首页 > 最新文献

2012 World Congress on Information and Communication Technologies最新文献

英文 中文
Implementation of high performance and low leakage half subtractor circuit using AVL technique 利用AVL技术实现高性能低漏半减码器电路
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409045
S. Akashe, G. Sharma, V. Rajak, R. Pandey
In this paper, we propose a leakage reduction technique as high leakage currents in deep submicron regimes are becoming a major contributor to total power dissipation of CMOS circuits. Sub threshold leakage current plays a very important role in power dissipation so to reduce the sub threshold leakage current we proposed an adaptive voltage level (AVL) technique. Which optimize the overall voltage across the half subtractor circuit in standby mode. In this AVL technique, two schemes are employed, one is AVLS (adaptive voltage level at supply) in which the supply voltage is reduced and the other is AVLG (adaptive voltage level at ground) in which the ground potential is increased. By applying this technique we have reduced the leakage current from 9.274*10-12ampere) to 5.428*10-12amp. That means this technique the leakage current 41.4%. The circuit is simulated on Cadence(R) Virtuoso(R) in 45nano meter CMOS technology. Simulation results reveal that there is a significant reduction in leakage current for this proposed cell with the AVL circuit reducing the supply voltage.
在本文中,我们提出了一种减少泄漏的技术,因为深亚微米区域的高泄漏电流正在成为CMOS电路总功耗的主要贡献者。为了降低亚阈值泄漏电流,提出了一种自适应电压电平(AVL)技术。在待机模式下优化整个半减法电路的总电压。在AVL技术中,采用了两种方案,一种是降低电源电压的AVLS(自适应电压电平)方案,另一种是提高地电位的AVLG(自适应电压电平)方案。通过应用这种技术,我们将泄漏电流从9.274*10-12安培降低到5.428*10-12安培。这意味着该技术的漏电流为41.4%。该电路在Cadence(R) Virtuoso(R)上采用45纳米CMOS技术进行仿真。仿真结果表明,AVL电路降低了电源电压,大大降低了电池的漏电流。
{"title":"Implementation of high performance and low leakage half subtractor circuit using AVL technique","authors":"S. Akashe, G. Sharma, V. Rajak, R. Pandey","doi":"10.1109/WICT.2012.6409045","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409045","url":null,"abstract":"In this paper, we propose a leakage reduction technique as high leakage currents in deep submicron regimes are becoming a major contributor to total power dissipation of CMOS circuits. Sub threshold leakage current plays a very important role in power dissipation so to reduce the sub threshold leakage current we proposed an adaptive voltage level (AVL) technique. Which optimize the overall voltage across the half subtractor circuit in standby mode. In this AVL technique, two schemes are employed, one is AVLS (adaptive voltage level at supply) in which the supply voltage is reduced and the other is AVLG (adaptive voltage level at ground) in which the ground potential is increased. By applying this technique we have reduced the leakage current from 9.274*10-12ampere) to 5.428*10-12amp. That means this technique the leakage current 41.4%. The circuit is simulated on Cadence(R) Virtuoso(R) in 45nano meter CMOS technology. Simulation results reveal that there is a significant reduction in leakage current for this proposed cell with the AVL circuit reducing the supply voltage.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124898268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A new algorithm for quantitative deciphering of pre-mature MiRNAs using some statistical parameters 一种利用一些统计参数定量破译早熟mirna的新算法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409146
J. Nath, A. Nath
It is now a prime research area to understand microRNA (miRNA) in a quantitative manner. The researchers across the globe have been working on quantitative estimation of microRNA (miRNA) from different angles. Our present study would be a new addition in the present scenario. The miRNAs are non-coding short ribonucleic acid (RNA) molecules, approximately ~25 nucleotides long. MiRNAs help in understanding the entire scope of post-transcriptional gene regulation. MiRNAs regulate numerous cellular processes and have roles in tissue remodeling. In the present work the authors made an exhaustive study on deciphering the inherent statistical behavior in pre-mature miRNA strings through few statistical parameters namely Hurst Exponent values, Variance, Poly String Mean and Poly String Standard Deviation. These four parameters not only quantify miRNA but also classify the miRNA strings. In the present work the authors have to tried to explore the quantification and classification based on statistical results on nucleotide strings of pre-mature miRNAs of the three organisms Homo sapiens (hsa), Macaca mulatta (mml) and Pan troglodytes (ptr).
