首页 > 最新文献

2018 International Conference on Advanced Computation and Telecommunication (ICACAT)最新文献

英文 中文
Transients, FFT analysis and Physical design of multi stage Ring Oscillators using 0.3µm CMOS technology 采用0.3µm CMOS技术的多级环形振荡器的瞬态、FFT分析和物理设计
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933668
Pooja Gupta, Sanket Choudhary, Ayoush Johari
Ring Oscillators are basic blocks of key digital modules like PLL, microprocessor or any other time related and memory driven circuits. The purpose of this paper is to compare transients and analyze FFT of multistage ring oscillators and physical design of the same. Additional DRC and NCC checks are applied on the design using 300 nm process technologies. Ring oscillator design presented is driven and controlled by a voltage bias that can be varied by SPICE code. Here a VCO based design is presented that had less floor plan area, lesser power dissipation and consumption and also providing better noise profile which is helpful and applicable for wideband analog mixed signal circuits. Ring Oscillators in this paper, 11 stages, 21 stages and 51 stages are presented. and suitable transients and FFT is done on the design. The paper will also consider a variety of design considerations which are SCMOS cell designs, supply or biasing circuitries and tool based implementation and SPICE based simulations of the multistage oscillator design.
环形振荡器是关键数字模块的基本模块,如锁相环,微处理器或任何其他时间相关和内存驱动电路。本文的目的是比较瞬态,分析多级环形振荡器的FFT和物理设计。使用300纳米工艺技术的设计应用了额外的DRC和NCC检查。环形振荡器设计是由一个电压偏置驱动和控制,可以通过SPICE代码改变。本文提出了一种基于压控振荡器的设计方案,该方案占地面积小,功耗低,噪声分布好,适用于宽带模拟混合信号电路。本文提出了11级、21级和51级环振。并在设计上进行了适当的瞬态和FFT处理。本文还将考虑各种设计考虑因素,包括SCMOS单元设计,电源或偏置电路以及基于工具的实现和基于SPICE的多级振荡器设计模拟。
{"title":"Transients, FFT analysis and Physical design of multi stage Ring Oscillators using 0.3µm CMOS technology","authors":"Pooja Gupta, Sanket Choudhary, Ayoush Johari","doi":"10.1109/ICACAT.2018.8933668","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933668","url":null,"abstract":"Ring Oscillators are basic blocks of key digital modules like PLL, microprocessor or any other time related and memory driven circuits. The purpose of this paper is to compare transients and analyze FFT of multistage ring oscillators and physical design of the same. Additional DRC and NCC checks are applied on the design using 300 nm process technologies. Ring oscillator design presented is driven and controlled by a voltage bias that can be varied by SPICE code. Here a VCO based design is presented that had less floor plan area, lesser power dissipation and consumption and also providing better noise profile which is helpful and applicable for wideband analog mixed signal circuits. Ring Oscillators in this paper, 11 stages, 21 stages and 51 stages are presented. and suitable transients and FFT is done on the design. The paper will also consider a variety of design considerations which are SCMOS cell designs, supply or biasing circuitries and tool based implementation and SPICE based simulations of the multistage oscillator design.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"48 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85659369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Aggregating and Searching frame in Video Using Semantic Analysis 基于语义分析的视频帧聚合与搜索
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933810
A. Gadicha, M. Sarode, V. Thakare
The idea of Video content reclamation is a youthful field that has its genetics grounded forebears instinctive intelligence, numerical signal rectification, statistics, natural language understanding, If researchers are concentrating all these fast growing fields so none of these parental fields alone antiquated able to directly solve the retrieval problem. In this paper shows the path towards a step by step mechanism of CBVR i.e. analysis of entire video, video segmentation, key frames mining, feature extraction mining for retrieving the video from large video datasets. The proposed system inclination focuses on performing key frame mining using adaptive thresholding algorithm and canny mechanism for feature extraction purpose. In order to legalize this claim, content based video reclamation systems were furnished using color histogram, features extraction and different approaches are applied for the supervision of the semantic temperament of each frame in the video.
