2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)最新文献

筛选
英文 中文
Multiclass genetic programming based approach for classification of intrusions 基于多类遗传规划的入侵分类方法
Sunitha Gp, Rio G. L. D'Souza
{"title":"Multiclass genetic programming based approach for classification of intrusions","authors":"Sunitha Gp, Rio G. L. D'Souza","doi":"10.1109/ICATCCT.2017.8389109","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389109","url":null,"abstract":"Classification plays a major role in distinguishing the normal traffic from the intrusive ones in any intrusion detection system. Different approaches have been used by various researchers to improve the accuracy of the classifiers for binary and multiclass classification problems. Genetic programming (GP) algorithms have been applied in the previous studies and have confirmed that it performs well for classification problems. In our work, we have used a variation of the mutation operation which will be applied when the fitness of the individual does not change significantly for a specified number of generations. Several experiments were conducted using the standard GP method and using the modified mutation operation and the results obtained show that our approach gives good results for multiclass problem in comparison to the standard GP method.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126445416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient survey to detect Alzheimer disease using data mining techniques 一种利用数据挖掘技术检测阿尔茨海默病的有效方法
Anshul Bhagtani, T. Choudhury, G. Raj, M. Sharma
{"title":"An efficient survey to detect Alzheimer disease using data mining techniques","authors":"Anshul Bhagtani, T. Choudhury, G. Raj, M. Sharma","doi":"10.1109/ICATCCT.2017.8389107","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389107","url":null,"abstract":"Data Mining is a computational process of discovering a certain pattern in huge datasets. It is an essential process where technical processes are applied to get patterns. Alzheimer's disease should be detected very early so that preventive measures can be taken. Alzheimer's disease is a chronic disorder that worsens over time. AD is a disease which progresses slowly and is characterized by loss of neurons. The symptoms of dementia keep on worsening over a number of years. It leads to loss of memory which disrupts the life of that person. Reasoning skills and thinking ability is also affected. The most spread disease in Western Europe is dementia and it is least spread in Sub-Saharan Africa. On an average rate, two in three people with Alzheimer are women.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low power VLSI architecture for LTEx binary to gray converters ltx二灰转换器的低功耗VLSI架构
U. Ragavendran, M. Ramkumarraja, M. Ramachandran
{"title":"Low power VLSI architecture for LTEx binary to gray converters","authors":"U. Ragavendran, M. Ramkumarraja, M. Ramachandran","doi":"10.1109/ICATCCT.2017.8389115","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389115","url":null,"abstract":"A modular approach to realize the ultra-fast quantum-dot cellular automata (QCA) generic binary to gray converter is presented in this paper. The novel designs here validated fully exploit the intrinsic repetitive capabilities of the Layered Τ Exclusive OR (LTEx) module in the QCA domain. An efficient logic formulation of QCA design metrics like O-Cost and delay is proposed for the η-bit QCA binary to gray converter designs. The QCA implementation of η-bit LTEx binary to gray converter is compared with the conventional converters. An attempt has been made to enhance the speed of modular binary to gray converter designs. The proposed layouts offer the smaller feature size, reduced circuit complexity exploiting the modular based design approach. The simulation results have been carried out in the esteemed computer aided design tool, namely QCADesigner 2.0.3 with gallium arsenide heterostructure based parameter environment.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121057589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and simulation of FPGA based all digital phase locked loop (ADPLL) 基于FPGA的全数字锁相环(ADPLL)设计与仿真
Shruti Edway, R. Manjunath
{"title":"Design and simulation of FPGA based all digital phase locked loop (ADPLL)","authors":"Shruti Edway, R. Manjunath","doi":"10.1109/ICATCCT.2017.8389144","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389144","url":null,"abstract":"Phase locked loops are most widely used in communication systems. Most of the PLL's that are used currently are hybrid type PLL's, where only the phase detectors are digital where as voltage controlled oscillators and loop filters are analog. This article presents an all digital approach for the design, simulation, Synthesis, and implementation of FPGA based ADPLL centred at 196 KHz with a lock range of 10% using VHDL codes. Xilinx ISE Design Suit 14.5 tools is used for simulating VHDL Codes and Xilinx Spartan 6 LX45 FPGA board for implementation. The FPGA results are verified using chipscope pro analysis tool. FPGA implementation results showed conformance with regard to the simulation results. The proposed design methodology resulted reduction of resources by 42% and low process time of 8.11ns as against 12.99ns achieved by other design methodologies.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116521722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Challenges in annotation and domain adaptation in hindi POS tagger: With reference to cricket 印地语POS标注器在标注和领域适应方面的挑战:以板球为例