以定量的方式了解microRNA (miRNA)是目前一个主要的研究领域。世界各地的研究人员一直在从不同的角度对microRNA (miRNA)进行定量估计。我们目前的研究将是目前情况下的一个新补充。mirna是非编码短核糖核酸(RNA)分子,长约25个核苷酸。mirna有助于理解转录后基因调控的整个范围。mirna调节许多细胞过程并在组织重塑中发挥作用。在本工作中,作者通过赫斯特指数值、方差、聚串均值和聚串标准差等几个统计参数,对早熟miRNA串的固有统计行为进行了详尽的研究。这四个参数不仅可以量化miRNA,还可以对miRNA串进行分类。在目前的工作中,作者试图在智人(Homo sapiens, hsa)、猕猴(Macaca mulatta, mml)和类人猿(Pan troglodytes, ptr)这三种生物的早熟miRNAs核苷酸序列统计结果的基础上,对其进行量化和分类。
{"title":"A new algorithm for quantitative deciphering of pre-mature MiRNAs using some statistical parameters","authors":"J. Nath, A. Nath","doi":"10.1109/WICT.2012.6409146","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409146","url":null,"abstract":"It is now a prime research area to understand microRNA (miRNA) in a quantitative manner. The researchers across the globe have been working on quantitative estimation of microRNA (miRNA) from different angles. Our present study would be a new addition in the present scenario. The miRNAs are non-coding short ribonucleic acid (RNA) molecules, approximately ~25 nucleotides long. MiRNAs help in understanding the entire scope of post-transcriptional gene regulation. MiRNAs regulate numerous cellular processes and have roles in tissue remodeling. In the present work the authors made an exhaustive study on deciphering the inherent statistical behavior in pre-mature miRNA strings through few statistical parameters namely Hurst Exponent values, Variance, Poly String Mean and Poly String Standard Deviation. These four parameters not only quantify miRNA but also classify the miRNA strings. In the present work the authors have to tried to explore the quantification and classification based on statistical results on nucleotide strings of pre-mature miRNAs of the three organisms Homo sapiens (hsa), Macaca mulatta (mml) and Pan troglodytes (ptr).","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132087830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A convection-diffusion model to determine the position of heavy metal pollution source in topsoil 一种确定表层土壤重金属污染源位置的对流-扩散模型
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409255
Yu Shaochen, He Shanshan, Li Guangyu, Gao Hongmin
In order to research water pollution problem in soil or underground water and determine the position of metal pollution source of certain region, the convection-diffusion model to determine the position of heavy metal pollution source in topsoil is established based on solute migration theory and actual measured data of heavy metal content in topsoil of certain region combined with deterministic solute migration model. The model expounds the method of rotation of coordinates and numerical insulation using reference coordinate system which follows the movement of fluid particle, discusses migration law of soluble pollution in soil or aquifer in function of water flow and solves partial differential equation by least square method to determine the position of pollution source accurately.
