首页 > 最新文献

2019 3rd International Conference on Computing and Communications Technologies (ICCCT)最新文献

英文 中文
Rule Based System for Better Prediction of Diabetes 基于规则的糖尿病预测系统
R. Karthikeyan, P. Geetha, E. Ramaraj
A rule-based system [RBS] is used in the field of artificial intelligence to store, manipulate, and interpret the information in various ways. It is also a combination of human knowledge and machine intelligence together to get the exact information in the field of medicine. Today number of medical data’s is generated based on patient information in various formats with missing values. In existing data mining techniques such as clustering and classification, the role of missing values plays vital role for the prediction of disease. By considering missing values may cause wrong prediction of disease in humans. To improve the accuracy of prediction in the medical data set, this paper proposes the Rule Based Classification (RBC) technique by considering the best classifier. The concept proposed RBC technique implements diabetic data set. The major drawback of diabetes is, its symptoms are not common in all humans and they have to undergo diabetic testing. Rule-based systems can be adapted and applied to a large kind of problems. RBC technique can be used to predict diabetes in patients by applying various steps, facts, symptoms to make suitable rules and decide the best rule related to disease. This paper also provides the comparative analysis of various classifiers pertaining to diabetic data set.
基于规则的系统[RBS]用于人工智能领域,以各种方式存储、操作和解释信息。它也是人类知识和机器智能的结合,共同获得医学领域的准确信息。目前,许多医疗数据是基于各种格式的患者信息生成的,这些信息缺少值。在现有的聚类和分类等数据挖掘技术中,缺失值的作用对疾病的预测起着至关重要的作用。通过考虑缺失值可能导致对人类疾病的错误预测。为了提高医疗数据集的预测精度,本文提出了基于规则的分类(RBC)技术,考虑了最佳分类器。提出RBC技术实现糖尿病数据集的概念。糖尿病的主要缺点是,它的症状在所有人身上并不常见,他们必须接受糖尿病检测。基于规则的系统可以适应并应用于各种各样的问题。RBC技术可以应用各种步骤、事实、症状来预测糖尿病患者,制定合适的规则,并确定与疾病相关的最佳规则。本文还提供了与糖尿病数据集有关的各种分类器的比较分析。
{"title":"Rule Based System for Better Prediction of Diabetes","authors":"R. Karthikeyan, P. Geetha, E. Ramaraj","doi":"10.1109/ICCCT2.2019.8824842","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824842","url":null,"abstract":"A rule-based system [RBS] is used in the field of artificial intelligence to store, manipulate, and interpret the information in various ways. It is also a combination of human knowledge and machine intelligence together to get the exact information in the field of medicine. Today number of medical data’s is generated based on patient information in various formats with missing values. In existing data mining techniques such as clustering and classification, the role of missing values plays vital role for the prediction of disease. By considering missing values may cause wrong prediction of disease in humans. To improve the accuracy of prediction in the medical data set, this paper proposes the Rule Based Classification (RBC) technique by considering the best classifier. The concept proposed RBC technique implements diabetic data set. The major drawback of diabetes is, its symptoms are not common in all humans and they have to undergo diabetic testing. Rule-based systems can be adapted and applied to a large kind of problems. RBC technique can be used to predict diabetes in patients by applying various steps, facts, symptoms to make suitable rules and decide the best rule related to disease. This paper also provides the comparative analysis of various classifiers pertaining to diabetic data set.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Factors That Trigger The Use Of Social Media Tools, Applications And Networks Of Tourist 引发游客使用社交媒体工具、应用和网络的因素
Mubarak Kaldeen
The aim of this research was to examine the factors affect the use of social media tools, applications and networks by tourists. In the tourism market, tourism products and service have found fertile ground in the internet due to their specific characteristics. Social media and networks as facebook, instagram, travel networks like trip advisor, agoda, air bnb are playing an increasingly important role as information sources for travelers. Though travel planning is a complex processwhich requires a considerable investment of time and money the social media contribute to reduce time and effort that tourist spend on searching for information and to plan their trip. Mean time there are some factors that hindering the use of social media by tourist and forced to choose traditional way to plan their trips. PEOU, PU and PT were some of those key factors that mostly influence the use of social media. 430 tourists responded to this survey in Sri Lanka. The questionnaire was used in collecting data and data were analyzed using SPSS. PT had most significant impact on tourist intention to use social media following the PEOU and PU. The websites, networks and tools, applications must be developed according to the ease of use of tourists. Ease of navigation, ease access to information, ease of sharing, and enquiring information help to develop effective social media and tools and that ultimately lead to improve the effective use. Tourism suppliers have to make use of this opportunity to promote the use of social media and networks that contribute them to promote their businesses and play a vital role in gaining customers with low cost, and less effort.
