Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942546
Anupriya O. Gathekar, A. Deshpande
Melody extraction from polyphonic audio, which consists of number of different instruments, is one of the most challenging tasks in the field of Music Information Retrieval (MIR). This paper aims at implementation of extracting melody using two-way mismatch dual pitch tracking (TWMDPT) and harmonic cluster tracking (HCT) algorithms. In this work, melody of singing voice is estimated in presence of multi-accompaniment. In the first method temporal features of voice harmonics are used to find the voice pitch and it is based on salience function. The second method depends upon strong higher harmonics for robustness against distortion by the first harmonic due to low frequency accompaniments. Performance of these algorithms is evaluated on MIR-1k database and accuracy is estimated using Raw Pitch Accuracy (RPA), Raw Chroma Accuracy (RCA) and timbre feature.
{"title":"Implementation of melody extraction algorithms from polyphonic audio for Music Information Retrieval","authors":"Anupriya O. Gathekar, A. Deshpande","doi":"10.1109/ICAECCT.2016.7942546","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942546","url":null,"abstract":"Melody extraction from polyphonic audio, which consists of number of different instruments, is one of the most challenging tasks in the field of Music Information Retrieval (MIR). This paper aims at implementation of extracting melody using two-way mismatch dual pitch tracking (TWMDPT) and harmonic cluster tracking (HCT) algorithms. In this work, melody of singing voice is estimated in presence of multi-accompaniment. In the first method temporal features of voice harmonics are used to find the voice pitch and it is based on salience function. The second method depends upon strong higher harmonics for robustness against distortion by the first harmonic due to low frequency accompaniments. Performance of these algorithms is evaluated on MIR-1k database and accuracy is estimated using Raw Pitch Accuracy (RPA), Raw Chroma Accuracy (RCA) and timbre feature.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"96 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89983998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942606
P. Sonwane, B. E. Kushare
Utility aims capacitor placement for power factor improvement, capacity release, voltage profile and reduction of power losses. Today, reliability is an important parameter in electrical industry to achieve high security and adequacy of the system. There are three important parameters required to be introduced in reliability viz customer composite damage function, average load and failure rate. If failure rate is reduced by means of optimal capacitor placement then reliability cost is also reduced. In this Paper, Objective function is developed and used in evaluation considering the capacitor cost, benefits due to reduction in power loss and reliability cost which is a function of failure rate. Failure rate and it's modification due to number of capacitor placements are critical issues addressed in this paper. This paper also introduces the modification method for failure rate using thermal loading and life expectancy of electrical equipments such as transformer. PSO is used to find the optimal locations and capacitor sizing with the help of dot net framework. Before applying PSO tool, IEEE 30 bus system is evaluated for load flow study. Load flow data is processed through OCP module developed in novel software. OCP module has two treatments. In first treatment, data is processed for evaluation of various objectives without capacitor placement and in second treatment, PSO is allowed to find the optimal place and size of capacitor considering the constraints selected. This paper discusses on methodology implemented in the novel software OCP-PSO. Algorithms are discussed in each process.
{"title":"Algorithms and methodology for development of OCP-PSO tool for optimal capacitor placement to enhance system reliability","authors":"P. Sonwane, B. E. Kushare","doi":"10.1109/ICAECCT.2016.7942606","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942606","url":null,"abstract":"Utility aims capacitor placement for power factor improvement, capacity release, voltage profile and reduction of power losses. Today, reliability is an important parameter in electrical industry to achieve high security and adequacy of the system. There are three important parameters required to be introduced in reliability viz customer composite damage function, average load and failure rate. If failure rate is reduced by means of optimal capacitor placement then reliability cost is also reduced. In this Paper, Objective function is developed and used in evaluation considering the capacitor cost, benefits due to reduction in power loss and reliability cost which is a function of failure rate. Failure rate and it's modification due to number of capacitor placements are critical issues addressed in this paper. This paper also introduces the modification method for failure rate using thermal loading and life expectancy of electrical equipments such as transformer. PSO is used to find the optimal locations and capacitor sizing with the help of dot net framework. Before applying PSO tool, IEEE 30 bus system is evaluated for load flow study. Load flow data is processed through OCP module developed in novel software. OCP module has two treatments. In first treatment, data is processed for evaluation of various objectives without capacitor placement and in second treatment, PSO is allowed to find the optimal place and size of capacitor considering the constraints selected. This paper discusses on methodology implemented in the novel software OCP-PSO. Algorithms are discussed in each process.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"320-327"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83075150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942607
P. P. Gutal, R. Kothe, S.B. Jahveri
Among various cloud services, storage is one of the fast utilizing and hugest category of cloud service. Very huge amount of data is stored at cloud storage servers by various users or organizations. With such services, various key issues are arises such as data security, confidentiality. To overcome these, the key concept was introduced such as Cryptography. In cryptography, various keys are used to encrypt or decrypt the data before uploading or downloading from cloud server. To generate the private and public key pair, distributed key generation (DKG) protocol was introduced. But within organization there is another issue is arises, regarding to authority based data access control policy. That is only user with particular authority can access data stored at cloud, based on their authority level. For this hierarchical threshold access structure (HTAS) is used along with DKG, known as HTDKG. In this, various users are divided into levels based on their designation and some threshold is assigned. At the time of data access, only specific levels users can access the specific amount of data. Because of this, all data is not revealed to any unconcern user. In existing system, HTDKG key generation and management is perform at user side which increases the management overhead. To overcome this issue, we introduced the third party Key Distribution Center (KDC), which execute the HTDKG protocol and take responsibility of all key generation, distribution and management activities. Experimental results prove that the proposed system decrease the processing time and enhances the memory utilization by utilizing of KDC.