为了研究土壤或地下水中的水污染问题,确定某一区域的金属污染源位置,基于溶质迁移理论和某一区域表土中重金属含量的实测数据,结合确定性溶质迁移模型,建立了确定表土中重金属污染源位置的对流扩散模型。该模型阐述了遵循流体颗粒运动的参考坐标系下的坐标旋转和数值绝缘方法,讨论了土壤或含水层中可溶性污染物随水流的迁移规律,并采用最小二乘法求解偏微分方程,以准确确定污染源的位置。
{"title":"A convection-diffusion model to determine the position of heavy metal pollution source in topsoil","authors":"Yu Shaochen, He Shanshan, Li Guangyu, Gao Hongmin","doi":"10.1109/WICT.2012.6409255","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409255","url":null,"abstract":"In order to research water pollution problem in soil or underground water and determine the position of metal pollution source of certain region, the convection-diffusion model to determine the position of heavy metal pollution source in topsoil is established based on solute migration theory and actual measured data of heavy metal content in topsoil of certain region combined with deterministic solute migration model. The model expounds the method of rotation of coordinates and numerical insulation using reference coordinate system which follows the movement of fluid particle, discusses migration law of soluble pollution in soil or aquifer in function of water flow and solves partial differential equation by least square method to determine the position of pollution source accurately.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An autonomic computing architecture for business applications 用于业务应用程序的自主计算体系结构
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409118
D. Kurian, P. Chelliah
Though the vision of autonomic computing (AC) is highly ambitious, an objective analysis of autonomic computing and its growth in the last decade throw more incisive and decisive insights on its birth deformities and growth pains. Predominantly software-based solutions are being preferred to make IT infrastructures and platforms, adaptive and autonomic in their offerings, outputs, and outlooks. However the autonomic journey has not been as promising as originally envisaged by industry leaders and luminaries, and there are several reasons being quoted by professionals and pundits for that gap. Precisely speaking, there is a kind of slackness in articulating its unique characteristics, and the enormous potentials in business and IT acceleration. There are not many real-world applications to popularize the autonomic concept among the development community. Though, some inroads has been made into infrastructure areas like networking, load balancing etc., very few attempts has been exercised in application areas like ERP, SCM, or CRM. In this paper, we would like to dig and dive deeper to extract and explain where the pioneering and path-breaking autonomic computing stands today, and the varied opportunities and possibilities, which insists hot pursuit of the autonomic idea. A simplistic architecture for deployment of autonomic business applications is introduced and a sample implementation in an existing CRM system is described. This should form the basis of new start and ubiquitous application of AC concepts for business applications.
尽管自主计算(AC)的愿景是雄心勃勃的,但对自主计算及其在过去十年中的发展进行客观分析,可以对其出生畸形和成长痛苦提供更深刻和决定性的见解。主要是基于软件的解决方案被首选为IT基础设施和平台,在其产品、输出和前景中具有适应性和自主性。然而,自动驾驶汽车的发展历程并不像行业领导者和杰出人士最初设想的那样充满希望,专业人士和权威人士援引了几个原因来解释这一差距。准确地说,在阐述其独特的特点方面有一种懈怠,在业务和IT加速方面有巨大的潜力。在开发社区中推广自治概念的实际应用程序并不多。尽管在网络、负载平衡等基础设施领域取得了一些进展,但在ERP、SCM或CRM等应用领域却很少有尝试。在本文中,我们将进一步挖掘和深入,提取和解释开创性和开创性的自主计算今天所处的位置,以及各种机会和可能性,这坚持了对自主思想的热烈追求。介绍了用于部署自主业务应用程序的简单架构,并描述了现有CRM系统中的示例实现。这应该成为业务应用程序中AC概念的新起点和普遍应用的基础。
{"title":"An autonomic computing architecture for business applications","authors":"D. Kurian, P. Chelliah","doi":"10.1109/WICT.2012.6409118","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409118","url":null,"abstract":"Though the vision of autonomic computing (AC) is highly ambitious, an objective analysis of autonomic computing and its growth in the last decade throw more incisive and decisive insights on its birth deformities and growth pains. Predominantly software-based solutions are being preferred to make IT infrastructures and platforms, adaptive and autonomic in their offerings, outputs, and outlooks. However the autonomic journey has not been as promising as originally envisaged by industry leaders and luminaries, and there are several reasons being quoted by professionals and pundits for that gap. Precisely speaking, there is a kind of slackness in articulating its unique characteristics, and the enormous potentials in business and IT acceleration. There