首页 > 最新文献

2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)最新文献

英文 中文
Implementation of melody extraction algorithms from polyphonic audio for Music Information Retrieval 音乐信息检索中复调音频旋律提取算法的实现
Anupriya O. Gathekar, A. Deshpande
Melody extraction from polyphonic audio, which consists of number of different instruments, is one of the most challenging tasks in the field of Music Information Retrieval (MIR). This paper aims at implementation of extracting melody using two-way mismatch dual pitch tracking (TWMDPT) and harmonic cluster tracking (HCT) algorithms. In this work, melody of singing voice is estimated in presence of multi-accompaniment. In the first method temporal features of voice harmonics are used to find the voice pitch and it is based on salience function. The second method depends upon strong higher harmonics for robustness against distortion by the first harmonic due to low frequency accompaniments. Performance of these algorithms is evaluated on MIR-1k database and accuracy is estimated using Raw Pitch Accuracy (RPA), Raw Chroma Accuracy (RCA) and timbre feature.
复调音频是由多种不同乐器组成的音频,从复调音频中提取旋律是音乐信息检索(MIR)领域最具挑战性的任务之一。本文旨在利用双向失配双音高跟踪(TWMDPT)和谐波聚类跟踪(HCT)算法实现旋律提取。在这部作品中,唱腔的旋律是在多重伴奏的情况下进行估计的。第一种方法基于显著性函数,利用语音谐波的时间特征来确定音高。第二种方法依赖于强高次谐波对低频伴奏引起的第一次谐波失真的鲁棒性。在MIR-1k数据库上评估这些算法的性能,并使用Raw Pitch accuracy (RPA)、Raw Chroma accuracy (RCA)和音色特征估计准确性。
{"title":"Implementation of melody extraction algorithms from polyphonic audio for Music Information Retrieval","authors":"Anupriya O. Gathekar, A. Deshpande","doi":"10.1109/ICAECCT.2016.7942546","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942546","url":null,"abstract":"Melody extraction from polyphonic audio, which consists of number of different instruments, is one of the most challenging tasks in the field of Music Information Retrieval (MIR). This paper aims at implementation of extracting melody using two-way mismatch dual pitch tracking (TWMDPT) and harmonic cluster tracking (HCT) algorithms. In this work, melody of singing voice is estimated in presence of multi-accompaniment. In the first method temporal features of voice harmonics are used to find the voice pitch and it is based on salience function. The second method depends upon strong higher harmonics for robustness against distortion by the first harmonic due to low frequency accompaniments. Performance of these algorithms is evaluated on MIR-1k database and accuracy is estimated using Raw Pitch Accuracy (RPA), Raw Chroma Accuracy (RCA) and timbre feature.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"96 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89983998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Algorithms and methodology for development of OCP-PSO tool for optimal capacitor placement to enhance system reliability 开发OCP-PSO工具以优化电容器位置以提高系统可靠性的算法和方法
P. Sonwane, B. E. Kushare
Utility aims capacitor placement for power factor improvement, capacity release, voltage profile and reduction of power losses. Today, reliability is an important parameter in electrical industry to achieve high security and adequacy of the system. There are three important parameters required to be introduced in reliability viz customer composite damage function, average load and failure rate. If failure rate is reduced by means of optimal capacitor placement then reliability cost is also reduced. In this Paper, Objective function is developed and used in evaluation considering the capacitor cost, benefits due to reduction in power loss and reliability cost which is a function of failure rate. Failure rate and it's modification due to number of capacitor placements are critical issues addressed in this paper. This paper also introduces the modification method for failure rate using thermal loading and life expectancy of electrical equipments such as transformer. PSO is used to find the optimal locations and capacitor sizing with the help of dot net framework. Before applying PSO tool, IEEE 30 bus system is evaluated for load flow study. Load flow data is processed through OCP module developed in novel software. OCP module has two treatments. In first treatment, data is processed for evaluation of various objectives without capacitor placement and in second treatment, PSO is allowed to find the optimal place and size of capacitor considering the constraints selected. This paper discusses on methodology implemented in the novel software OCP-PSO. Algorithms are discussed in each process.
