首页 > 最新文献

2018 International Conference on Advanced Computation and Telecommunication (ICACAT)最新文献

英文 中文
Mining on Relationships in Big Data era using Improve Apriori Algorithm with MapReduce Approach 基于MapReduce改进Apriori算法的大数据时代关系挖掘
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933674
K. Pandey, D. Shukla
The current time technology is growing very faster and data is generating very fast so data characteristics have changed in form of data to big data. If anybody wants to mine some related data in big data environment then present data mining algorithm fails to mine relationship in big data and it takes a lot of time for processing. MapReduce approach is a most efficient algorithm in big data framework which handles a huge amount of data and gives fast result. The Apriori algorithm is more powerful algorithm for mining on interesting relationships between dataset in any type of databases or same databases. In present time a lot of MapReduce base Apriori algorithms are available but its Map and Reduce function run to multiple times and works only for the transaction database. This paper describes what is big data with its characteristics, concept of Association rules with the Apriori algorithm in big data, problems in the existing MapReduce base Apriori algorithm. We propose new improve MapReduce approach base Apriori algorithm for mining on a relationship with the help of given one suitable example where Reduce function runs only one time after running on Map function and this proposed algorithm run on any type of database.
当今时代技术发展速度非常快,数据产生速度非常快,因此数据的特征已经从数据的形式转变为大数据。如果有人想在大数据环境中挖掘一些相关数据,那么现有的数据挖掘算法无法挖掘大数据中的关系,并且需要花费大量的时间进行处理。MapReduce方法是大数据框架中最有效的一种算法,它可以处理大量的数据并给出快速的结果。Apriori算法是一种更强大的算法,可以挖掘任何类型数据库或相同数据库中数据集之间的有趣关系。目前有很多基于Apriori的MapReduce算法,但它的Map和Reduce函数只能运行多次,并且只适用于事务数据库。本文介绍了什么是大数据及其特点,大数据中关联规则与Apriori算法的概念,现有MapReduce基础Apriori算法存在的问题。我们提出了一种新的改进MapReduce方法,基于Apriori算法来挖掘关系,并给出了一个合适的例子,其中Reduce函数在Map函数上运行后只运行一次,并且该算法可以在任何类型的数据库上运行。
{"title":"Mining on Relationships in Big Data era using Improve Apriori Algorithm with MapReduce Approach","authors":"K. Pandey, D. Shukla","doi":"10.1109/ICACAT.2018.8933674","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933674","url":null,"abstract":"The current time technology is growing very faster and data is generating very fast so data characteristics have changed in form of data to big data. If anybody wants to mine some related data in big data environment then present data mining algorithm fails to mine relationship in big data and it takes a lot of time for processing. MapReduce approach is a most efficient algorithm in big data framework which handles a huge amount of data and gives fast result. The Apriori algorithm is more powerful algorithm for mining on interesting relationships between dataset in any type of databases or same databases. In present time a lot of MapReduce base Apriori algorithms are available but its Map and Reduce function run to multiple times and works only for the transaction database. This paper describes what is big data with its characteristics, concept of Association rules with the Apriori algorithm in big data, problems in the existing MapReduce base Apriori algorithm. We propose new improve MapReduce approach base Apriori algorithm for mining on a relationship with the help of given one suitable example where Reduce function runs only one time after running on Map function and this proposed algorithm run on any type of database.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"59 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84484259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Secure Data Aggregation in IoT using Particle Swarm Optimization Algorithm 一种基于粒子群优化算法的物联网安全数据聚合方法
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933784
Neeraj Chandnani, C. N. Khairnar
Internet of Things (IoT) is a network paradigm in which data aggregation and data security plays a vital role. Data aggregation in IoT describes collection of information from different users and data security means encryption of collected data using cryptography method. The proposed work comprises of devices and gateway to perform data aggregation and data encryption. Data aggregation is performed using clustering in which data are clustered and secured by Particle Swarm Optimization (PSO) algorithm which finds the cluster head. After finding cluster head, nodes requests to join as cluster member. PSO computes fitness function using metrics i.e. energy, end-to-end delay, scoring factor, packet drops and successful packet transformation. After completion of clustering process, data encryption process is held in which, cluster head collects data from the cluster members and encrypts it using Elliptic Curve Cryptography (ECC) method. Finally, encrypted data are dispatched to gateway device. Experimental result shows, the proposed work on Secure Particle Swarm Optimization (SPSO)prompts better performance in following metrics i.e. delay, throughput and energy consumption.