Anupam Pandey, Srishti Singh, Atul Kr. Ojha, Girish Nath Jha
{"title":"Challenges in annotation and domain adaptation in hindi POS tagger: With reference to cricket","authors":"Anupam Pandey, Srishti Singh, Atul Kr. Ojha, Girish Nath Jha","doi":"10.1109/icatcct.2017.8389124","DOIUrl":"https://doi.org/10.1109/icatcct.2017.8389124","url":null,"abstract":"In this paper, author reports the scope of domain adaptation for multi-domain Hindi POS tagger to a new domain, i.e. the popular domain of Cricket, through an initial experiment. Utility of Adaptation of new domain is proposed and verified by testing the accuracy of existing Hindi POS tagger for sports domain (here, Cricket) resulting in reduced average accuracy of 87.77% from approx. 94% overall tagger accuracy. Manual validation method is followed for evaluating the test result for generating correct error report for the sports domain data. Alongside, inter — annotator agreement/disagreement found among evaluators, and some major tagger based errors like unseen vocabulary and inconsistent performance has been recorded along with some suggestions for the improvement, serving as the basis of introducing adaptation for the Hindi tagger.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127026733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MQTT based environment monitoring in factories for employee safety 工厂中基于MQTT的员工安全环境监控
R. Kodali, Aditya Valdas
{"title":"MQTT based environment monitoring in factories for employee safety","authors":"R. Kodali, Aditya Valdas","doi":"10.1109/ICATCCT.2017.8389123","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389123","url":null,"abstract":"Safety of employees, in any industry, especially at the factory level is one of the most important aspects to be considered by businesses. This is of paramount importance, both for the well-being of the employees and that of the corporation as a whole. In factories where working conditions are harsh and employees need to take great caution while going about their work, it is common for mishaps to occur. With numbers going as high as into the thousands it is important that there is a measure of safety for the employees from any possible hazardous situations. As a solution to this problem, we propose a monitoring system to be installed in factories. With this system, we will be able to monitor critical safety parameters of the working environment in these factories so that we are well-aware of the safety situation and the possibility of occurence of any mishap. For the design of this system, we use an ESP8266 Wi-Fi chip enabled microcontroller NodeMCU. To this are connected three sensors — one to monitor temperature and humidity (DHT sensor), an ultrasonic sensor (HC-04) and a smoke sensor(MQ2 sensor). these sensors continually monitor the environment in the workplace and upload the data onto the Losant IoT Platform, which is one of the most powerful cloud platforms which help monitor data by different visualizations and further provisions.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131222840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Copy-move forgery detection using hybrid transform and K-means clustering technique 基于混合变换和k均值聚类技术的复制-移动伪造检测
Tawheed Jan Shah, M. Banday
{"title":"Copy-move forgery detection using hybrid transform and K-means clustering technique","authors":"Tawheed Jan Shah, M. Banday","doi":"10.1109/ICATCCT.2017.8389110","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389110","url":null,"abstract":"Currently, techniques such as copy-move forgery or image cloning and image splicing are used for digital image forgery. Out of these forgeries, copy-move forgery is the most common and popular approach because it involves only one image. Copy-move forgery is easy to create and very hard to detect. Thus, there is need of an efficient copy-move forgery detection technique to verify the authenticity and integrity of images. Copy-move forgery detection techniques are broadly of two types namely Block-based methods and Key-point based methods. In this paper, hybrid transform and K-means clustering technique based algorithm has been proposed to detect copy-move forgery in digital images. The application of hybrid transform allows the reduction of image features. Experimental results showed that the presented copy-move forgery detection algorithm is effective both in time and accuracy as compared to the existing algorithms.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128104329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ECG signal de-noising using complementary ensemble empirical mode decomposition and Kalman smoother 利用互补综经验模态分解和卡尔曼平滑对心电信号进行降噪
