首页 > 最新文献

2017 International Conference on Computing, Communication and Automation (ICCCA)最新文献

英文 中文
Risk for big data in the cloud 云中的大数据风险
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229815
Nayan Chitransh, C. Mehrotra, A. Singh
With a lot of technological advancements in recent years the data generation has increased as an outcome, large amount of data is being generated which is a major issue to the organization, as an example social media is flooding data each day, which is unmanageable. Here in this paper we would discuss the various risks and issues which are associated with big data. Big Data as itself describes the large volume of data, either structured or unstructured, in now a day's data came from so many sources that usual database systems are not able to handle that data so we need Big Data, but Big Data requires a huge assurance of hardware and processing resources which make Big Data costly. In order to provide Big Data services to every user we take help form Cloud computing which offer Big Data implementation cheaper. Cloud Computing is a technology which offers sharing of computing resources such as servers, devices etc instead of having personal one, services over Cloud Computing are delivered via Internet.
随着近年来技术的进步,数据的产生也随之增加,大量的数据正在产生,这对组织来说是一个重大问题,例如,社交媒体每天都在产生大量的数据,这是难以管理的。在本文中,我们将讨论与大数据相关的各种风险和问题。大数据本身描述了大量的数据,无论是结构化的还是非结构化的,现在每天的数据来自如此多的来源,通常的数据库系统无法处理这些数据,所以我们需要大数据,但是大数据需要巨大的硬件保证和处理资源,这使得大数据成本很高。为了向每一个用户提供大数据服务,我们借助云计算的帮助,使大数据实现更便宜。云计算是一种提供共享计算资源的技术,如服务器、设备等,而不是个人的,云计算上的服务通过互联网提供。
{"title":"Risk for big data in the cloud","authors":"Nayan Chitransh, C. Mehrotra, A. Singh","doi":"10.1109/CCAA.2017.8229815","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229815","url":null,"abstract":"With a lot of technological advancements in recent years the data generation has increased as an outcome, large amount of data is being generated which is a major issue to the organization, as an example social media is flooding data each day, which is unmanageable. Here in this paper we would discuss the various risks and issues which are associated with big data. Big Data as itself describes the large volume of data, either structured or unstructured, in now a day's data came from so many sources that usual database systems are not able to handle that data so we need Big Data, but Big Data requires a huge assurance of hardware and processing resources which make Big Data costly. In order to provide Big Data services to every user we take help form Cloud computing which offer Big Data implementation cheaper. Cloud Computing is a technology which offers sharing of computing resources such as servers, devices etc instead of having personal one, services over Cloud Computing are delivered via Internet.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"83 1","pages":"277-282"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85971913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on finger vein feature extraction methods 手指静脉特征提取方法综述
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229983
Rahul Dev, Ruqaiya Khanam
In today's era, personal information security is major topic of concern. In this regard many advanced techniques are used but still in all of those biometric is most reliable. Biometric technologies are based on individual's biological and behavioural characteristics. These system includes human finger, vein, iris, hand and many other as its identifiers. Biometric system using finger-vein as one of its trait is most widely accepted. This paper reviews the various method of feature extraction in finger vein recognition. Most of the existing work is functionally described and compared in three parts i.e., Finger vein image acquisition, pre-processing and feature extraction.