本研究的目的是研究影响游客使用社交媒体工具、应用程序和网络的因素。在旅游市场上,旅游产品和服务由于其特有的特点,在互联网上找到了肥沃的土壤。社交媒体和网络,如facebook、instagram,旅行顾问、agoda、airbnb等旅游网络,作为旅行者的信息来源,正发挥着越来越重要的作用。虽然旅游计划是一个复杂的过程,需要大量的时间和金钱投入,但社交媒体有助于减少游客花费在搜索信息和计划旅行上的时间和精力。同时,也有一些因素阻碍了游客使用社交媒体,迫使他们选择传统的方式来计划他们的旅行。PEOU, PU和PT是影响社交媒体使用的主要因素。在斯里兰卡,430名游客参与了这项调查。采用问卷调查法收集数据,采用SPSS软件对数据进行分析。PT对游客使用社交媒体意愿的影响最显著,仅次于PEOU和PU。网站、网络和工具、应用程序必须根据游客的易用性来开发。易于导航、易于获取信息、易于分享和查询信息有助于开发有效的社交媒体和工具,并最终导致提高有效使用。旅游供应商必须利用这个机会来促进使用社交媒体和网络,这有助于他们推广自己的业务,并在以低成本,少努力获得客户方面发挥至关重要的作用。
{"title":"Factors That Trigger The Use Of Social Media Tools, Applications And Networks Of Tourist","authors":"Mubarak Kaldeen","doi":"10.1109/ICCCT2.2019.8824837","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824837","url":null,"abstract":"The aim of this research was to examine the factors affect the use of social media tools, applications and networks by tourists. In the tourism market, tourism products and service have found fertile ground in the internet due to their specific characteristics. Social media and networks as facebook, instagram, travel networks like trip advisor, agoda, air bnb are playing an increasingly important role as information sources for travelers. Though travel planning is a complex processwhich requires a considerable investment of time and money the social media contribute to reduce time and effort that tourist spend on searching for information and to plan their trip. Mean time there are some factors that hindering the use of social media by tourist and forced to choose traditional way to plan their trips. PEOU, PU and PT were some of those key factors that mostly influence the use of social media. 430 tourists responded to this survey in Sri Lanka. The questionnaire was used in collecting data and data were analyzed using SPSS. PT had most significant impact on tourist intention to use social media following the PEOU and PU. The websites, networks and tools, applications must be developed according to the ease of use of tourists. Ease of navigation, ease access to information, ease of sharing, and enquiring information help to develop effective social media and tools and that ultimately lead to improve the effective use. Tourism suppliers have to make use of this opportunity to promote the use of social media and networks that contribute them to promote their businesses and play a vital role in gaining customers with low cost, and less effort.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"28 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advocate Office Management System 倡导办公管理系统
Firas Abdallah, S. Khawandi, Anis Ismail
Prior to 1980’s computers had a limited function. The use of computer systems by advocate in the domain of laws was very limited and just for office issues. On the contrary, nowadays, the practice of law is parallel to the speed of life and Information and Communication Technology. Lawyers need more creative and fast tools to help them stay up to date in their work. This paper describes a theoretical and empirical study to design and develop an Advocate Office Management System
在20世纪80年代之前,计算机的功能有限。律师在法律领域使用计算机系统的情况非常有限,而且仅限于办公室事务。相反,如今,法律的实践与生活和信息通信技术的速度是平行的。律师们需要更多的创新和快速的工具来帮助他们跟上他们的工作。本文对律师办公室管理系统的设计和开发进行了理论和实证研究
{"title":"Advocate Office Management System","authors":"Firas Abdallah, S. Khawandi, Anis Ismail","doi":"10.1109/ICCCT2.2019.8824994","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824994","url":null,"abstract":"Prior to 1980’s computers had a limited function. The use of computer systems by advocate in the domain of laws was very limited and just for office issues. On the contrary, nowadays, the practice of law is parallel to the speed of life and Information and Communication Technology. Lawyers need more creative and fast tools to help them stay up to date in their work. This paper describes a theoretical and empirical study to design and develop an Advocate Office Management System","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach to reduce Vulnerability on Router by Zero vulnerability Encrypted password in Router (ZERO) Mechanism 一种利用路由器零漏洞加密密码(Zero)机制降低路由器漏洞的新方法
