Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496528
G. Shiva, K. Hrishikes, R. Raj
This paper presents the design of Closed loop voltage mode control for impedance-source inverter using Proportional Integral Derivative (PID) controller. The control action is performed by regulating the DC-link voltage at the input side. Mathematical model of the inverter is developed and the control parameters are designed using Bode plot. MATLAB - Simulink model has been developed for simulation. From the results, it was shown that the proposed controller is very well capable to regulate the AC output voltage.
{"title":"Closed loop voltage mode control of impedance source inverter (ZSI)","authors":"G. Shiva, K. Hrishikes, R. Raj","doi":"10.1109/ICEVENT.2013.6496528","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496528","url":null,"abstract":"This paper presents the design of Closed loop voltage mode control for impedance-source inverter using Proportional Integral Derivative (PID) controller. The control action is performed by regulating the DC-link voltage at the input side. Mathematical model of the inverter is developed and the control parameters are designed using Bode plot. MATLAB - Simulink model has been developed for simulation. From the results, it was shown that the proposed controller is very well capable to regulate the AC output voltage.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88105591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496556
N. Neelima, M. Arulvani
Nowadays, an important part of scientific and artistic works is stored in form of film and image archive, so image processing becomes a very important task. A new topic in image processing is image inpainting. Image inpainting is filling in damaged or missed regions in an image in an undetectable form. It has several applications such as image reconstructing, video restoration, special effects and so on. A new algorithm is proposed in this Paper for removing large objects from digital images. The challenge is to fill in the hole that is left behind in a visually plausible way. We propose a best-first algorithm in which the confidence in the synthesized pixel values is propagated in a manner similar to the propagation of information in inpainting. The actual colour values are computed using exemplar-based synthesis. Computational efficiency is achieved by a block based sampling process. A number of examples on real and synthetic images demonstrate the effectiveness of our algorithm in removing large occluding objects. Our results compare favorably to those obtained by existing techniques.
{"title":"Object removal by region based filling inpainting","authors":"N. Neelima, M. Arulvani","doi":"10.1109/ICEVENT.2013.6496556","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496556","url":null,"abstract":"Nowadays, an important part of scientific and artistic works is stored in form of film and image archive, so image processing becomes a very important task. A new topic in image processing is image inpainting. Image inpainting is filling in damaged or missed regions in an image in an undetectable form. It has several applications such as image reconstructing, video restoration, special effects and so on. A new algorithm is proposed in this Paper for removing large objects from digital images. The challenge is to fill in the hole that is left behind in a visually plausible way. We propose a best-first algorithm in which the confidence in the synthesized pixel values is propagated in a manner similar to the propagation of information in inpainting. The actual colour values are computed using exemplar-based synthesis. Computational efficiency is achieved by a block based sampling process. A number of examples on real and synthetic images demonstrate the effectiveness of our algorithm in removing large occluding objects. Our results compare favorably to those obtained by existing techniques.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88305017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496559
M., Chitral, Dr. M. Kalaiselvi Geetha, L. Menaka
Object detection is an important step in any video analysis. In this paper, we propose a novel framework for blob based occluded object detection. It detects and tracks the occluded objects in video sequences captured by a fixed camera in crowded scene with occlusion. Moreover the occlusion of an abandoned object is a critical aspect in the video surveillance. We present the system used to identify the abandoned object highlighting how the system can recognize a problem of occlusion and detect the object when it is visible again. Initially Pedestrians are detected using the pedestrian detector by computing the Histogram of Oriented Gradients descriptors (HOG), using a linear Support Vector Machine (SVM) as the classifier. In our system, the background subtraction is modeled by a Mixture of Gaussians technique (MOG). Several experiments were conducted to demonstrate the proposed method using huge video dataset show the robustness and effectiveness.