视频内容回收的想法是一个年轻的领域,它有其遗传学基础的祖先本能智力,数字信号校正,统计学,自然语言理解,如果研究人员集中所有这些快速发展的领域,那么没有一个原始的领域能够直接解决检索问题。本文给出了CBVR逐步实现的机制,即整个视频分析、视频分割、关键帧挖掘、从大型视频数据集中检索视频的特征提取挖掘。提出的系统倾向于使用自适应阈值算法和canny机制进行关键帧挖掘,以达到特征提取的目的。为了使这种说法合法化,基于内容的视频回收系统使用颜色直方图,特征提取和不同的方法来监督视频中每帧的语义气质。
{"title":"Aggregating and Searching frame in Video Using Semantic Analysis","authors":"A. Gadicha, M. Sarode, V. Thakare","doi":"10.1109/ICACAT.2018.8933810","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933810","url":null,"abstract":"The idea of Video content reclamation is a youthful field that has its genetics grounded forebears instinctive intelligence, numerical signal rectification, statistics, natural language understanding, If researchers are concentrating all these fast growing fields so none of these parental fields alone antiquated able to directly solve the retrieval problem. In this paper shows the path towards a step by step mechanism of CBVR i.e. analysis of entire video, video segmentation, key frames mining, feature extraction mining for retrieving the video from large video datasets. The proposed system inclination focuses on performing key frame mining using adaptive thresholding algorithm and canny mechanism for feature extraction purpose. In order to legalize this claim, content based video reclamation systems were furnished using color histogram, features extraction and different approaches are applied for the supervision of the semantic temperament of each frame in the video.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"50 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85707046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Basic NOSQL Injection Analysis And Detection On MongoDB MongoDB基础NOSQL注入分析与检测
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933707
Vrinda Sachdeva, Sachin Gupta
In recent years the usage of Information technology has unexpectedly increasing resulting in huge data generation. Many companies have taken initiative to use no relational database for managing the data. It has powerful function to manage big data. Huge amount of data has been generated every day. It possibly results in malicious information into the database. No sql database gaining popularity due to its powerful features like scalability, flexibility, faster data access and availability. In this paper, we will analyze the injection on NOSQL database. We also propose defense method by using php and java script. MongoDB is one of the most secure and powerful no sql database. In this paper we demonstrate, basic no sql injection attack and propose defense method to secure the no sql database. In this way, no sql database programmer be aware of the basic no sql injection attack mechanism and create a more secure database to store huge data.
近年来,信息技术的使用出乎意料地增加,产生了巨大的数据。许多公司已经采取主动,不使用关系数据库来管理数据。具有强大的大数据管理功能。每天都会产生大量的数据。这可能会导致恶意信息进入数据库。没有sql数据库因为其强大的特性(如可伸缩性、灵活性、更快的数据访问和可用性)而受到欢迎。本文将对NOSQL数据库的注入进行分析。并提出了利用php和java脚本进行防御的方法。MongoDB是最安全、最强大的非sql数据库之一。本文演示了基本的无sql注入攻击,并提出了保护无sql数据库安全的防御方法。这样,无sql数据库程序员就可以意识到基本的无sql注入攻击机制,从而创建一个更安全的数据库来存储海量数据。
{"title":"Basic NOSQL Injection Analysis And Detection On MongoDB","authors":"Vrinda Sachdeva, Sachin Gupta","doi":"10.1109/ICACAT.2018.8933707","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933707","url":null,"abstract":"In recent years the usage of Information technology has unexpectedly increasing resulting in huge data generation. Many companies have taken initiative to use no relational database for managing the data. It has powerful function to manage big data. Huge amount of data has been generated every day. It possibly results in malicious information into the database. No sql database gaining popularity due to its powerful features like scalability, flexibility, faster data access and availability. In this paper, we will analyze the injection on NOSQL database. We also propose defense method by using php and java script. MongoDB is one of the most secure and powerful no sql database. In this paper we demonstrate, basic no sql injection attack and propose defense method to secure the no sql database. In this way, no sql database programmer be aware of the basic no sql injection attack mechanism and create a more secure database to store huge data.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"66 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76472284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Animal Identification 动物识别
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933624
Jayati Bodkhe, Harshita Dighe, Aparna R. Gupta, Litesh Bopche
Animal identification has become necessary in livestock management at global level. It is one of the three pillars of trace ability, along with premises identification and movement. RFID tags transmit animal identification information using radio waves. This paper contributes and illustrates the different methods of animal identification focusing on radio frequency identification and how it works.