DS Tejendra, C.R Varunkumar, S. Sriram, V. Sumathy, CK. Thejeshwari
As technology is developing exponentially and the world is moving towards automation, the resources have to be transferred through the internet which requires routers to connect networks and forward bundles (information). Due to the vulnerability of routers the data and resources have been hacked. The vulnerability of routers is due to minimum authentication to the network shared, some technical attacks on routers, leaking of passwords to others, single passwords. Based on the study, the solution is to maximize authentication of the router by embedding an application that monitors the user entry based on MAC address of the device, the password is frequently changed and that encrypted password is sent to a user and notifies the admin about the changes. Thus, these routers provide high-level security to the forward data through the internet.
随着技术的飞速发展和世界向自动化的方向发展,资源必须通过互联网进行传输,这就需要路由器连接网络并转发信息。由于路由器存在漏洞,导致数据和资源遭到黑客攻击。路由器的漏洞是由于对共享网络的最小认证,对路由器的一些技术攻击,向他人泄露密码,单一密码。根据研究,解决方案是通过嵌入一个应用程序来最大化路由器的认证,该应用程序根据设备的MAC地址监控用户的入口,密码频繁更改,并将加密的密码发送给用户并通知管理员。因此,这些路由器为通过互联网转发的数据提供了高级别的安全性。
{"title":"A Novel Approach to reduce Vulnerability on Router by Zero vulnerability Encrypted password in Router (ZERO) Mechanism","authors":"DS Tejendra, C.R Varunkumar, S. Sriram, V. Sumathy, CK. Thejeshwari","doi":"10.1109/ICCCT2.2019.8824985","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824985","url":null,"abstract":"As technology is developing exponentially and the world is moving towards automation, the resources have to be transferred through the internet which requires routers to connect networks and forward bundles (information). Due to the vulnerability of routers the data and resources have been hacked. The vulnerability of routers is due to minimum authentication to the network shared, some technical attacks on routers, leaking of passwords to others, single passwords. Based on the study, the solution is to maximize authentication of the router by embedding an application that monitors the user entry based on MAC address of the device, the password is frequently changed and that encrypted password is sent to a user and notifies the admin about the changes. Thus, these routers provide high-level security to the forward data through the internet.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain Based Aadhaar b区块链基于Aadhaar
S V Juno Bella Gracia, D. Raghav, R. Santhoshkumar, B. Velprakash
Blockchain Based Aadhaar uses Blockchain platform for securing Aadhaar information. The system stores the Aadhaar data in a group of computers interconnected to each other. The Blockchain uses a hashing function to transform the data and produces a hash code. The hash code ensures the identity of user is kept secure. The data is stored in blocks in the nodes. The system also uses Ethereum Smart Contracts to ensure to only the authenticated data is accessed by the third parties. The Blockchain based Aadhaar uses distributed databases (decentralized databases) math and cryptography to record transactions, transactional data is secured and the data is stored in distributed small chunks and spreads across the entire network of computers, and so it is difficult to hack these systems than hacking the centralized or traditional servers.
