首页 > 最新文献

IOSR journal of computer engineering最新文献

英文 中文
Statistical Downscaling Based On Multiple Linear Regression Analysis for Temperature and Precipitation inLidder River Basin of India 基于多元线性回归分析的印度利德河流域温度和降水统计降尺度
Pub Date : 2017-07-01 DOI: 10.9790/3021-0706015560
Mehnaza Akhter
In the present study multiple linear regression technique was used to carry out the downscaling of GCM predictors.The large scale GCM predictors were obtained from the Global Climate Model namely CGCM3 (Canadian Global Climate model) and were related to locally observed precipitation and temperature at Pahalgam meteorological station which is located in the Lidder River Basin.Appropriate predictandpredictor relationships were found out for the region by carrying out regression analysis. So the future projections of climate were made for the basin upto 21st century using CGCM3 model. At the end of the 21st century the mean annual temperature of theLidder river basin is predicted to increase by 1.91°C, whereas the average annual precipitation is predicted to decrease substantially by 27.56% using CGCM3 model.
本研究采用多元线性回归技术对GCM预测因子进行降尺度处理。大尺度GCM预测因子来自全球气候模式CGCM3(加拿大全球气候模式),并与位于lider河流域的Pahalgam气象站的局地观测降水和温度有关。通过回归分析,找到了适合该地区的预测因子和预测因子关系。因此,利用CGCM3模式对流域未来至21世纪的气候进行了预估。利用CGCM3模式预测,21世纪末利德尔河流域年平均气温将上升1.91°C,年平均降水量将大幅减少27.56%。
{"title":"Statistical Downscaling Based On Multiple Linear Regression Analysis for Temperature and Precipitation inLidder River Basin of India","authors":"Mehnaza Akhter","doi":"10.9790/3021-0706015560","DOIUrl":"https://doi.org/10.9790/3021-0706015560","url":null,"abstract":"In the present study multiple linear regression technique was used to carry out the downscaling of GCM predictors.The large scale GCM predictors were obtained from the Global Climate Model namely CGCM3 (Canadian Global Climate model) and were related to locally observed precipitation and temperature at Pahalgam meteorological station which is located in the Lidder River Basin.Appropriate predictandpredictor relationships were found out for the region by carrying out regression analysis. So the future projections of climate were made for the basin upto 21st century using CGCM3 model. At the end of the 21st century the mean annual temperature of theLidder river basin is predicted to increase by 1.91°C, whereas the average annual precipitation is predicted to decrease substantially by 27.56% using CGCM3 model.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90832681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Ontology Based Collaborative Filtering Recommendation Algorithms in E-Commerce Applications 电子商务中基于本体的协同过滤推荐算法研究
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904011419
H. Mohana, M. Suriakala
Recommender system is a growing proliferation in today online applications contributed to the problems of Information overloading. In a day to day life enormous amount of data is generated and collected leads to a problem of information overloading. This paper focuses on how to deal with the problem of information overloading and how to recommend an additional product to the end user using collaborative filtering (CF) recommendation algorithms. The personalized recommendation algorithm with their benefits and limitations are described. A pitfall occurs in CF recommendation system is described. An outline framework is proposed for the initial stage of recommendation. A sample problem statement is framed to show how recommendation technology is embedded in to the framework.