物联网(IoT)是一种网络范式,数据聚合和数据安全在其中起着至关重要的作用。物联网中的数据聚合是指对来自不同用户的信息进行收集,数据安全是指对收集到的数据使用加密方法进行加密。提出的工作包括执行数据聚合和数据加密的设备和网关。数据聚合采用聚类方法进行,其中数据由粒子群优化算法(PSO)进行聚类和保护,PSO算法查找簇头。在找到集群头之后,节点请求加入为集群成员。粒子群算法利用能量、端到端延迟、评分因子、丢包和成功的包转换等度量来计算适应度函数。聚类过程完成后,进行数据加密过程,簇头从集群成员中收集数据,并使用椭圆曲线加密(ECC)方法进行加密。最后,将加密的数据发送到网关设备。实验结果表明,所提出的安全粒子群优化方法在延迟、吞吐量和能耗等指标上都有较好的性能。
{"title":"A Novel Secure Data Aggregation in IoT using Particle Swarm Optimization Algorithm","authors":"Neeraj Chandnani, C. N. Khairnar","doi":"10.1109/ICACAT.2018.8933784","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933784","url":null,"abstract":"Internet of Things (IoT) is a network paradigm in which data aggregation and data security plays a vital role. Data aggregation in IoT describes collection of information from different users and data security means encryption of collected data using cryptography method. The proposed work comprises of devices and gateway to perform data aggregation and data encryption. Data aggregation is performed using clustering in which data are clustered and secured by Particle Swarm Optimization (PSO) algorithm which finds the cluster head. After finding cluster head, nodes requests to join as cluster member. PSO computes fitness function using metrics i.e. energy, end-to-end delay, scoring factor, packet drops and successful packet transformation. After completion of clustering process, data encryption process is held in which, cluster head collects data from the cluster members and encrypts it using Elliptic Curve Cryptography (ECC) method. Finally, encrypted data are dispatched to gateway device. Experimental result shows, the proposed work on Secure Particle Swarm Optimization (SPSO)prompts better performance in following metrics i.e. delay, throughput and energy consumption.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"112 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86758220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Markov-Chain Model Based Study of Distributed Weighted Round-Robin Scheduling for Data Centers 基于马尔可夫链模型的数据中心分布式加权轮循调度研究
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933588
Shweta Jain, Saurabh Jain
Data centers spread around the world at different geographical location with the variation of time and location. This paper offers distributed weighted round robin (DWRR) scheduling algorithm for large-scale distributed data centers using Markov Chain Model. DWRR provides a platform to achieve fairness for all data centers. This proposed algorithm evaluates and optimizes the performance that reduces the operation costs, balances the load effectively, improves fairness and produces maximum throughput of data centers to study the transition behaviour of threads among different data centers.
随着时间和地点的变化,数据中心分布在世界各地的不同地理位置。本文利用马尔可夫链模型提出了大规模分布式数据中心的分布式加权轮询调度算法。DWRR为所有数据中心提供了一个实现公平的平台。该算法从降低运行成本、有效平衡负载、提高公平性和产生数据中心最大吞吐量的角度对性能进行评估和优化,研究线程在不同数据中心之间的迁移行为。
{"title":"A Markov-Chain Model Based Study of Distributed Weighted Round-Robin Scheduling for Data Centers","authors":"Shweta Jain, Saurabh Jain","doi":"10.1109/ICACAT.2018.8933588","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933588","url":null,"abstract":"Data centers spread around the world at different geographical location with the variation of time and location. This paper offers distributed weighted round robin (DWRR) scheduling algorithm for large-scale distributed data centers using Markov Chain Model. DWRR provides a platform to achieve fairness for all data centers. This proposed algorithm evaluates and optimizes the performance that reduces the operation costs, balances the load effectively, improves fairness and produces maximum throughput of data centers to study the transition behaviour of threads among different data centers.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"416 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84902729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advance Malware Analysis Using Static and Dynamic Methodology 使用静态和动态方法的高级恶意软件分析
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933769
Saurabh
As we are becoming more and more dependent on computers the attack vectors on them are increasing day by day. The cyberspace is becoming the battlefield of the 21st century as we are witnessing the increasing potential of a cyber-attack on the critical infrastructure. Malware are the most sophisticated evil code It is designed to damage computer systems without the knowledge of the owner these days malware are made up with special arbitrary to evade detection from the antivirus [1] with a huge potential to damage computer systems. Malware analysis is a process for studying the components and the behavior of malware. For analyzing malware we will use two types of methods static analysis and the dynamic analysis. In the static analysis the malware are examined without running it, whereas in dynamic analysis the malware is analyzed while running it in a virtual and controlled environment. In this research we are going to focus on malware analysis using the static and the dynamic method which will help us to access damage, to know the indicators of compromise and to determine the sophistication level of an intruder and to catch the creator of the malware.
