首页 > 最新文献

2014 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Simulation of CMOS IO Standard Based Energy Efficient Gurmukhi Unicode Reader on FPGA 基于CMOS IO标准的节能Gurmukhi Unicode阅读器在FPGA上的仿真
B. Pandey, Gurpreet Singh
In order to fill the research gap of energy efficient hardware design in natural language processing, this project reports the designing of an energy efficient Gurumukhi Unicode Reader on Field Programmable Gate Array (FPGA). To avoid transmission line reflection, a usual problem in hardware design, impedances of transmission line, device and port should be equal. In order to avoid transmission line reflection and make the design energy efficient too, we are using low voltage variants of CMOS: LVCMOS (Low Voltage Complementary Metal oxide Semiconductor) and TTL: LVTTL (Low Voltage Transistor Transistor Logic) I/O standards were used in this project. There is 58.33% and 58.97% decrease in IO power dissipation with LVCMOS12, in compare to LVCMOS25 for 625MHz and 1GHz respectively, with no significant changes in clock power, leakage power and junction temperature. This design is also tested on 25MHz, 125MHz and 25GHz operating frequency with four different LVCMOS.
为了填补自然语言处理领域节能硬件设计的研究空白,本项目报道了一种基于现场可编程门阵列(FPGA)的节能Gurumukhi Unicode阅读器的设计。为了避免传输线反射这一硬件设计中常见的问题,传输线、设备和端口的阻抗应相等。为了避免传输线反射并使设计节能,我们使用了CMOS的低压变体:LVCMOS(低压互补金属氧化物半导体)和TTL: LVTTL(低压晶体管晶体管逻辑)I/O标准在这个项目中使用。与LVCMOS25相比,LVCMOS12在625MHz和1GHz频段的IO功耗分别降低了58.33%和58.97%,时钟功率、漏功率和结温没有显著变化。本设计还使用四个不同的LVCMOS在25MHz, 125MHz和25GHz工作频率下进行了测试。
{"title":"Simulation of CMOS IO Standard Based Energy Efficient Gurmukhi Unicode Reader on FPGA","authors":"B. Pandey, Gurpreet Singh","doi":"10.1109/CICN.2014.193","DOIUrl":"https://doi.org/10.1109/CICN.2014.193","url":null,"abstract":"In order to fill the research gap of energy efficient hardware design in natural language processing, this project reports the designing of an energy efficient Gurumukhi Unicode Reader on Field Programmable Gate Array (FPGA). To avoid transmission line reflection, a usual problem in hardware design, impedances of transmission line, device and port should be equal. In order to avoid transmission line reflection and make the design energy efficient too, we are using low voltage variants of CMOS: LVCMOS (Low Voltage Complementary Metal oxide Semiconductor) and TTL: LVTTL (Low Voltage Transistor Transistor Logic) I/O standards were used in this project. There is 58.33% and 58.97% decrease in IO power dissipation with LVCMOS12, in compare to LVCMOS25 for 625MHz and 1GHz respectively, with no significant changes in clock power, leakage power and junction temperature. This design is also tested on 25MHz, 125MHz and 25GHz operating frequency with four different LVCMOS.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"26 1","pages":"917-920"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83965533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of High Performance IEEE754 Floating Point Multiplier Using Vedic Mathematics 基于吠陀数学的高性能IEEE754浮点乘法器设计
Sushma S. Mahakalkar, S. Haridas
The fundamental and the core of all the Digital Signal Processors (DSPs) are its multipliers and the speed of the DSPs is mainly determined by the speed of its multiplier. In this paper we have synthesized and verified IEEE 754 single and double precision High Speed Floating Point Multiplier using VHDL on Xilinx Virtex - 5 FPGA. The Urdhva-Tiryakbhyam sutra (method) was selected for designing of mantissa. In addition the proposed designed handled underflow, overflow and rounding condition. High speed is achieved by reducing carry propagation delay by using carry save adder while implementation of four (27 × 27 bit multiplier for double precision) and (12 × 12 bit multiplier for single precision).
