首页 > 最新文献

2018 Second International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Evaluation and Customization of Community Detection Algorithms in Large Social Networks 大型社交网络中社区检测算法的评价与定制
Sanjay Kumar, Stuti Pandey, R. Gupta
Nowadays, social, natural, technological and information systems can be exhibited by complex networks having millions of nodes interconnected to each other. The extraction of comprehensive information from these massive networks call for computationally efficient methods. A promising approach to accomplish this task is to disintegrate the network into sub-units or communities and then using these identified communities to uncover relevant information. Thus, identifying communities in large scale networks plays a pivotal role in several scientific domains. In this paper, we extensively evaluate the functioning of two known algorithms and propose an improvement over one of them, in order to overcome its shortcomings to some extent, for optimal identification of community structure. We also present experimental results and evidences indicating that both the established algorithms, as well as our suggested approach, when applied to large social network datasets yields different results in terms of goodness and performance.
如今,社会、自然、技术和信息系统可以通过具有数百万个节点相互连接的复杂网络来展示。从这些庞大的网络中提取综合信息需要高效的计算方法。完成这项任务的一个很有前途的方法是将网络分解为子单元或社区,然后使用这些已识别的社区来发现相关信息。因此,在大规模网络中识别社区在几个科学领域起着关键作用。在本文中,我们广泛地评估了两种已知算法的功能,并对其中一种算法提出了改进,以便在一定程度上克服其缺点,以实现最优的社区结构识别。我们还提供了实验结果和证据,表明所建立的算法以及我们建议的方法在应用于大型社交网络数据集时,在良度和性能方面产生了不同的结果。
{"title":"Evaluation and Customization of Community Detection Algorithms in Large Social Networks","authors":"Sanjay Kumar, Stuti Pandey, R. Gupta","doi":"10.1109/ICCMC.2018.8487507","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487507","url":null,"abstract":"Nowadays, social, natural, technological and information systems can be exhibited by complex networks having millions of nodes interconnected to each other. The extraction of comprehensive information from these massive networks call for computationally efficient methods. A promising approach to accomplish this task is to disintegrate the network into sub-units or communities and then using these identified communities to uncover relevant information. Thus, identifying communities in large scale networks plays a pivotal role in several scientific domains. In this paper, we extensively evaluate the functioning of two known algorithms and propose an improvement over one of them, in order to overcome its shortcomings to some extent, for optimal identification of community structure. We also present experimental results and evidences indicating that both the established algorithms, as well as our suggested approach, when applied to large social network datasets yields different results in terms of goodness and performance.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"30 1","pages":"1036-1040"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90977479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IOT Based Railway Disaster Management System 基于物联网的铁路灾害管理系统
B. Khivsara, P. Gawande, Mayuri Dhanwate, Kishor R. Sonawane, Trupti N. Chaudhari
Now a days train accidents is a major issue in all over the world due to increase in rash driving. Accidents are responsible for a large number of collision, derailment, fire in trains, level crossing accident each year. In some cases deaths are caused due to unavailability of immediate medical facility to the injured passengers which can be avoided with the help of an automated system that will reduce the time consumed in activities such as taking the victim to the nearest hospital completing formalities such as filling forms and also involving police in case of major crashes. So the proposed system is using motion (accelerometer) and smoke/fire detection sensor based on IOT application integrated with android (GSM technology) to send information about train accident location to local citizens and administration using google map/GSM location system.