公用事业的目的是电容器安置功率因数的改善,容量释放,电压分布和减少功率损耗。在当今的电气工业中,可靠性是实现系统高安全性和充分性的重要参数。可靠性中需要引入三个重要参数,即用户复合损伤函数、平均载荷和故障率。如果通过优化电容器布局来降低故障率,那么可靠性成本也会降低。本文提出了考虑电容器成本、功率损耗降低效益和可靠性成本(故障率的函数)的目标函数,并将其应用于评估。故障率和它的修改由于电容器放置的数量是本文讨论的关键问题。本文还介绍了利用变压器等电气设备的热负荷和预期寿命来修正故障率的方法。利用粒子群算法在点网框架的帮助下找到最优位置和电容器尺寸。在应用PSO工具之前,对IEEE 30总线系统进行了负荷流研究。采用新型软件开发的OCP模块对潮流数据进行处理。OCP模块有两种处理方式。在第一次处理中,对数据进行评估,不考虑电容器的放置位置;在第二次处理中,允许粒子群算法根据所选择的约束条件找到电容器的最佳位置和尺寸。本文讨论了新型软件OCP-PSO的实现方法。在每个过程中讨论了算法。
{"title":"Algorithms and methodology for development of OCP-PSO tool for optimal capacitor placement to enhance system reliability","authors":"P. Sonwane, B. E. Kushare","doi":"10.1109/ICAECCT.2016.7942606","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942606","url":null,"abstract":"Utility aims capacitor placement for power factor improvement, capacity release, voltage profile and reduction of power losses. Today, reliability is an important parameter in electrical industry to achieve high security and adequacy of the system. There are three important parameters required to be introduced in reliability viz customer composite damage function, average load and failure rate. If failure rate is reduced by means of optimal capacitor placement then reliability cost is also reduced. In this Paper, Objective function is developed and used in evaluation considering the capacitor cost, benefits due to reduction in power loss and reliability cost which is a function of failure rate. Failure rate and it's modification due to number of capacitor placements are critical issues addressed in this paper. This paper also introduces the modification method for failure rate using thermal loading and life expectancy of electrical equipments such as transformer. PSO is used to find the optimal locations and capacitor sizing with the help of dot net framework. Before applying PSO tool, IEEE 30 bus system is evaluated for load flow study. Load flow data is processed through OCP module developed in novel software. OCP module has two treatments. In first treatment, data is processed for evaluation of various objectives without capacitor placement and in second treatment, PSO is allowed to find the optimal place and size of capacitor considering the constraints selected. This paper discusses on methodology implemented in the novel software OCP-PSO. Algorithms are discussed in each process.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"320-327"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83075150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient hierarchical cloud storage data access structure with KDC 具有KDC的高效分层云存储数据访问结构
P. P. Gutal, R. Kothe, S.B. Jahveri
Among various cloud services, storage is one of the fast utilizing and hugest category of cloud service. Very huge amount of data is stored at cloud storage servers by various users or organizations. With such services, various key issues are arises such as data security, confidentiality. To overcome these, the key concept was introduced such as Cryptography. In cryptography, various keys are used to encrypt or decrypt the data before uploading or downloading from cloud server. To generate the private and public key pair, distributed key generation (DKG) protocol was introduced. But within organization there is another issue is arises, regarding to authority based data access control policy. That is only user with particular authority can access data stored at cloud, based on their authority level. For this hierarchical threshold access structure (HTAS) is used along with DKG, known as HTDKG. In this, various users are divided into levels based on their designation and some threshold is assigned. At the time of data access, only specific levels users can access the specific amount of data. Because of this, all data is not revealed to any unconcern user. In existing system, HTDKG key generation and management is perform at user side which increases the management overhead. To overcome this issue, we introduced the third party Key Distribution Center (KDC), which execute the HTDKG protocol and take responsibility of all key generation, distribution and management activities. Experimental results prove that the proposed system decrease the processing time and enhances the memory utilization by utilizing of KDC.