are not many real-world applications to popularize the autonomic concept among the development community. Though, some inroads has been made into infrastructure areas like networking, load balancing etc., very few attempts has been exercised in application areas like ERP, SCM, or CRM. In this paper, we would like to dig and dive deeper to extract and explain where the pioneering and path-breaking autonomic computing stands today, and the varied opportunities and possibilities, which insists hot pursuit of the autonomic idea. A simplistic architecture for deployment of autonomic business applications is introduced and a sample implementation in an existing CRM system is described. This should form the basis of new start and ubiquitous application of AC concepts for business applications.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132037963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Analysis of power in 3T DRAM and 4T DRAM Cell design for different technology 分析了3T DRAM和4T DRAM在不同工艺下的功耗设计
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409043
S. Akashe, A. Mudgal, S. B. Singh
In this paper power dissipation analysis for 3T DRAM cell and 4T DRAM cell design have been carried out for the Nanoscale technology. Many advanced processors now have on chip instructions and data memory using DRAMs. The major contribution of power dissipation in DRAM cell is off-state leakage current. Thus, improving the power efficiency of a DRAM cell is critical to the overall system power dissipation. This paper investigates the effectiveness of 3T DRAM cell and 4T DRAM cell circuit design techniques and power dissipation analysis. 3T DRAM cell is designed with the semantic design technique for the analysis of power dissipation using CADENCE Tool. In this paper, we have taken two circuits of dynamic random access memory (DRAM). Read and write operation for single bit storage of 3T DRAM and 4T DRAM circuit is shown by simulating it on CADENCE tool.
本文对3T DRAM单元进行了功耗分析,并针对纳米级技术对4T DRAM单元进行了设计。许多先进的处理器现在都有使用dram的芯片指令和数据存储器。在DRAM电池中耗散的主要因素是失态泄漏电流。因此,提高DRAM单元的功率效率对整个系统功耗至关重要。本文研究了3T DRAM单元和4T DRAM单元的有效性电路设计技术和功耗分析。采用语义设计技术,利用CADENCE工具对3T DRAM单元进行了功耗分析。本文采用了动态随机存取存储器(DRAM)的两种电路。通过在CADENCE工具上对3T DRAM和4T DRAM电路进行仿真,给出了单比特存储的读写操作。
{"title":"Analysis of power in 3T DRAM and 4T DRAM Cell design for different technology","authors":"S. Akashe, A. Mudgal, S. B. Singh","doi":"10.1109/WICT.2012.6409043","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409043","url":null,"abstract":"In this paper power dissipation analysis for 3T DRAM cell and 4T DRAM cell design have been carried out for the Nanoscale technology. Many advanced processors now have on chip instructions and data memory using DRAMs. The major contribution of power dissipation in DRAM cell is off-state leakage current. Thus, improving the power efficiency of a DRAM cell is critical to the overall system power dissipation. This paper investigates the effectiveness of 3T DRAM cell and 4T DRAM cell circuit design techniques and power dissipation analysis. 3T DRAM cell is designed with the semantic design technique for the analysis of power dissipation using CADENCE Tool. In this paper, we have taken two circuits of dynamic random access memory (DRAM). Read and write operation for single bit storage of 3T DRAM and 4T DRAM circuit is shown by simulating it on CADENCE tool.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132230372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Assessment for possible drug application delays in MCT strategy due to pathophysiological constraints of cancer 由于癌症的病理生理限制,MCT策略中可能的药物应用延迟的评估
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409122
D. Majumder
Different analytical modelling showed that metronomic chemotherapeutic (MCT) strategy is a better option than maximum tolerable dosing (MTD) for the treatment of cancer under the condition of malignancy. In this work, a major physiological constraint, drug clearance rate has been considered. Incorporating it into analytical state-space models, the transformation of the overall system has been examined through computer simulations. Accumulation of drug, dead tumor cells and metabolites produced by living tumor cells in turn affect the subsequent drug application and thereby the therapeutic procedure and its outcome. Simulation results suggest that subsequent drug administration delay increases gradually with time due to this constraint.