在当今时代,个人信息安全是人们关注的重大话题。在这方面使用了许多先进的技术,但在所有这些生物识别技术中仍然是最可靠的。生物识别技术是基于个人的生物和行为特征。该系统包括人的手指、静脉、虹膜、手等多种身份标识。利用指静脉作为其特征之一的生物识别系统是最被广泛接受的。本文综述了手指静脉识别中的各种特征提取方法。现有的大部分工作主要从手指静脉图像采集、预处理和特征提取三个部分进行功能描述和比较。
{"title":"Review on finger vein feature extraction methods","authors":"Rahul Dev, Ruqaiya Khanam","doi":"10.1109/CCAA.2017.8229983","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229983","url":null,"abstract":"In today's era, personal information security is major topic of concern. In this regard many advanced techniques are used but still in all of those biometric is most reliable. Biometric technologies are based on individual's biological and behavioural characteristics. These system includes human finger, vein, iris, hand and many other as its identifiers. Biometric system using finger-vein as one of its trait is most widely accepted. This paper reviews the various method of feature extraction in finger vein recognition. Most of the existing work is functionally described and compared in three parts i.e., Finger vein image acquisition, pre-processing and feature extraction.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"11 6 1","pages":"1209-1213"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84025399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Nanocavity coupled waveguide photonic crystal biosensor for detection of different blood components 用于检测不同血液成分的纳米腔耦合波导光子晶体生物传感器
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8230049
Shivani Ameta, Arvind Sharma, P. Inaniya
Biosensor is an analytical device used to detect the biological analyte, which can be antibodies enzymes cells or biomolecules. Biosensors have many applications like in environmental monitoring, biomedical research, and healthcare. In this paper we have proposed a nano-cavity coupled waveguide 2D photonic crystal biosensor which can be able to detect different blood components. This structure has a hexagonal symmetry that has area of 19×15μm2. Over the wafer of air dielectric rods of Si are introduced, which has refractive index of 3.6730, lattice constant of 690nm and radius of 220nm. Biosensor can detect Acetone, Tocopherol, Blood plasma, Cytop, Ethanol, Sylgard184, and Water. Simulation and analysis has been done and peak has been observed. For the analysis, FDTD method is used. A spectral shift has been occurred in transmission spectra due to change in refractive index. With the consideration of different components having different refractive indices, this property is expedient in the sensing application. In this paper design is allowed to operate in the wavelength range of 1500–1700nm.
生物传感器是一种用于检测生物分析物的分析装置,生物分析物可以是抗体、酶、细胞或生物分子。生物传感器在环境监测、生物医学研究和医疗保健等方面有许多应用。本文提出了一种纳米腔耦合波导二维光子晶体生物传感器,可以检测不同的血液成分。这个结构具有六边形对称,面积为19×15μm2。介绍了折射率为3.6730,晶格常数为690nm,半径为220nm的空气介质硅棒。生物传感器可检测丙酮、生育酚、血浆、细胞素、乙醇、Sylgard184和水。并进行了仿真分析,观察到了峰值。分析采用时域有限差分法。由于折射率的变化,透射光谱发生了谱移。考虑到不同的元件具有不同的折射率,这种特性在传感应用中是方便的。本文设计的允许工作波长范围为1500-1700nm。
{"title":"Nanocavity coupled waveguide photonic crystal biosensor for detection of different blood components","authors":"Shivani Ameta, Arvind Sharma, P. Inaniya","doi":"10.1109/CCAA.2017.8230049","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8230049","url":null,"abstract":"Biosensor is an analytical device used to detect the biological analyte, which can be antibodies enzymes cells or biomolecules. Biosensors have many applications like in environmental monitoring, biomedical research, and healthcare. In this paper we have proposed a nano-cavity coupled waveguide 2D photonic crystal biosensor which can be able to detect different blood components. This structure has a hexagonal symmetry that has area of 19×15μm2. Over the wafer of air dielectric rods of Si are introduced, which has refractive index of 3.6730, lattice constant of 690nm and radius of 220nm. Biosensor can detect Acetone, Tocopherol, Blood plasma, Cytop, Ethanol, Sylgard184, and Water. Simulation and analysis has been done and peak has been observed. For the analysis, FDTD method is used. A spectral shift has been occurred in transmission spectra due to change in refractive index. With the consideration of different components having different refractive indices, this property is expedient in the sensing application. In this paper design is allowed to operate in the wavelength range of 1500–1700nm.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"1 1","pages":"1554-1557"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78571232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comment on efficient certificateless aggregate signature scheme 关于高效无证书聚合签名方案的评述
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229854
Pankaj Kumar, Vishnu Sharma
Certificateless signature scheme provides the solution of key escrow problem inherit in ID based public key cryptography. Aggregate signature allows aggregating of n signature in one single short signature which is very efficient in ad-hoc networks, PDA, mobile computation and more. A certificateless aggregate signature scheme solves not only the certification problem and key escrow problem but also done aggregation of n user's signatures. Recently, Deng et al proposed a certificateless aggregate signature scheme in “Concurrency and Computation: Practice and Experience” [doi: 10.1002/cpe.3551] in 2015 and claims that it is unforgeable under some concrete attacks but during security analysis we found it is insecure by some concrete attacks. In this paper, we show that proposed scheme is forged by universal adversary.