如今,由于鲁莽驾驶的增加,火车事故成为世界各地的一个主要问题。事故每年造成大量的碰撞、脱轨、火车火灾、平交道口事故。在某些情况下,死亡是由于受伤乘客无法立即获得医疗设施而造成的,这可以在自动化系统的帮助下避免,该系统将减少将受害者送到最近的医院完成填写表格等手续以及在发生重大事故时涉及警察等活动所消耗的时间。因此,拟议的系统使用基于物联网应用的运动(加速度计)和烟雾/火灾探测传感器,与android (GSM技术)集成,通过谷歌地图/GSM定位系统向当地公民和管理部门发送有关火车事故位置的信息。
{"title":"IOT Based Railway Disaster Management System","authors":"B. Khivsara, P. Gawande, Mayuri Dhanwate, Kishor R. Sonawane, Trupti N. Chaudhari","doi":"10.1109/ICCMC.2018.8487802","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487802","url":null,"abstract":"Now a days train accidents is a major issue in all over the world due to increase in rash driving. Accidents are responsible for a large number of collision, derailment, fire in trains, level crossing accident each year. In some cases deaths are caused due to unavailability of immediate medical facility to the injured passengers which can be avoided with the help of an automated system that will reduce the time consumed in activities such as taking the victim to the nearest hospital completing formalities such as filling forms and also involving police in case of major crashes. So the proposed system is using motion (accelerometer) and smoke/fire detection sensor based on IOT application integrated with android (GSM technology) to send information about train accident location to local citizens and administration using google map/GSM location system.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"78 1","pages":"680-685"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90124039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Activity Detection from Wearable Electromyogram Sensors using Hidden Markov Model 基于隐马尔可夫模型的可穿戴式肌电传感器活动检测
Rinki Gupta, Karush Suri
Surface electromyography (sEMG) has gained significant importance during recent advancements in consumer electronics for healthcare systems, gesture analysis and recognition and sign language communication. For such a system, it is imperative to determine the regions of activity in a continuously recorded sEMG signal. The proposed work provides a novel activity detection approach based on Hidden Markov Models (HMM) using sEMG signals recorded when various hand gestures are performed. Detection procedure is designed based on a probabilistic outlook by making use of mathematical models. The requirement of a threshold for activity detection is obviated making it subject and activity independent. Correctness of the predicted outputs is asserted by classifying the signal segments around the detected transition regions as activity or rest. Classified outputs are compared with the transition regions in a stimulus given to the subject to perform the activity. The activity onsets are detected with an average of 96.25% accuracy whereas the activity termination regions with an average of 87.5% accuracy with the considered set of six activities and four subjects.
表面肌电图(sEMG)在最近的医疗保健系统,手势分析和识别以及手语交流的消费电子领域取得了重大进展。对于这样一个系统,必须确定连续记录的表面肌电信号中的活动区域。提出的工作提供了一种基于隐马尔可夫模型(HMM)的新颖活动检测方法,该方法使用各种手势时记录的表面肌电信号。利用数学模型,设计了基于概率观的检测程序。消除了对活动检测阈值的要求,使其独立于主体和活动。通过将检测到的过渡区域周围的信号段分类为活动或休息来断言预测输出的正确性。分类输出与给定给受试者执行活动的刺激中的过渡区域进行比较。在考虑的6个活动和4个受试者的集合中,检测活动开始区域的平均准确率为96.25%,而检测活动终止区域的平均准确率为87.5%。
{"title":"Activity Detection from Wearable Electromyogram Sensors using Hidden Markov Model","authors":"Rinki Gupta, Karush Suri","doi":"10.1109/ICCMC.2018.8488070","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488070","url":null,"abstract":"Surface electromyography (sEMG) has gained significant importance during recent advancements in consumer electronics for healthcare systems, gesture analysis and recognition and sign language communication. For such a system, it is imperative to determine the regions of activity in a continuously recorded sEMG signal. The proposed work provides a novel activity detection approach based on Hidden Markov Models (HMM) using sEMG signals recorded when various hand gestures are performed. Detection procedure is designed based on a probabilistic outlook by making use of mathematical models. The requirement of a threshold for activity detection is obviated making it subject and activity independent. Correctness of the predicted outputs is asserted by classifying the signal segments around the detected transition regions as activity or rest. Classified outputs are compared with the transition regions in a stimulus given to the subject to perform the activity. The activity onsets are detected with an average of 96.25% accuracy whereas the activity termination regions with an average of 87.5% accuracy with the considered set of six activities and four subjects.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"340-345"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90152766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations 选定机构/组织的自动化和云网络安全改进
Tilahun Ayalew Tareke, Sujoy Datta
Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.
