previously proposed benchmark algorithms.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114926948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Opinion based book recommendation using Naive Bayes classifier 基于意见的基于朴素贝叶斯分类器的图书推荐
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019672
Anand Shanker Tewari, T. S. Ansari, A. Barman
In the rapidly increasing field of E-commerce, buyer is surrounded by many product information. However, search engines like Google, Baidu, can't satisfy the demands of buyer because the information about the product that the users want can't be obtain quickly, easily and correctly. So buyer has to spend lots of time in removing the unnecessary information. Many e-commerce website often request buyers to review products that they have already purchased. As the popularity of e-commerce is increasing day by day, the reviews from customers about the product receives also increasing heavily. As a result of this it is difficult for a buyer to read all the reviews to make a decision about the product purchase. In this paper, we extracted, summarize and categorize all the customer reviews of a book. This paper proposes a book recommendation technique based on opinion mining and Naïve Bayes classifier to recommend top ranking books to buyers. This paper also considered the important factor like price of the book while recommendation and presented a novel tabular efficient method for recommending books to the buyer, especially when the buyer is coming first time to the website.
在快速发展的电子商务领域,买家被大量的产品信息所包围。然而,像谷歌、百度这样的搜索引擎不能满足购买者的需求,因为用户想要的产品信息不能快速、方便、正确地获得。因此,买家不得不花费大量的时间来删除不必要的信息。许多电子商务网站经常要求买家对他们已经购买的产品进行评论。随着电子商务的日益普及,顾客对产品的评论也越来越多。因此,买家很难阅读所有的评论来做出购买产品的决定。在本文中,我们提取,总结和分类所有的客户评论的一本书。本文提出了一种基于意见挖掘和Naïve贝叶斯分类器的图书推荐技术,向购买者推荐排名靠前的图书。本文还考虑了图书价格等重要的推荐因素,提出了一种新颖的表格式高效的推荐方法,特别适用于首次访问网站的买家。
{"title":"Opinion based book recommendation using Naive Bayes classifier","authors":"Anand Shanker Tewari, T. S. Ansari, A. Barman","doi":"10.1109/IC3I.2014.7019672","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019672","url":null,"abstract":"In the rapidly increasing field of E-commerce, buyer is surrounded by many product information. However, search engines like Google, Baidu, can't satisfy the demands of buyer because the information about the product that the users want can't be obtain quickly, easily and correctly. So buyer has to spend lots of time in removing the unnecessary information. Many e-commerce website often request buyers to review products that they have already purchased. As the popularity of e-commerce is increasing day by day, the reviews from customers about the product receives also increasing heavily. As a result of this it is difficult for a buyer to read all the reviews to make a decision about the product purchase. In this paper, we extracted, summarize and categorize all the customer reviews of a book. This paper proposes a book recommendation technique based on opinion mining and Naïve Bayes classifier to recommend top ranking books to buyers. This paper also considered the important factor like price of the book while recommendation and presented a novel tabular efficient method for recommending books to the buyer, especially when the buyer is coming first time to the website.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Book recommendation system based on collaborative filtering and association rule mining for college students 基于协同过滤和关联规则挖掘的大学生图书推荐系统
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019651
Anand Shanker Tewari, K. Priyanka
Recommendation systems are tools in e-commerce websites which helps user to find the appropriate products. With the rapid development of internet technologies the number of online book selling websites has increased which enhanced the competition among them. This paper presents online book recommendation system for students reading textbooks. The main motive of this paper is to develop the technique which recommends most suitable books to the students according to their price range and publisher's name. This is based on the combined features of classification, user based collaborative filtering and association rule mining.