在各种云服务中,存储是使用速度最快、规模最大的云服务类别之一。各种用户或组织将大量数据存储在云存储服务器上。有了这些服务,就会出现各种关键问题,例如数据安全、机密性。为了克服这些问题,引入了诸如密码学之类的关键概念。在密码学中,在从云服务器上传或下载数据之前,使用各种密钥对数据进行加密或解密。为了生成私钥对和公钥对,引入了分布式密钥生成(DKG)协议。但是在组织内部出现了另一个问题,关于基于权限的数据访问控制策略。也就是说,只有具有特定权限的用户才能根据其权限级别访问存储在云中的数据。为此,分层阈值访问结构(HTAS)与DKG(称为HTDKG)一起使用。在这种方法中,根据用户的名称将不同的用户划分为不同的级别,并分配一定的阈值。在数据访问时,只有特定级别的用户才能访问特定数量的数据。因此,所有数据都不会透露给任何无关的用户。在现有的系统中,HTDKG密钥的生成和管理是在用户端进行的,这增加了管理开销。为了克服这个问题,我们引入了第三方密钥分发中心(KDC),它执行HTDKG协议并负责所有密钥生成、分发和管理活动。实验结果表明,该系统利用KDC技术减少了处理时间,提高了内存利用率。
{"title":"Efficient hierarchical cloud storage data access structure with KDC","authors":"P. P. Gutal, R. Kothe, S.B. Jahveri","doi":"10.1109/ICAECCT.2016.7942607","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942607","url":null,"abstract":"Among various cloud services, storage is one of the fast utilizing and hugest category of cloud service. Very huge amount of data is stored at cloud storage servers by various users or organizations. With such services, various key issues are arises such as data security, confidentiality. To overcome these, the key concept was introduced such as Cryptography. In cryptography, various keys are used to encrypt or decrypt the data before uploading or downloading from cloud server. To generate the private and public key pair, distributed key generation (DKG) protocol was introduced. But within organization there is another issue is arises, regarding to authority based data access control policy. That is only user with particular authority can access data stored at cloud, based on their authority level. For this hierarchical threshold access structure (HTAS) is used along with DKG, known as HTDKG. In this, various users are divided into levels based on their designation and some threshold is assigned. At the time of data access, only specific levels users can access the specific amount of data. Because of this, all data is not revealed to any unconcern user. In existing system, HTDKG key generation and management is perform at user side which increases the management overhead. To overcome this issue, we introduced the third party Key Distribution Center (KDC), which execute the HTDKG protocol and take responsibility of all key generation, distribution and management activities. Experimental results prove that the proposed system decrease the processing time and enhances the memory utilization by utilizing of KDC.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"84 1","pages":"328-332"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83213740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated silkworm eggs count 蚕卵自动计数
Sanaha S. Pathan, A. Harale
Counting the number of objects from an image is an essential part of image processing. Detecting the number of objects from an image is useful for further analysis in global application. Producing and counting silkworm eggs is very complicated process and requires large man power also extra time will be required so to reduce man power and efforts that required for counting silkworm eggs a method automated silkworm eggs count is useful. Convential method is by using calculator and manually which is erroneous and also waste of time. In this paper, we introduced method for automatically counting the number of silkworm eggs from an image. The objective of proposed method is detecting an eggs portion for counting and eliminating non egg portion from silkworm DFL sheet. We presented image segmentation technique for detecting egg portion, area based thresholding for removing small noise and barriers. Number of objects can be calculated by using object counting functions present in MATLAB.