随着我们对计算机的依赖程度越来越高,针对计算机的攻击手段也日益增多。网络空间正在成为21世纪的战场,因为我们正在目睹对关键基础设施进行网络攻击的可能性越来越大。恶意软件是最复杂的邪恶代码,它的目的是破坏计算机系统不知情的所有者,这些天的恶意软件是由特殊的任意逃避检测从反病毒[1]具有巨大的潜力,破坏计算机系统。恶意软件分析是研究恶意软件的组成和行为的过程。为了分析恶意软件,我们将使用两种类型的方法静态分析和动态分析。在静态分析中,恶意软件在不运行的情况下进行检查,而在动态分析中,恶意软件在虚拟和受控环境中运行时进行分析。在这项研究中,我们将专注于使用静态和动态方法进行恶意软件分析,这将有助于我们访问损害,了解折衷指标,确定入侵者的复杂程度,并抓住恶意软件的创建者。
{"title":"Advance Malware Analysis Using Static and Dynamic Methodology","authors":"Saurabh","doi":"10.1109/ICACAT.2018.8933769","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933769","url":null,"abstract":"As we are becoming more and more dependent on computers the attack vectors on them are increasing day by day. The cyberspace is becoming the battlefield of the 21st century as we are witnessing the increasing potential of a cyber-attack on the critical infrastructure. Malware are the most sophisticated evil code It is designed to damage computer systems without the knowledge of the owner these days malware are made up with special arbitrary to evade detection from the antivirus [1] with a huge potential to damage computer systems. Malware analysis is a process for studying the components and the behavior of malware. For analyzing malware we will use two types of methods static analysis and the dynamic analysis. In the static analysis the malware are examined without running it, whereas in dynamic analysis the malware is analyzed while running it in a virtual and controlled environment. In this research we are going to focus on malware analysis using the static and the dynamic method which will help us to access damage, to know the indicators of compromise and to determine the sophistication level of an intruder and to catch the creator of the malware.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"44 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74076110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Enhanced Differential Evolution through Memory Based Mechanism 基于记忆机制的增强差分进化
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933676
Raghav Prasad Parouha
This article is to presents an enhanced DE (differential evolution) through memory based mechanism of PSO (particle swarm optimization). Because of uses the memory concept of PSO, the proposed DE is termed as ‘MBDE (memory based differential evolution)’ where new mutation and crossover operators are introduced. This proposed technique is implemented on four typical benchmark functions available in literature. Experimental results prove that the proposed technique produce faster and more accurate solutions than classical DE, traditional PSO and PSODE (an effective hybrid variant of PSO and DE).