无证书签名方案解决了基于ID的公钥加密中的密钥托管继承问题。聚合签名允许将n个签名聚合在一个短签名中,这在ad-hoc网络、PDA、移动计算等领域非常有效。无证书聚合签名方案不仅解决了证书问题和密钥托管问题,而且解决了n个用户签名的聚合问题。最近,Deng等人在“并发与计算:实践与经验”[doi: 10.1002/cpe]中提出了一种无证书聚合签名方案。3551]并声称它在一些具体攻击下是不可伪造的,但在安全分析期间,我们发现它在一些具体攻击下是不安全的。在本文中,我们证明了该方案是被普遍对手伪造的。
{"title":"A comment on efficient certificateless aggregate signature scheme","authors":"Pankaj Kumar, Vishnu Sharma","doi":"10.1109/CCAA.2017.8229854","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229854","url":null,"abstract":"Certificateless signature scheme provides the solution of key escrow problem inherit in ID based public key cryptography. Aggregate signature allows aggregating of n signature in one single short signature which is very efficient in ad-hoc networks, PDA, mobile computation and more. A certificateless aggregate signature scheme solves not only the certification problem and key escrow problem but also done aggregation of n user's signatures. Recently, Deng et al proposed a certificateless aggregate signature scheme in “Concurrency and Computation: Practice and Experience” [doi: 10.1002/cpe.3551] in 2015 and claims that it is unforgeable under some concrete attacks but during security analysis we found it is insecure by some concrete attacks. In this paper, we show that proposed scheme is forged by universal adversary.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"20 1","pages":"515-519"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90455015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
General study of intrusion detection system and survey of agent based intrusion detection system 入侵检测系统概论及基于agent的入侵检测系统综述
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229866
A. Saxena, S. Sinha, P. Shukla
In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.
在当今世界,对计算机安全最严重的威胁之一是非法侵入计算机系统。随着网络应用的快速增长,新型网络攻击也在不断涌现。入侵检测系统IDS用于检测扩展到公网的入侵活动。IDS可能需要处理不同的审计记录格式。入侵检测已成为检测对计算机网络和资源的攻击必不可少的安全工具。因此,我们对IDS进行了综述(一般研究)。首先,我们将讨论入侵检测,稍后将讨论入侵检测的类型。本文着重介绍了异常入侵、误用入侵、基于主机的入侵、基于网络的入侵和混合入侵,特别是基于异常的入侵和基于行为的入侵以及基于Agent技术的入侵。最后,介绍了各类入侵检测系统的贡献。
{"title":"General study of intrusion detection system and survey of agent based intrusion detection system","authors":"A. Saxena, S. Sinha, P. Shukla","doi":"10.1109/CCAA.2017.8229866","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229866","url":null,"abstract":"In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"59 1","pages":"471-421"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90461057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Design and implementation of EF-MAC protocol to optimize WSN communication 优化无线传感器网络通信的EF-MAC协议的设计与实现
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229876
Rai Pal, R. Singh, Sanjoy Das
In a sensor network, the sensor devices are the most critical resources that contribute in the network communication. The physical features of the network including node energy, coverage capability and channel strength can affect the network communication. In this paper, a novel MAC protocol called EF-MAC is introduced to utilize the restricted capabilities and the communication features to optimize the network life. In this protocol, the featured attributes are applied at two layers. In first layer, the effective neighbours are shortlisted based on zone driven analysis. In second layer, the fading vector and the failure analysis is applied to identify effective intermediate node. The featured layered analysis is applied on each zone to generate the effective and reliable route. The comparative analysis shows that the method has improved the network life and reduced the error rate.