基于区块链的Aadhaar使用区块链平台来保护Aadhaar信息。该系统将Aadhaar数据存储在一组相互连接的计算机中。区块链使用哈希函数来转换数据并产生哈希码。哈希码确保了用户身份的安全。数据以块的形式存储在节点中。该系统还使用以太坊智能合约来确保只有经过认证的数据才能被第三方访问。基于区块链的Aadhaar使用分布式数据库(去中心化数据库)数学和密码学来记录交易,交易数据是安全的,数据存储在分布式的小块中,并分布在整个计算机网络中,因此攻击这些系统比攻击集中式或传统服务器要困难。
{"title":"Blockchain Based Aadhaar","authors":"S V Juno Bella Gracia, D. Raghav, R. Santhoshkumar, B. Velprakash","doi":"10.1109/ICCCT2.2019.8824892","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824892","url":null,"abstract":"Blockchain Based Aadhaar uses Blockchain platform for securing Aadhaar information. The system stores the Aadhaar data in a group of computers interconnected to each other. The Blockchain uses a hashing function to transform the data and produces a hash code. The hash code ensures the identity of user is kept secure. The data is stored in blocks in the nodes. The system also uses Ethereum Smart Contracts to ensure to only the authenticated data is accessed by the third parties. The Blockchain based Aadhaar uses distributed databases (decentralized databases) math and cryptography to record transactions, transactional data is secured and the data is stored in distributed small chunks and spreads across the entire network of computers, and so it is difficult to hack these systems than hacking the centralized or traditional servers.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation and Validation of a Non-Contact Measurement of Cardiac Activity 非接触式心脏活动测量的实现与验证
R. Kausalya, E. Priya
This work aim to present a simple and reliable method of measuring the pulse rate directly from face images obtained using a webcam. Video sequences from a webcam are captured and are converted into frames. The frames are decomposed into their constituent colour channels. The red component signals from the RGB images of the face and the forehead region (region of interest) are extracted. The heart rate is obtained by further processing the red channel signal and finding the maximum of power spectral density. To validate whether the resultant pulse rate are related to the heart rate, the results thus obtained from the video sequences are compared with pulse rate measured from an Electrocardiogram (ECG) signal acquired for the same subject. The red channel component of the face image contains most information pertaining to the pulse rate. The maximum of power spectral density of the red channel component gives the heart rate. The ECG circuit implemented to validate the results obtained through this method shows that the deviation is about ± 4 bpm. Thus as a surrogate to the conventional ECG measurement technique the method implemented in this work could be used for continuous monitoring of patients especially the elderly persons at home.
这项工作旨在提出一种简单可靠的方法,直接从使用网络摄像头获得的面部图像中测量脉搏率。来自网络摄像头的视频序列被捕获并转换成帧。帧被分解成它们的组成颜色通道。从人脸和前额区域(感兴趣区域)的RGB图像中提取红色分量信号。对红通道信号进行进一步处理,求出功率谱密度的最大值,得到心率。为了验证最终的脉搏率是否与心率相关,将从视频序列中获得的结果与从同一受试者的心电图(ECG)信号中测量的脉搏率进行比较。人脸图像的红色通道成分包含了与脉冲速率有关的大部分信息。红色通道分量的最大功率谱密度给出了心率。实现的心电电路验证了通过该方法得到的结果,偏差约为±4bpm。因此,作为传统心电测量技术的替代品,本工作实现的方法可用于患者特别是家中老年人的连续监测。
{"title":"Implementation and Validation of a Non-Contact Measurement of Cardiac Activity","authors":"R. Kausalya, E. Priya","doi":"10.1109/ICCCT2.2019.8824864","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824864","url":null,"abstract":"This work aim to present a simple and reliable method of measuring the pulse rate directly from face images obtained using a webcam. Video sequences from a webcam are captured and are converted into frames. The frames are decomposed into their constituent colour channels. The red component signals from the RGB images of the face and the forehead region (region of interest) are extracted. The heart rate is obtained by further processing the red channel signal and finding the maximum of power spectral density. To validate whether the resultant pulse rate are related to the heart rate, the results thus obtained from the video sequences are compared with pulse rate measured from an Electrocardiogram (ECG) signal acquired for the same subject. The red channel component of the face image contains most information pertaining to the pulse rate. The maximum of power spectral density of the red channel component gives the heart rate. The ECG circuit implemented to validate the results obtained through this method shows that the deviation is about ± 4 bpm. Thus as a surrogate to the conventional ECG measurement technique the method implemented in this work could be used for continuous monitoring of patients especially the elderly persons at home.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132258965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on DME interference mitigation techniques for L-band aeronautical communication l波段航空通信DME干扰抑制技术综述