本文提出了一种基于记忆的粒子群优化机制的差分进化算法。由于使用了PSO的记忆概念,所提出的DE被称为“MBDE(基于记忆的差分进化)”,其中引入了新的突变和交叉算子。该技术在文献中提供的四个典型基准函数上实现。实验结果表明,与经典DE、传统PSO和PSODE(一种有效的PSO和DE的混合变体)相比,该方法能够更快、更准确地得到解。
{"title":"An Enhanced Differential Evolution through Memory Based Mechanism","authors":"Raghav Prasad Parouha","doi":"10.1109/ICACAT.2018.8933676","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933676","url":null,"abstract":"This article is to presents an enhanced DE (differential evolution) through memory based mechanism of PSO (particle swarm optimization). Because of uses the memory concept of PSO, the proposed DE is termed as ‘MBDE (memory based differential evolution)’ where new mutation and crossover operators are introduced. This proposed technique is implemented on four typical benchmark functions available in literature. Experimental results prove that the proposed technique produce faster and more accurate solutions than classical DE, traditional PSO and PSODE (an effective hybrid variant of PSO and DE).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89727820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modified Wideband Bow-Tie Antenna with DGS for Wireless Fidelity Range 用于无线保真范围的改进型DGS宽带蝴蝶结天线
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933583
E. Choudhary, S. Sharma, Pranay Yadav
In this research work design a modified wideband bow-tie antenna for Wi-Fi ranges. Now a day’s demand of wireless device increases in rapidly due to require a wide range application antenna. Wide band antennas are those antennas full fill the demand of current generation communication devices. In this presented research work design a bow-tie antenna for 1 to 6 GHz frequency range. In this current generation most of the wireless devices exist in this range. This research work shows Bow-Tie Shape antenna with bow shape slot. In slotted Bow-Tie antenna on patch side, and apply defected ground structure on the ground side. On the ground side apply two right angle cuts with parabolic cut on the ground side. For the enhancement of bandwidth apply CPW feed in the structure and obtain enhanced bandwidth as well as return loss. The proposed bow-tie antenna shows result in the range of 3.0 GHz to 4.87 GHz range and the total bandwidth obtain 1.86 GHz. In this region got two impedance frequency on 3.47 GHz and 4.41 GHz with return loss is -32.45 dB and -34.45 dB. Designed antenna is shows wide band (WB) nature also shows dual band nature. The result of proposed design show good return loss as well as VSWR.
本研究设计了一种适用于Wi-Fi范围的改进型宽带领结天线。由于需要广泛应用的天线,人们对无线设备的需求迅速增加。宽带天线是满足当前通信需求的天线。本课题设计了一种1 ~ 6ghz频率范围的领结天线。在当前这一代,大多数无线设备都在这个范围内。本文研究的是带弓形槽的弓形天线。在贴片侧的开槽领结天线中,并在接地侧采用缺陷接地结构。在地面一侧应用两个直角切割与抛物线切割在地面一侧。为了提高带宽,在结构中加入CPW馈电,得到了增强的带宽和回波损耗。所设计的领结天线的工作范围为3.0 GHz ~ 4.87 GHz,总带宽为1.86 GHz。该区域阻抗频率分别为3.47 GHz和4.41 GHz,回波损耗分别为-32.45 dB和-34.45 dB。所设计的天线既具有宽带特性,又具有双频特性。结果表明,该设计具有良好的回波损耗和驻波比。
{"title":"A Modified Wideband Bow-Tie Antenna with DGS for Wireless Fidelity Range","authors":"E. Choudhary, S. Sharma, Pranay Yadav","doi":"10.1109/ICACAT.2018.8933583","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933583","url":null,"abstract":"In this research work design a modified wideband bow-tie antenna for Wi-Fi ranges. Now a day’s demand of wireless device increases in rapidly due to require a wide range application antenna. Wide band antennas are those antennas full fill the demand of current generation communication devices. In this presented research work design a bow-tie antenna for 1 to 6 GHz frequency range. In this current generation most of the wireless devices exist in this range. This research work shows Bow-Tie Shape antenna with bow shape slot. In slotted Bow-Tie antenna on patch side, and apply defected ground structure on the ground side. On the ground side apply two right angle cuts with parabolic cut on the ground side. For the enhancement of bandwidth apply CPW feed in the structure and obtain enhanced bandwidth as well as return loss. The proposed bow-tie antenna shows result in the range of 3.0 GHz to 4.87 GHz range and the total bandwidth obtain 1.86 GHz. In this region got two impedance frequency on 3.47 GHz and 4.41 GHz with return loss is -32.45 dB and -34.45 dB. Designed antenna is shows wide band (WB) nature also shows dual band nature. The result of proposed design show good return loss as well as VSWR.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"53 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75955105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dark Channel Prior and Global Contrast Stretching based Hybrid Defogging Image Technique 基于暗通道先验和全局对比度拉伸的混合图像去雾技术
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933729
V. Trivedi, P. Shukla, H. Gupta
Since the foggy images undergo from low contrast and resolution due to diffusion of light and poor visibility conditions. So, Fog elimination is extremely preferred in both estimation picture making and computer vision applications. Proposed technique uses a Dark Channel Prior with contrast stretching to remove fog and improve the contrast of fog free image, respectively. Using Dark Channel Prior method one can directly take away the thickness of the haze and recover a high quality haze free image. Contrast Stretching is applied in the resulted image of dark channel prior method to improve the contrast of image. The noise that affect foggy image can also be ease by using the median low pass filter. By using this technique the visual quality and color of the foggy image can be correct effectively. Experiments are conducted on PSNR and RMSE parameters. Experimental Result shows that proposed method contains least average RMSE values and Higher PSNR values among other methods.