推荐系统是当今在线应用程序日益泛滥的一个原因,造成了信息过载的问题。在日常生活中,产生和收集的大量数据导致了信息过载的问题。本文主要研究如何处理信息过载问题,以及如何使用协同过滤(CF)推荐算法向最终用户推荐额外的产品。介绍了个性化推荐算法的优缺点。描述了CF推荐系统中存在的一个缺陷。在建议的初始阶段,提出了一个大纲框架。本文给出了一个示例问题陈述,以展示如何将推荐技术嵌入到框架中。
{"title":"A Study on Ontology Based Collaborative Filtering Recommendation Algorithms in E-Commerce Applications","authors":"H. Mohana, M. Suriakala","doi":"10.9790/0661-1904011419","DOIUrl":"https://doi.org/10.9790/0661-1904011419","url":null,"abstract":"Recommender system is a growing proliferation in today online applications contributed to the problems of Information overloading. In a day to day life enormous amount of data is generated and collected leads to a problem of information overloading. This paper focuses on how to deal with the problem of information overloading and how to recommend an additional product to the end user using collaborative filtering (CF) recommendation algorithms. The personalized recommendation algorithm with their benefits and limitations are described. A pitfall occurs in CF recommendation system is described. An outline framework is proposed for the initial stage of recommendation. A sample problem statement is framed to show how recommendation technology is embedded in to the framework.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75445310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Entropy Driven Bit Coding For Image Compression In Medical Application 熵驱动位编码在医学图像压缩中的应用
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903035360
S. Jagadeesh, E. Nagabhooshanam
This paper present a new bit redundancy coding for image compression in binary bit planar coding. In the compression model, images are coded into binary level to stream over a communication medium or to store the processed data in a remote location. In this processing, the representative coefficients are coded in binary level and to minimize the resource overhead these bits are compressed using binary compression logic. Among different coding logic, Huffman coding is the standard coding approach, standardized by JPEG and JPEG-2K image compression committee. The coding schemes computes a bit pattern occurrence probability and derive a allocating code word for a pattern to be compressed. The advantage of utilizing redundancy coding result in higher compression. However, the over-coding issue for lower pattern probability gives a inverse compression affect in image compression. In this paper, this issue is addressed an a new hybrid image coding approach developing a mixed model approach of variable entropy coding and fixed pattern allotment is proposed. The proposed hybrid approach termed “Selective Hybrid Coding” is used for the compression of medical samples and compared for performance evaluation to the conventional image compression model.
在二进制位平面编码中,提出了一种新的图像压缩位冗余编码。在压缩模型中,图像被编码为二进制级,以便在通信介质上传输或将处理后的数据存储在远程位置。在此处理中,代表性系数以二进制级别编码,并使用二进制压缩逻辑对这些位进行压缩,以最小化资源开销。在不同的编码逻辑中,霍夫曼编码是标准的编码方式,由JPEG和JPEG- 2k图像压缩委员会标准化。编码方案计算位模式出现的概率,并为要压缩的模式导出分配码字。利用冗余编码的优点导致更高的压缩。然而,低模式概率下的过编码问题会对图像压缩产生反压缩影响。本文提出了一种新的混合图像编码方法,即可变熵编码和固定模式分配的混合模型方法。所提出的混合方法被称为“选择性混合编码”用于医学样本的压缩,并与传统的图像压缩模型进行性能评估比较。
{"title":"Entropy Driven Bit Coding For Image Compression In Medical Application","authors":"S. Jagadeesh, E. Nagabhooshanam","doi":"10.9790/0661-1903035360","DOIUrl":"https://doi.org/10.9790/0661-1903035360","url":null,"abstract":"This paper present a new bit redundancy coding for image compression in binary bit planar coding. In the compression model, images are coded into binary level to stream over a communication medium or to store the processed data in a remote location. In this processing, the representative coefficients are coded in binary level and to minimize the resource overhead these bits are compressed using binary compression logic. Among different coding logic, Huffman coding is the standard coding approach, standardized by JPEG and JPEG-2K image compression committee. The coding schemes computes a bit pattern occurrence probability and derive a allocating code word for a pattern to be compressed. The advantage of utilizing redundancy coding result in higher compression. However, the over-coding issue for lower pattern probability gives a inverse compression affect in image compression. In this paper, this issue is addressed an a new hybrid image coding approach developing a mixed model approach of variable entropy coding and fixed pattern allotment is proposed. The proposed hybrid approach termed “Selective Hybrid Coding” is used for the compression of medical samples and compared for performance evaluation to the conventional image compression model.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72438762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Compression Using Wavelet Transform 基于小波变换的语音压缩
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903063341
H. Petkar
This paper applies wavelet analysis to speech compression. A mother or basis wavelet is first chosen for the compression. The signal is then decomposed to a set of scaled and translated versions of the mother wavelet. The resulting wavelet coefficients that are insignificant or close to zero are truncated achieving signal compression. Analysis of the compression process was performed by comparing the compressed-decompressed signal against the original. This was conducted to determine the effect of the choice of mother wavelet on the speech compression. The results however showed that regardless of bases wavelet used the compression ratio is relatively close to one another.