Jesna Catherine, Bindu Sebastian
The aeronautical communication system has an influential role in future because the air traffic is increasing day by day. The Future Communication Infrastructure(FCI) for aeronautical communication is seeking for a better transmission scheme. As the demand for frequency spectrum for aeronautical communication is raising up, and the VHF spectrum utilization is almost saturated, FCI has developed two candidates for communication; L-DACS1 and L-DACS2 which are operating in L-band frequencies. These systems are inserted in L-band in an inlay approach. The majority part of L- band is occupied by DME(Distance Measuring Equipment) which induces interference to the communication candidates. So, for a better communication in L-band, we have to combat against the DME interference. Here presenting a survey on several methods to mitigate DME interference.
由于空中交通的日益增长,航空通信系统在未来将发挥重要作用。航空通信的未来通信基础设施(FCI)正在寻求一种更好的传输方案。随着航空通信对频谱需求的不断增加,甚高频频谱的利用已接近饱和,FCI开发了两种通信候选方案;L-DACS1和L-DACS2,它们工作在l波段频率。这些系统以嵌体方式插入l波段。L波段大部分被测距设备(DME)占用,对候选通信产生干扰。因此,为了更好地实现l波段的通信,必须对抗DME干扰。本文介绍了几种减轻二甲醚干扰的方法。
{"title":"A survey on DME interference mitigation techniques for L-band aeronautical communication","authors":"Jesna Catherine, Bindu Sebastian","doi":"10.1109/ICCCT2.2019.8824809","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824809","url":null,"abstract":"The aeronautical communication system has an influential role in future because the air traffic is increasing day by day. The Future Communication Infrastructure(FCI) for aeronautical communication is seeking for a better transmission scheme. As the demand for frequency spectrum for aeronautical communication is raising up, and the VHF spectrum utilization is almost saturated, FCI has developed two candidates for communication; L-DACS1 and L-DACS2 which are operating in L-band frequencies. These systems are inserted in L-band in an inlay approach. The majority part of L- band is occupied by DME(Distance Measuring Equipment) which induces interference to the communication candidates. So, for a better communication in L-band, we have to combat against the DME interference. Here presenting a survey on several methods to mitigate DME interference.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SPICE Modelling of CNTFET based Neuron Architecture for Low Power and High Speed applications 低功耗和高速应用中基于CNTFET的神经元结构的SPICE建模
N. Mathan, S. Jayashri
Very Large-Scale Integration (VLSI) rapidly grew when the Transistor-Transistor Logic (TTL) has much higher power consumption than the Metal-Oxide Semiconductor (MOS) family. The development in the field of electronics have been tremendous since the advent of VLSI. Due to the disadvantages like tunnelling, scaling in Metal Oxide Semiconductor Field Effect Transistors, Carbon nanotubes can be considered as the promising candidate for future devices. Carbon nanotubes are considered as the next generation Field Effect Transistors that can sustain the scalability while increasing its performance. The artificial neural networks are depicted as a structure of interconnected neurons that can figure out values from inputs and are capable of pattern recognition as well as machine learning. The prime aim of this paper is to assimilate techniques that reduce the architecture size using CNTFET technology and decrease the power consumption which leads to higher efficiency and augmented performance of the device. To satisfy the pre-requisites the circuit is designed using 32nm CNTFET technology. The proposed neuron architecture concentrates on the modification of flip flop by replacing the transmission gates with pass transistor by restructuring and reorganisation method to achieve significant delay, power and power delay product utilization. Circuit level simulation for D Flip Flop and neuron Architecture has been performed. The simulation results show that the performance of neuron architecture is improved power by 24.02% with the use of CNTFET, which means the stability is vital than that of MOSFET.
