In order to fill the research gap of energy efficient hardware design in natural language processing, this project reports the designing of an energy efficient Gurumukhi Unicode Reader on Field Programmable Gate Array (FPGA). To avoid transmission line reflection, a usual problem in hardware design, impedances of transmission line, device and port should be equal. In order to avoid transmission line reflection and make the design energy efficient too, we are using low voltage variants of CMOS: LVCMOS (Low Voltage Complementary Metal oxide Semiconductor) and TTL: LVTTL (Low Voltage Transistor Transistor Logic) I/O standards were used in this project. There is 58.33% and 58.97% decrease in IO power dissipation with LVCMOS12, in compare to LVCMOS25 for 625MHz and 1GHz respectively, with no significant changes in clock power, leakage power and junction temperature. This design is also tested on 25MHz, 125MHz and 25GHz operating frequency with four different LVCMOS.
{"title":"Simulation of CMOS IO Standard Based Energy Efficient Gurmukhi Unicode Reader on FPGA","authors":"B. Pandey, Gurpreet Singh","doi":"10.1109/CICN.2014.193","DOIUrl":"https://doi.org/10.1109/CICN.2014.193","url":null,"abstract":"In order to fill the research gap of energy efficient hardware design in natural language processing, this project reports the designing of an energy efficient Gurumukhi Unicode Reader on Field Programmable Gate Array (FPGA). To avoid transmission line reflection, a usual problem in hardware design, impedances of transmission line, device and port should be equal. In order to avoid transmission line reflection and make the design energy efficient too, we are using low voltage variants of CMOS: LVCMOS (Low Voltage Complementary Metal oxide Semiconductor) and TTL: LVTTL (Low Voltage Transistor Transistor Logic) I/O standards were used in this project. There is 58.33% and 58.97% decrease in IO power dissipation with LVCMOS12, in compare to LVCMOS25 for 625MHz and 1GHz respectively, with no significant changes in clock power, leakage power and junction temperature. This design is also tested on 25MHz, 125MHz and 25GHz operating frequency with four different LVCMOS.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"26 1","pages":"917-920"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83965533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fundamental and the core of all the Digital Signal Processors (DSPs) are its multipliers and the speed of the DSPs is mainly determined by the speed of its multiplier. In this paper we have synthesized and verified IEEE 754 single and double precision High Speed Floating Point Multiplier using VHDL on Xilinx Virtex - 5 FPGA. The Urdhva-Tiryakbhyam sutra (method) was selected for designing of mantissa. In addition the proposed designed handled underflow, overflow and rounding condition. High speed is achieved by reducing carry propagation delay by using carry save adder while implementation of four (27 × 27 bit multiplier for double precision) and (12 × 12 bit multiplier for single precision).
{"title":"Design of High Performance IEEE754 Floating Point Multiplier Using Vedic Mathematics","authors":"Sushma S. Mahakalkar, S. Haridas","doi":"10.1109/CICN.2014.207","DOIUrl":"https://doi.org/10.1109/CICN.2014.207","url":null,"abstract":"The fundamental and the core of all the Digital Signal Processors (DSPs) are its multipliers and the speed of the DSPs is mainly determined by the speed of its multiplier. In this paper we have synthesized and verified IEEE 754 single and double precision High Speed Floating Point Multiplier using VHDL on Xilinx Virtex - 5 FPGA. The Urdhva-Tiryakbhyam sutra (method) was selected for designing of mantissa. In addition the proposed designed handled underflow, overflow and rounding condition. High speed is achieved by reducing carry propagation delay by using carry save adder while implementation of four (27 × 27 bit multiplier for double precision) and (12 × 12 bit multiplier for single precision).","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"16 1","pages":"985-988"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88523590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The explosive growth of the information over the internet makes a crucial task to make network safe and secure with many users hits and connectivity. Geo location based network provides context-aware services that help associate location with users and content. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based network is to secure system from disparate user, so that the right user can take the right decision for the security of the items which are relevant for them. In this paper we are comparing different techniques on different aspects of systems which is used in Geo location based network.
{"title":"A Study on Geo-location Authentication Techniques","authors":"Brinda Shivhare, Gaurav Sharma, S. Kushwah","doi":"10.1109/CICN.2014.161","DOIUrl":"https://doi.org/10.1109/CICN.2014.161","url":null,"abstract":"The explosive growth of the information over the internet makes a crucial task to make network safe and secure with many users hits and connectivity. Geo location based network provides context-aware services that help associate location with users and content. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based network is to secure system from disparate user, so that the right user can take the right decision for the security of the items which are relevant for them. In this paper we are comparing different techniques on different aspects of systems which is used in Geo location based network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"98 1","pages":"744-748"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88565942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an optimum tuning of PID Controller is proposed. A Linear Brushless DC motor is known for higher efficiency & lower maintenance. A newly developed algorithm named, teaching learning based optimization algorithm is applied for the PID Controller tuning of Brushless Linear DC Motor. This algorithm is inspired by the teaching learning process and it works on the effect of influence of a teacher on the output of the learners in a class. Teaching -- Learning-Based Optimization (TLBO) algorithms simulate the teaching -- learning phenomenon of a classroom to solve multidimensional, linear and nonlinear problems with appreciable efficiency. TLBO is population based method. The performance of TLBO algorithm compared Mehdi nasri et.at. Realization of TLBO based PID controller for BLDC motor is economic and easily implemented.