在传感器网络中,传感器设备是网络通信中最关键的资源。网络的物理特性包括节点能量、覆盖能力、信道强度等都会影响网络通信。本文提出了一种新的MAC协议EF-MAC,利用有限的性能和通信特性来优化网络寿命。在该协议中,特征属性在两层应用。在第一层,基于区域驱动分析选出有效邻域;第二层采用衰落向量和失效分析来识别有效的中间节点。对各区域进行特征分层分析,生成有效可靠的路线。对比分析表明,该方法提高了网络使用寿命,降低了误差率。
{"title":"Design and implementation of EF-MAC protocol to optimize WSN communication","authors":"Rai Pal, R. Singh, Sanjoy Das","doi":"10.1109/CCAA.2017.8229876","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229876","url":null,"abstract":"In a sensor network, the sensor devices are the most critical resources that contribute in the network communication. The physical features of the network including node energy, coverage capability and channel strength can affect the network communication. In this paper, a novel MAC protocol called EF-MAC is introduced to utilize the restricted capabilities and the communication features to optimize the network life. In this protocol, the featured attributes are applied at two layers. In first layer, the effective neighbours are shortlisted based on zone driven analysis. In second layer, the fading vector and the failure analysis is applied to identify effective intermediate node. The featured layered analysis is applied on each zone to generate the effective and reliable route. The comparative analysis shows that the method has improved the network life and reduced the error rate.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"23 1","pages":"625-629"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90909369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement in BER performance of BPSK system using diversity techniques 利用分集技术提高BPSK系统的误码率
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229790
Govind Singh Jethi, N. Belwal, S. Sunori, P. Juneja
Multiple antennas are used with suitable signaling methods in space time diversity techniques. A significant performance gains are achieved in presence of multipath fading with the use of diversity techniques. The signals on both the transmitter and receiver sides of the antennas are combined in such a way that the BER is improved. In this paper we discussed about diversity techniques to overcome the problem of multipath fading as we have taken three conditions i.e. no diversity, maximal ratio combining and ostbc and we have find that by diversity techniques the BER is being minimized. In the present paper, the performance of a BPSK system has been investigated for three different cases, one without using diversity technique, second using OSTBC diversity technique and the third with maximal ratio combining using MATLAB.
在空时分集技术中,多天线与合适的信号方式相结合。在多径衰落的情况下,采用分集技术可以显著提高系统的性能。天线的发射端和接收端信号以这样一种方式组合在一起,从而提高了误码率。本文讨论了利用分集技术克服多径衰落问题的方法,在无分集、最大比组合和最大比组合三种情况下,通过分集技术可以使误码率最小化。本文研究了三种不同情况下BPSK系统的性能,一种是不使用分集技术,第二种是使用OSTBC分集技术,第三种是使用MATLAB进行最大比组合。
{"title":"Improvement in BER performance of BPSK system using diversity techniques","authors":"Govind Singh Jethi, N. Belwal, S. Sunori, P. Juneja","doi":"10.1109/CCAA.2017.8229790","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229790","url":null,"abstract":"Multiple antennas are used with suitable signaling methods in space time diversity techniques. A significant performance gains are achieved in presence of multipath fading with the use of diversity techniques. The signals on both the transmitter and receiver sides of the antennas are combined in such a way that the BER is improved. In this paper we discussed about diversity techniques to overcome the problem of multipath fading as we have taken three conditions i.e. no diversity, maximal ratio combining and ostbc and we have find that by diversity techniques the BER is being minimized. In the present paper, the performance of a BPSK system has been investigated for three different cases, one without using diversity technique, second using OSTBC diversity technique and the third with maximal ratio combining using MATLAB.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"14 1","pages":"6-10"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91162471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of dynamic metrics to measure component based software 基于组件的动态度量软件设计
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229922
Parveen Kumar, P. Tomar
This paper defines the different categories of dynamic metric which are designed to measure component at run time based on the some parametric values. These parametric values help to define the execution flow of all components required to get the desired result. This paper focuses on dynamic metrics of component integration at run time. The dependency function measure the Component-Usage Metric and Component Interface Metric results the number of components called and executed during the rendering process. The aim of the paper is to enhance the performance and predict the quality of CBS in real-time dynamically.