{"title":"Efficient hierarchical cloud storage data access structure with KDC","authors":"P. P. Gutal, R. Kothe, S.B. Jahveri","doi":"10.1109/ICAECCT.2016.7942607","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942607","url":null,"abstract":"Among various cloud services, storage is one of the fast utilizing and hugest category of cloud service. Very huge amount of data is stored at cloud storage servers by various users or organizations. With such services, various key issues are arises such as data security, confidentiality. To overcome these, the key concept was introduced such as Cryptography. In cryptography, various keys are used to encrypt or decrypt the data before uploading or downloading from cloud server. To generate the private and public key pair, distributed key generation (DKG) protocol was introduced. But within organization there is another issue is arises, regarding to authority based data access control policy. That is only user with particular authority can access data stored at cloud, based on their authority level. For this hierarchical threshold access structure (HTAS) is used along with DKG, known as HTDKG. In this, various users are divided into levels based on their designation and some threshold is assigned. At the time of data access, only specific levels users can access the specific amount of data. Because of this, all data is not revealed to any unconcern user. In existing system, HTDKG key generation and management is perform at user side which increases the management overhead. To overcome this issue, we introduced the third party Key Distribution Center (KDC), which execute the HTDKG protocol and take responsibility of all key generation, distribution and management activities. Experimental results prove that the proposed system decrease the processing time and enhances the memory utilization by utilizing of KDC.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"84 1","pages":"328-332"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83213740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942551
Sanaha S. Pathan, A. Harale
Counting the number of objects from an image is an essential part of image processing. Detecting the number of objects from an image is useful for further analysis in global application. Producing and counting silkworm eggs is very complicated process and requires large man power also extra time will be required so to reduce man power and efforts that required for counting silkworm eggs a method automated silkworm eggs count is useful. Convential method is by using calculator and manually which is erroneous and also waste of time. In this paper, we introduced method for automatically counting the number of silkworm eggs from an image. The objective of proposed method is detecting an eggs portion for counting and eliminating non egg portion from silkworm DFL sheet. We presented image segmentation technique for detecting egg portion, area based thresholding for removing small noise and barriers. Number of objects can be calculated by using object counting functions present in MATLAB.
{"title":"Automated silkworm eggs count","authors":"Sanaha S. Pathan, A. Harale","doi":"10.1109/ICAECCT.2016.7942551","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942551","url":null,"abstract":"Counting the number of objects from an image is an essential part of image processing. Detecting the number of objects from an image is useful for further analysis in global application. Producing and counting silkworm eggs is very complicated process and requires large man power also extra time will be required so to reduce man power and efforts that required for counting silkworm eggs a method automated silkworm eggs count is useful. Convential method is by using calculator and manually which is erroneous and also waste of time. In this paper, we introduced method for automatically counting the number of silkworm eggs from an image. The objective of proposed method is detecting an eggs portion for counting and eliminating non egg portion from silkworm DFL sheet. We presented image segmentation technique for detecting egg portion, area based thresholding for removing small noise and barriers. Number of objects can be calculated by using object counting functions present in MATLAB.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"1 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85700293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942616
S. Rane, N. Shekokar
Website security is a major concern in today's world. CAPTCHA are used to protect websites from spammers, bots and unauthorized users. Different types of CAPTCHA are text CAPTCHA and graphical CAPTCHA. Text CAPTCHA are vulnerable to segmentation attack and graphical CAPTCHA are vulnerable to bot attack. To overcome such attacks we have designed a modern graphical CAPTCHA system by combining the concept of reCAPTCHA and graphical CAPTCHA. Our proposed system contains two images in CAPTCHA challenge and user performs click event to solve the CAPTCHA. In conducted survey, it is proved that system gain high usability, learnability, memorability, accuracy and robustness against bot and spamming attack.