不同的分析模型表明,在恶性肿瘤条件下,节律化疗(MCT)策略比最大耐受剂量(MTD)治疗癌症更好。在这项工作中,主要考虑了生理上的制约因素,药物清除率。将其纳入分析状态空间模型,通过计算机模拟检查了整个系统的转换。药物、死亡肿瘤细胞和活肿瘤细胞产生的代谢物的积累反过来影响随后的药物应用,从而影响治疗过程及其结果。模拟结果表明,由于这一约束,后续给药延迟随时间逐渐增加。
{"title":"Assessment for possible drug application delays in MCT strategy due to pathophysiological constraints of cancer","authors":"D. Majumder","doi":"10.1109/WICT.2012.6409122","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409122","url":null,"abstract":"Different analytical modelling showed that metronomic chemotherapeutic (MCT) strategy is a better option than maximum tolerable dosing (MTD) for the treatment of cancer under the condition of malignancy. In this work, a major physiological constraint, drug clearance rate has been considered. Incorporating it into analytical state-space models, the transformation of the overall system has been examined through computer simulations. Accumulation of drug, dead tumor cells and metabolites produced by living tumor cells in turn affect the subsequent drug application and thereby the therapeutic procedure and its outcome. Simulation results suggest that subsequent drug administration delay increases gradually with time due to this constraint.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132806770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure encryption with digital signature approach for Short Message Service 短消息服务的数字签名安全加密方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409184
N. Saxena, N. Chaudhari
As Short Message Service (SMS) is now widely used as business tool, its security has become a major concern for business organizations and customers. However, their security is a critical issue cumbering their application and development. This paper analyses the most popular digital signature algorithms such as DSA, RSA and ECDSA and compared these algorithms. These signature algorithms were implemented in Java with various different key sizes set. Experimental comparison results of the three signature algorithms were presented and analysed. The results show that ECDSA is more suitable to generate the signature and RSA is more suitable to verify the signature on mobile devices. The experimental results are presented to show the effectiveness of each algorithm and to choose the most suitable algorithm for SMS digital signature. Next, we propose a new algorithm for digital signature based on ECDSA. At the end, conclusion and future extension of this work is discussed.
随着短消息服务(SMS)作为商业工具被广泛使用,其安全性已成为商业组织和客户关注的主要问题。然而,它们的安全性是阻碍其应用和开发的关键问题。本文分析了目前最流行的数字签名算法DSA、RSA和ECDSA,并对这些算法进行了比较。这些签名算法是用Java实现的,设置了不同的密钥大小。给出了三种签名算法的实验对比结果并进行了分析。结果表明,ECDSA更适合用于生成签名,RSA更适合用于验证移动设备上的签名。实验结果表明了每种算法的有效性,并为短信数字签名选择了最合适的算法。接下来,我们提出了一种新的基于ECDSA的数字签名算法。最后,对本文的结论和未来的扩展进行了讨论。
{"title":"Secure encryption with digital signature approach for Short Message Service","authors":"N. Saxena, N. Chaudhari","doi":"10.1109/WICT.2012.6409184","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409184","url":null,"abstract":"As Short Message Service (SMS) is now widely used as business tool, its security has become a major concern for business organizations and customers. However, their security is a critical issue cumbering their application and development. This paper analyses the most popular digital signature algorithms such as DSA, RSA and ECDSA and compared these algorithms. These signature algorithms were implemented in Java with various different key sizes set. Experimental comparison results of the three signature algorithms were presented and analysed. The results show that ECDSA is more suitable to generate the signature and RSA is more suitable to verify the signature on mobile devices. The experimental results are presented to show the effectiveness of each algorithm and to choose the most suitable algorithm for SMS digital signature. Next, we propose a new algorithm for digital signature based on ECDSA. At the end, conclusion and future extension of this work is discussed.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133017855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Multistage Recognition Approach for Handwritten Devanagari Script Recognition 手写体梵文文字识别的多阶段识别方法
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409156
P. Rahul, A. Gaikwad
This paper is focused on Devanagari Handwritten Script Recognition. The scanned word image is taken as an input image. An Input image is preprocessed and segmented. The features are extracted. Feature vector is applied to an artificial Neural Network. The Network is trained for the different set of numerals and alphabets. Output of Self Organizing Map applied to Learning Vector Quantization and the accuracy is calculated.