所有数字信号处理器(dsp)的基础和核心是它的乘法器,dsp的速度主要取决于它的乘法器的速度。本文在Xilinx Virtex - 5 FPGA上利用VHDL对ieee754单、双精度高速浮点乘子进行了合成和验证。尾翼的设计选用了《乌德瓦-提亚巴扬经》(方法)。此外,本设计还处理了底流、溢流和舍入情况。采用进位保存加法器减少进位传播延迟,实现了4(双精度27 × 27位乘法器)和(单精度12 × 12位乘法器)的高速传输。
{"title":"Design of High Performance IEEE754 Floating Point Multiplier Using Vedic Mathematics","authors":"Sushma S. Mahakalkar, S. Haridas","doi":"10.1109/CICN.2014.207","DOIUrl":"https://doi.org/10.1109/CICN.2014.207","url":null,"abstract":"The fundamental and the core of all the Digital Signal Processors (DSPs) are its multipliers and the speed of the DSPs is mainly determined by the speed of its multiplier. In this paper we have synthesized and verified IEEE 754 single and double precision High Speed Floating Point Multiplier using VHDL on Xilinx Virtex - 5 FPGA. The Urdhva-Tiryakbhyam sutra (method) was selected for designing of mantissa. In addition the proposed designed handled underflow, overflow and rounding condition. High speed is achieved by reducing carry propagation delay by using carry save adder while implementation of four (27 × 27 bit multiplier for double precision) and (12 × 12 bit multiplier for single precision).","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"16 1","pages":"985-988"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88523590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Study on Geo-location Authentication Techniques 地理位置认证技术研究
Brinda Shivhare, Gaurav Sharma, S. Kushwah
The explosive growth of the information over the internet makes a crucial task to make network safe and secure with many users hits and connectivity. Geo location based network provides context-aware services that help associate location with users and content. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based network is to secure system from disparate user, so that the right user can take the right decision for the security of the items which are relevant for them. In this paper we are comparing different techniques on different aspects of systems which is used in Geo location based network.
随着互联网信息的爆炸式增长,在用户大量访问和连接的情况下,如何保证网络的安全成为一项至关重要的任务。基于地理位置的网络提供上下文感知服务,帮助将位置与用户和内容关联起来。本文对地理定位网络的相关技术进行了综述。基于地理位置的网络的目的是保护系统免受不同用户的影响,以便正确的用户能够对与其相关的项目的安全性做出正确的决策。在本文中,我们比较了基于地理定位的网络系统在不同方面所采用的不同技术。
{"title":"A Study on Geo-location Authentication Techniques","authors":"Brinda Shivhare, Gaurav Sharma, S. Kushwah","doi":"10.1109/CICN.2014.161","DOIUrl":"https://doi.org/10.1109/CICN.2014.161","url":null,"abstract":"The explosive growth of the information over the internet makes a crucial task to make network safe and secure with many users hits and connectivity. Geo location based network provides context-aware services that help associate location with users and content. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based network is to secure system from disparate user, so that the right user can take the right decision for the security of the items which are relevant for them. In this paper we are comparing different techniques on different aspects of systems which is used in Geo location based network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"98 1","pages":"744-748"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88565942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Tuning of PID Controller for a Linear BLDC Motor Using TLBO Technique 基于TLBO技术的线性无刷直流电机PID控制器整定
Pooja Sharma, Rajeev Gupta
In this paper, an optimum tuning of PID Controller is proposed. A Linear Brushless DC motor is known for higher efficiency & lower maintenance. A newly developed algorithm named, teaching learning based optimization algorithm is applied for the PID Controller tuning of Brushless Linear DC Motor. This algorithm is inspired by the teaching learning process and it works on the effect of influence of a teacher on the output of the learners in a class. Teaching -- Learning-Based Optimization (TLBO) algorithms simulate the teaching -- learning phenomenon of a classroom to solve multidimensional, linear and nonlinear problems with appreciable efficiency. TLBO is population based method. The performance of TLBO algorithm compared Mehdi nasri et.at. Realization of TLBO based PID controller for BLDC motor is economic and easily implemented.