{"title":"Tuning of PID Controller for a Linear BLDC Motor Using TLBO Technique","authors":"Pooja Sharma, Rajeev Gupta","doi":"10.1109/CICN.2014.254","DOIUrl":"https://doi.org/10.1109/CICN.2014.254","url":null,"abstract":"In this paper, an optimum tuning of PID Controller is proposed. A Linear Brushless DC motor is known for higher efficiency & lower maintenance. A newly developed algorithm named, teaching learning based optimization algorithm is applied for the PID Controller tuning of Brushless Linear DC Motor. This algorithm is inspired by the teaching learning process and it works on the effect of influence of a teacher on the output of the learners in a class. Teaching -- Learning-Based Optimization (TLBO) algorithms simulate the teaching -- learning phenomenon of a classroom to solve multidimensional, linear and nonlinear problems with appreciable efficiency. TLBO is population based method. The performance of TLBO algorithm compared Mehdi nasri et.at. Realization of TLBO based PID controller for BLDC motor is economic and easily implemented.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"1224-1228"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83321428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Krishna Mahajan, D. Malik, M. Rizvi, D. S. Karaulia
Route discovery and maintenance in Mobile Ad-hoc Network (MANET) is a problem of long standing interest. In ad-hoc networks the Ad-hoc on demand Distance Vector (AODV) protocol assumes that discovered route is optimal and transmits data on it for the entire data session, whereas due to dynamic topology nodes change position dynamically, the optimum route may change. Thus, node mobility may give rise to more optimal path than already discovered one, making the optimal path suboptimal. AODV does not re-initiate route discovery until link failure or route break occurs which incurs large overhead and increase in delay and is not energy efficient. Therefore, dynamic optimal route discovery should be done. An attempt is made in this paper to find an event based optimum path which is created because of the dynamic topology of the Ad-hoc network and its advantages in data transmission in terms of delay and energy efficiency. Moreover routing information on nodes of active route remains correct. In the literature Anticipated Route Maintenance (ARM), path compression algorithm (PCA), etc. Are some of the approaches used for dynamic route discovery.
移动自组网(MANET)中的路由发现和维护是一个长期关注的问题。在ad-hoc网络中,AODV (ad-hoc on demand Distance Vector)协议假定发现的路由是最优路由,并在整个数据会话中沿着这条路由传输数据,但由于动态拓扑节点位置的动态变化,最优路由可能会发生变化。因此,节点迁移可能会产生比已经发现的路径更多的最优路径,使最优路径成为次优路径。AODV不重新发起路由发现,直到发生链路故障或路由中断,这会导致较大的开销和延迟增加,并且不节能。因此,需要进行动态最优路由发现。本文尝试寻找一种基于事件的最优路径,该路径是基于Ad-hoc网络的动态拓扑结构及其在数据传输方面的延迟和能效优势而创建的。并且活动路由节点上的路由信息保持正确。文献中有预期路由维护(ARM)、路径压缩算法(PCA)等。是用于动态路由发现的一些方法。
{"title":"Event Driven Dynamic Path Optimization for AODV in MANET","authors":"Krishna Mahajan, D. Malik, M. Rizvi, D. S. Karaulia","doi":"10.1109/CICN.2014.105","DOIUrl":"https://doi.org/10.1109/CICN.2014.105","url":null,"abstract":"Route discovery and maintenance in Mobile Ad-hoc Network (MANET) is a problem of long standing interest. In ad-hoc networks the Ad-hoc on demand Distance Vector (AODV) protocol assumes that discovered route is optimal and transmits data on it for the entire data session, whereas due to dynamic topology nodes change position dynamically, the optimum route may change. Thus, node mobility may give rise to more optimal path than already discovered one, making the optimal path suboptimal. AODV does not re-initiate route discovery until link failure or route break occurs which incurs large overhead and increase in delay and is not energy efficient. Therefore, dynamic optimal route discovery should be done. An attempt is made in this paper to find an event based optimum path which is created because of the dynamic topology of the Ad-hoc network and its advantages in data transmission in terms of delay and energy efficiency. Moreover routing information on nodes of active route remains correct. In the literature Anticipated Route Maintenance (ARM), path compression algorithm (PCA), etc. Are some of the approaches used for dynamic route discovery.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"137 1","pages":"448-452"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78186077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the globular progression is taking place, a hub for wireless network is broadening swiftly. Exploitation of Mobile Ad hoc Network is no exception to that. Effortlessness to use, enclosing extensive applications and independence from fixed infrastructure makes Mobile Ad hoc Network, one of the most alarming areas of research today. The article presents a thorough study of Mobile Ad hoc Network, which takes into account the variety of attacks. The approach also presents a concise summary of selective encryption and our proposed method, Selective Significant Data Encryption (SSDE). The technique is based on selective encryption which selects specific words to be encrypted, so that time overhead of encryption can be reduced, thereby making the encryption procedure more effective. Set of experiments are performed in ns 2.35 simulator. This manuscript offers the methodology for the future enhancement for Securing MANET.