自动化和云网络安全的进步彻底改变了网络犯罪检测和补救方法的方式。如今,即使是在秒、微秒和纳秒等时间单位的一小部分,技术进步也在增加。然而,网络攻击与试图通过网络空间访问未经授权的资源同时存在挑战。很明显,网络攻击者的性质随着时间的推移而变化,以在国家和国际层面上执行已经设计好的网络安全部门政策、程序和法律框架。因此,必须设计和开发自动化的云网络安全,以确保预先保护试图渗透任何系统的网络攻击者的动态特性。因此,本文的目的是由司法机构根据规定的网络法律检测、监控、处理、预测和调查,并将充分的证据存储在所有物理和云服务器中,并与选定的工业、商业组织、教育机构和政府机构/组织合作。网络攻击者行为的程度,包括基础设施缺陷、算法修改和恶意代码泛滥,覆盖行业、机构和其他目标组织的关键来源。现在,这项技术应该以一种形式用于加强防御技术,并通过引入自动化、云支持和改进的网络安全系统来解决网络犯罪。这是通过设计和部署一个预测性的、自动化的、动态的、支持云的集成系统来实现的,该集成系统将最终用户设备作为最终来源。在选定的机构/组织中改进网络安全,解决网络攻击者行为的存储和检索,最终用户最终来源的实施,网络安全部门与目标机构之间的通信,同时检测网络攻击者和法律刑事调查流程。
{"title":"Automated and Cloud Enabling Cyber Security Improvement in Selected Institutions/Organizations","authors":"Tilahun Ayalew Tareke, Sujoy Datta","doi":"10.1109/ICCMC.2018.8487245","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487245","url":null,"abstract":"Advancements in an automated and cloud enabling cyber security have revolutionized the way in which cyber-criminal detection and remediation approaches are improved. Now a day, technological improvement increases even in fraction of time units such as seconds, micro seconds and Nano seconds. However, there is a parallel challenging of cyber-attack with attempting to access unauthorized resources over the cyber space. It obvious that the nature of cyber-attacker varies over time to cop up the already designed cyber security department policies, procedures and legal frame works at national and International level. It is therefore, compulsory to design and develop an automated and cloud enabling cyber security that ensures pre-securing the dynamic nature of cyber attackers attempting to penetrate any system. The purpose of this paper is therefore, to detect, monitor, process, forecast, and investigate by judiciary as per the prescribed cyber law with full of evidences stored in all physical and cloud server and with the selected Institutions/Organizations of Industries, commercial organizations, Educational Institutions and governmental institutions. The extent to which a cyber-attacker behaves including infrastructural defects, algorithms modifications and also malicious codes flooding over the key sources of industries, Institutions and other target organizations. And now the technology should be used in a form to strengthen the defensive techniques and tackling the cyber-criminals by introducing an automated, cloud enabling and improved cyber security systems. This is done by design and deployments of a predictive, automated, and dynamic and cloud enabling integration system on the focus of end user devices as an ultimate source. An improved cyber security in selected Institutions/Organizations address the storage and retrieval of cyber-attacker behavior, the implementation on an end users ultimate source, the communications in between the cyber security departments and target institutions while detecting cyber attackers and the legal criminal investigation processes.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"40 1","pages":"533-538"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80956838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Intensity Threshold based Image Segmentation of Malaria Infected Cells 基于强度阈值的疟疾感染细胞图像分割
Prakriti Aggarwal, Ashish Khatter, Garima Vyas
Malaria is a perilous disease in charge for around 400 to 1000 deaths annually in India. The conventional technique to diagnose malaria is through microscopy. It takes few hours by an expert to examine and diagnose malarial parasites in the blood smear. The diagnosis report may vary when the blood smears are analyzed by different experts. In proposed work, an image processing based robust algorithm is designed to diagnose malarial parasites with minimal intervention of an expert. Initially, the images are enhanced by using green channel and histogram equalization, and the background subtraction is performed to get the clear vision of the region of interest. After preprocessing, a median filter is employed to eliminate the noise from the images. Then Otsu’s method for segmentation is implemented on the filtered images. The database from world health organization is used in this research. The experiments give encouraging results and an accuracy up to 93%.