{"title":"Occlusion detection in visual scene using histogram of oriented gradients","authors":"M., Chitral, Dr. M. Kalaiselvi Geetha, L. Menaka","doi":"10.1109/ICEVENT.2013.6496559","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496559","url":null,"abstract":"Object detection is an important step in any video analysis. In this paper, we propose a novel framework for blob based occluded object detection. It detects and tracks the occluded objects in video sequences captured by a fixed camera in crowded scene with occlusion. Moreover the occlusion of an abandoned object is a critical aspect in the video surveillance. We present the system used to identify the abandoned object highlighting how the system can recognize a problem of occlusion and detect the object when it is visible again. Initially Pedestrians are detected using the pedestrian detector by computing the Histogram of Oriented Gradients descriptors (HOG), using a linear Support Vector Machine (SVM) as the classifier. In our system, the background subtraction is modeled by a Mixture of Gaussians technique (MOG). Several experiments were conducted to demonstrate the proposed method using huge video dataset show the robustness and effectiveness.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90016540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496535
R. Michael, B. RajaKumar, S. Swaminathan, M. Ramkumar
Now day's usage mobile devices are increasing in numbers. It can provide a foundation for improving the communication, learning and teaching environments. However, not all potential users have the capabilities that allow them to use the existing methodologies. To improve the search and navigation of various application and features of mobile devices we have proposed a model that entails the hands-free voice navigation system will be helpful for the visually challenged people. This model provides the opportunity to operate the mobile devices without using the keypad.
{"title":"A novel approach: Voice enabled interface with intelligent voice response system to navigate mobile devices for visually challenged people","authors":"R. Michael, B. RajaKumar, S. Swaminathan, M. Ramkumar","doi":"10.1109/ICEVENT.2013.6496535","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496535","url":null,"abstract":"Now day's usage mobile devices are increasing in numbers. It can provide a foundation for improving the communication, learning and teaching environments. However, not all potential users have the capabilities that allow them to use the existing methodologies. To improve the search and navigation of various application and features of mobile devices we have proposed a model that entails the hands-free voice navigation system will be helpful for the visually challenged people. This model provides the opportunity to operate the mobile devices without using the keypad.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89860643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496566
H. M. G. Enagadapa, G. Isola, A. M. Sapkal
In radar systems and other applications circulator is an important component used for isolation or duplexing. In modern polarimetric radars it is required to transmit vertical and horizontal polarization turn by turn while receive both co and cross polarizations to serve this purpose switching (latching) circulator is inevitable device. Three port junction waveguide circulators are most widely used form of the circulators for high power conditions. This paper discusses the design a high power three port waveguide latching circulator at Ka band. The Design is done around centre frequency of 32.5 GHz using HFSS. Design is specifically made with dimension of WR-28 waveguide, so the device can be directly installed in the system using WR-28 waveguide. Isolation in excess of -45 dB is observed and Insertion Loss fraction of a dB is obtained which is quite competent with industrial standards. Latching ferrite H-plane wave guide Y-junction circulator with internal magnetic return paths has widespread applications in radars and radiometers and works as protective devices in microwave receivers.