{"title":"Designing an Enhanced Selective Encryption Method for Securing Mobile Ad Hoc Network","authors":"A. Kushwaha, H. Sharma","doi":"10.1109/CICN.2014.170","DOIUrl":"https://doi.org/10.1109/CICN.2014.170","url":null,"abstract":"As the globular progression is taking place, a hub for wireless network is broadening swiftly. Exploitation of Mobile Ad hoc Network is no exception to that. Effortlessness to use, enclosing extensive applications and independence from fixed infrastructure makes Mobile Ad hoc Network, one of the most alarming areas of research today. The article presents a thorough study of Mobile Ad hoc Network, which takes into account the variety of attacks. The approach also presents a concise summary of selective encryption and our proposed method, Selective Significant Data Encryption (SSDE). The technique is based on selective encryption which selects specific words to be encrypted, so that time overhead of encryption can be reduced, thereby making the encryption procedure more effective. Set of experiments are performed in ns 2.35 simulator. This manuscript offers the methodology for the future enhancement for Securing MANET.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"793-798"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89437552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asish Srivastava, Amit Gupta, Tinesh Kumar Goyal, P. Saxena
In the research paper, primarily there will be description about cyber forensics tools for SaaS application for eucalyptus continued with implementation and finally the evaluation. FORE endow us to dedicated capabilities of forensics for Eucalyptus cloud platform. Eucalyptus is open source software which is providing us with various cloud deployment model. FORE implementation supports for SaaS application. FORE cyber investigation related to the SaaS application which is hosted on virtual machine and virtual operating system using SaaS application logs, virtual volume logs and user activity logs. [2][8] In simple Web application we easily perform forensics activity, but in cloud platform it is very difficult to perform forensics activity because all servers operated virtually. This type of forensics investigate on a Web based approach may required for log investigation. In virtual environment user also responsible for their data security, so user need to self audit of account activity. In this paper, we explore the basic requirement for a cloud forensics and develop forensic tool for auditing and investigation for SaaS model.
{"title":"Design and Implementation of FORE Toolkit: Cyber Forensic Tool for the Eucalyptus Software as a Service Cloud Model","authors":"Asish Srivastava, Amit Gupta, Tinesh Kumar Goyal, P. Saxena","doi":"10.1109/CICN.2014.124","DOIUrl":"https://doi.org/10.1109/CICN.2014.124","url":null,"abstract":"In the research paper, primarily there will be description about cyber forensics tools for SaaS application for eucalyptus continued with implementation and finally the evaluation. FORE endow us to dedicated capabilities of forensics for Eucalyptus cloud platform. Eucalyptus is open source software which is providing us with various cloud deployment model. FORE implementation supports for SaaS application. FORE cyber investigation related to the SaaS application which is hosted on virtual machine and virtual operating system using SaaS application logs, virtual volume logs and user activity logs. [2][8] In simple Web application we easily perform forensics activity, but in cloud platform it is very difficult to perform forensics activity because all servers operated virtually. This type of forensics investigate on a Web based approach may required for log investigation. In virtual environment user also responsible for their data security, so user need to self audit of account activity. In this paper, we explore the basic requirement for a cloud forensics and develop forensic tool for auditing and investigation for SaaS model.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"10 1","pages":"546-550"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74464303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
High incidence of Gastrointestinal (GI) tract related diseases are common nowadays, which leads to cancer. Diagnose of these kind of diseases is not easy in the early stage. This makes the researchers to develop an automated screening technique for early detection, many modalities are employed to view the GI tract but complete visualization is not possible. Wireless Capsule Endo scopy (WCE) is a modern modality which helps to view the complete GI tract, This claims an computational assistances which automatically segment the defective frames with the help of computer assisted diagnosis, In this paper the author describes an semi-automated interactive grow cut algorithm for segmenting capsule endoscopy (CE) images as foreground and background image by iterative process with a small number of user-labeled pixel the rest of the images are segmented with less human input. User can view and guide the algorithm without any additional user effort a semi automated segmentation is computed using mat lab.