由于光的扩散和能见度差,雾天图像的对比度和分辨率较低。因此,雾消除在估计图像制作和计算机视觉应用中都是非常优选的。该技术采用暗通道先验和对比度拉伸分别去除无雾图像的雾和提高无雾图像的对比度。使用暗通道先验方法可以直接去除雾的厚度,恢复高质量的无雾图像。对暗通道先验法得到的图像进行对比度拉伸,提高了图像的对比度。影响雾状图像的噪声也可以通过使用中值低通滤波器来缓解。利用该技术可以有效地保证雾天图像的视觉质量和色彩的准确性。对PSNR和RMSE参数进行了实验。实验结果表明,该方法具有最小的平均RMSE值和较高的PSNR值。
{"title":"Dark Channel Prior and Global Contrast Stretching based Hybrid Defogging Image Technique","authors":"V. Trivedi, P. Shukla, H. Gupta","doi":"10.1109/ICACAT.2018.8933729","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933729","url":null,"abstract":"Since the foggy images undergo from low contrast and resolution due to diffusion of light and poor visibility conditions. So, Fog elimination is extremely preferred in both estimation picture making and computer vision applications. Proposed technique uses a Dark Channel Prior with contrast stretching to remove fog and improve the contrast of fog free image, respectively. Using Dark Channel Prior method one can directly take away the thickness of the haze and recover a high quality haze free image. Contrast Stretching is applied in the resulted image of dark channel prior method to improve the contrast of image. The noise that affect foggy image can also be ease by using the median low pass filter. By using this technique the visual quality and color of the foggy image can be correct effectively. Experiments are conducted on PSNR and RMSE parameters. Experimental Result shows that proposed method contains least average RMSE values and Higher PSNR values among other methods.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91530278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Puzzling Out Emotions: A Deep-Learning Approach to Multimodal Sentiment Analysis 困惑情绪:多模态情感分析的深度学习方法
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933684
V. Shrivastava, Vivek Richhariya, Vineet Richhariya
Emotions steer both active and passive semantics of human interactions. Precise analysis of these emotions is indispensable to ensure a meaningful communication. Humans, in general, express their emotions in various forms. In order to encompass multiple dimensions of these expressions, this paper proposes a triple-layer (facial, verbal, and vocal) sentiment analysis system based on an application of deep-learning concepts. As such, in our experiment, first we separately examined facial expressions, verbal sentiments and vocal characteristics of a speaker and then mapped the individual results to perform a complete multimodal sentiment analysis. As a part of our two-stage facial expression analysis algorithm, we trained three multi-layer perceptrons using backpropagation technique to recognize a number of action units in human faces and seven single layer perceptrons each to identify one of seven basic human emotions (happiness, sadness, surprise, anger, fear, contempt or disgust, and neutral) expressed by the action units. In our vocal analysis module, we extracted important features (such as, jittering, shimmering, etc.) from sampled audio signals using standard formulae and used those features in a Bayesian Classifier to determine the type of sentiment (positive, negative, or neutral) in the voice. In the final segment of our experiment, we trained seven one dimensional convolutional neural networks to analyze verbal sentiments using the results of vocal analysis module as a bias. We were able to obtain results with as high as 91.80% (training) and 88% (testing) accuracies in our vocal and verbal analysis module; whereas, our facial expression analysis module provided results with 93.71% (training) and 92% (testing) accuracies.