推荐系统是电子商务网站中帮助用户找到合适产品的工具。随着互联网技术的飞速发展,网上图书销售网站的数量不断增加,加剧了网上图书销售网站之间的竞争。本文介绍了一种适合学生阅读教材的网上图书推荐系统。本文的主要动机是开发一种技术,根据他们的价格范围和出版商的名称向学生推荐最合适的书籍。它结合了分类、基于用户的协同过滤和关联规则挖掘的特点。
{"title":"Book recommendation system based on collaborative filtering and association rule mining for college students","authors":"Anand Shanker Tewari, K. Priyanka","doi":"10.1109/IC3I.2014.7019651","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019651","url":null,"abstract":"Recommendation systems are tools in e-commerce websites which helps user to find the appropriate products. With the rapid development of internet technologies the number of online book selling websites has increased which enhanced the competition among them. This paper presents online book recommendation system for students reading textbooks. The main motive of this paper is to develop the technique which recommends most suitable books to the students according to their price range and publisher's name. This is based on the combined features of classification, user based collaborative filtering and association rule mining.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130445197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Using K-means cluster based techniques in external plagiarism detection 基于k均值聚类技术的外部抄袭检测
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019659
Rajiv Yerra, Yiu-Kai Ng
Text document categorization is one of the rapidly emerging research fields, where documents are identified, differentiated and classified manually or algorithmically. The paper focuses on application of automatic text document categorization in plagiarism detection domain. In today's world plagiarism has become a prime concern, especially in research and educational fields. This paper aims on the study and comparison of different methods of document categorization in external plagiarism detection. Here the primary focus is to explore the unsupervised document categorization/ clustering methods using different variations of K-means algorithm and compare it with the general N-gram based method and Vector Space Model based method. Finally the analysis and evaluation is done using data set from PAN-20131 and performance is compared based on precision, recall and efficiency in terms of time taken for algorithm execution.
文本文档分类是一个新兴的研究领域,主要是通过人工或算法对文档进行识别、区分和分类。本文主要研究了文本自动分类在抄袭检测领域的应用。在当今世界,剽窃已经成为一个主要问题,特别是在研究和教育领域。本文旨在对外部抄袭检测中不同的文献分类方法进行研究和比较。本文的主要重点是探索使用K-means算法的不同变体的无监督文档分类/聚类方法,并将其与基于n图的通用方法和基于向量空间模型的方法进行比较。最后使用PAN-20131的数据集进行分析和评估,并根据算法执行时间的精度,召回率和效率进行性能比较。
{"title":"Using K-means cluster based techniques in external plagiarism detection","authors":"Rajiv Yerra, Yiu-Kai Ng","doi":"10.1109/IC3I.2014.7019659","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019659","url":null,"abstract":"Text document categorization is one of the rapidly emerging research fields, where documents are identified, differentiated and classified manually or algorithmically. The paper focuses on application of automatic text document categorization in plagiarism detection domain. In today's world plagiarism has become a prime concern, especially in research and educational fields. This paper aims on the study and comparison of different methods of document categorization in external plagiarism detection. Here the primary focus is to explore the unsupervised document categorization/ clustering methods using different variations of K-means algorithm and compare it with the general N-gram based method and Vector Space Model based method. Finally the analysis and evaluation is done using data set from PAN-20131 and performance is compared based on precision, recall and efficiency in terms of time taken for algorithm execution.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116983927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An unsupervised intelligent system to detect fabrication in photocopy document using variations in Bounding Box features 一种无监督的智能系统,利用边界盒特征的变化来检测复印文件中的伪造
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019814
Suman V. Patgar, K. Rani, T. Vasudev
Photocopy documents are very common in our normal life. People are permitted to carry and produce photocopied documents frequently, to avoid damages or losing the original documents. But this provision is misused for temporary benefits by fabricating fake photocopied documents. When a photocopied document is produced, it may be required to check for its authenticity. An attempt is made in this direction to detect such fabricated photocopied documents. This paper proposes a system to detect fabricated photocopied document using Bounding box. The work in this paper mainly focuses on detecting fabrication of photocopied document in which some contents are manipulated by smearing whitener over the original content and writing new contents above it and manipulate the content through cut and paste technique. A detailed experimental study has been performed using a collected sample set of considerable size and a decision model is developed for classification. Testing is performed on set of collected testing samples resulted in an average detection rate close to 86%.