{"title":"Interactive Segmentation of Capsule Endoscopy Images Using Grow Cut Method","authors":"P. Shanmugasundaram, N. Santhiyakumari","doi":"10.1109/CICN.2014.52","DOIUrl":"https://doi.org/10.1109/CICN.2014.52","url":null,"abstract":"High incidence of Gastrointestinal (GI) tract related diseases are common nowadays, which leads to cancer. Diagnose of these kind of diseases is not easy in the early stage. This makes the researchers to develop an automated screening technique for early detection, many modalities are employed to view the GI tract but complete visualization is not possible. Wireless Capsule Endo scopy (WCE) is a modern modality which helps to view the complete GI tract, This claims an computational assistances which automatically segment the defective frames with the help of computer assisted diagnosis, In this paper the author describes an semi-automated interactive grow cut algorithm for segmenting capsule endoscopy (CE) images as foreground and background image by iterative process with a small number of user-labeled pixel the rest of the images are segmented with less human input. User can view and guide the algorithm without any additional user effort a semi automated segmentation is computed using mat lab.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"190-192"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79319214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In modern times, it has become very essential for e-commerce businesses to empower their end customers to write reviews about the services that they have utilized. Such reviews provide vital sources of information on these products or services. This information is utilized by the future potential customers before deciding on purchase of new products or services. These opinions or reviews are also exploited by marketers to find out the drawbacks of their own products or services and alternatively to find the vital information related to their competitor's products or services. This in turn allows to identify weaknesses or strengths of products. Unfortunately, this significant usefulness of opinions has also raised the problem for spam, which contains forged positive or spiteful negative opinions. This paper focuses on the detection of deceptive opinion spam. A recently proposed opinion spam detection method which is based on n-gram techniques is extended by means of feature selection and different representation of the opinions. The problem is modelled as the classification problem and Naïve Bayes (NB) classifier and Least Squares Support Vector Machine (LS-SVM) are used on three different representations (Boolean, bag-of-words and term frequency -- inverse document frequency (TF-IDF) ) of the opinions. All the experiments are carried out on widely used gold-standard dataset.
{"title":"Opinion Spam Detection Using Feature Selection","authors":"Rinki Patel, Priyank Thakkar","doi":"10.1109/CICN.2014.127","DOIUrl":"https://doi.org/10.1109/CICN.2014.127","url":null,"abstract":"In modern times, it has become very essential for e-commerce businesses to empower their end customers to write reviews about the services that they have utilized. Such reviews provide vital sources of information on these products or services. This information is utilized by the future potential customers before deciding on purchase of new products or services. These opinions or reviews are also exploited by marketers to find out the drawbacks of their own products or services and alternatively to find the vital information related to their competitor's products or services. This in turn allows to identify weaknesses or strengths of products. Unfortunately, this significant usefulness of opinions has also raised the problem for spam, which contains forged positive or spiteful negative opinions. This paper focuses on the detection of deceptive opinion spam. A recently proposed opinion spam detection method which is based on n-gram techniques is extended by means of feature selection and different representation of the opinions. The problem is modelled as the classification problem and Naïve Bayes (NB) classifier and Least Squares Support Vector Machine (LS-SVM) are used on three different representations (Boolean, bag-of-words and term frequency -- inverse document frequency (TF-IDF) ) of the opinions. All the experiments are carried out on widely used gold-standard dataset.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"117 1","pages":"560-564"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79394472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Projectile-Deviation measurement is a key part of shooting calibration of anti-aircraft artillery systems. In recent years, as the imaging and computer processing speed improved significantly, it makes real-time analysis and getting the deviation from projectile-shooting scene possible. This paper makes a deep research on projectile-deviation measurement using image processing technology, combined with the small target detection algorithm, discusses target detection approach of projectile, and small target detection algorithm is given the main features and trends, research in this field has a certain significance.
{"title":"Projectile-Deviation Measuring Technology Literature Review","authors":"Shang Zaifei, Wang Chunping","doi":"10.1109/CICN.2014.228","DOIUrl":"https://doi.org/10.1109/CICN.2014.228","url":null,"abstract":"Projectile-Deviation measurement is a key part of shooting calibration of anti-aircraft artillery systems. In recent years, as the imaging and computer processing speed improved significantly, it makes real-time analysis and getting the deviation from projectile-shooting scene possible. This paper makes a deep research on projectile-deviation measurement using image processing technology, combined with the small target detection algorithm, discusses target detection approach of projectile, and small target detection algorithm is given the main features and trends, research in this field has a certain significance.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"116 1","pages":"1088-1091"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79252010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}