情感控制着人类互动的主动和被动语义。准确分析这些情绪对于确保有意义的交流是必不可少的。一般来说,人类以各种形式表达自己的情感。为了涵盖这些表情的多个维度,本文提出了一个基于深度学习概念应用的三层(面部、语言和声音)情感分析系统。因此,在我们的实验中,首先,我们分别检查了说话者的面部表情、言语情绪和声音特征,然后绘制了单个结果,以执行完整的多模态情绪分析。作为两阶段面部表情分析算法的一部分,我们使用反向传播技术训练了三个多层感知器来识别人脸中的多个动作单元,以及七个单层感知器来识别动作单元所表达的七种基本人类情绪(快乐、悲伤、惊讶、愤怒、恐惧、蔑视或厌恶以及中性)中的一种。在我们的声音分析模块中,我们使用标准公式从采样的音频信号中提取重要特征(例如,抖动,闪烁等),并在贝叶斯分类器中使用这些特征来确定声音中的情绪类型(积极,消极或中性)。在实验的最后一部分,我们训练了7个一维卷积神经网络,使用声音分析模块的结果作为偏见来分析语言情感。在我们的语音和言语分析模块中,我们能够获得高达91.80%(训练)和88%(测试)准确率的结果;而我们的面部表情分析模块提供的结果准确率为93.71%(训练)和92%(测试)。
{"title":"Puzzling Out Emotions: A Deep-Learning Approach to Multimodal Sentiment Analysis","authors":"V. Shrivastava, Vivek Richhariya, Vineet Richhariya","doi":"10.1109/ICACAT.2018.8933684","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933684","url":null,"abstract":"Emotions steer both active and passive semantics of human interactions. Precise analysis of these emotions is indispensable to ensure a meaningful communication. Humans, in general, express their emotions in various forms. In order to encompass multiple dimensions of these expressions, this paper proposes a triple-layer (facial, verbal, and vocal) sentiment analysis system based on an application of deep-learning concepts. As such, in our experiment, first we separately examined facial expressions, verbal sentiments and vocal characteristics of a speaker and then mapped the individual results to perform a complete multimodal sentiment analysis. As a part of our two-stage facial expression analysis algorithm, we trained three multi-layer perceptrons using backpropagation technique to recognize a number of action units in human faces and seven single layer perceptrons each to identify one of seven basic human emotions (happiness, sadness, surprise, anger, fear, contempt or disgust, and neutral) expressed by the action units. In our vocal analysis module, we extracted important features (such as, jittering, shimmering, etc.) from sampled audio signals using standard formulae and used those features in a Bayesian Classifier to determine the type of sentiment (positive, negative, or neutral) in the voice. In the final segment of our experiment, we trained seven one dimensional convolutional neural networks to analyze verbal sentiments using the results of vocal analysis module as a bias. We were able to obtain results with as high as 91.80% (training) and 88% (testing) accuracies in our vocal and verbal analysis module; whereas, our facial expression analysis module provided results with 93.71% (training) and 92% (testing) accuracies.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"137 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86771978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Profit Maximization for SaaS Provider using Improved Strategy for Resource Allocation in Cloud Computing Environment 云计算环境下基于改进资源分配策略的SaaS提供商利润最大化
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933652
Nikky Ahuja, P. Kanungo, S. Katiyal
In the present era of cut-throat competition, IT tools and services provided by cloud computing environment plays an important role in the success of any business organization. These services are offered by the SaaS providers, who act as a bridge between organizations and the available resources. These providers focus on the optimum utilization of available resources without violating the quality constraints and maximization of profit for gaining competitive advantage. The present research is an effort to maximize the profit of SaaS providers by devising an algorithm to overcome the limitation of present system. Renting of resources in heterogeneous environment has been suggested as a way to improve earnings. Also, dynamic scheduling and re-scheduling of available resources has been used to improve utilization of available resources. Aim is to control cost and gain customer loyalty. Thus, the objectives of the research are: 1) to design a knowledge-based algorithm for optimal allocation of resources; 2) to design an algorithm for scheduling of resources to maximize profit and control cost and 3) to propose a system model to earn maximum customer satisfaction.