本文将小波分析应用于语音压缩。首先选择母小波或基小波进行压缩。然后将信号分解为一组母小波的缩放和平移版本。所得到的小波系数不显著或接近于零被截断,从而实现信号压缩。通过将压缩后的解压缩信号与原始信号进行比较,对压缩过程进行分析。这是为了确定母小波的选择对语音压缩的影响。结果表明,无论采用何种基小波,压缩比都比较接近。
{"title":"Speech Compression Using Wavelet Transform","authors":"H. Petkar","doi":"10.9790/0661-1903063341","DOIUrl":"https://doi.org/10.9790/0661-1903063341","url":null,"abstract":"This paper applies wavelet analysis to speech compression. A mother or basis wavelet is first chosen for the compression. The signal is then decomposed to a set of scaled and translated versions of the mother wavelet. The resulting wavelet coefficients that are insignificant or close to zero are truncated achieving signal compression. Analysis of the compression process was performed by comparing the compressed-decompressed signal against the original. This was conducted to determine the effect of the choice of mother wavelet on the speech compression. The results however showed that regardless of bases wavelet used the compression ratio is relatively close to one another.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77394573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Investigation into Ipredation in Cyberspace towards Developing a Framework for Preventing Ipredators’ Attacks 对网络空间网络掠夺行为的研究,以建立防止网络掠夺者攻击的框架
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903052836
Ambrose Kinyanjui Muchonjo, G. Wanyembi, C. Makori
The information age society is becoming highly dependent on technological advancements and in particular software platform and devices that can access the cyberspace. The way people acquire, access and share data, files and, information have significantly revolutionized peoples‟ social-technical interactions shaping their lifestyle and activities in regard to both the physical space and cyberspace. Ubiquitous computing for instance tends to offer digital society great, exciting, powerful features and capabilities that enable reliable and productive encounters within convenient environments. In ubiquitous environments however, there is high possibility of users‟ data, files and other users‟ digital assets being exposed to high risk of disclosure and tampering by iPredators. Such disclosure and tampering of users‟ sensitive data and information potentially exposes the targeted persons in society to many risks in regard to their digital and environmental security and privacy. In event of a successful iPredator‟s attacks on targets, the aftermath tend to be quite devastating sometimes leading to loss of lives, financial investments, critical data, human dignity and/or freedom. Dangers lurking in the cyberspace where there is increased usage of ICTs within a highly connected society of people and devices are therefore real and costly. The iPredators attack on users in cyberspace is a problem that requires cyber security awareness for users to address. To achieve this, this paper explored the various typologies of iPredators attacks targeting users in the cyberspace. The output of the study lead to a proposed framework by the researcher for preventing iPredators attacks on cyberspace. Desktop study research technique was adopted by the study which inclined to qualitative research design.
