2017 International Conference on Information Communication and Embedded Systems (ICICES)最新文献

筛选
英文 中文
A fast collaborative filtering approach for web personalized recommendation system 一种面向web个性化推荐系统的快速协同过滤方法
Fayaz Dafedar, K. Bharati
{"title":"A fast collaborative filtering approach for web personalized recommendation system","authors":"Fayaz Dafedar, K. Bharati","doi":"10.1109/ICICES.2017.8070755","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070755","url":null,"abstract":"Collaborative Filtering (CF) is that the most significant technology that is employed in recommender systems (RS). However, this CF techniques area unit plagued by issues like quality in recommendation, big-error in predictions and data sparsity. A unique characteristic of TYCO is obtaining ‘neighbours’ based on typicality degree of user. In the collaborative web personalized Recommender system (WRS) the recommendations are created by similarity measure supported entropy so as to recommend the advice to the users of the system. Primarily the entropy based similarity is calculated between the users so as to realize quantifiability. Based on this entropy based similarity the online recommendations are going to generate and further suggestions can be given to the users based on their previous data and preferences. Moreover the proposed system can procure most accurate predictions with lesser big-error predictions.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132984448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A video target tracking using shadow suppression and feature extraction 一种基于阴影抑制和特征提取的视频目标跟踪方法
D. Mohanapriya, K. Mahesh
{"title":"A video target tracking using shadow suppression and feature extraction","authors":"D. Mohanapriya, K. Mahesh","doi":"10.1109/ICICES.2017.8070734","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070734","url":null,"abstract":"In real-time application, most of the research is focused in video tracking system. Since this is mainly used for the application of robotics, surveillance tracking, human to machine interface, etc. to extract the target status. There are more number of video tracking system to identify the targeted region from the frame of given video. Since the performance of tracking can affect by sudden illumination changes, shadowing effect and uneven background. In moving object detection system, it suffers from dynamic background changing and shadow effect present in the video frames. Due to this, tracking of targeted region may misclassified and results in false detection of moving objects. To rectify this problem there are many techniques to detect and eliminate the shadow from frames like K-Means clustering, Fuzzy C-Means, etc. which are to segment both foreground and background from each frames. Then they remove/suppress shadow region and track the target. Since in that methods, segmentation is based on non-changing background of surveillance area. To rectify this problem, we propose a novel background normalization technique which is based on textural pattern analysis. In texture based system, there are several methods perform texture pattern extraction to verify the feature matching for target region analysis. In this work, we present a novel model of background clustering by using Neighborhood Chain Prediction (NCP) algorithm for uneven background. Here we also propose Differential Boundary Pattern (DBP) to extract texture of the frame for suppressing shadow pixels present in the frame. This is done by estimating lowest intensity present in that frame and predict the area by using DBP method and enhance the pixel to suppress shadow region. From this equalized frame of the given video, we split the frame into several grids. Then from that grid formatted frame, we extract histogram features of the targeted frame and provide classification for each grid in that frame. In that classification can be done by using Machine Learning Classification (MLC) method. This matched grid is consider as the tracked region and provide binary label to separate background and foreground. This type of visual tracking system is robust over sudden illumination changes and dynamic background by using the texture pattern analysis. Our Proposed work can be compare with existing segmentation approaches for the parameters of True Positive (TP), True Negative (TN), False Positive (FP), False Negative (FN), Sensitivity, Specificity, Accuracy, Correction rate, Positive likelihood and Negative likelihood for the tracking of targeted region.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An analysis of tongue shape to identify diseases by using supervised learning techniques 使用监督学习技术对舌形进行分析以识别疾病
G. Devi, E. Anita
{"title":"An analysis of tongue shape to identify diseases by using supervised learning techniques","authors":"G. Devi, E. Anita","doi":"10.1109/ICICES.2017.8070786","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070786","url":null,"abstract":"The tongue is a basic organ in Traditional Chinese Medicine (TCM). Tongue image diagnoses the health status of a human based on shape characteristics of the tongue. Tongue shape is a very important feature in tongue diagnosis. Different tongue shapes like circle, rectangle and triangle indicate presence of certain pathologies. In this paper, we propose a method for automated recognition of diseases based on the shape of a tongue image using supervised machine learning techniques. Experimental results obtained with a set of tongue images demonstrate that the SVM classifier improves the current state of the art method.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122528403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Monitoring Fishy activity of the user in social networking 监控用户在社交网络中的可疑活动