动物鉴定在全球一级的牲畜管理中已成为必要。它是追踪能力的三大支柱之一,另外两个是场所识别和移动。RFID标签使用无线电波传输动物识别信息。本文以射频识别为重点,阐述了动物识别的不同方法及其工作原理。
{"title":"Animal Identification","authors":"Jayati Bodkhe, Harshita Dighe, Aparna R. Gupta, Litesh Bopche","doi":"10.1109/ICACAT.2018.8933624","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933624","url":null,"abstract":"Animal identification has become necessary in livestock management at global level. It is one of the three pillars of trace ability, along with premises identification and movement. RFID tags transmit animal identification information using radio waves. This paper contributes and illustrates the different methods of animal identification focusing on radio frequency identification and how it works.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"83 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76336970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Customer Churn Prediction In Telecom Sector Using Various Machine Learning Techniques 利用各种机器学习技术预测电信行业的客户流失预测
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933783
A. Gaur, R. Dubey
Customer churn analysis and prediction in telecom sector is an issue now a days because it’s very important for telecommunication industries to analyze behaviors of various customer to predict which customers are about to leave the subscription from telecom company. So data mining techniques and algorithm plays an important role for companies in today’s commercial conditions because gaining a new customer’s cost is more than retaining the existing ones. In this paper we can focuses on various machine learning techniques for predicting customer churn through which we can build the classification models such as Logistic Regression, SVM, Random Forest and Gradient boosted tree and also compare the performance of these models.
电信行业的客户流失分析与预测是当今的一个问题,因为分析各种客户的行为,预测哪些客户即将离开电信公司的订阅,对电信行业来说非常重要。因此,在当今的商业环境下,数据挖掘技术和算法对公司来说起着重要的作用,因为获得新客户的成本超过了保留现有客户的成本。在本文中,我们可以专注于预测客户流失的各种机器学习技术,通过这些技术我们可以建立分类模型,如逻辑回归,支持向量机,随机森林和梯度提升树,并比较这些模型的性能。
{"title":"Predicting Customer Churn Prediction In Telecom Sector Using Various Machine Learning Techniques","authors":"A. Gaur, R. Dubey","doi":"10.1109/ICACAT.2018.8933783","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933783","url":null,"abstract":"Customer churn analysis and prediction in telecom sector is an issue now a days because it’s very important for telecommunication industries to analyze behaviors of various customer to predict which customers are about to leave the subscription from telecom company. So data mining techniques and algorithm plays an important role for companies in today’s commercial conditions because gaining a new customer’s cost is more than retaining the existing ones. In this paper we can focuses on various machine learning techniques for predicting customer churn through which we can build the classification models such as Logistic Regression, SVM, Random Forest and Gradient boosted tree and also compare the performance of these models.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"191 1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78956372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An Efficient Algorithmic 3-SAT Formulation for Sudoku Puzzle using Graph Coloring 一种利用图着色的数独有效的3-SAT算法公式
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933664
Deepika Rai, N. Chaudhari, M. Ingle
Graph k-Coloring Problem (GKCP) is a renowned NP Complete Problem (NPC) that has been received noteworthy contribution in diverse research areas. One of the important applications of GKCP is the Sudoku puzzle which is also an NPC. We encoded the problem of solving Sudoku puzzle of size (n$times$n) into GKCP firstly. Further, we reduced GKCP into 3-SAT clauses to obtain the solution of Sudoku puzzle (n$times$ n). Encoding of Sudoku puzzle to 3-SAT clauses straightforwardly leads to large number of clauses. In this way, we developed an algorithm ${SP}_{2}mathrm{G}_{2}3$ SAT on the basis of 3-SAT formulation of Sudoku puzzle using GKCP. This algorithm generates $[(n^{2}/2)^{star}(3n^{2}+(1-2sqrt{n})^{star}n-4)+m]3$-SAT clauses that can be solved by SAT solver to obtain the solution of Sudoku puzzle $(ntimes n)$. 3-SAT reduction of Sudoku puzzle using GKCP provides an efficient way to acquire the solution of Sudoku puzzle of size $(ntimes n)$ as it generates fewer clauses than earlier approach.