疟疾是一种危险的疾病,每年在印度造成大约400到1000人死亡。诊断疟疾的传统技术是通过显微镜。专家需要几个小时来检查和诊断血液涂片中的疟疾寄生虫。当不同的专家分析血液涂片时,诊断报告可能会有所不同。本文设计了一种基于图像处理的鲁棒算法,在专家干预最少的情况下诊断疟疾寄生虫。首先利用绿色通道和直方图均衡化对图像进行增强,然后进行背景减法,得到感兴趣区域的清晰视觉。预处理后,采用中值滤波去除图像中的噪声。然后在滤波后的图像上实现Otsu分割方法。本研究使用世界卫生组织数据库。实验结果令人鼓舞,准确率高达93%。
{"title":"An Intensity Threshold based Image Segmentation of Malaria Infected Cells","authors":"Prakriti Aggarwal, Ashish Khatter, Garima Vyas","doi":"10.1109/ICCMC.2018.8487494","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487494","url":null,"abstract":"Malaria is a perilous disease in charge for around 400 to 1000 deaths annually in India. The conventional technique to diagnose malaria is through microscopy. It takes few hours by an expert to examine and diagnose malarial parasites in the blood smear. The diagnosis report may vary when the blood smears are analyzed by different experts. In proposed work, an image processing based robust algorithm is designed to diagnose malarial parasites with minimal intervention of an expert. Initially, the images are enhanced by using green channel and histogram equalization, and the background subtraction is performed to get the clear vision of the region of interest. After preprocessing, a median filter is employed to eliminate the noise from the images. Then Otsu’s method for segmentation is implemented on the filtered images. The database from world health organization is used in this research. The experiments give encouraging results and an accuracy up to 93%.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"30 1","pages":"549-553"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81026882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Anonymous User Authentication and Implicit Background Checks in Cloud Environment 云环境下的匿名用户认证和隐式后台检查
Aashi Rastogi, Swadha Vanikar, N. Jeyanthi
Security threats faced by the customer, while storing information on the cloud, are on a continuous hike. Authentication is client's way to claim access to the data stored in the cloud. In our proposed system, we are taking anonymous authentication as an additional feature to the dynamic authentication policy which already exists. Along with the Attribute-Based Signature which serves as the first part of the granting-the-permission process, we use implicit authentication which includes periodic background checks, to ensure that the same legitimate user is using the account and that the account is not hacked or compromised after the login. This is based on a dynamically built user profile. The user profile consists of a set of vectors or features which are used to check whether the device is in the hands of a legitimate user.
客户在云中存储信息时所面临的安全威胁正在不断增加。身份验证是客户端声明访问存储在云中的数据的方式。在我们提出的系统中,我们将匿名身份验证作为已经存在的动态身份验证策略的附加功能。除了作为授予权限过程的第一部分的基于属性的签名之外,我们还使用隐式身份验证,包括定期背景检查,以确保同一合法用户正在使用该帐户,并且该帐户在登录后不会被黑客攻击或泄露。这是基于动态构建的用户配置文件。用户配置文件由一组矢量或特征组成,用于检查设备是否在合法用户手中。
{"title":"Anonymous User Authentication and Implicit Background Checks in Cloud Environment","authors":"Aashi Rastogi, Swadha Vanikar, N. Jeyanthi","doi":"10.1109/ICCMC.2018.8487857","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487857","url":null,"abstract":"Security threats faced by the customer, while storing information on the cloud, are on a continuous hike. Authentication is client's way to claim access to the data stored in the cloud. In our proposed system, we are taking anonymous authentication as an additional feature to the dynamic authentication policy which already exists. Along with the Attribute-Based Signature which serves as the first part of the granting-the-permission process, we use implicit authentication which includes periodic background checks, to ensure that the same legitimate user is using the account and that the account is not hacked or compromised after the login. This is based on a dynamically built user profile. The user profile consists of a set of vectors or features which are used to check whether the device is in the hands of a legitimate user.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"305-309"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82635232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-input Inverter for Hybrid Wind-Photovoltaic Standalone System 混合风力光伏单机系统的多输入逆变器
N. Archana, K. I. Anupamma
The rise in the use of alternate energy sources such as solar, wind, geothermal, fuel cell, etc. is due to the fast depletion of conventional energy sources. However these sources are less reliable due to their intermittent nature. To effectively utilise these energy sources, hybrid power systems with more than one renewable energy is used. One type of hybrid power system is a combination of PV energy and battery. The battery is utilized whenever the power from the solar panel is unavailable. Another type of hybrid system is the combination of photovoltaic and wind systems. This paper presents one such combination of hybrid power system with wind and solar energy as two inputs to a multi-input inverter which is supplying a load of 1kW. The simulation of the model is created using MATLAB/Simulink for input dc sources and for solar and wind sources.