本文的研究重点是梵文手写体识别。将扫描的字图像作为输入图像。对输入图像进行预处理和分割。提取特征。将特征向量应用于人工神经网络。该网络针对不同的数字和字母集进行训练。将自组织映射的输出应用于学习向量量化,并计算了精度。
{"title":"Multistage Recognition Approach for Handwritten Devanagari Script Recognition","authors":"P. Rahul, A. Gaikwad","doi":"10.1109/WICT.2012.6409156","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409156","url":null,"abstract":"This paper is focused on Devanagari Handwritten Script Recognition. The scanned word image is taken as an input image. An Input image is preprocessed and segmented. The features are extracted. Feature vector is applied to an artificial Neural Network. The Network is trained for the different set of numerals and alphabets. Output of Self Organizing Map applied to Learning Vector Quantization and the accuracy is calculated.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115553776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An analysis of cloud computing security issues 云计算安全问题分析
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409059
Akhil Behl, Kanika Behl
Cloud computing is a whole new paradigm that offers a non-traditional computing model for organizations to adopt Information Technology and related functions and aspects without upfront investment and with lower Total Cost of Ownership (TCO). Cloud computing opens doors to multiple, unlimited venues from elastic computing to on demand provisioning to dynamic storage and computing requirement fulfillment. However, despite the potential gains achieved from the cloud computing, the security of an open-ended and rather freely accessible resource is still questionable which impacts the cloud adoption. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer dependency, and elasticity. This paper introduces a detailed analysis of the cloud security problem. It investigates the problem of security from the cloud architecture perspective, the cloud characteristics perspective, cloud delivery model perspective, and the cloud stakeholder perspective. The paper investigates some of the key research challenges of implementing cloud-aware security solutions which can plausibly secure the ever-changing and dynamic cloud model. Based on this analysis it presents a derived detailed specification of the cloud security problem and key features that should be covered by any proposed security solution for cloud computing.
云计算是一种全新的范例,它为组织提供了一种非传统的计算模型,可以在没有前期投资的情况下采用信息技术和相关的功能和方面,并且具有较低的总拥有成本(TCO)。从弹性计算到按需供应,再到动态存储和计算需求实现,云计算为多个无限场所打开了大门。然而,尽管从云计算中获得了潜在的收益,但开放式和相当自由访问的资源的安全性仍然值得怀疑,这影响了云的采用。在云模型下,随着与体系结构、多租户、层依赖性和弹性相关的新维度进入问题范围,安全问题变得更加严重。本文对云安全问题进行了详细的介绍分析。本文从云架构角度、云特征角度、云交付模型角度和云利益相关者角度研究了安全问题。本文研究了实现云感知安全解决方案的一些关键研究挑战,这些解决方案可以合理地保护不断变化和动态的云模型。在此分析的基础上,本文提出了云安全问题的派生详细规范,以及任何拟议的云计算安全解决方案都应涵盖的关键特性。
{"title":"An analysis of cloud computing security issues","authors":"Akhil Behl, Kanika Behl","doi":"10.1109/WICT.2012.6409059","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409059","url":null,"abstract":"Cloud computing is a whole new paradigm that offers a non-traditional computing model for organizations to adopt Information Technology and related functions and aspects without upfront investment and with lower Total Cost of Ownership (TCO). Cloud computing opens doors to multiple, unlimited venues from elastic computing to on demand provisioning to dynamic storage and computing requirement fulfillment. However, despite the potential gains achieved from the cloud computing, the security of an open-ended and rather freely accessible resource is still questionable which impacts the cloud adoption. The security problem becomes amplified under the cloud model as new dimensions enter into the problem scope related to the architecture, multi-tenancy, layer dependency, and elasticity. This paper introduces a detailed analysis of the