从图像中计算对象的数量是图像处理的重要组成部分。在全局应用中,检测图像中物体的数量有助于进一步分析。蚕卵的生产和计数是一个非常复杂的过程,需要大量的人力和额外的时间,因此,为了减少计数所需的人力和精力,一种自动化的蚕卵计数方法是有用的。传统的方法是用计算器和人工计算,既错误又浪费时间。本文介绍了一种从图像中自动统计蚕卵数量的方法。提出的方法的目的是检测用于计数的卵部分,并消除家蚕DFL片上的非卵部分。我们提出了用于检测鸡蛋部分的图像分割技术和用于去除小噪声和障碍的基于面积的阈值分割技术。利用MATLAB中提供的对象计数函数可以计算出对象的数量。
{"title":"Automated silkworm eggs count","authors":"Sanaha S. Pathan, A. Harale","doi":"10.1109/ICAECCT.2016.7942551","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942551","url":null,"abstract":"Counting the number of objects from an image is an essential part of image processing. Detecting the number of objects from an image is useful for further analysis in global application. Producing and counting silkworm eggs is very complicated process and requires large man power also extra time will be required so to reduce man power and efforts that required for counting silkworm eggs a method automated silkworm eggs count is useful. Convential method is by using calculator and manually which is erroneous and also waste of time. In this paper, we introduced method for automatically counting the number of silkworm eggs from an image. The objective of proposed method is detecting an eggs portion for counting and eliminating non egg portion from silkworm DFL sheet. We presented image segmentation technique for detecting egg portion, area based thresholding for removing small noise and barriers. Number of objects can be calculated by using object counting functions present in MATLAB.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85700293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
3D Socio Graphical CAPTCHA based on reCAPTCHA against spammers and bots 3D社会图形验证码基于reCAPTCHA对垃圾邮件发送者和机器人
S. Rane, N. Shekokar
Website security is a major concern in today's world. CAPTCHA are used to protect websites from spammers, bots and unauthorized users. Different types of CAPTCHA are text CAPTCHA and graphical CAPTCHA. Text CAPTCHA are vulnerable to segmentation attack and graphical CAPTCHA are vulnerable to bot attack. To overcome such attacks we have designed a modern graphical CAPTCHA system by combining the concept of reCAPTCHA and graphical CAPTCHA. Our proposed system contains two images in CAPTCHA challenge and user performs click event to solve the CAPTCHA. In conducted survey, it is proved that system gain high usability, learnability, memorability, accuracy and robustness against bot and spamming attack.
网站安全是当今世界关注的主要问题。CAPTCHA用于保护网站免受垃圾邮件发送者,机器人和未经授权的用户。不同类型的验证码有文本验证码和图形验证码。文本验证码容易受到分段攻击,图形验证码容易受到机器人攻击。为了克服这种攻击,我们通过结合reCAPTCHA和图形CAPTCHA的概念设计了一个现代图形CAPTCHA系统。我们提出的系统在CAPTCHA挑战中包含两个图像,用户执行点击事件来解决CAPTCHA。实践证明,该系统具有较高的可用性、可学习性、可记忆性、准确性以及对bot和垃圾邮件攻击的鲁棒性。
{"title":"3D Socio Graphical CAPTCHA based on reCAPTCHA against spammers and bots","authors":"S. Rane, N. Shekokar","doi":"10.1109/ICAECCT.2016.7942616","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942616","url":null,"abstract":"Website security is a major concern in today's world. CAPTCHA are used to protect websites from spammers, bots and unauthorized users. Different types of CAPTCHA are text CAPTCHA and graphical CAPTCHA. Text CAPTCHA are vulnerable to segmentation attack and graphical CAPTCHA are vulnerable to bot attack. To overcome such attacks we have designed a modern graphical CAPTCHA system by combining the concept of reCAPTCHA and graphical CAPTCHA. Our proposed system contains two images in CAPTCHA challenge and user performs click event to solve the CAPTCHA. In conducted survey, it is proved that system gain high usability, learnability, memorability, accuracy and robustness against bot and spamming attack.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"11 1","pages":"372-377"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76438511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud 基于云的两层安全方案,用于将数据存储、共享和审计到云中
Priya Kharmate, Ranjeetsingh S. Suryawanshi
Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.