太阳能、风能、地热、燃料电池等替代能源使用的增加是由于传统能源的迅速枯竭。然而,这些来源由于其间歇性而不太可靠。为了有效地利用这些能源,混合动力系统使用了一种以上的可再生能源。一种混合动力系统是光伏能源和电池的结合。当太阳能电池板的电力不可用时,电池就会被利用。另一种类型的混合系统是光伏和风力系统的结合。本文介绍了一种以风能和太阳能为双输入的混合电力系统,该系统为多输入逆变器提供1kW的负载。利用MATLAB/Simulink对输入直流电源、太阳能和风能电源进行了仿真。
{"title":"Multi-input Inverter for Hybrid Wind-Photovoltaic Standalone System","authors":"N. Archana, K. I. Anupamma","doi":"10.1109/ICCMC.2018.8488043","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488043","url":null,"abstract":"The rise in the use of alternate energy sources such as solar, wind, geothermal, fuel cell, etc. is due to the fast depletion of conventional energy sources. However these sources are less reliable due to their intermittent nature. To effectively utilise these energy sources, hybrid power systems with more than one renewable energy is used. One type of hybrid power system is a combination of PV energy and battery. The battery is utilized whenever the power from the solar panel is unavailable. Another type of hybrid system is the combination of photovoltaic and wind systems. This paper presents one such combination of hybrid power system with wind and solar energy as two inputs to a multi-input inverter which is supplying a load of 1kW. The simulation of the model is created using MATLAB/Simulink for input dc sources and for solar and wind sources.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"106 1","pages":"451-455"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75793946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review Paper on Novel Recommendation 小说推荐综述
Kinjal N. Gharia, Palak V. Desai, Monali R. Gandhi
A recommendation system is broadly used to recommend products to the end users that are most appropriate. Online book selling websites now-a-days is competing with each other by considering many attributes. In this paper, we describe traditional approaches and explain what kind of modern approaches have been developed. We will also try to explain approaches and their problems for the book/novels recommendations. This paper also presents book/novels recommendation in which we are proposing hybrid algorithm, so it helps the recommendation system to recommend the books or novels based on the buyer’s interest.
推荐系统广泛用于向最终用户推荐最合适的产品。如今,在线图书销售网站通过多种属性相互竞争。在本文中,我们描述了传统的方法,并解释了什么样的现代方法已经发展。我们还将尝试解释书籍/小说推荐的方法及其问题。本文还介绍了图书/小说推荐,其中我们提出了混合算法,从而帮助推荐系统根据购买者的兴趣来推荐图书或小说。
{"title":"Review Paper on Novel Recommendation","authors":"Kinjal N. Gharia, Palak V. Desai, Monali R. Gandhi","doi":"10.1109/ICCMC.2018.8487749","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487749","url":null,"abstract":"A recommendation system is broadly used to recommend products to the end users that are most appropriate. Online book selling websites now-a-days is competing with each other by considering many attributes. In this paper, we describe traditional approaches and explain what kind of modern approaches have been developed. We will also try to explain approaches and their problems for the book/novels recommendations. This paper also presents book/novels recommendation in which we are proposing hybrid algorithm, so it helps the recommendation system to recommend the books or novels based on the buyer’s interest.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"5 1","pages":"346-348"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77971599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Analysis of Traditional Clustering Algorithms On Corporate Bond Data 传统公司债券数据聚类算法的综合分析
Utkarsha Bagde, Priyanka Tripathi
This paper examines various clustering algorithms for corporate bond. The corporate bond is a bond issued by the corporations with certain time limit after which the bond will get mature. In order to raise funding such as explanation of business and for many other reasons corporation issues bond to the organization. A few years ago, the corporate bond market had to face very poor clustered default events in comparison to those experienced throughout the recession. The purpose of bond clustering, any organization can choose the bond with high ratings and high yields. Clustering is the technique to group data by identifying the common characteristics on a large dataset.In the proposed work K-Means, Hierarchical, Self Organizing Map, Fuzzy-C Mean and Gaussian Mixture Model clustering algorithms have been used to segment the bonds. The Portuguese retail bank with data collected from 2008 to 2013 is used for the presented work. The proposed work results, K-Means gives the most efficient result in terms of time and accuracy.