cloud security problem. It investigates the problem of security from the cloud architecture perspective, the cloud characteristics perspective, cloud delivery model perspective, and the cloud stakeholder perspective. The paper investigates some of the key research challenges of implementing cloud-aware security solutions which can plausibly secure the ever-changing and dynamic cloud model. Based on this analysis it presents a derived detailed specification of the cloud security problem and key features that should be covered by any proposed security solution for cloud computing.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115944344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 137
Software effort prediction using unsupervised learning (clustering) and functional link artificial neural networks 利用无监督学习(聚类)和功能链接人工神经网络进行软件工作量预测
Pub Date : 2012-10-01 DOI: 10.1109/WICT.2012.6409060
Tirimula Rao Benala, R. Mall, Satchidanada Dehuri, Koradda Chinna Babu
Software cost estimation continues to be an area of concern for managing of software development industry. We use unsupervised learning (e.g., clustering algorithms) combined with functional link artificial neural networks for software effort prediction. The unsupervised learning (clustering) indigenously divide the input space into the required number of partitions thus eliminating the need of ad-hoc selection of number of clusters. Functional link artificial neural networks (FLANNs), on the other hand is a powerful computational model. Chebyshev polynomial has been used in the FLANN as a choice for functional expansion to exhaustively study the performance. Three real life datasets related to software cost estimation have been considered for empirical evaluation of this proposed method. The experimental results show that our method could significantly improve prediction accuracy of conventional FLANN and has the potential to become an effective method for software cost estimation.
软件成本估算一直是软件开发行业管理关注的一个领域。我们使用无监督学习(例如,聚类算法)结合功能链接人工神经网络进行软件工作量预测。无监督学习(聚类)将输入空间本地划分为所需数量的分区,从而消除了特别选择聚类数量的需要。另一方面,功能链接人工神经网络(FLANNs)是一种强大的计算模型。采用切比雪夫多项式作为函数展开的选择,对FLANN的性能进行了详尽的研究。本文考虑了与软件成本估算相关的三个现实生活数据集,对所提出的方法进行了实证评估。实验结果表明,该方法能够显著提高传统FLANN的预测精度,有潜力成为一种有效的软件成本估算方法。
{"title":"Software effort prediction using unsupervised learning (clustering) and functional link artificial neural networks","authors":"Tirimula Rao Benala, R. Mall, Satchidanada Dehuri, Koradda Chinna Babu","doi":"10.1109/WICT.2012.6409060","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409060","url":null,"abstract":"Software cost estimation continues to be an area of concern for managing of software development industry. We use unsupervised learning (e.g., clustering algorithms) combined with functional link artificial neural networks for software effort prediction. The unsupervised learning (clustering) indigenously divide the input space into the required number of partitions thus eliminating the need of ad-hoc selection of number of clusters. Functional link artificial neural networks (FLANNs), on the other hand is a powerful computational model. Chebyshev polynomial has been used in the FLANN as a choice for functional expansion to exhaustively study the performance. Three real life datasets related to software cost estimation have been considered for empirical evaluation of this proposed method. The experimental results show that our method could significantly improve prediction accuracy of conventional FLANN and has the potential to become an effective method for software cost estimation.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115878781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2012 World Congress on Information and Communication Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1