Mercy Paul Selvan, R. Selvaraj
{"title":"Monitoring Fishy activity of the user in social networking","authors":"Mercy Paul Selvan, R. Selvaraj","doi":"10.1109/ICICES.2017.8070737","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070737","url":null,"abstract":"With the high usage of internet today, people started sharing much of the information with each other online. In this paper, we propose to monitor user activity for any hazardous behavior like terrorism on Gmail and Twitter. We apply Natural Language Processing (NLP) techniques like POS tagging, Chunking, Stemming, and WordNet Processing to extract the keyword and check to see whether the information is normal or little suspicious or offensive.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130508427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Comparative performance analysis of gate-inside, gate-outside and gate-inside&outside cylindrical junctionless silicon nanotube FET 栅极内、栅极外、栅极内、栅极外圆柱形无结硅纳米管场效应管性能对比分析
R. Ambika, R. Srinivasan
{"title":"Comparative performance analysis of gate-inside, gate-outside and gate-inside&outside cylindrical junctionless silicon nanotube FET","authors":"R. Ambika, R. Srinivasan","doi":"10.1109/ICICES.2017.8070771","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070771","url":null,"abstract":"In this paper, the performance investigation of Gate-Inside (GI), Gate-Outside (GO) cylindrical Junction-less Silicon Nanotube Field Effect Transistor (JLSiNT) devices and comparative analysis with Gate-Inside & Outside (GIO) JLSiNT device are done using 3D TCAD numerical simulations. ON current (I<inf>ON</inf>), OFF current (I<inf>OFF</inf>), Sub-threshold Swing (SS), Threshold voltage (V<inf>TH</inf>), Trans-conductance (g<inf>m</inf>), Output resistance (R<inf>OUT</inf>), Gate capacitance (C<inf>GG</inf>) and unity gain cutoff frequency (f<inf>T</inf>) are extracted for the above devices. For the matched I<inf>OFF</inf> scenario, GI shows better I<inf>ON</inf> but GO offers better f<inf>T</inf> since it has lower C<inf>GG</inf> comparatively. GIO device shows better SS and R<inf>OUT</inf> comparatively.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133686690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The effects of change in statistical properties of datasets on feature selection stability 数据集统计特性的变化对特征选择稳定性的影响
P. M. Chelvan, K. Perumal
{"title":"The effects of change in statistical properties of datasets on feature selection stability","authors":"P. M. Chelvan, K. Perumal","doi":"10.1109/ICICES.2017.8070728","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070728","url":null,"abstract":"Data mining extracts previously not known knowledge from huge amount of stored operational data of organizations which can be used for managerial decision making. The datasets are mostly high dimensional due to the advancements in information and communication technologies. Feature selection is an important dimensionality reduction technique to manage the “curse of dimensionality”. The subset of features selected in subsequent iterations of feature selection algorithms must be same or at least similar for the small perturbations of the experimental dataset. The robustness of feature selection algorithms is called as the feature selection stability. High data quality with security/privacy is the major requirement of good privacy preserving data mining technique. This paper explores the change in statistical properties of datasets due to perturbations of datasets by the privacy preserving data mining techniques and their effects in feature selection stability.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"251 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133586775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Border alert system and emergency contact for Fisherman using RSSI 边境警报系统和渔民使用RSSI的紧急联系
E. Krishnamoorthy, S. Manikandan, M. MohamedShalik, S. Samy
{"title":"Border alert system and emergency contact for Fisherman using RSSI","authors":"E. Krishnamoorthy, S. Manikandan, M. MohamedShalik, S. Samy","doi":"10.1109/ICICES.2017.8070766","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070766","url":null,"abstract":"Augmenting strains over the ocean fringes brought on much devastation between two nations. Anglers from any nation are being snatched by the naval force for intersection the fringe which is accidental the majority of the circumstances. The viable generation of this framework manages following the area of the watercraft using RSSI, it gives solid arranging route and timing facilities to overall clients on a consistent substructure in all climate, day and night on or proximate to earth and trigger an exhortation message, when the outskirt is drawn nearer or crossed. Withal, in additional organize, the RSSI data is sent to costal sentinel and the celerity of the watercraft motor gets off by the control of fuel supply to motor. Subsequently sentinels in the shore can profit and give supplemental benefit to the anglers and profit them not to move past the outskirt.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116363367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of PDMS membrane for CTC separation 用于CTC分离的PDMS膜设计