信息时代的社会越来越依赖于技术的进步,特别是能够进入网络空间的软件平台和设备。人们获取、访问和共享数据、文件和信息的方式极大地改变了人们的社会技术互动,塑造了他们在物理空间和网络空间的生活方式和活动。例如,无处不在的计算倾向于为数字社会提供伟大、令人兴奋、强大的特性和功能,使人们能够在方便的环境中进行可靠和富有成效的接触。然而,在无处不在的环境中,用户的数据、文件和其他用户的数字资产极有可能暴露在ipredator泄露和篡改的高风险中。这种对用户敏感数据和信息的披露和篡改,可能会使社会上的目标人群在数字和环境安全和隐私方面面临许多风险。一旦“捕食者”成功攻击目标,后果往往是毁灭性的,有时会导致生命、金融投资、关键数据、人类尊严和/或自由的损失。因此,在一个人与设备高度互联的社会中,随着信息通信技术使用量的增加,潜伏在网络空间中的危险是真实存在且代价高昂的。ipredator对网络空间用户的攻击是一个需要用户提高网络安全意识才能解决的问题。为了实现这一点,本文探讨了针对网络空间用户的ipredator攻击的各种类型。这项研究的结果导致了一个由研究人员提出的框架,用于防止ipredator对网络空间的攻击。本研究采用桌面研究方法,倾向于定性研究设计。
{"title":"An Investigation into Ipredation in Cyberspace towards Developing a Framework for Preventing Ipredators’ Attacks","authors":"Ambrose Kinyanjui Muchonjo, G. Wanyembi, C. Makori","doi":"10.9790/0661-1903052836","DOIUrl":"https://doi.org/10.9790/0661-1903052836","url":null,"abstract":"The information age society is becoming highly dependent on technological advancements and in particular software platform and devices that can access the cyberspace. The way people acquire, access and share data, files and, information have significantly revolutionized peoples‟ social-technical interactions shaping their lifestyle and activities in regard to both the physical space and cyberspace. Ubiquitous computing for instance tends to offer digital society great, exciting, powerful features and capabilities that enable reliable and productive encounters within convenient environments. In ubiquitous environments however, there is high possibility of users‟ data, files and other users‟ digital assets being exposed to high risk of disclosure and tampering by iPredators. Such disclosure and tampering of users‟ sensitive data and information potentially exposes the targeted persons in society to many risks in regard to their digital and environmental security and privacy. In event of a successful iPredator‟s attacks on targets, the aftermath tend to be quite devastating sometimes leading to loss of lives, financial investments, critical data, human dignity and/or freedom. Dangers lurking in the cyberspace where there is increased usage of ICTs within a highly connected society of people and devices are therefore real and costly. The iPredators attack on users in cyberspace is a problem that requires cyber security awareness for users to address. To achieve this, this paper explored the various typologies of iPredators attacks targeting users in the cyberspace. The output of the study lead to a proposed framework by the researcher for preventing iPredators attacks on cyberspace. Desktop study research technique was adopted by the study which inclined to qualitative research design.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85628241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RSA-A Symmetric Key Cryptosystem rsa -对称密钥密码系统
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903035357
S. Sawant, V. Kamat, Vishal Snedan Robertson, Sneha Kamat, Anish Thali, Anuj Shetgaonkar
Data security has become a growing concern in this digital age. Current cryptographic algorithms either compromise on computational speed or data security. We put forth a variable key length 1024-bit symmetric cryptosystem which encrypts and decrypts text data in the form of 256-bit blocks at a time. It is fast as well secure and it is completely dependent on the key.