当晶体管-晶体管逻辑(TTL)具有比金属氧化物半导体(MOS)家族高得多的功耗时,超大规模集成电路(VLSI)迅速发展。自超大规模集成电路问世以来,电子领域取得了巨大的发展。由于金属氧化物半导体场效应晶体管存在穿隧、结垢等缺点,碳纳米管被认为是未来器件中很有前途的候选材料。碳纳米管被认为是能够在保持可扩展性的同时提高其性能的新一代场效应晶体管。人工神经网络被描述为一个相互连接的神经元结构,可以从输入中计算出值,并且能够进行模式识别和机器学习。本文的主要目的是吸收使用CNTFET技术减少架构尺寸和降低功耗的技术,从而提高设备的效率和增强性能。为了满足这些先决条件,电路采用32nm CNTFET技术设计。所提出的神经元结构侧重于对触发器的改进,通过重构和重组的方法将传输门替换为通晶体管,以实现显著的延迟、功率和功率延迟产品利用率。对D触发器和神经元结构进行了电路级仿真。仿真结果表明,与MOSFET相比,cnfet的神经元结构性能提高了24.02%,这意味着其稳定性至关重要。
{"title":"SPICE Modelling of CNTFET based Neuron Architecture for Low Power and High Speed applications","authors":"N. Mathan, S. Jayashri","doi":"10.1109/ICCCT2.2019.8824863","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824863","url":null,"abstract":"Very Large-Scale Integration (VLSI) rapidly grew when the Transistor-Transistor Logic (TTL) has much higher power consumption than the Metal-Oxide Semiconductor (MOS) family. The development in the field of electronics have been tremendous since the advent of VLSI. Due to the disadvantages like tunnelling, scaling in Metal Oxide Semiconductor Field Effect Transistors, Carbon nanotubes can be considered as the promising candidate for future devices. Carbon nanotubes are considered as the next generation Field Effect Transistors that can sustain the scalability while increasing its performance. The artificial neural networks are depicted as a structure of interconnected neurons that can figure out values from inputs and are capable of pattern recognition as well as machine learning. The prime aim of this paper is to assimilate techniques that reduce the architecture size using CNTFET technology and decrease the power consumption which leads to higher efficiency and augmented performance of the device. To satisfy the pre-requisites the circuit is designed using 32nm CNTFET technology. The proposed neuron architecture concentrates on the modification of flip flop by replacing the transmission gates with pass transistor by restructuring and reorganisation method to achieve significant delay, power and power delay product utilization. Circuit level simulation for D Flip Flop and neuron Architecture has been performed. The simulation results show that the performance of neuron architecture is improved power by 24.02% with the use of CNTFET, which means the stability is vital than that of MOSFET.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115894541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review of SDN-Based Next Generation Smart Networks 基于sdn的下一代智能网络研究综述
Priyanka Prabakaran, Deva Priya Isravel, S. Silas
Today’s network infrastructure have grown dramatically due to the advancement of IT technologies. Many enterprise service providers have shifted their focus to operate the network infrastructure using open source technologies to build a customer-provider friendly platform. One of the recent technology that has captured the interest of many service providers is the software defined networking (SDN). This paper presents a detailed study on how next-generation networks are influenced and orchestrated by SDN technologies. The challenges that are encountered in various applications and the benefits of integrating SDN to realize the full potential in various application domains are discussed. Further, the scope of research is also presented.