T. Keshavamurthy, M. N. Eshwarappa
{"title":"ECG signal de-noising using complementary ensemble empirical mode decomposition and Kalman smoother","authors":"T. Keshavamurthy, M. N. Eshwarappa","doi":"10.1109/ICATCCT.2017.8389118","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389118","url":null,"abstract":"The Electrocardiogram (ECG) is a representation of the electrical events of the cardiac cycle. Each event has a distinctive waveform and the study of wave form can lead to greater insight into a patient's cardiac pathophysiology. ECG is the biological signal and it represents the electrical activity of the heart. The signal is recorded by placing the electrode on the human body surface and the recorded signal includes several types of noises such as power line interference, electrode contact noise, muscle contractions, baseline wander, electro surgical noise, instrumental noise muscle contractions and composite noise. The proposed work is to develop a system which is used for removing or filtering the artifacts present in the given input signal. The input signal is an synthetic signal which consists of power line interference noise and composite noise as artifacts. The Complementary Ensemble Empirical Mode Decomposition (CEEMD) and Kalman Smoother methods are used for developing de-noising system for effective filtering of noise which is generated during the ECG signal recording. The combination of two methods are proposed in this work for better filtering performance. Pre-processing of the given input signal is performed by using band pass filter and decomposition of signal by wavelet transformation methods. The developed system performance can be evaluated by using SNR (Signal to Noise Ratio) and RMSE (Root Mean Square Error) and the results are tabulated. The results shows better performance and strongly recommend that, combined system performance gives better result compare to individual system results.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128347948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IOT based energy efficient security system 基于物联网的节能安防系统
Amreen Saba, Nagarathna
{"title":"IOT based energy efficient security system","authors":"Amreen Saba, Nagarathna","doi":"10.1109/ICATCCT.2017.8389120","DOIUrl":"https://doi.org/10.1109/ICATCCT.2017.8389120","url":null,"abstract":"Internet of things can support Enormous applications and services in various sectors such as smart cities and smart homes. IOT smart objects and it's components interact with other components Ex: proxies, mobile devices and data collectors along with various sensors for management, data sharing and other activities in the context of provided services. In recent years Raspberry Pi is being used enormously for the implementation of IOT applications. Here in particular we use Raspberry Pi to capture and compress images. Raspberry Pi board is mounted with PIR sensor which detects the movements around it, and a Pi camera which captures the image when movement is encountered the captured image is compressed on the raspberry pi using SVD compression methodology after which the compressed image is transmitted over the network to the desktop application where it is decompressed on the receiving end using Matlab. The primary aim of this paper is to achieve image compression which reduces considerable image size in terms of bytes during transmission to reduce latency issues and communication bandwidth during transmission of the image over the network and simultaneously preserve the useful features of the image.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building RMS for a RD using Wordnet 使用Wordnet为RD构建RMS
Shete Padmini, ProfG. A. Patii, Shivaji University, D. Patil
{"title":"Building RMS for a RD using Wordnet","authors":"Shete Padmini, ProfG. A. Patii, Shivaji University, D. Patil","doi":"10.1109/icatcct.2017.8389152","DOIUrl":"https://doi.org/10.1109/icatcct.2017.8389152","url":null,"abstract":"In reverse dictionary building a Reverse Mapping Set is important to extract the candidate words from the user input phrase. We present set of algorithms to build the RMS. Building the RMS in a Reverse Dictionary is significant to extend the search of more meaningful words for a user entered phrase to obtain efficient word as a result. We build reverse mapping set where we fetch the synsets like synonyms, hypernyms and hyponyms using an ExpandQuery algorithm. Building these synsets, we can explore the number of result in form of words and possibility of getting perspective results will be increased.","PeriodicalId":123050,"journal":{"name":"2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133904169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信