在这个数字时代,数据安全已成为人们日益关注的问题。当前的加密算法要么降低了计算速度,要么降低了数据安全性。提出了一种可变密钥长度的1024位对称密码系统,每次对256位块形式的文本数据进行加密和解密。它既快速又安全,并且完全依赖于密钥。
{"title":"RSA-A Symmetric Key Cryptosystem","authors":"S. Sawant, V. Kamat, Vishal Snedan Robertson, Sneha Kamat, Anish Thali, Anuj Shetgaonkar","doi":"10.9790/0661-1903035357","DOIUrl":"https://doi.org/10.9790/0661-1903035357","url":null,"abstract":"Data security has become a growing concern in this digital age. Current cryptographic algorithms either compromise on computational speed or data security. We put forth a variable key length 1024-bit symmetric cryptosystem which encrypts and decrypts text data in the form of 256-bit blocks at a time. It is fast as well secure and it is completely dependent on the key.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85818906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Implementation of a Real Time Image Compression 实时图像压缩的硬件实现
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903050613
M. Al-Ani
Real time processing of image deals with applying all required operations within a range of time not exceed the acceptable time of human eyes. Real time processing does not realized on standalone computer, so it need special hardware. The big challenge of image processing work is the processing time, in which there are big amount of data (pixels) that must be processed at a specific time. The most important objective aspect of this work and any image processing algorithm (software or hardware) is how to implement it in an efficient way via the effective management of the scheduling of the processing jobs and time allocated for each job. This work try to avoid this problem by inserting a Raspberry Pi device which is working as microcomputer and has the ability to work with image, video, audio and data. Compensating between hardware and software is very important to achieve an efficient implemented system. This work mixing between hardware (Raspberry Pi device) and the software compression algorithm to reach acceptable low cost and high speed operated system. The synchronization between hardware and software leads to an efficient architecture that can achieve the real time processing.
图像的实时处理涉及在不超过人眼可接受的时间范围内应用所有必需的操作。在独立的计算机上无法实现实时处理,因此需要特殊的硬件。图像处理工作的最大挑战是处理时间,其中有大量的数据(像素)必须在特定的时间处理。这项工作和任何图像处理算法(软件或硬件)最重要的客观方面是如何通过有效管理处理作业的调度和为每个作业分配的时间,以有效的方式实现它。这项工作试图通过插入树莓派设备来避免这个问题,树莓派设备作为微型计算机工作,具有处理图像、视频、音频和数据的能力。硬件和软件之间的补偿对于实现一个高效的系统非常重要。这项工作混合了硬件(树莓派设备)和软件压缩算法,以达到可接受的低成本和高速操作系统。硬件和软件之间的同步导致了一个高效的体系结构,可以实现实时处理。
{"title":"Hardware Implementation of a Real Time Image Compression","authors":"M. Al-Ani","doi":"10.9790/0661-1903050613","DOIUrl":"https://doi.org/10.9790/0661-1903050613","url":null,"abstract":"Real time processing of image deals with applying all required operations within a range of time not exceed the acceptable time of human eyes. Real time processing does not realized on standalone computer, so it need special hardware. The big challenge of image processing work is the processing time, in which there are big amount of data (pixels) that must be processed at a specific time. The most important objective aspect of this work and any image processing algorithm (software or hardware) is how to implement it in an efficient way via the effective management of the scheduling of the processing jobs and time allocated for each job. This work try to avoid this problem by inserting a Raspberry Pi device which is working as microcomputer and has the ability to work with image, video, audio and data. Compensating between hardware and software is very important to achieve an efficient implemented system. This work mixing between hardware (Raspberry Pi device) and the software compression algorithm to reach acceptable low cost and high speed operated system. The synchronization between hardware and software leads to an efficient architecture that can achieve the real time processing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77942967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Extracting the Frequent Item Sets by Using Greedy Strategy in Hadoop 基于贪婪策略的Hadoop频繁项集提取
Pub Date : 2017-06-01 DOI: 10.9790/0661-1904018390
B. Veerendranadh, Mr. Manoj Kumar
Information mining came into the presence because of mechanical advances in numerous various controls. As it were, every one of the information on the planet are of no incentive without components to proficiently and successfully remove data and learning from them. In contrast with other information mining fields, visit design mining is a generally late improvement. This paper exhibits a novel approach through which the Apriori calculation can be progressed. The adjusted calculation presents elements time devoured in exchanges filtering for competitor itemsets and the quantities of tenets produced are additionally diminished. Catchphrases: Apriori, Frequent itemsets, Minimum Support, Confidence, Greedy Method.