复印文件在我们的日常生活中很常见。市民可经常携带及出示影印文件,以免损坏或遗失正本文件。但是,这一规定被滥用于临时利益,通过伪造影印文件。出示影印文件时,可以要求检查其真实性。试图在这个方向上发现这种伪造的影印文件。提出了一种基于边界框的伪造影印文件检测系统。本文的工作主要是检测影印文件的伪造,即通过在原始内容上涂抹增白剂并在其上书写新的内容,以及通过剪切粘贴技术对内容进行操纵。详细的实验研究已经进行了使用收集的样本集相当大的规模和决策模型开发的分类。对收集的一组测试样本进行测试,平均检出率接近86%。
{"title":"An unsupervised intelligent system to detect fabrication in photocopy document using variations in Bounding Box features","authors":"Suman V. Patgar, K. Rani, T. Vasudev","doi":"10.1109/IC3I.2014.7019814","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019814","url":null,"abstract":"Photocopy documents are very common in our normal life. People are permitted to carry and produce photocopied documents frequently, to avoid damages or losing the original documents. But this provision is misused for temporary benefits by fabricating fake photocopied documents. When a photocopied document is produced, it may be required to check for its authenticity. An attempt is made in this direction to detect such fabricated photocopied documents. This paper proposes a system to detect fabricated photocopied document using Bounding box. The work in this paper mainly focuses on detecting fabrication of photocopied document in which some contents are manipulated by smearing whitener over the original content and writing new contents above it and manipulate the content through cut and paste technique. A detailed experimental study has been performed using a collected sample set of considerable size and a decision model is developed for classification. Testing is performed on set of collected testing samples resulted in an average detection rate close to 86%.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131515706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The survivability of computing systems 计算系统的生存能力
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019710
M. Murmu
The distributed systems are highly fault prone environment to work with. Thus, fault tolerance is a major concern in distributed computing. The available failure resiliency techniques mitigate only the failures that are limited in some way. However, it is extremely difficult to limit the failures because the autonomous nodes may suffer autonomous failures. Nevertheless, in mission critical applications, the uncontrolled failures are unaffordable. Hence, it is highly desirable that the system survives such failures. The survivability of computer networks is a popular research topic. However, the survivability of computing systems has not been in focus. In this illustration, we have attempted to raise this issue and bring out certain requirements and features related to survivable computing systems. To the best of my knowledge, it is the first attempt in the direction.
分布式系统是一个非常容易发生故障的工作环境。因此,容错是分布式计算中的一个主要问题。可用的故障恢复技术只能减轻在某种程度上有限的故障。然而,由于自治节点可能遭受自治故障,因此限制故障是极其困难的。然而,在关键任务应用程序中,无法控制的故障是无法承受的。因此,非常希望系统能够在此类故障中幸存下来。计算机网络的生存能力是一个热门的研究课题。然而,计算系统的生存能力并没有成为人们关注的焦点。在本例中,我们试图提出这个问题,并提出与可生存计算系统相关的某些需求和特性。据我所知,这是朝这个方向的第一次尝试。
{"title":"The survivability of computing systems","authors":"M. Murmu","doi":"10.1109/IC3I.2014.7019710","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019710","url":null,"abstract":"The distributed systems are highly fault prone environment to work with. Thus, fault tolerance is a major concern in distributed computing. The available failure resiliency techniques mitigate only the failures that are limited in some way. However, it is extremely difficult to limit the failures because the autonomous nodes may suffer autonomous failures. Nevertheless, in mission critical applications, the uncontrolled failures are unaffordable. Hence, it is highly desirable that the system survives such failures. The survivability of computer networks is a popular research topic. However, the survivability of computing systems has not been in focus. In this illustration, we have attempted to raise this issue and bring out certain requirements and features related to survivable computing systems. To the best of my knowledge, it is the first attempt in the direction.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128253833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Granular neural networks models with class-belonging granulation 具有类所属粒化的颗粒神经网络模型
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019743
D. A. Kumar, S. Meher
Granular neural networks (GNNs) take the fuzzy granulated input and process them through neural networks (NNs). As a result, performance of GNNs depends highly on the granulation process and initial weights of NNs. The initial weights between nodes of GNNs provide the starting point in the searching of the lowest cost function value. The present article proposes GNN model that use class-belonging (CB) fuzzy granulation of input information and rough set-theoretic weight initialization of NNs. The model thus avoids the random initialization of weights and provides improved decisions at the output with CB granulation. Classification performance of the proposed GNN model has been assessed using various measurement indexes and its superiority over similar other methods is justified. Conventional back propagation algorithm is used to train the proposed model of GNN.