{"title":"3D Socio Graphical CAPTCHA based on reCAPTCHA against spammers and bots","authors":"S. Rane, N. Shekokar","doi":"10.1109/ICAECCT.2016.7942616","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942616","url":null,"abstract":"Website security is a major concern in today's world. CAPTCHA are used to protect websites from spammers, bots and unauthorized users. Different types of CAPTCHA are text CAPTCHA and graphical CAPTCHA. Text CAPTCHA are vulnerable to segmentation attack and graphical CAPTCHA are vulnerable to bot attack. To overcome such attacks we have designed a modern graphical CAPTCHA system by combining the concept of reCAPTCHA and graphical CAPTCHA. Our proposed system contains two images in CAPTCHA challenge and user performs click event to solve the CAPTCHA. In conducted survey, it is proved that system gain high usability, learnability, memorability, accuracy and robustness against bot and spamming attack.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"11 1","pages":"372-377"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76438511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942566
Priya Kharmate, Ranjeetsingh S. Suryawanshi
Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.
{"title":"Cloud Based Two Tier Security Scheme for Store, Share and Audit Our Data into Cloud","authors":"Priya Kharmate, Ranjeetsingh S. Suryawanshi","doi":"10.1109/ICAECCT.2016.7942566","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942566","url":null,"abstract":"Cloud computing is rising as a powerful computing tool which utilizes advanced computational power with its improving data sharing and data securing limits have great contribution to Green IT. The security aspect plays crucial role in cloud, as the decision of shifting to cloud from customer's perspective mainly depends upon privacy of the data vis-à-vis the other benefits they would attain by shifting on cloud storage. The overall emphasis of this project is to conquer security issues as in the existing system remote verification technique used to audit cloud data by the third party or private auditing and it requires the presence of data owners to manage the authentication. In the proposed system we are using the own auditing based on the token generation. The regeneration problem of failed authorized users in the absence of data owners is solved through a proxy, which is used to regenerate the authorized users into the traditional public auditing system. To set up an effective Third party auditor, the auditing process should give user data privacy and user should free from online burden ultimately minimize the computational overhead. We propose a secure cloud-based storage system that supports public auditing and preserve privacy and that allows the Third party auditor to perform simultaneously and efficiently audits for multiple users.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"30 1","pages":"116-121"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76483635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942582
P. Varade, Y. Ravinder
In this paper, the Testbed implementation of cognitive radio for green communication using Universal Software Radio peripheral (USRP) is investigated. The main objective of this Testbed is to create a realistic and accurate platform to implement and validate innovative and novel schemes for spectrum sensing and resource allocations for cognitive radio networks to achieve Green communication. For spectrum sensing energy detection method is used. Resource allocation to maximize energy efficiency is carried out using single user and multiuser system where subcarrier and power allocation is done sequentially to reduce complexity of the system. Testbed consists of two host computers connected to two USRP (2922) devices operating in the range 400MHz to 4.4GHz. Experimental results confirm that for single user system maximum energy efficiency achieved is 267 bits/Joule, In a multiuser system, maximum energy efficiency achieved is 145 bits/Joule.
{"title":"Novel Testbed implementation for resource allocation in cognitive radio for green communication","authors":"P. Varade, Y. Ravinder","doi":"10.1109/ICAECCT.2016.7942582","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942582","url":null,"abstract":"In this paper, the Testbed implementation of cognitive radio for green communication using Universal Software Radio peripheral (USRP) is investigated. The main objective of this Testbed is to create a realistic and accurate platform to implement and validate innovative and novel schemes for spectrum sensing and resource allocations for cognitive radio networks to achieve Green communication. For spectrum sensing energy detection method is used. Resource allocation to maximize energy efficiency is carried out using single user and multiuser system where subcarrier and power allocation is done sequentially to reduce complexity of the system. Testbed consists of two host computers connected to two USRP (2922) devices operating in the range 400MHz to 4.4GHz. Experimental results confirm that for single user system maximum energy efficiency achieved is 267 bits/Joule, In a multiuser system, maximum energy efficiency achieved is 145 bits/Joule.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"127 1","pages":"198-203"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74924777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942622
Sheila A. Abaya, Ejay Cabico, Jonah Domingo, Rommel Diaz, H. Kojima, R. Rivera
Fire alarm system is considered as one of the most essential mechanisms for safety against fire. In fact, most structural buildings especially the commercial ones are required by law to be equipped with this technology. The Bureau of Fire Protection (BFP) in the Philippines have recorded a total of 12,301 fire incidents in the year 2013, in the year 2014 there were 15,897 and in January 2015 a total of 1,848 incidents have transpired. Out of these incidents, 244 lives were lost in 2013 and 263 in 2014. Aside from the lives that were taken, these destructive killer fires also caused a lot of homeless individuals that have brought property damage to 5.5B in 2013, 3.3M in 2014 and 411M since January 2015. In spite of the figures, the BFP is still implementing measures that foster safety and fire prevention in whatever structural setup you are living or staying in. This information has motivated the development of an embedded technology of detecting and locating fire occurrence for possible deployment in the BFP agencies or fire stations in the country to provide immediate response and actions in mitigating fire incidents. The proposed system structure is an integration of sensors, microcontrollers and wireless sending of data. Homes, offices, schools or any building structure equipped with this technology will be an implementing measure in reducing the occurrence of destructive and killer fires.