本文提出了一种PID控制器的最优整定方法。线性无刷直流电动机以更高的效率和更低的维护而闻名。将一种新提出的基于教学的优化算法应用于无刷直流电动机的PID控制器整定。该算法受教学过程的启发,主要研究教师的影响对课堂中学习者输出的影响。基于教学的优化算法(TLBO)模拟课堂的教-学现象,以可观的效率解决多维、线性和非线性问题。TLBO是基于群体的方法。比较了Mehdi nasri等TLBO算法的性能。基于TLBO的无刷直流电动机PID控制器的实现既经济又容易实现。
{"title":"Tuning of PID Controller for a Linear BLDC Motor Using TLBO Technique","authors":"Pooja Sharma, Rajeev Gupta","doi":"10.1109/CICN.2014.254","DOIUrl":"https://doi.org/10.1109/CICN.2014.254","url":null,"abstract":"In this paper, an optimum tuning of PID Controller is proposed. A Linear Brushless DC motor is known for higher efficiency & lower maintenance. A newly developed algorithm named, teaching learning based optimization algorithm is applied for the PID Controller tuning of Brushless Linear DC Motor. This algorithm is inspired by the teaching learning process and it works on the effect of influence of a teacher on the output of the learners in a class. Teaching -- Learning-Based Optimization (TLBO) algorithms simulate the teaching -- learning phenomenon of a classroom to solve multidimensional, linear and nonlinear problems with appreciable efficiency. TLBO is population based method. The performance of TLBO algorithm compared Mehdi nasri et.at. Realization of TLBO based PID controller for BLDC motor is economic and easily implemented.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"1224-1228"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83321428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Event Driven Dynamic Path Optimization for AODV in MANET 基于事件驱动的maet AODV动态路径优化
Krishna Mahajan, D. Malik, M. Rizvi, D. S. Karaulia
Route discovery and maintenance in Mobile Ad-hoc Network (MANET) is a problem of long standing interest. In ad-hoc networks the Ad-hoc on demand Distance Vector (AODV) protocol assumes that discovered route is optimal and transmits data on it for the entire data session, whereas due to dynamic topology nodes change position dynamically, the optimum route may change. Thus, node mobility may give rise to more optimal path than already discovered one, making the optimal path suboptimal. AODV does not re-initiate route discovery until link failure or route break occurs which incurs large overhead and increase in delay and is not energy efficient. Therefore, dynamic optimal route discovery should be done. An attempt is made in this paper to find an event based optimum path which is created because of the dynamic topology of the Ad-hoc network and its advantages in data transmission in terms of delay and energy efficiency. Moreover routing information on nodes of active route remains correct. In the literature Anticipated Route Maintenance (ARM), path compression algorithm (PCA), etc. Are some of the approaches used for dynamic route discovery.
移动自组网(MANET)中的路由发现和维护是一个长期关注的问题。在ad-hoc网络中,AODV (ad-hoc on demand Distance Vector)协议假定发现的路由是最优路由,并在整个数据会话中沿着这条路由传输数据,但由于动态拓扑节点位置的动态变化,最优路由可能会发生变化。因此,节点迁移可能会产生比已经发现的路径更多的最优路径,使最优路径成为次优路径。AODV不重新发起路由发现,直到发生链路故障或路由中断,这会导致较大的开销和延迟增加,并且不节能。因此,需要进行动态最优路由发现。本文尝试寻找一种基于事件的最优路径,该路径是基于Ad-hoc网络的动态拓扑结构及其在数据传输方面的延迟和能效优势而创建的。并且活动路由节点上的路由信息保持正确。文献中有预期路由维护(ARM)、路径压缩算法(PCA)等。是用于动态路由发现的一些方法。
{"title":"Event Driven Dynamic Path Optimization for AODV in MANET","authors":"Krishna Mahajan, D. Malik, M. Rizvi, D. S. Karaulia","doi":"10.1109/CICN.2014.105","DOIUrl":"https://doi.org/10.1109/CICN.2014.105","url":null,"abstract":"Route discovery and maintenance in Mobile Ad-hoc Network (MANET) is a problem of long standing interest. In ad-hoc networks the Ad-hoc on demand Distance Vector (AODV) protocol assumes that discovered route is optimal and transmits data on it for the entire data session, whereas due to dynamic topology nodes change position dynamically, the optimum route may change. Thus, node mobility may give rise to more optimal path than already discovered one, making the optimal path suboptimal. AODV does not re-initiate route discovery until link failure or route break occurs which incurs large overhead and increase in delay and is not energy efficient. Therefore, dynamic optimal route discovery should be done. An attempt is made in this paper to find an event based optimum path which is created because of the dynamic topology of the Ad-hoc network and its advantages in data transmission in terms of delay and energy efficiency. Moreover routing information on nodes of active route remains correct. In the literature Anticipated Route Maintenance (ARM), path compression algorithm (PCA), etc. Are some of the approaches used for dynamic route discovery.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"137 1","pages":"448-452"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78186077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Designing an Enhanced Selective Encryption Method for Securing Mobile Ad Hoc Network 设计一种增强的选择性加密方法来保护移动自组织网络
A. Kushwaha, H. Sharma
As the globular progression is taking place, a hub for wireless network is broadening swiftly. Exploitation of Mobile Ad hoc Network is no exception to that. Effortlessness to use, enclosing extensive applications and independence from fixed infrastructure makes Mobile Ad hoc Network, one of the most alarming areas of research today. The article presents a thorough study of Mobile Ad hoc Network, which takes into account the variety of attacks. The approach also presents a concise summary of selective encryption and our proposed method, Selective Significant Data Encryption (SSDE). The technique is based on selective encryption which selects specific words to be encrypted, so that time overhead of encryption can be reduced, thereby making the encryption procedure more effective. Set of experiments are performed in ns 2.35 simulator. This manuscript offers the methodology for the future enhancement for Securing MANET.