{"title":"Design of high power Ka band waveguide latching circulator","authors":"H. M. G. Enagadapa, G. Isola, A. M. Sapkal","doi":"10.1109/ICEVENT.2013.6496566","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496566","url":null,"abstract":"In radar systems and other applications circulator is an important component used for isolation or duplexing. In modern polarimetric radars it is required to transmit vertical and horizontal polarization turn by turn while receive both co and cross polarizations to serve this purpose switching (latching) circulator is inevitable device. Three port junction waveguide circulators are most widely used form of the circulators for high power conditions. This paper discusses the design a high power three port waveguide latching circulator at Ka band. The Design is done around centre frequency of 32.5 GHz using HFSS. Design is specifically made with dimension of WR-28 waveguide, so the device can be directly installed in the system using WR-28 waveguide. Isolation in excess of -45 dB is observed and Insertion Loss fraction of a dB is obtained which is quite competent with industrial standards. Latching ferrite H-plane wave guide Y-junction circulator with internal magnetic return paths has widespread applications in radars and radiometers and works as protective devices in microwave receivers.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85233894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496537
A. Gandhimathinathan, P. D'Souza, D. Prasad
The increased usage of directional methods of communications (e.g. directional smart antennas [15], Free-Space Optical transceivers [19], and sector antennas) has prompted research into leveraging directionality in every layer of the network stack. In this paper, we learnt how the concept of directionality can be used in layer 3 to facilitate routing under contexts of 1) wireless mesh networks, 2) highly mobile environments, and 3) overlay networks through virtual directions. In the context of wireless mesh networks, we introduce Orthogonal Rendezvous Routing Protocol (ORRP), a lightweight-but-scalable routing protocol utilizing the inherent nature of directional communications to relax information requirements such as coordinate space embedding and node localization. The ORRP source and ORRP destination send route discovery and route dissemination packets respectively in locally-chosen orthogonal directions. We show that ORRP achieves connectivity with high probability even in sparse networks with voids. ORRP scales well without imposing DHT-like graph structures (eg: trees, rings, torus etc). We show that MORRP achieves connectivity with high probability even in highly mobile environments while maintaining only probabilistic information about destinations. MORRP scales well without imposing DHT-like graph structures (eg: trees, rings, torus etc). We will also show that high connectivity can be achieved without the need to frequently disseminate node position resulting increased scalability even in highly mobile environments. We will also evaluate the metrics of reachability, state maintenance, path stretch, end-to-end latency and aggregate network good put under conditions of varying network densities, number of interfaces, and TTL values.
{"title":"Performance analysis of an orthogonal rendezvous routing protocol for wireless mesh networks","authors":"A. Gandhimathinathan, P. D'Souza, D. Prasad","doi":"10.1109/ICEVENT.2013.6496537","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496537","url":null,"abstract":"The increased usage of directional methods of communications (e.g. directional smart antennas [15], Free-Space Optical transceivers [19], and sector antennas) has prompted research into leveraging directionality in every layer of the network stack. In this paper, we learnt how the concept of directionality can be used in layer 3 to facilitate routing under contexts of 1) wireless mesh networks, 2) highly mobile environments, and 3) overlay networks through virtual directions. In the context of wireless mesh networks, we introduce Orthogonal Rendezvous Routing Protocol (ORRP), a lightweight-but-scalable routing protocol utilizing the inherent nature of directional communications to relax information requirements such as coordinate space embedding and node localization. The ORRP source and ORRP destination send route discovery and route dissemination packets respectively in locally-chosen orthogonal directions. We show that ORRP achieves connectivity with high probability even in sparse networks with voids. ORRP scales well without imposing DHT-like graph structures (eg: trees, rings, torus etc). We show that MORRP achieves connectivity with high probability even in highly mobile environments while maintaining only probabilistic information about destinations. MORRP scales well without imposing DHT-like graph structures (eg: trees, rings, torus etc). We will also show that high connectivity can be achieved without the need to frequently disseminate node position resulting increased scalability even in highly mobile environments. We will also evaluate the metrics of reachability, state maintenance, path stretch, end-to-end latency and aggregate network good put under conditions of varying network densities, number of interfaces, and TTL values.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83017246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496549
K. Seshukumar, R. Saravanan, M. S. Suraj
Cognitive Radio having the great key mechanism of enabling spectrum awareness in the Spectrum sensing. This paper deals with spectrum sensing methods used in a cognitive radio is presented and also deals disadvantages and advantages facing each sensing method. Cognitive radio facing many feature difficulties in spectrum sensing and those are measured by multi-dimensional spectrum sensing. Those tasks are enabling and revised these spectrum sensing approaches. Other alternative methods like Statistical sensing algorithms also discussed here. Moreover, statistical modelling of network utilization and also traffic models are used for estimation of primary user performance. Spectrum sensing uses dynamic spectrum model without troubling the primary users. This may improves the radio frequency usage of spectrum and it is done when both unlicensed and licensed reducing interference and also by usage of licensed users for identifying the white spaces. The concurrence of these circumstances can produce a commands where the signal to noise ratio (SNR) is below the level of detection threshold by use of sensor, and it missed detections at final result. The concept spectrum sensing is important to secondary users in cognitive radio to operate without interfering the primary users. Final review shows cooperative sensing spectrum can improve the performance of cognitive radio network by increasing the efficiency spectrum and providing a detection accuracy better. These benefits come at the cost of increased traffic overhead, complexity, power consumption, and the need for control channels. The idea of cognitive radio is planned to address the issue faced in spectrum efficiency and it provides wireless users to adapt their operating factors and dealings with the help of adjacent radio environment.