云计算作为一种强大的计算工具正在崛起,它利用先进的计算能力,以其不断提高的数据共享和数据安全限制为绿色IT做出了巨大贡献。安全方面在云计算中起着至关重要的作用,因为从客户的角度来看,转移到云计算的决定主要取决于数据的隐私性,而-à-vis他们通过转移到云存储将获得的其他好处。该项目的总体重点是克服现有系统远程验证技术中存在的安全问题,该技术用于第三方或私有审计云数据,并且需要数据所有者在场来管理身份验证。在提议的系统中,我们使用基于令牌生成的自己的审计。通过代理来解决在没有数据所有者的情况下失败授权用户的再生问题,通过代理将授权用户再生到传统的公共审计系统中。为了建立一个有效的第三方审计员,审计过程应该给予用户数据隐私,用户应该免于在线负担,最终最大限度地减少计算开销。我们提出了一个安全的基于云的存储系统,支持公共审计和保护隐私,并允许第三方审计人员同时高效地对多个用户进行审计。
{"title":"Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud","authors":"Priya Kharmate, Ranjeetsingh S. Suryawanshi","doi":"10.1109/ICAECCT.2016.7942566","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942566","url":null,"abstract":"Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"30 1","pages":"116-121"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76483635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel Testbed implementation for resource allocation in cognitive radio for green communication 面向绿色通信的认知无线电资源分配新试验台实现
P. Varade, Y. Ravinder
In this paper, the Testbed implementation of cognitive radio for green communication using Universal Software Radio peripheral (USRP) is investigated. The main objective of this Testbed is to create a realistic and accurate platform to implement and validate innovative and novel schemes for spectrum sensing and resource allocations for cognitive radio networks to achieve Green communication. For spectrum sensing energy detection method is used. Resource allocation to maximize energy efficiency is carried out using single user and multiuser system where subcarrier and power allocation is done sequentially to reduce complexity of the system. Testbed consists of two host computers connected to two USRP (2922) devices operating in the range 400MHz to 4.4GHz. Experimental results confirm that for single user system maximum energy efficiency achieved is 267 bits/Joule, In a multiuser system, maximum energy efficiency achieved is 145 bits/Joule.
本文研究了基于通用软件无线电外设(USRP)的绿色通信认知无线电的试验台实现。该测试平台的主要目标是创建一个现实和准确的平台,以实现和验证认知无线电网络的频谱传感和资源分配的创新方案,以实现绿色通信。光谱传感采用能量检测法。利用单用户和多用户系统进行资源分配以实现能源效率最大化,其中子载波和功率分配顺序进行,以降低系统的复杂性。试验台由两台主机组成,两台主机连接到两台USRP(2922)设备,工作范围为400MHz至4.4GHz。实验结果证实,单用户系统的最大能源效率为267比特/焦耳,多用户系统的最大能源效率为145比特/焦耳。
{"title":"Novel Testbed implementation for resource allocation in cognitive radio for green communication","authors":"P. Varade, Y. Ravinder","doi":"10.1109/ICAECCT.2016.7942582","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942582","url":null,"abstract":"In this paper, the Testbed implementation of cognitive radio for green communication using Universal Software Radio peripheral (USRP) is investigated. The main objective of this Testbed is to create a realistic and accurate platform to implement and validate innovative and novel schemes for spectrum sensing and resource allocations for cognitive radio networks to achieve Green communication. For spectrum sensing energy detection method is used. Resource allocation to maximize energy efficiency is carried out using single user and multiuser system where subcarrier and power allocation is done sequentially to reduce complexity of the system. Testbed consists of two host computers connected to two USRP (2922) devices operating in the range 400MHz to 4.4GHz. Experimental results confirm that for single user system maximum energy efficiency achieved is 267 bits/Joule, In a multiuser system, maximum energy efficiency achieved is 145 bits/Joule.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"127 1","pages":"198-203"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74924777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An embedded system of dedicated and real-time fire detector and locator technology as an interactive response mechanism in fire occurrences 一种嵌入式系统的专用和实时火灾探测器和定位技术,作为火灾发生时的交互响应机制
Sheila A. Abaya, Ejay Cabico, Jonah Domingo, Rommel Diaz, H. Kojima, R. Rivera