图k-着色问题(Graph k-Coloring Problem, GKCP)是一个著名的NP完全问题(NP Complete Problem, NPC),在各个研究领域都有显著的贡献。GKCP的一个重要应用是数独谜题,它也是一个NPC。我们首先将求解大小为(n$ × $n)的数独问题编码到GKCP中。进一步,我们将GKCP简化为3-SAT子句,得到数独题的解(n$乘以$ n)。将数独题直接编码为3-SAT子句会导致大量子句。在此基础上,我们利用GKCP开发了一种算法${SP}_{2} maththrm {G}_{2}3$ SAT。该算法生成$[(n^{2}/2)^{star}(3n^{2}+(1-2sqrt{n})^{star}n-4)+m]3$-SAT子句,通过SAT求解器求解得到数独题$(n乘以n)$的解。使用GKCP进行数独的3-SAT约简提供了一种获得大小为$(n * n)$的数独解的有效方法,因为它产生的子句比以前的方法少。
{"title":"An Efficient Algorithmic 3-SAT Formulation for Sudoku Puzzle using Graph Coloring","authors":"Deepika Rai, N. Chaudhari, M. Ingle","doi":"10.1109/ICACAT.2018.8933664","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933664","url":null,"abstract":"Graph k-Coloring Problem (GKCP) is a renowned NP Complete Problem (NPC) that has been received noteworthy contribution in diverse research areas. One of the important applications of GKCP is the Sudoku puzzle which is also an NPC. We encoded the problem of solving Sudoku puzzle of size (n$times$n) into GKCP firstly. Further, we reduced GKCP into 3-SAT clauses to obtain the solution of Sudoku puzzle (n$times$ n). Encoding of Sudoku puzzle to 3-SAT clauses straightforwardly leads to large number of clauses. In this way, we developed an algorithm ${SP}_{2}mathrm{G}_{2}3$ SAT on the basis of 3-SAT formulation of Sudoku puzzle using GKCP. This algorithm generates $[(n^{2}/2)^{star}(3n^{2}+(1-2sqrt{n})^{star}n-4)+m]3$-SAT clauses that can be solved by SAT solver to obtain the solution of Sudoku puzzle $(ntimes n)$. 3-SAT reduction of Sudoku puzzle using GKCP provides an efficient way to acquire the solution of Sudoku puzzle of size $(ntimes n)$ as it generates fewer clauses than earlier approach.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"40 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80506953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fire Recognition Based on Sensor node and Feature of Video Smoke 基于传感器节点和视频烟雾特征的火灾识别
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933629
S. Vijayalakshmi, S. Muruganand
Gaussian mixed model, LK optical flow method and background subtraction from foreground method are used to extract the fire and smoke region in foreground of video image. Multi feature of fire characteristics are used to extract the information. Colour feature of suspected region are extracted according to the colour model RGB and HSI spaces. Background blur feature is extracted using two dimensional discrete wavelet transform. If smoke appears in scene, the contour edge of the background would become blurry. The motion direction feature is extracted using LK optical flow method and gaussion mixed model. The DHT 11 digital temperature - humidity sensor in sensor node is used to extract temperature and humidity values for measurement and TIMSP430 micro controller for processing the information. The video node and sensor node extracted information are combined to detect the possibility of fire in the area during worst season conditions. By this method, the accuracy of fire and smoke detection is improved even in the worst environmental condition such as rainy weather. From the simulated and experimental results, the proposed method improves the accuracy and detection rate. Combination of sensor output and video output give excellent value in finding smoke or fire from videos. They reduces false detection rate of detecting smoke from non-smoke videos. It can be used in outdoor large environment.