随着全球范围的发展,无线网络的中心正在迅速扩大。移动自组网的开发也不例外。易于使用,封闭广泛的应用程序和独立于固定基础设施使移动自组织网络成为当今最令人担忧的研究领域之一。本文对移动自组织网络进行了深入的研究,并考虑了各种攻击。该方法还简要介绍了选择性加密和我们提出的方法,选择性重要数据加密(SSDE)。该技术基于选择性加密,选择特定的要加密的字,这样可以减少加密的时间开销,从而使加密过程更加有效。在ns 2.35模拟器上进行了一组实验。这份手稿提供了未来增强安全MANET的方法。
{"title":"Designing an Enhanced Selective Encryption Method for Securing Mobile Ad Hoc Network","authors":"A. Kushwaha, H. Sharma","doi":"10.1109/CICN.2014.170","DOIUrl":"https://doi.org/10.1109/CICN.2014.170","url":null,"abstract":"As the globular progression is taking place, a hub for wireless network is broadening swiftly. Exploitation of Mobile Ad hoc Network is no exception to that. Effortlessness to use, enclosing extensive applications and independence from fixed infrastructure makes Mobile Ad hoc Network, one of the most alarming areas of research today. The article presents a thorough study of Mobile Ad hoc Network, which takes into account the variety of attacks. The approach also presents a concise summary of selective encryption and our proposed method, Selective Significant Data Encryption (SSDE). The technique is based on selective encryption which selects specific words to be encrypted, so that time overhead of encryption can be reduced, thereby making the encryption procedure more effective. Set of experiments are performed in ns 2.35 simulator. This manuscript offers the methodology for the future enhancement for Securing MANET.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"793-798"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89437552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of FORE Toolkit: Cyber Forensic Tool for the Eucalyptus Software as a Service Cloud Model FORE工具箱的设计与实现:用于Eucalyptus软件即服务云模型的网络取证工具
Asish Srivastava, Amit Gupta, Tinesh Kumar Goyal, P. Saxena
In the research paper, primarily there will be description about cyber forensics tools for SaaS application for eucalyptus continued with implementation and finally the evaluation. FORE endow us to dedicated capabilities of forensics for Eucalyptus cloud platform. Eucalyptus is open source software which is providing us with various cloud deployment model. FORE implementation supports for SaaS application. FORE cyber investigation related to the SaaS application which is hosted on virtual machine and virtual operating system using SaaS application logs, virtual volume logs and user activity logs. [2][8] In simple Web application we easily perform forensics activity, but in cloud platform it is very difficult to perform forensics activity because all servers operated virtually. This type of forensics investigate on a Web based approach may required for log investigation. In virtual environment user also responsible for their data security, so user need to self audit of account activity. In this paper, we explore the basic requirement for a cloud forensics and develop forensic tool for auditing and investigation for SaaS model.