Fire alarm system is considered as one of the most essential mechanisms for safety against fire. In fact, most structural buildings especially the commercial ones are required by law to be equipped with this technology. The Bureau of Fire Protection (BFP) in the Philippines have recorded a total of 12,301 fire incidents in the year 2013, in the year 2014 there were 15,897 and in January 2015 a total of 1,848 incidents have transpired. Out of these incidents, 244 lives were lost in 2013 and 263 in 2014. Aside from the lives that were taken, these destructive killer fires also caused a lot of homeless individuals that have brought property damage to 5.5B in 2013, 3.3M in 2014 and 411M since January 2015. In spite of the figures, the BFP is still implementing measures that foster safety and fire prevention in whatever structural setup you are living or staying in. This information has motivated the development of an embedded technology of detecting and locating fire occurrence for possible deployment in the BFP agencies or fire stations in the country to provide immediate response and actions in mitigating fire incidents. The proposed system structure is an integration of sensors, microcontrollers and wireless sending of data. Homes, offices, schools or any building structure equipped with this technology will be an implementing measure in reducing the occurrence of destructive and killer fires.
火灾报警系统被认为是最重要的防火安全机制之一。事实上,大多数结构建筑,特别是商业建筑,都是法律要求配备这种技术的。菲律宾消防局(BFP)在2013年共记录了12,301起火灾事件,2014年有15,897起,2015年1月共发生了1,848起事件。在这些事件中,2013年有244人丧生,2014年有263人丧生。除了夺去生命之外,这些毁灭性的火灾还造成了许多无家可归的人,2013年的财产损失为55亿美元,2014年为330万美元,2015年1月以来为4.11亿美元。尽管有这些数字,英国消防局仍在实施措施,在你居住或居住的任何结构设置中促进安全和防火。这一信息促使开发了一种探测和定位火灾发生的嵌入式技术,以便可能在国内的BFP机构或消防站部署,以便在减轻火灾事件方面提供即时反应和行动。提出的系统结构是传感器、微控制器和无线数据发送的集成。家庭,办公室,学校或任何建筑结构配备了这项技术将是一个实施措施,以减少破坏性和致命的火灾的发生。
{"title":"An embedded system of dedicated and real-time fire detector and locator technology as an interactive response mechanism in fire occurrences","authors":"Sheila A. Abaya, Ejay Cabico, Jonah Domingo, Rommel Diaz, H. Kojima, R. Rivera","doi":"10.1109/ICAECCT.2016.7942622","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942622","url":null,"abstract":"Fire alarm system is considered as one of the most essential mechanisms for safety against fire. In fact, most structural buildings especially the commercial ones are required by law to be equipped with this technology. The Bureau of Fire Protection (BFP) in the Philippines have recorded a total of 12,301 fire incidents in the year 2013, in the year 2014 there were 15,897 and in January 2015 a total of 1,848 incidents have transpired. Out of these incidents, 244 lives were lost in 2013 and 263 in 2014. Aside from the lives that were taken, these destructive killer fires also caused a lot of homeless individuals that have brought property damage to 5.5B in 2013, 3.3M in 2014 and 411M since January 2015. In spite of the figures, the BFP is still implementing measures that foster safety and fire prevention in whatever structural setup you are living or staying in. This information has motivated the development of an embedded technology of detecting and locating fire occurrence for possible deployment in the BFP agencies or fire stations in the country to provide immediate response and actions in mitigating fire incidents. The proposed system structure is an integration of sensors, microcontrollers and wireless sending of data. Homes, offices, schools or any building structure equipped with this technology will be an implementing measure in reducing the occurrence of destructive and killer fires.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"9 1","pages":"407-411"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72893385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A comparative study on distance measuring approches for permutation representations 排列表示距离测量方法的比较研究
Abhay B. Rathod, S. M. Gulhane, Shailesh R. Padalwar
Distance measure plays an important role in permutation problems. Choosing the right distance measure for a given permutation is a biggest challenge. In this paper, we investigates Hamming, Euclidean, Manhattan and Squared Euclidean distance measures for their applicability to various permutation problem. This paper surveys existing distance measures for permutation and present a comparison between them based on application domain, time required to compute, benefits and drawbacks. From the simulation result it is shown that Hamming distance outperform the Euclidean, Manhattan and Squared Euclidean distance measures. This comparison helps the researchers to take quick decision about which distance measure to use for permutation problem. We conclude this work by identifying trends and challenges of research and development towards permutation problem.