本文定义了动态度量的不同类别,这些动态度量是根据某些参数值来设计的,用于在运行时对部件进行度量。这些参数值有助于定义获得所需结果所需的所有组件的执行流。本文主要研究运行时组件集成的动态度量。依赖函数度量组件使用度量和组件接口度量,得出在呈现过程中调用和执行的组件的数量。本文的研究目的是提高CBS的性能,实时动态地预测CBS的质量。
{"title":"Design of dynamic metrics to measure component based software","authors":"Parveen Kumar, P. Tomar","doi":"10.1109/CCAA.2017.8229922","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229922","url":null,"abstract":"This paper defines the different categories of dynamic metric which are designed to measure component at run time based on the some parametric values. These parametric values help to define the execution flow of all components required to get the desired result. This paper focuses on dynamic metrics of component integration at run time. The dependency function measure the Component-Usage Metric and Component Interface Metric results the number of components called and executed during the rendering process. The aim of the paper is to enhance the performance and predict the quality of CBS in real-time dynamically.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"1151 1","pages":"753-757"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91457305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge detection using particle swarm optimization technique 基于粒子群优化技术的边缘检测
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229843
Ruchika Chaudhary, A. Patel, Sushil Kumar, S. Tomar
Handwriting recognition has been a major topic of research since past many years. There have been several approaches to handwriting recognition but the recognition of handwritten characters using deep learning has been a hot topic of research in the past five years. This paper proposes a method of converting handwritten text into speech at real time using the concept of deep neural networks. Moreover the pre-processing is improved by using an enhanced edge detection method for thinning the boundaries of the segmented characters. The recognized text is converted into speech. This system provides the benefit of reducing the hectic task of manually going through the handwritten documents in places such as banks and post offices. It can have various applications such as the audio based checking of exam sheets of students in schools and colleges preventing the task of recognizing the handwritten characters, would be beneficial for the blind, for the people who are illiterate and do not know reading but know a specific language. It proposes to reduce the human effort in understanding one's handwriting and easily they can listen to the speech converted. It can be beneficial for the students as well as they can simple listen to their notes and learn better.