在当今竞争激烈的时代,云计算环境所提供的IT工具和服务对任何企业的成功都起着重要的作用。这些服务由SaaS提供商提供,它们充当组织和可用资源之间的桥梁。这些供应商关注的是在不违反质量约束和利润最大化的前提下,对可用资源的最佳利用,以获得竞争优势。本研究旨在通过设计一种算法来克服现有系统的局限性,从而使SaaS提供商的利润最大化。异质性环境下的资源租赁被认为是提高收益的一种方式。此外,还采用了对可用资源的动态调度和重新调度来提高可用资源的利用率。目的是控制成本,获得客户忠诚度。因此,本文的研究目标是:1)设计一种基于知识的资源优化配置算法;2)设计资源调度算法,实现利润最大化和成本控制;3)提出系统模型,实现客户满意度最大化。
{"title":"Profit Maximization for SaaS Provider using Improved Strategy for Resource Allocation in Cloud Computing Environment","authors":"Nikky Ahuja, P. Kanungo, S. Katiyal","doi":"10.1109/ICACAT.2018.8933652","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933652","url":null,"abstract":"In the present era of cut-throat competition, IT tools and services provided by cloud computing environment plays an important role in the success of any business organization. These services are offered by the SaaS providers, who act as a bridge between organizations and the available resources. These providers focus on the optimum utilization of available resources without violating the quality constraints and maximization of profit for gaining competitive advantage. The present research is an effort to maximize the profit of SaaS providers by devising an algorithm to overcome the limitation of present system. Renting of resources in heterogeneous environment has been suggested as a way to improve earnings. Also, dynamic scheduling and re-scheduling of available resources has been used to improve utilization of available resources. Aim is to control cost and gain customer loyalty. Thus, the objectives of the research are: 1) to design a knowledge-based algorithm for optimal allocation of resources; 2) to design an algorithm for scheduling of resources to maximize profit and control cost and 3) to propose a system model to earn maximum customer satisfaction.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78523626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Content Based Image Retrieval using Statistical Soft Computing and Texture Features 基于统计软计算和纹理特征的高效图像检索
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933696
Mranali Yadav, Manish Rai, Mohit Gangwar
With the invent of low cost cameras the uses of imaging data has exponentially increased in last two decades. Due to availability of huge data on web, demand of efficient image retrieval techniques have also increased. Many feature based local and global methods have been designed in past but they were either too complex or only case specific. In this paper a simple and efficient statistical soft computing and texture based content based retrieval system is proposed and designed. The method is designed to match the quarry and template images based on histogram and their statistical properties as statistical absolute mean difference and 2D normalized correlation of texture images. Method first resizes the quarry and template image to same size and then calculates the statistical parameters in RGB domain and compares the same. In addition Local binary pattern (LBP) is calculated for comparing the local texture feature of the quarry and template images. The performance of our proposed method is tested and evaluated using the standard large image-vary dataset of color images.
随着低成本相机的发明,成像数据的使用在过去二十年中呈指数级增长。由于网络上大量数据的可用性,对高效图像检索技术的需求也随之增加。过去已经设计了许多基于局部和全局特征的方法,但它们要么太复杂,要么只针对具体情况。本文提出并设计了一种简单高效的基于统计软计算和纹理的内容检索系统。该方法利用纹理图像的统计绝对均值差和二维归一化相关等统计特性,利用直方图对图像进行匹配。该方法首先将采石场和模板图像调整为相同大小,然后计算RGB域的统计参数并进行比较。此外,计算了局部二值模式(LBP),用于比较采石场图像和模板图像的局部纹理特征。使用彩色图像的标准大图像变化数据集对我们提出的方法的性能进行了测试和评估。
{"title":"An Efficient Content Based Image Retrieval using Statistical Soft Computing and Texture Features","authors":"Mranali Yadav, Manish Rai, Mohit Gangwar","doi":"10.1109/ICACAT.2018.8933696","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933696","url":null,"abstract":"With the invent of low cost cameras the uses of imaging data has exponentially increased in last two decades. Due to availability of huge data on web, demand of efficient image retrieval techniques have also increased. Many feature based local and global methods have been designed in past but they were either too complex or only case specific. In this paper a simple and efficient statistical soft computing and texture based content based retrieval system is proposed and designed. The method is designed to match the quarry and template images based on histogram and their statistical properties as statistical absolute mean difference and 2D normalized correlation of texture images. Method first resizes the quarry and template image to same size and then calculates the statistical parameters in RGB domain and compares the same. In addition Local binary pattern (LBP) is calculated for comparing the local texture feature of the quarry and template images. The performance of our proposed method is tested and evaluated using the standard large image-vary dataset of color images.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"75 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79495514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Advanced Computation and Telecommunication (ICACAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1