{"title":"Spectrum sensing review in cognitive radio","authors":"K. Seshukumar, R. Saravanan, M. S. Suraj","doi":"10.1109/ICEVENT.2013.6496549","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496549","url":null,"abstract":"Cognitive Radio having the great key mechanism of enabling spectrum awareness in the Spectrum sensing. This paper deals with spectrum sensing methods used in a cognitive radio is presented and also deals disadvantages and advantages facing each sensing method. Cognitive radio facing many feature difficulties in spectrum sensing and those are measured by multi-dimensional spectrum sensing. Those tasks are enabling and revised these spectrum sensing approaches. Other alternative methods like Statistical sensing algorithms also discussed here. Moreover, statistical modelling of network utilization and also traffic models are used for estimation of primary user performance. Spectrum sensing uses dynamic spectrum model without troubling the primary users. This may improves the radio frequency usage of spectrum and it is done when both unlicensed and licensed reducing interference and also by usage of licensed users for identifying the white spaces. The concurrence of these circumstances can produce a commands where the signal to noise ratio (SNR) is below the level of detection threshold by use of sensor, and it missed detections at final result. The concept spectrum sensing is important to secondary users in cognitive radio to operate without interfering the primary users. Final review shows cooperative sensing spectrum can improve the performance of cognitive radio network by increasing the efficiency spectrum and providing a detection accuracy better. These benefits come at the cost of increased traffic overhead, complexity, power consumption, and the need for control channels. The idea of cognitive radio is planned to address the issue faced in spectrum efficiency and it provides wireless users to adapt their operating factors and dealings with the help of adjacent radio environment.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81601098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496547
M. Mohanraj, R. Thottungal, K. Jaikumar
Electrical energy can be produced using fossil fuels and also by natural resources. The production of electrical energy using fossil fuels is costlier when compared to natural resources. Solar, wind, thermal and tidal energy are most widely used natural resources for the production of electrical energy. Presently wind energy is most widely used natural resources which could reduce the emission of carbon dioxide. The cost of the wind turbine is extremely higher and work in harsh and unattended environment. Hence the monitoring and the automation of wind turbine are necessary. This paper describes the monitoring and fault diagnosis system for wind turbine using CAN interface. The monitoring parameters and CAN interface are described in detail.