采用高斯混合模型、LK光流法和前景背景减去法提取视频图像前景中的火焰和烟雾区域。利用火灾特征的多种特征提取信息。根据颜色模型RGB和HSI空间提取可疑区域的颜色特征。利用二维离散小波变换提取背景模糊特征。如果烟雾出现在场景中,背景的轮廓边缘会变得模糊。采用LK光流法和高斯混合模型提取运动方向特征。传感器节点采用DHT 11数字温湿度传感器提取温湿度值进行测量,并用TIMSP430单片机对数据进行处理。将视频节点和传感器节点提取的信息相结合,在最恶劣的季节条件下检测该地区发生火灾的可能性。通过这种方法,即使在恶劣的环境条件下,如阴雨天气,也能提高火灾和烟雾探测的准确性。仿真和实验结果表明,该方法提高了检测精度和检测率。传感器输出和视频输出的结合为从视频中发现烟雾或火灾提供了极好的价值。降低了从无烟雾视频中检测烟雾的误检率。可在室外大环境下使用。
{"title":"Fire Recognition Based on Sensor node and Feature of Video Smoke","authors":"S. Vijayalakshmi, S. Muruganand","doi":"10.1109/ICACAT.2018.8933629","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933629","url":null,"abstract":"Gaussian mixed model, LK optical flow method and background subtraction from foreground method are used to extract the fire and smoke region in foreground of video image. Multi feature of fire characteristics are used to extract the information. Colour feature of suspected region are extracted according to the colour model RGB and HSI spaces. Background blur feature is extracted using two dimensional discrete wavelet transform. If smoke appears in scene, the contour edge of the background would become blurry. The motion direction feature is extracted using LK optical flow method and gaussion mixed model. The DHT 11 digital temperature - humidity sensor in sensor node is used to extract temperature and humidity values for measurement and TIMSP430 micro controller for processing the information. The video node and sensor node extracted information are combined to detect the possibility of fire in the area during worst season conditions. By this method, the accuracy of fire and smoke detection is improved even in the worst environmental condition such as rainy weather. From the simulated and experimental results, the proposed method improves the accuracy and detection rate. Combination of sensor output and video output give excellent value in finding smoke or fire from videos. They reduces false detection rate of detecting smoke from non-smoke videos. It can be used in outdoor large environment.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1021 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74140080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting the occurrence of Parkinson’s Disease using various Classification Models 使用各种分类模型预测帕金森病的发生
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933579
Shreerag Marar, Debabrata Swain, Vivek Hiwarkar, Nikhil Motwani, A. Awari
Parkinson is a disease that directly degrades the functioning of central nervous system, more specifically the motor system. If diagnosed in a later stage, this disease may become incurable. Hence, it is necessary to diagnose the disease at an early stage. Voice frequency plays a vital role in the prediction of Parkinson disease. This paper presents the study for the diagnosis of Parkinson disease using various machine learning algorithms through the amount of voice data attained from UCI repository [1]. The voice dataset consists of voice frequencies of 31 people with early-stage Parkinson's disease recruited to a six-month trial of a telemonitoring device for remote symptom progression monitoring. Various machine learning algorithms were applied on the dataset and among them ANN has shown highest accuracy (94.87%). Random Forest which is a Classification algorithm has shown good accuracy (87.17%) while Naïve Bayes has shown least accuracy (71.79%). We have summarized all the results using the confusion matrix.