多年来,手写识别一直是一个重要的研究课题。手写识别的方法有很多种,但在过去五年中,使用深度学习来识别手写字符一直是研究的热点。本文提出了一种利用深度神经网络的概念将手写文本实时转换为语音的方法。此外,通过使用增强的边缘检测方法来细化分割字符的边界,改进了预处理。被识别的文本被转换成语音。该系统的好处是减少了在银行和邮局等地方手工检查手写文件的繁忙任务。它可以有各种各样的应用,例如基于音频的检查学生在学校和大学的试卷,防止识别手写字符的任务,这将有利于盲人,对于文盲和不知道阅读但知道特定语言的人。它提出了减少人类理解笔迹的努力,他们可以很容易地听转换后的演讲。这对学生来说是有益的,因为他们可以简单地听笔记,更好地学习。
{"title":"Edge detection using particle swarm optimization technique","authors":"Ruchika Chaudhary, A. Patel, Sushil Kumar, S. Tomar","doi":"10.1109/CCAA.2017.8229843","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229843","url":null,"abstract":"Handwriting recognition has been a major topic of research since past many years. There have been several approaches to handwriting recognition but the recognition of handwritten characters using deep learning has been a hot topic of research in the past five years. This paper proposes a method of converting handwritten text into speech at real time using the concept of deep neural networks. Moreover the pre-processing is improved by using an enhanced edge detection method for thinning the boundaries of the segmented characters. The recognized text is converted into speech. This system provides the benefit of reducing the hectic task of manually going through the handwritten documents in places such as banks and post offices. It can have various applications such as the audio based checking of exam sheets of students in schools and colleges preventing the task of recognizing the handwritten characters, would be beneficial for the blind, for the people who are illiterate and do not know reading but know a specific language. It proposes to reduce the human effort in understanding one's handwriting and easily they can listen to the speech converted. It can be beneficial for the students as well as they can simple listen to their notes and learn better.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"6 1","pages":"363-367"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90990651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool 利用模糊逻辑工具对AOSQ模型的演化特征及其子特征进行评估
Pub Date : 2017-05-01 DOI: 10.1109/CCAA.2017.8229839
Pankaj Kumar, S. K. Singh
Over the past few decades, IT industry has faced the difficulties of evolving their software systems in order to live on the market and to compete with similar software systems. For software systems to live on market, they should derived new additional design requirements and concert themselves to the new evolving environment. Evolvability is most crucial and essential attribute to evaluate the software development. Due to gradual development of system, the AOP-based software moves closer to researcher and practitioner. It is sufficient straightforward to reuse the system than developing the new system. Evolvability reduces the different factors like development cost, time (i.e. installation and access), maintenance and effort of software system. This paper explores a framework to assess and verification of evolvability in AOSQ model using fuzzy logic toolbox. All the values of evolvability and its related characteristics are calculated by analytic hierarchy process (AHP) tool.
在过去的几十年里,IT行业为了在市场上生存并与类似的软件系统竞争,一直面临着软件系统发展的困难。为了使软件系统在市场上生存,它们应该派生出新的附加设计需求,并使自己适应新的发展环境。可发展性是评价软件开发的最重要、最基本的属性。由于系统的逐步发展,基于aop的软件离研究者和实践者越来越近。重用系统比开发新系统更直接。可演化性减少了软件系统的开发成本、时间(即安装和访问)、维护和工作量等不同因素。本文利用模糊逻辑工具箱探索了一种评估和验证AOSQ模型可演化性的框架。利用层次分析法(AHP)计算了所有可进化性值及其相关特征。
{"title":"A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool","authors":"Pankaj Kumar, S. K. Singh","doi":"10.1109/CCAA.2017.8229839","DOIUrl":"https://doi.org/10.1109/CCAA.2017.8229839","url":null,"abstract":"Over the past few decades, IT industry has faced the difficulties of evolving their software systems in order to live on the market and to compete with similar software systems. For software systems to live on market, they should derived new additional design requirements and concert themselves to the new evolving environment. Evolvability is most crucial and essential attribute to evaluate the software development. Due to gradual development of system, the AOP-based software moves closer to researcher and practitioner. It is sufficient straightforward to reuse the system than developing the new system. Evolvability reduces the different factors like development cost, time (i.e. installation and access), maintenance and effort of software system. This paper explores a framework to assess and verification of evolvability in AOSQ model using fuzzy logic toolbox. All the values of evolvability and its related characteristics are calculated by analytic hierarchy process (AHP) tool.","PeriodicalId":6627,"journal":{"name":"2017 International Conference on Computing, Communication and Automation (ICCCA)","volume":"28 1","pages":"339-344"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83380757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 International Conference on Computing, Communication and Automation (ICCCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1