{"title":"A CAN bus based system for monitoring and fault diagnosis in wind turbine","authors":"M. Mohanraj, R. Thottungal, K. Jaikumar","doi":"10.1109/ICEVENT.2013.6496547","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496547","url":null,"abstract":"Electrical energy can be produced using fossil fuels and also by natural resources. The production of electrical energy using fossil fuels is costlier when compared to natural resources. Solar, wind, thermal and tidal energy are most widely used natural resources for the production of electrical energy. Presently wind energy is most widely used natural resources which could reduce the emission of carbon dioxide. The cost of the wind turbine is extremely higher and work in harsh and unattended environment. Hence the monitoring and the automation of wind turbine are necessary. This paper describes the monitoring and fault diagnosis system for wind turbine using CAN interface. The monitoring parameters and CAN interface are described in detail.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82520400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496542
A. Grover, Neeti Grover, Keshav Kumar
The demand of wireless communication systems has been increased to greater extent because of offering high throughput, wide coverage, and improved reliability. One of the approaches to achieve these is MIMO systems that can efficiently boost the data transmission rate and improves the system coverage by considering multiple numbers of transmitter and receiver antennas and employing the spatial dimensions. This article focuses on the comparison of equalization techniques for Rician Flat fading and Rayleigh frequency selective fading channel. The performance of these channels based on BER has been considered and it has been found that Rician Flat Fading Channel is the best and Frequency Selective Channel is the worst. It has also been observed that the MMSE and ZF give the worst performance in Rayleigh frequency selective channel as compare to Rician Flat Fading Channel and Rayleigh Flat fading Channel [35]. By analyzing equalization techniques in terms of BER, It has been observed that the successive interference methods outperform the ZF and MMSE however their complexity is higher due to iterative nature of the algorithms. ML provides the better performance in comparison to others. Sphere decoder provides the best performance and the highest decoding complexity as compare to ML and it is the best suited method to remove ISI in Frequency selective fading channel in MIMO systems.
{"title":"A comparative analysis in equalization","authors":"A. Grover, Neeti Grover, Keshav Kumar","doi":"10.1109/ICEVENT.2013.6496542","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496542","url":null,"abstract":"The demand of wireless communication systems has been increased to greater extent because of offering high throughput, wide coverage, and improved reliability. One of the approaches to achieve these is MIMO systems that can efficiently boost the data transmission rate and improves the system coverage by considering multiple numbers of transmitter and receiver antennas and employing the spatial dimensions. This article focuses on the comparison of equalization techniques for Rician Flat fading and Rayleigh frequency selective fading channel. The performance of these channels based on BER has been considered and it has been found that Rician Flat Fading Channel is the best and Frequency Selective Channel is the worst. It has also been observed that the MMSE and ZF give the worst performance in Rayleigh frequency selective channel as compare to Rician Flat Fading Channel and Rayleigh Flat fading Channel [35]. By analyzing equalization techniques in terms of BER, It has been observed that the successive interference methods outperform the ZF and MMSE however their complexity is higher due to iterative nature of the algorithms. ML provides the better performance in comparison to others. Sphere decoder provides the best performance and the highest decoding complexity as compare to ML and it is the best suited method to remove ISI in Frequency selective fading channel in MIMO systems.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77771953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-11DOI: 10.1109/ICEVENT.2013.6496554
A. Lekha, C. Srikrishna, Viji Vinod
In this paper a few case studies pertaining to breast cancer, mushroom, larynx cancer and other datasets are studied to find the utility of association rule mining using Weka tool. Three association algorithms - Apriori, PredictiveApriori and Tertius Algorithms are employed to discuss different case studies. A comparative study of the three algorithms is also made. Further architecture for implementing the association rules on datasets using Weka is also given. The analysis reveals that although the implementation of the three algorithms gives the strong association rules they have problems with the number of cycles taken to generate the frequent itemsets, minimum support needed, memory utilized and non-numeric data.
{"title":"Utility of association rule mining: A case study using Weka tool","authors":"A. Lekha, C. Srikrishna, Viji Vinod","doi":"10.1109/ICEVENT.2013.6496554","DOIUrl":"https://doi.org/10.1109/ICEVENT.2013.6496554","url":null,"abstract":"In this paper a few case studies pertaining to breast cancer, mushroom, larynx cancer and other datasets are studied to find the utility of association rule mining using Weka tool. Three association algorithms - Apriori, PredictiveApriori and Tertius Algorithms are employed to discuss different case studies. A comparative study of the three algorithms is also made. Further architecture for implementing the association rules on datasets using Weka is also given. The analysis reveals that although the implementation of the three algorithms gives the strong association rules they have problems with the number of cycles taken to generate the frequent itemsets, minimum support needed, memory utilized and non-numeric data.","PeriodicalId":6426,"journal":{"name":"2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74965445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}