帕金森氏症是一种直接降低中枢神经系统功能的疾病,更具体地说,是运动系统。如果在晚期诊断出来,这种疾病可能会变得无法治愈。因此,有必要在早期诊断这种疾病。语音频率在帕金森病的预测中起着至关重要的作用。本文通过从UCI存储库中获得的大量语音数据,介绍了使用各种机器学习算法诊断帕金森病的研究[1]。语音数据集包括31名早期帕金森氏症患者的语音频率,这些患者被招募参加为期六个月的远程监测设备试验,用于远程监测症状进展。在数据集上应用了各种机器学习算法,其中ANN的准确率最高(94.87%)。Random Forest是一种分类算法,准确率较高(87.17%),而Naïve Bayes准确率最低(71.79%)。我们用混淆矩阵总结了所有的结果。
{"title":"Predicting the occurrence of Parkinson’s Disease using various Classification Models","authors":"Shreerag Marar, Debabrata Swain, Vivek Hiwarkar, Nikhil Motwani, A. Awari","doi":"10.1109/ICACAT.2018.8933579","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933579","url":null,"abstract":"Parkinson is a disease that directly degrades the functioning of central nervous system, more specifically the motor system. If diagnosed in a later stage, this disease may become incurable. Hence, it is necessary to diagnose the disease at an early stage. Voice frequency plays a vital role in the prediction of Parkinson disease. This paper presents the study for the diagnosis of Parkinson disease using various machine learning algorithms through the amount of voice data attained from UCI repository [1]. The voice dataset consists of voice frequencies of 31 people with early-stage Parkinson's disease recruited to a six-month trial of a telemonitoring device for remote symptom progression monitoring. Various machine learning algorithms were applied on the dataset and among them ANN has shown highest accuracy (94.87%). Random Forest which is a Classification algorithm has shown good accuracy (87.17%) while Naïve Bayes has shown least accuracy (71.79%). We have summarized all the results using the confusion matrix.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"167 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85175638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficiently reducing the size of web log data using Fuzzy Dynamic Approach 利用模糊动态方法有效地减小了web日志数据的大小
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933739
J. Mehra, R. S. Thakur
WWW is a huge repository of information which is growing exponentially. More and more people visit various web sites and search engines to find relevant information. To provide the huge information is not the problem, but the problem is that day by day more and more people having different needs and requirements search through this huge WWW and get lost in complex web structures and hence miss their inquiry goals. Web personalization can be the solution to this problem. Web personalization is the process where web site contents are tailored as per the needs of a user. For the personalization, the interesting access patterns can be mined from web usage data. In many applications of web personalization, dynamic recommendations of items are made based on user's browsing behavior and his/her profile. The regular explosion of e-Commerce, there is strong competition amongst companies and other sectors to be a focus for the customers. Web server analysis is very difficult to find out the web user behavior for any organization. It is useful for future web site improvement and design. In this paper proposed a Fuzzy dynamic approach for finding the web user session clusters from web log data. Direct elimination of the small-sized estimated sessions may bring about loss of an essential measure of data specially when small session large in number. This proposes a "Fuzzy Dynamic" approach to deal with manage this issue.
WWW是一个巨大的信息库,其增长呈指数级增长。越来越多的人访问各种网站和搜索引擎来查找相关信息。提供海量的信息不是问题,但问题是越来越多的人有不同的需求和需求在这个庞大的WWW中搜索,迷失在复杂的网络结构中,从而错过了他们的查询目标。Web个性化可以解决这个问题。网络个性化是指根据用户的需要对网站内容进行定制的过程。为了实现个性化,可以从web使用数据中挖掘出有趣的访问模式。在许多网页个性化的应用中,都是根据用户的浏览行为和个人资料进行动态推荐。随着电子商务的迅猛发展,企业和其他行业之间的竞争日益激烈,成为客户关注的焦点。Web服务器分析对于任何组织来说都很难发现Web用户的行为。这对以后的网站改进和设计是有用的。本文提出了一种从web日志数据中寻找web用户会话聚类的模糊动态方法。直接消除小型估计会话可能会导致重要数据度量的丢失,特别是当小型会话数量较多时。提出了一种“模糊动态”方法来处理和管理这一问题。