R. Indhu, K. M. Shreemathi, J. Mercy, S. Radha, S. Kirubaveni, B. S. Sreeja
{"title":"Design of PDMS membrane for CTC separation","authors":"R. Indhu, K. M. Shreemathi, J. Mercy, S. Radha, S. Kirubaveni, B. S. Sreeja","doi":"10.1109/ICICES.2017.8070770","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070770","url":null,"abstract":"Circulating tumorcells(CTC) are the primary tumor cells which contains the key information about the cancer. These CTCs can be separated from the peripheral blood in microfluidics, where a PDMS(polydimethylsiloxane) membrane can be designed for CTC detection. The PDMS membrane is designed with cylindrical pores for the detection of Circulating TumorCells(CTC) from the peripheral blood samples. The membrane consisting of cylindrical pores of size 9μm and the distance between the pores are designed to be (15μm) are simulated and analysed for the separation of CTCs.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134142103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient and secure server migration on cloud storage with VSM and dropbox services 高效和安全的服务器迁移与VSM和dropbox服务的云存储
J. A. Mayan, D. Anand, Neha Sadhvi
{"title":"Efficient and secure server migration on cloud storage with VSM and dropbox services","authors":"J. A. Mayan, D. Anand, Neha Sadhvi","doi":"10.1109/ICICES.2017.8070725","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070725","url":null,"abstract":"The huge amount of sensitive data store in centralize storage space in cloud server, which is most important for providing the result based on the user's provided keywords. These service providing high efficiency with keeping user privacy. Without any configure the existing system learn plain text information. CSP (Cloud Service Provider) have outsourced data control in this condition because of some issue. There may survive unconstitutional operation on outsourced information on relation of profit or curiosity. Hence, privacy data has to encrypt for security. In existing search method over encrypted data in cloud support KNN search keyword not multi-keyword rank search based on semantics approach. The search methods aren't intelligent also neglect a few semantically associated documents. In vision of attempt, deficiency an efficient method is suggested to solve multi rank search keyword issue over encrypted information similar search clarification sustaining synonym queries over encrypted information in cloud. To overcome these problems we proposed DMRS search and VSM (Vector Space Model) algorithm. These two algorithms give top ranking search consequence and Security in the cloud storage system.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Implementation of interleaved soft switching boost converter and H-bridge inverter for solar pv power generation system to attain maximum output voltage and reduced harmonics 实现太阳能光伏发电系统的交错软开关升压变换器和h桥逆变器,以获得最大输出电压和降低谐波
K. Pradeepa, S. Krishnan, M. D. Dharshinii, S. Akshaya
{"title":"Implementation of interleaved soft switching boost converter and H-bridge inverter for solar pv power generation system to attain maximum output voltage and reduced harmonics","authors":"K. Pradeepa, S. Krishnan, M. D. Dharshinii, S. Akshaya","doi":"10.1109/ICICES.2017.8070778","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070778","url":null,"abstract":"Solar energy is a non-conventional type of energy. Only a small fraction of the available solar energy is used in practice. Solar powered electrical generation relies on photovoltaic system and heat engines. To harvest the solar energy, the most common way is to use photovoltaic panels which will receive photon energy from sun and convert to electrical energy. The efficiency of PV module is very low and power output depends on solar insulation level and ambient temperature, so maximization of power output with greater efficiency is of special interest. In this paper, an interleaved soft switching boost converter (ISSBC) for a photovoltaic (PV) power-generation system is proposed. The topology used raises the efficiency for the dc/dc converter of the PV power conditioning system (PVPCS), and it minimizes switching losses by adopting a resonant soft-switching method. This project proposes a novel soft-switching interleaved boost converter composed of two shunted elementary boost conversion units and an auxiliary inductor. The proposed controller scheme utilizes PWM techniques to regulate the output power of interleaved boost converter at its maximum possible value and simultaneously controls the charging process of battery. This converter is able to turn on both the active power switches at zero voltage to reduce their switching losses and evidently raise the conversion efficiency. Since the two parallel-operated elementary boost units are identical, operation analysis and design for the converter module becomes quite simple. The resulting system has high-efficiency, lower-cost, very fast tracking speed. The circuit will be simulated using MATLAB Simulink.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122281789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信