在研究论文中,主要将描述用于eucalyptus SaaS应用程序的网络取证工具,然后继续实施,最后进行评估。FORE赋予我们桉树云平台取证的专用功能。Eucalyptus是开源软件,它为我们提供了各种云部署模型。FORE实现支持SaaS应用程序。利用SaaS应用程序日志、虚拟卷日志和用户活动日志,对托管在虚拟机和虚拟操作系统上的SaaS应用程序进行了FORE网络调查。在简单的Web应用程序中,我们很容易执行取证活动,但在云平台中,执行取证活动非常困难,因为所有服务器都是虚拟操作的。日志调查可能需要基于Web的方法进行这种类型的取证调查。在虚拟环境中,用户还要对自己的数据安全负责,因此用户需要对账户活动进行自我审计。本文探讨了云取证的基本需求,并开发了用于SaaS模型审计和调查的取证工具。
{"title":"Design and Implementation of FORE Toolkit: Cyber Forensic Tool for the Eucalyptus Software as a Service Cloud Model","authors":"Asish Srivastava, Amit Gupta, Tinesh Kumar Goyal, P. Saxena","doi":"10.1109/CICN.2014.124","DOIUrl":"https://doi.org/10.1109/CICN.2014.124","url":null,"abstract":"In the research paper, primarily there will be description about cyber forensics tools for SaaS application for eucalyptus continued with implementation and finally the evaluation. FORE endow us to dedicated capabilities of forensics for Eucalyptus cloud platform. Eucalyptus is open source software which is providing us with various cloud deployment model. FORE implementation supports for SaaS application. FORE cyber investigation related to the SaaS application which is hosted on virtual machine and virtual operating system using SaaS application logs, virtual volume logs and user activity logs. [2][8] In simple Web application we easily perform forensics activity, but in cloud platform it is very difficult to perform forensics activity because all servers operated virtually. This type of forensics investigate on a Web based approach may required for log investigation. In virtual environment user also responsible for their data security, so user need to self audit of account activity. In this paper, we explore the basic requirement for a cloud forensics and develop forensic tool for auditing and investigation for SaaS model.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"10 1","pages":"546-550"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74464303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive Segmentation of Capsule Endoscopy Images Using Grow Cut Method 基于生长切口法的胶囊内窥镜图像交互式分割
P. Shanmugasundaram, N. Santhiyakumari
High incidence of Gastrointestinal (GI) tract related diseases are common nowadays, which leads to cancer. Diagnose of these kind of diseases is not easy in the early stage. This makes the researchers to develop an automated screening technique for early detection, many modalities are employed to view the GI tract but complete visualization is not possible. Wireless Capsule Endo scopy (WCE) is a modern modality which helps to view the complete GI tract, This claims an computational assistances which automatically segment the defective frames with the help of computer assisted diagnosis, In this paper the author describes an semi-automated interactive grow cut algorithm for segmenting capsule endoscopy (CE) images as foreground and background image by iterative process with a small number of user-labeled pixel the rest of the images are segmented with less human input. User can view and guide the algorithm without any additional user effort a semi automated segmentation is computed using mat lab.
目前,胃肠道相关疾病的高发是常见的,并导致癌症的发生。这类疾病的早期诊断并不容易。这使得研究人员开发了一种用于早期检测的自动筛查技术,许多方法被用来观察胃肠道,但完全可视化是不可能的。无线胶囊内镜(WCE)是一种现代模式,有助于查看完整的胃肠道,这要求一个计算辅助,在计算机辅助诊断的帮助下自动分割缺陷框架。本文描述了一种半自动化交互式生长切割算法,该算法通过迭代处理将胶囊内窥镜(CE)图像分割为前景和背景图像,使用少量用户标记的像素,其余图像以较少的人工输入进行分割。用户可以查看和指导算法,而无需任何额外的用户努力,使用mat lab计算半自动分割。
{"title":"Interactive Segmentation of Capsule Endoscopy Images Using Grow Cut Method","authors":"P. Shanmugasundaram, N. Santhiyakumari","doi":"10.1109/CICN.2014.52","DOIUrl":"https://doi.org/10.1109/CICN.2014.52","url":null,"abstract":"High incidence of Gastrointestinal (GI) tract related diseases are common nowadays, which leads to cancer. Diagnose of these kind of diseases is not easy in the early stage. This makes the researchers to develop an automated screening technique for early detection, many modalities are employed to view the GI tract but complete visualization is not possible. Wireless Capsule Endo scopy (WCE) is a modern modality which helps to view the complete GI tract, This claims an computational assistances which automatically segment the defective frames with the help of computer assisted diagnosis, In this paper the author describes an semi-automated interactive grow cut algorithm for segmenting capsule endoscopy (CE) images as foreground and background image by iterative process with a small number of user-labeled pixel the rest of the images are segmented with less human input. User can view and guide the algorithm without any additional user effort a semi automated segmentation is computed using mat lab.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"190-192"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79319214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Opinion Spam Detection Using Feature Selection 基于特征选择的垃圾邮件检测
Rinki Patel, Priyank Thakkar
In modern times, it has become very essential for e-commerce businesses to empower their end customers to write reviews about the services that they have utilized. Such reviews provide vital sources of information on these products or services. This information is utilized by the future potential customers before deciding on purchase of new products or services. These opinions or reviews are also exploited by marketers to find out the drawbacks of their own products or services and alternatively to find the vital information related to their competitor's products or services. This in turn allows to identify weaknesses or strengths of products. Unfortunately, this significant usefulness of opinions has also raised the problem for spam, which contains forged positive or spiteful negative opinions. This paper focuses on the detection of deceptive opinion spam. A recently proposed opinion spam detection method which is based on n-gram techniques is extended by means of feature selection and different representation of the opinions. The problem is modelled as the classification problem and Naïve Bayes (NB) classifier and Least Squares Support Vector Machine (LS-SVM) are used on three different representations (Boolean, bag-of-words and term frequency -- inverse document frequency (TF-IDF) ) of the opinions. All the experiments are carried out on widely used gold-standard dataset.