距离测度在置换问题中起着重要的作用。为给定的排列选择正确的距离度量是最大的挑战。本文研究了汉明距离测度、欧几里得距离测度、曼哈顿距离测度和平方欧几里得距离测度在各种排列问题中的适用性。本文综述了现有的排列距离度量方法,并从应用领域、计算时间、优缺点等方面对它们进行了比较。仿真结果表明,汉明距离优于欧氏距离、曼哈顿距离和平方欧氏距离。这种比较有助于研究人员快速决定使用哪种距离度量来解决排列问题。我们通过确定排列问题研究和发展的趋势和挑战来总结这项工作。
{"title":"A comparative study on distance measuring approches for permutation representations","authors":"Abhay B. Rathod, S. M. Gulhane, Shailesh R. Padalwar","doi":"10.1109/ICAECCT.2016.7942593","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942593","url":null,"abstract":"Distance measure plays an important role in permutation problems. Choosing the right distance measure for a given permutation is a biggest challenge. In this paper, we investigates Hamming, Euclidean, Manhattan and Squared Euclidean distance measures for their applicability to various permutation problem. This paper surveys existing distance measures for permutation and present a comparison between them based on application domain, time required to compute, benefits and drawbacks. From the simulation result it is shown that Hamming distance outperform the Euclidean, Manhattan and Squared Euclidean distance measures. This comparison helps the researchers to take quick decision about which distance measure to use for permutation problem. We conclude this work by identifying trends and challenges of research and development towards permutation problem.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"18 1","pages":"251-255"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72726770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Emotweet: Sentiment Analysis tool for twitter Emotweet: twitter的情感分析工具
Abhijit Patankar, K. Kulhalli, Kotrappa Sirbi
In this 21st century, Internet is very important part of modern life. Along with Internet, OSN's also become integral part of life. OSN's provide a platform for people to share their views, ideas, information with each other irrespective of their location. By collecting this information, Sentiment Analysis can be done which helps us to gain wider public opinion about certain topic. Writer's feelings expressed in positive or negative tweets can be identified by scrutinizing large number of documents using Natural language processing and Information Extraction.
在21世纪,互联网是现代生活中非常重要的一部分。随着互联网的发展,OSN也成为人们生活中不可或缺的一部分。OSN为人们提供了一个平台来分享他们的观点、想法和信息,而不管他们在哪里。通过收集这些信息,可以进行情感分析,这有助于我们获得有关某些主题的更广泛的公众意见。作者在积极或消极的推文中表达的情感可以通过使用自然语言处理和信息提取对大量文档进行仔细检查来识别。
{"title":"Emotweet: Sentiment Analysis tool for twitter","authors":"Abhijit Patankar, K. Kulhalli, Kotrappa Sirbi","doi":"10.1109/ICAECCT.2016.7942573","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942573","url":null,"abstract":"In this 21st century, Internet is very important part of modern life. Along with Internet, OSN's also become integral part of life. OSN's provide a platform for people to share their views, ideas, information with each other irrespective of their location. By collecting this information, Sentiment Analysis can be done which helps us to gain wider public opinion about certain topic. Writer's feelings expressed in positive or negative tweets can be identified by scrutinizing large number of documents using Natural language processing and Information Extraction.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"11 1","pages":"157-159"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72674492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1