{"title":"An embedded system of dedicated and real-time fire detector and locator technology as an interactive response mechanism in fire occurrences","authors":"Sheila A. Abaya, Ejay Cabico, Jonah Domingo, Rommel Diaz, H. Kojima, R. Rivera","doi":"10.1109/ICAECCT.2016.7942622","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942622","url":null,"abstract":"Fire alarm system is considered as one of the most essential mechanisms for safety against fire. In fact, most structural buildings especially the commercial ones are required by law to be equipped with this technology. The Bureau of Fire Protection (BFP) in the Philippines have recorded a total of 12,301 fire incidents in the year 2013, in the year 2014 there were 15,897 and in January 2015 a total of 1,848 incidents have transpired. Out of these incidents, 244 lives were lost in 2013 and 263 in 2014. Aside from the lives that were taken, these destructive killer fires also caused a lot of homeless individuals that have brought property damage to 5.5B in 2013, 3.3M in 2014 and 411M since January 2015. In spite of the figures, the BFP is still implementing measures that foster safety and fire prevention in whatever structural setup you are living or staying in. This information has motivated the development of an embedded technology of detecting and locating fire occurrence for possible deployment in the BFP agencies or fire stations in the country to provide immediate response and actions in mitigating fire incidents. The proposed system structure is an integration of sensors, microcontrollers and wireless sending of data. Homes, offices, schools or any building structure equipped with this technology will be an implementing measure in reducing the occurrence of destructive and killer fires.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"9 1","pages":"407-411"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72893385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942593
Abhay B. Rathod, S. M. Gulhane, Shailesh R. Padalwar
Distance measure plays an important role in permutation problems. Choosing the right distance measure for a given permutation is a biggest challenge. In this paper, we investigates Hamming, Euclidean, Manhattan and Squared Euclidean distance measures for their applicability to various permutation problem. This paper surveys existing distance measures for permutation and present a comparison between them based on application domain, time required to compute, benefits and drawbacks. From the simulation result it is shown that Hamming distance outperform the Euclidean, Manhattan and Squared Euclidean distance measures. This comparison helps the researchers to take quick decision about which distance measure to use for permutation problem. We conclude this work by identifying trends and challenges of research and development towards permutation problem.
{"title":"A comparative study on distance measuring approches for permutation representations","authors":"Abhay B. Rathod, S. M. Gulhane, Shailesh R. Padalwar","doi":"10.1109/ICAECCT.2016.7942593","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942593","url":null,"abstract":"Distance measure plays an important role in permutation problems. Choosing the right distance measure for a given permutation is a biggest challenge. In this paper, we investigates Hamming, Euclidean, Manhattan and Squared Euclidean distance measures for their applicability to various permutation problem. This paper surveys existing distance measures for permutation and present a comparison between them based on application domain, time required to compute, benefits and drawbacks. From the simulation result it is shown that Hamming distance outperform the Euclidean, Manhattan and Squared Euclidean distance measures. This comparison helps the researchers to take quick decision about which distance measure to use for permutation problem. We conclude this work by identifying trends and challenges of research and development towards permutation problem.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"18 1","pages":"251-255"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72726770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICAECCT.2016.7942573
Abhijit Patankar, K. Kulhalli, Kotrappa Sirbi
In this 21st century, Internet is very important part of modern life. Along with Internet, OSN's also become integral part of life. OSN's provide a platform for people to share their views, ideas, information with each other irrespective of their location. By collecting this information, Sentiment Analysis can be done which helps us to gain wider public opinion about certain topic. Writer's feelings expressed in positive or negative tweets can be identified by scrutinizing large number of documents using Natural language processing and Information Extraction.
{"title":"Emotweet: Sentiment Analysis tool for twitter","authors":"Abhijit Patankar, K. Kulhalli, Kotrappa Sirbi","doi":"10.1109/ICAECCT.2016.7942573","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942573","url":null,"abstract":"In this 21st century, Internet is very important part of modern life. Along with Internet, OSN's also become integral part of life. OSN's provide a platform for people to share their views, ideas, information with each other irrespective of their location. By collecting this information, Sentiment Analysis can be done which helps us to gain wider public opinion about certain topic. Writer's feelings expressed in positive or negative tweets can be identified by scrutinizing large number of documents using Natural language processing and Information Extraction.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"11 1","pages":"157-159"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72674492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}