在现代,对于电子商务企业来说,授权其最终客户撰写关于他们所使用的服务的评论已经变得非常重要。这些审查提供了有关这些产品或服务的重要信息来源。在决定购买新产品或服务之前,这些信息被未来的潜在客户所利用。这些意见或评论也被营销人员用来找出他们自己的产品或服务的缺点,或者找到与竞争对手的产品或服务相关的重要信息。这反过来又允许识别产品的弱点或优势。不幸的是,这种重要的有用性也引发了垃圾邮件的问题,其中包含伪造的正面或恶意的负面意见。本文主要研究欺骗性意见垃圾邮件的检测问题。最近提出了一种基于n-gram技术的意见垃圾检测方法,通过特征选择和意见的不同表示进行了扩展。该问题被建模为分类问题,Naïve贝叶斯(NB)分类器和最小二乘支持向量机(LS-SVM)用于意见的三种不同表示(布尔,词袋和术语频率-逆文档频率(TF-IDF))。所有实验都是在广泛使用的金标准数据集上进行的。
{"title":"Opinion Spam Detection Using Feature Selection","authors":"Rinki Patel, Priyank Thakkar","doi":"10.1109/CICN.2014.127","DOIUrl":"https://doi.org/10.1109/CICN.2014.127","url":null,"abstract":"In modern times, it has become very essential for e-commerce businesses to empower their end customers to write reviews about the services that they have utilized. Such reviews provide vital sources of information on these products or services. This information is utilized by the future potential customers before deciding on purchase of new products or services. These opinions or reviews are also exploited by marketers to find out the drawbacks of their own products or services and alternatively to find the vital information related to their competitor's products or services. This in turn allows to identify weaknesses or strengths of products. Unfortunately, this significant usefulness of opinions has also raised the problem for spam, which contains forged positive or spiteful negative opinions. This paper focuses on the detection of deceptive opinion spam. A recently proposed opinion spam detection method which is based on n-gram techniques is extended by means of feature selection and different representation of the opinions. The problem is modelled as the classification problem and Naïve Bayes (NB) classifier and Least Squares Support Vector Machine (LS-SVM) are used on three different representations (Boolean, bag-of-words and term frequency -- inverse document frequency (TF-IDF) ) of the opinions. All the experiments are carried out on widely used gold-standard dataset.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"117 1","pages":"560-564"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79394472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Projectile-Deviation Measuring Technology Literature Review 弹丸偏差测量技术文献综述
Shang Zaifei, Wang Chunping
Projectile-Deviation measurement is a key part of shooting calibration of anti-aircraft artillery systems. In recent years, as the imaging and computer processing speed improved significantly, it makes real-time analysis and getting the deviation from projectile-shooting scene possible. This paper makes a deep research on projectile-deviation measurement using image processing technology, combined with the small target detection algorithm, discusses target detection approach of projectile, and small target detection algorithm is given the main features and trends, research in this field has a certain significance.
射偏测量是高炮系统射击标定的关键环节。近年来,随着成像和计算机处理速度的显著提高,使得实时分析和获取弹丸射击现场偏差成为可能。本文利用图像处理技术对弹丸偏差测量进行了深入的研究,结合小目标检测算法,讨论了弹丸的目标检测方法,并给出了小目标检测算法的主要特点和发展趋势,对该领域的研究具有一定的意义。
{"title":"Projectile-Deviation Measuring Technology Literature Review","authors":"Shang Zaifei, Wang Chunping","doi":"10.1109/CICN.2014.228","DOIUrl":"https://doi.org/10.1109/CICN.2014.228","url":null,"abstract":"Projectile-Deviation measurement is a key part of shooting calibration of anti-aircraft artillery systems. In recent years, as the imaging and computer processing speed improved significantly, it makes real-time analysis and getting the deviation from projectile-shooting scene possible. This paper makes a deep research on projectile-deviation measurement using image processing technology, combined with the small target detection algorithm, discusses target detection approach of projectile, and small target detection algorithm is given the main features and trends, research in this field has a certain significance.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"116 1","pages":"1088-1091"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79252010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1