本文研究了公司债券的各种聚类算法。公司债券是公司发行的有一定期限的债券,到期后即到期。为了筹集资金,如业务解释和许多其他原因,公司向组织发行债券。几年前,与整个经济衰退期间相比,公司债券市场不得不面对非常糟糕的集群违约事件。债券聚类的目的是,任何组织都可以选择具有高评级和高收益的债券。聚类是一种通过识别大型数据集上的共同特征来对数据进行分组的技术。本文采用K-Means、分层、自组织映射、Fuzzy-C Mean和高斯混合模型聚类算法对键进行分割。葡萄牙零售银行从2008年到2013年收集的数据被用于介绍的工作。提出的工作结果,K-Means给出了在时间和精度方面最有效的结果。
{"title":"A Comprehensive Analysis of Traditional Clustering Algorithms On Corporate Bond Data","authors":"Utkarsha Bagde, Priyanka Tripathi","doi":"10.1109/ICCMC.2018.8487512","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487512","url":null,"abstract":"This paper examines various clustering algorithms for corporate bond. The corporate bond is a bond issued by the corporations with certain time limit after which the bond will get mature. In order to raise funding such as explanation of business and for many other reasons corporation issues bond to the organization. A few years ago, the corporate bond market had to face very poor clustered default events in comparison to those experienced throughout the recession. The purpose of bond clustering, any organization can choose the bond with high ratings and high yields. Clustering is the technique to group data by identifying the common characteristics on a large dataset.In the proposed work K-Means, Hierarchical, Self Organizing Map, Fuzzy-C Mean and Gaussian Mixture Model clustering algorithms have been used to segment the bonds. The Portuguese retail bank with data collected from 2008 to 2013 is used for the presented work. The proposed work results, K-Means gives the most efficient result in terms of time and accuracy.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82647638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart IoT based Energy Metering System for Microgrids with Load Management Algorithm 基于负载管理算法的智能物联网微电网电能计量系统
K. Roy, V. Banninthaya K., S. M. Prabhu, Arun Koomar, Disha Karnataki, G. Shankar
The number of smart meter users in this present day world is still limited. The traditional and conventional application of the smart meters was mainly to establish a bi-channel communication – one is to provide the billing details of the energy consumed via GSM modules to the end users and the other is to provide energy data and other related information that are of concern to the supplying utility. The modifications incorporated in this project are - Avoid two different channels of communication and instead concentrate the entire data into one storage system i.e. a server, that facilitates both the users and the concerned utility with access to the the real-time data from anywhere in the world and also an upgradation has been made to automatically detect and protect loads from transients in the line such as overvoltage, undervoltage and overcurrent with a load management algorithm utilizing the features of the smart energy meter IC.
在当今世界,智能电表用户的数量仍然有限。智能电表的传统和常规应用主要是建立双通道通信——一个是通过GSM模块向最终用户提供所消耗能源的帐单明细,另一个是提供能源数据和供电公用事业公司关心的其他相关信息。该项目中包含的修改是-避免两个不同的通信渠道,而是将整个数据集中到一个存储系统中,即服务器,这便于用户和有关公用事业公司从世界任何地方访问实时数据,并且已经进行了升级,以自动检测和保护负载免受线路中的瞬变,如过电压。欠压和过流与负载管理算法利用智能电能表IC的特点。
{"title":"Smart IoT based Energy Metering System for Microgrids with Load Management Algorithm","authors":"K. Roy, V. Banninthaya K., S. M. Prabhu, Arun Koomar, Disha Karnataki, G. Shankar","doi":"10.1109/ICCMC.2018.8487710","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487710","url":null,"abstract":"The number of smart meter users in this present day world is still limited. The traditional and conventional application of the smart meters was mainly to establish a bi-channel communication – one is to provide the billing details of the energy consumed via GSM modules to the end users and the other is to provide energy data and other related information that are of concern to the supplying utility. The modifications incorporated in this project are - Avoid two different channels of communication and instead concentrate the entire data into one storage system i.e. a server, that facilitates both the users and the concerned utility with access to the the real-time data from anywhere in the world and also an upgradation has been made to automatically detect and protect loads from transients in the line such as overvoltage, undervoltage and overcurrent with a load management algorithm utilizing the features of the smart energy meter IC.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"49 1","pages":"252-256"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82219291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 Second International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1