由于IT技术的进步,今天的网络基础设施已经急剧增长。许多企业服务提供商已经将重点转移到使用开源技术来运营网络基础设施,以构建客户-提供商友好的平台。最近引起许多服务提供商兴趣的技术之一是软件定义网络(SDN)。本文详细研究了SDN技术如何影响和协调下一代网络。讨论了各种应用中遇到的挑战以及集成SDN以实现各种应用领域的全部潜力的好处。在此基础上,提出了本文的研究范围。
{"title":"A Review of SDN-Based Next Generation Smart Networks","authors":"Priyanka Prabakaran, Deva Priya Isravel, S. Silas","doi":"10.1109/ICCCT2.2019.8824871","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824871","url":null,"abstract":"Today’s network infrastructure have grown dramatically due to the advancement of IT technologies. Many enterprise service providers have shifted their focus to operate the network infrastructure using open source technologies to build a customer-provider friendly platform. One of the recent technology that has captured the interest of many service providers is the software defined networking (SDN). This paper presents a detailed study on how next-generation networks are influenced and orchestrated by SDN technologies. The challenges that are encountered in various applications and the benefits of integrating SDN to realize the full potential in various application domains are discussed. Further, the scope of research is also presented.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Natural Language Interface to Linux Shell – Report Linux Shell的自然语言接口-报告
N. Kumar, M. Nagalakshmi, Tanya Sharma, S. Ambati, Vibha Satyanarayana
Many a time, a user might not remember the exact Linux commands to apply while using the Linux shell. The programmer ends up searching for the correct solution. Having a natural language interface (like English) to a shell would help programmers’ in performing their desired tasks without having to think much about the particular command or option that needs to be used. We present a tool that can convert natural language into executable Linux commands. This paper covers the related work done in this field and our approach to solving this problem. Research in this field is fairly new and there are two tools in this domain, Tellina[1] and Betty. Tellina is a powerful tool which covers file operations with high complexity. Apart from file utilities, our tool also covers a wider scope of commands including awk and sed. A novel approach is used to find the structure of the command. This paper includes the comparisons between Neural Machine Translation (NMT), Statistical Machine Translation(SMT), similarity models and machine learning models.
很多时候,用户可能不记得在使用Linux shell时应用的确切Linux命令。程序员最终会寻找正确的解决方案。拥有shell的自然语言接口(如英语)将有助于程序员执行他们想要的任务,而不必考虑需要使用的特定命令或选项。我们提出了一个可以将自然语言转换为可执行Linux命令的工具。本文介绍了在这一领域所做的相关工作以及我们解决这一问题的方法。这一领域的研究相对较新,目前有两种工具,Tellina[1]和Betty。Tellina是一个功能强大的工具,涵盖了高复杂性的文件操作。除了文件实用程序,我们的工具还涵盖了更广泛的命令范围,包括awk和sed。采用了一种新颖的方法来查找命令的结构。本文对神经机器翻译(NMT)、统计机器翻译(SMT)、相似度模型和机器学习模型进行了比较。
{"title":"Natural Language Interface to Linux Shell – Report","authors":"N. Kumar, M. Nagalakshmi, Tanya Sharma, S. Ambati, Vibha Satyanarayana","doi":"10.1109/ICCCT2.2019.8824800","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824800","url":null,"abstract":"Many a time, a user might not remember the exact Linux commands to apply while using the Linux shell. The programmer ends up searching for the correct solution. Having a natural language interface (like English) to a shell would help programmers’ in performing their desired tasks without having to think much about the particular command or option that needs to be used. We present a tool that can convert natural language into executable Linux commands. This paper covers the related work done in this field and our approach to solving this problem. Research in this field is fairly new and there are two tools in this domain, Tellina[1] and Betty. Tellina is a powerful tool which covers file operations with high complexity. Apart from file utilities, our tool also covers a wider scope of commands including awk and sed. A novel approach is used to find the structure of the command. This paper includes the comparisons between Neural Machine Translation (NMT), Statistical Machine Translation(SMT), similarity models and machine learning models.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122973299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 3rd International Conference on Computing and Communications Technologies (ICCCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1