信息挖掘的出现是由于许多不同控制的机械进步。可以说,地球上的每一个信息,如果没有组件来熟练和成功地删除数据并从中学习,就没有任何动力。与其他信息挖掘领域相比,访问设计挖掘是一个普遍较晚的发展。本文展示了一种新的方法,通过该方法可以推进Apriori计算。调整后的计算表明,在交换中过滤竞争对手项目集所消耗的时间和产生的原则数量也减少了。关键词:Apriori,频繁项集,最小支持度,置信度,贪婪方法。
{"title":"Extracting the Frequent Item Sets by Using Greedy Strategy in Hadoop","authors":"B. Veerendranadh, Mr. Manoj Kumar","doi":"10.9790/0661-1904018390","DOIUrl":"https://doi.org/10.9790/0661-1904018390","url":null,"abstract":"Information mining came into the presence because of mechanical advances in numerous various controls. As it were, every one of the information on the planet are of no incentive without components to proficiently and successfully remove data and learning from them. In contrast with other information mining fields, visit design mining is a generally late improvement. This paper exhibits a novel approach through which the Apriori calculation can be progressed. The adjusted calculation presents elements time devoured in exchanges filtering for competitor itemsets and the quantities of tenets produced are additionally diminished. Catchphrases: Apriori, Frequent itemsets, Minimum Support, Confidence, Greedy Method.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87747421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey: Searching Techniques 调查:搜索技术
Pub Date : 2017-06-01 DOI: 10.9790/0661-1903064748
M. S. Teli, Asst. Prof. Priti S. Subramanium
{"title":"A Survey: Searching Techniques","authors":"M. S. Teli, Asst. Prof. Priti S. Subramanium","doi":"10.9790/0661-1903064748","DOIUrl":"https://doi.org/10.9790/0661-1903064748","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83244871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigations of Ultrasonic Vibration Turning 超声振动车削的研究
Pub Date : 2017-06-01 DOI: 10.9790/3021-0705015457
Zhang Jia-jia, D. Bang, H. Tao
Ultrasonic vibration (UV) turning is a method with micro-scale high frequency vibration on the cutting tool to make the tool-workpiece interaction a periodically separation and the direction of the friction between tool and chip changed in each cycle of the ultrasonic vibration .The investigations show that the turning efficiency,the micro topography of machined surface can be improved and the ware of cutting tool, the deformation zone in a workpiece can be reduced by the application of the ultrasonic vibration machining. Finite element software simulation are performed on turning in this paper to clarify the advantages of applying tool ultrasonic vibration. The separation-contact process of ultrasonic vibration cutting and compare of ultrasonic vibration cutting force and normal cutting cutting force are studied.
超声振动车削是一种在刀具上施加微尺度高频振动,使刀-工件相互作用周期性分离,并且在超声振动的每一周期中刀具与切屑之间的摩擦方向发生变化的方法。研究表明,这种方法可以提高车削效率,改善加工表面的微观形貌,提高刀具的质量。应用超声振动加工可以减小工件的变形区。本文对车削过程进行了有限元软件仿真,阐明了应用刀具超声振动的优越性。研究了超声振动切削的分离接触过程,并对超声振动切削力与普通切削力进行了比较。
{"title":"Investigations of Ultrasonic Vibration Turning","authors":"Zhang Jia-jia, D. Bang, H. Tao","doi":"10.9790/3021-0705015457","DOIUrl":"https://doi.org/10.9790/3021-0705015457","url":null,"abstract":"Ultrasonic vibration (UV) turning is a method with micro-scale high frequency vibration on the cutting tool to make the tool-workpiece interaction a periodically separation and the direction of the friction between tool and chip changed in each cycle of the ultrasonic vibration .The investigations show that the turning efficiency,the micro topography of machined surface can be improved and the ware of cutting tool, the deformation zone in a workpiece can be reduced by the application of the ultrasonic vibration machining. Finite element software simulation are performed on turning in this paper to clarify the advantages of applying tool ultrasonic vibration. The separation-contact process of ultrasonic vibration cutting and compare of ultrasonic vibration cutting force and normal cutting cutting force are studied.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89587217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IOSR journal of computer engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1