颗粒神经网络(GNNs)将模糊颗粒化输入通过神经网络进行处理。因此,gnn的性能在很大程度上取决于造粒过程和神经网络的初始权重。gnn节点间的初始权值是搜索最小代价函数值的起点。本文提出了使用类归属模糊粒化输入信息和粗糙集理论权重初始化神经网络的GNN模型。因此,该模型避免了权重的随机初始化,并通过CB粒化在输出处提供了改进的决策。利用各种度量指标对所提出的GNN模型的分类性能进行了评价,证明了其优于同类方法的优越性。采用传统的反向传播算法对所提出的GNN模型进行训练。
{"title":"Granular neural networks models with class-belonging granulation","authors":"D. A. Kumar, S. Meher","doi":"10.1109/IC3I.2014.7019743","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019743","url":null,"abstract":"Granular neural networks (GNNs) take the fuzzy granulated input and process them through neural networks (NNs). As a result, performance of GNNs depends highly on the granulation process and initial weights of NNs. The initial weights between nodes of GNNs provide the starting point in the searching of the lowest cost function value. The present article proposes GNN model that use class-belonging (CB) fuzzy granulation of input information and rough set-theoretic weight initialization of NNs. The model thus avoids the random initialization of weights and provides improved decisions at the output with CB granulation. Classification performance of the proposed GNN model has been assessed using various measurement indexes and its superiority over similar other methods is justified. Conventional back propagation algorithm is used to train the proposed model of GNN.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123020207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of optimized reversible binary adder/subtractor and BCD adder 优化可逆二进制加/减法器和BCD加法器的设计
Pub Date : 2014-11-01 DOI: 10.1109/IC3I.2014.7019664
A. N. Nagamani, S. Ashwin, V. K. Agrawal
Reversible logic has gained the interest of many researchers due to its applicability in emerging low power technologies such as Quantum computing, QCA, optical computing etc., Adders/Subtractors are basic design components of any processor. Optimized design of these adders results in efficient processors. In this work we propose optimized Binary adders/subtractors and BCD adders. The adders/subtractors designed in this work are optimized for Quantum cost and Delay. We also propose a generic design of n-bit adders and subtractors. In this work, we explore the use of Negative control lines for detecting overflow logic of BCD adder which considerably reduces Quantum cost, delay and gate count which result in high speed BCD adder with optimized area which give way to lot of scope in the field of reversible computing in near future.
可逆逻辑由于其在量子计算、QCA、光学计算等新兴低功耗技术中的适用性而引起了许多研究人员的兴趣,加法器/减法器是任何处理器的基本设计组件。这些加法器的优化设计产生了高效的处理器。在这项工作中,我们提出了优化的二进制加/减法器和BCD加法器。本工作设计的加/减法器针对量子成本和延迟进行了优化。我们还提出了n位加法器和减法器的通用设计。在这项工作中,我们探索了使用负控制线来检测BCD加法器的溢出逻辑,这大大降低了量子成本,延迟和门计数,从而实现了具有优化面积的高速BCD加法器,在不久的将来在可逆计算领域有很大的发展空间。
{"title":"Design of optimized reversible binary adder/subtractor and BCD adder","authors":"A. N. Nagamani, S. Ashwin, V. K. Agrawal","doi":"10.1109/IC3I.2014.7019664","DOIUrl":"https://doi.org/10.1109/IC3I.2014.7019664","url":null,"abstract":"Reversible logic has gained the interest of many researchers due to its applicability in emerging low power technologies such as Quantum computing, QCA, optical computing etc., Adders/Subtractors are basic design components of any processor. Optimized design of these adders results in efficient processors. In this work we propose optimized Binary adders/subtractors and BCD adders. The adders/subtractors designed in this work are optimized for Quantum cost and Delay. We also propose a generic design of n-bit adders and subtractors. In this work, we explore the use of Negative control lines for detecting overflow logic of BCD adder which considerably reduces Quantum cost, delay and gate count which result in high speed BCD adder with optimized area which give way to lot of scope in the field of reversible computing in near future.","PeriodicalId":430848,"journal":{"name":"2014 International Conference on Contemporary Computing and Informatics (IC3I)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121433171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2014 International Conference on Contemporary Computing and Informatics (IC3I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1