{"title":"Efficiently reducing the size of web log data using Fuzzy Dynamic Approach","authors":"J. Mehra, R. S. Thakur","doi":"10.1109/ICACAT.2018.8933739","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933739","url":null,"abstract":"WWW is a huge repository of information which is growing exponentially. More and more people visit various web sites and search engines to find relevant information. To provide the huge information is not the problem, but the problem is that day by day more and more people having different needs and requirements search through this huge WWW and get lost in complex web structures and hence miss their inquiry goals. Web personalization can be the solution to this problem. Web personalization is the process where web site contents are tailored as per the needs of a user. For the personalization, the interesting access patterns can be mined from web usage data. In many applications of web personalization, dynamic recommendations of items are made based on user's browsing behavior and his/her profile. The regular explosion of e-Commerce, there is strong competition amongst companies and other sectors to be a focus for the customers. Web server analysis is very difficult to find out the web user behavior for any organization. It is useful for future web site improvement and design. In this paper proposed a Fuzzy dynamic approach for finding the web user session clusters from web log data. Direct elimination of the small-sized estimated sessions may bring about loss of an essential measure of data specially when small session large in number. This proposes a \"Fuzzy Dynamic\" approach to deal with manage this issue.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"26 2 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80384923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Framework for Preprocessing and Feature Extraction from Weblogs for Identification of HTTP Flood Request Attacks 基于weblog预处理和特征提取的HTTP Flood攻击识别框架
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933587
Dilip Singh Sisodia, Namrata Verma
The HTTP flood attacks are carried out through enormous HTTP requests generated by automated software agents within a short period. The application layer is more vulnerable to HTTP flood attacks and exhausted computing and communication resources of the web server to disrupt the different web services. All HTTP requests are stored at the server as a web log file. However, malicious automated software agents camouflage their behavior on the web server logs and pose a great challenge to detect their HTTP requests. It is assumed that navigational behavior of actual visitors and automated software agents are fundamentally different. In this paper, a framework for weblog preprocessing and extracting various predefined features from raw web server logs is implemented. The most effective features are identified which are potentially useful in differentiating legitimate users and automated software agents. The sessionized HTTP feature vectors are also labeled as an actual visitor or possible web robots. The experiments are performed on raw weblogs of a commercial web portal.
HTTP flood攻击是通过自动化软件代理在短时间内生成大量HTTP请求来实现的。应用层更容易受到HTTP flood攻击,耗尽web服务器的计算和通信资源,使不同的web服务中断。所有HTTP请求都以web日志文件的形式存储在服务器上。然而,恶意的自动化软件代理会在web服务器日志上伪装它们的行为,这对检测它们的HTTP请求构成了很大的挑战。假设实际访问者的导航行为和自动软件代理是根本不同的。本文实现了一个从原始web服务器日志中预处理和提取各种预定义特征的框架。最有效的特征识别潜在有用的区分合法用户和自动化的软件代理。会话化的HTTP特征向量也被标记为实际访问者或可能的web机器人。实验是在一个商业门户网站的原始博客上进行的。
{"title":"Framework for Preprocessing and Feature Extraction from Weblogs for Identification of HTTP Flood Request Attacks","authors":"Dilip Singh Sisodia, Namrata Verma","doi":"10.1109/ICACAT.2018.8933587","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933587","url":null,"abstract":"The HTTP flood attacks are carried out through enormous HTTP requests generated by automated software agents within a short period. The application layer is more vulnerable to HTTP flood attacks and exhausted computing and communication resources of the web server to disrupt the different web services. All HTTP requests are stored at the server as a web log file. However, malicious automated software agents camouflage their behavior on the web server logs and pose a great challenge to detect their HTTP requests. It is assumed that navigational behavior of actual visitors and automated software agents are fundamentally different. In this paper, a framework for weblog preprocessing and extracting various predefined features from raw web server logs is implemented. The most effective features are identified which are potentially useful in differentiating legitimate users and automated software agents. The sessionized HTTP feature vectors are also labeled as an actual visitor or possible web robots. The experiments are performed on raw weblogs of a commercial web portal.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"64 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84008185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 International Conference on Advanced Computation and Telecommunication (ICACAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1