International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

筛选
英文 中文
Sentiment classification using weakly supervised learning techniques 使用弱监督学习技术的情感分类
P. Bharathi, P. Kalaivaani
{"title":"Sentiment classification using weakly supervised learning techniques","authors":"P. Bharathi, P. Kalaivaani","doi":"10.1109/ICICES.2014.7033924","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033924","url":null,"abstract":"Due to the advanced technologies of Web 2.0, people are participating in and exchanging opinions through social media sites such as Web forums and Weblogs etc., Classification and Analysis of such opinions and sentiment information is potentially important for both service and product providers, users because this analysis is used for making valuable decisions. Sentiment is expressed differently in different domains. Applying a sentiment classifiers trained on source domain does not produce good performance on target domain because words that occur in the train domain might not appear in the test domain. We propose a hybrid model to detect sentiment and topics from text by using weakly supervised learning technique. First we create sentiment sensitive thesaurus using both labeled and unlabeled data from multiple domains. The created thesaurus is then used to classify sentiments from text. This model is highly portable to various domains. This is verified by experimental results from four different domains where the hybrid model even outperforms existing semi-supervised approaches.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77127058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
StatCom control for voltage stability improvement at a fixed speed wind farm under unbalanced faults 不平衡故障下固定速度风电场电压稳定性改进的StatCom控制
M. Vimalraj, B. Alex, M. Tamilarasi
{"title":"StatCom control for voltage stability improvement at a fixed speed wind farm under unbalanced faults","authors":"M. Vimalraj, B. Alex, M. Tamilarasi","doi":"10.1109/ICICES.2014.7034140","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034140","url":null,"abstract":"In this paper investigations on a fixed speed wind farm with squirrel cage induction generators directly connected to the grid in combination with a StatCom under unbalanced grid voltage fault are given by means of theory and simulations. The stability of fixed speed wind turbines can be improved by a StatCom, which is well known and documented in literature for balanced grid voltage dips. Under unbalanced grid voltage dips the negative sequence voltage causes additional generator torque oscillations. A StatCom control structure with the capability to control the positive or negative sequence of the voltage is used. The simulation results clarify the effect of positive and negative sequence voltage compensation by a StatCom on the operation of a fixed speed wind farm. The influence of different StatCom control targets is investigated that lead to an increased network voltage stability and lower torque pulsations.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"247 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77527567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting misbehavior node in Wifi networks by co-ordinated sampling of network monitoring 通过网络监测的协同抽样检测Wifi网络中的不良行为节点
M. Shanthi, S. Suresh
{"title":"Detecting misbehavior node in Wifi networks by co-ordinated sampling of network monitoring","authors":"M. Shanthi, S. Suresh","doi":"10.1109/ICICES.2014.7033760","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033760","url":null,"abstract":"We present an approach to detect a selfish node in a wireless network by passive monitoring. This does not require any access to the network nodes. Our approach requires deploying multiple sniffers across the network to capture wireless traffic traces among multiple channels. IEEE 802.11 networks support multiple channels, and a wireless interface can monitor only a single channel at one time. Thus, capturing all frames passing an interface on all channels is an impossible task, and we need strategies to capture the most representative sample. When a large area is to be monitored, several sniffers must be deployed, and these will typically overlap in their area of coverage. The goals of effective wireless monitoring are to capture as many frames as possible, while minimizing the number of those frames that are captured redundantly by more than one sniffer. The above goals May be addressed with a coordinated sampling strategy that directs neighboring sniffer to different channels during any period. These traces are then analyzed using hidden markov model to infer the misbehavior node in wifi networks.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"27 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91085653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Overview of mobile agent security issues — Solutions 移动代理安全问题概述-解决方案
S. Sobitha Ahila, K. L. Shunmuganathan
{"title":"Overview of mobile agent security issues — Solutions","authors":"S. Sobitha Ahila, K. L. Shunmuganathan","doi":"10.1109/ICICES.2014.7033808","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033808","url":null,"abstract":"Mobile agent systems are an active area of research with many issues still to be addressed before they achieve practical widespread use. Mobile agent is a mobile object that moves from host to host under the control of its own will to achieve task. Mobile agents are mainly intended to be used for applications distributed over large-scale networks since they permit reduction in communication costs by moving computation part to the host on which the target data resides. This paper gives an overview of the main security issues related to the mobile agent paradigm. These issues include security threats, requirements, and techniques for keeping the mobile agent platform and the agent itself secure against each other.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"32 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72868095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
MISR architectures to remove unknown values in output response compaction 用于在输出响应压缩中删除未知值的MISR架构
S. Aruna, K. S. Neelukumari
{"title":"MISR architectures to remove unknown values in output response compaction","authors":"S. Aruna, K. S. Neelukumari","doi":"10.1109/ICICES.2014.7034081","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034081","url":null,"abstract":"MISR architectures are proposed to remove the unknown (X) values in the output sequences. The MISR signature is represented as a system of linear equations in terms of unknown's (X). The method of symbolic simulation is used to represent each bit of the MISR signature. The combination of linear equations of the MISR signature bits is determined with Gauss-Jordan Elimination algorithm to remove unknown values in the output responses. These X-cancelled combinations are then computed in a separate storage register to provide X-free combinations values. Experimental result describes that maximum error coverage and test time can be obtained with the help of theses MISR architectures.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"77 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73810618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An experimental analysis to study the characteristic features of gas sensor 通过实验分析研究了气体传感器的特性
S. Marcia, R. Meenupriya, S. Priyadharshini, P. Bhuvaneswari
{"title":"An experimental analysis to study the characteristic features of gas sensor","authors":"S. Marcia, R. Meenupriya, S. Priyadharshini, P. Bhuvaneswari","doi":"10.1109/ICICES.2014.7034093","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034093","url":null,"abstract":"This paper investigates the sensing characteristics of the gas sensor. When Gas Sensor is subjected to ethanol gas, the corresponding analog voltage output is obtained. This analog voltage output is proportional to the concentration of the ethanol gas in the vicinity of the sensor. In order to enhance the accuracy of sensing, various analysis such as range analysis, orientation analysis and concentration analysis are performed. Based on the experimental results obtained, the optimal values for sensing in real time is determined. Further the response and recovery time of gas sensing characteristics is also measured to validate the usage of gas sensor in multi-sensing scenario.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"51 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73373991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Various job scheduling algorithms in cloud computing: A survey 云计算中的各种作业调度算法:综述
Yash Dave, Avani S. Shelat, Dhara Patel, R. Jhaveri
{"title":"Various job scheduling algorithms in cloud computing: A survey","authors":"Yash Dave, Avani S. Shelat, Dhara Patel, R. Jhaveri","doi":"10.1109/ICICES.2014.7033909","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033909","url":null,"abstract":"Cloud Computing provides a Computing environment where different resources, infrastructures, development platforms and software are delivered as a service to customers virtually on pay per time basis. Low cost, scalability, reliability, utility-based computing are important aspects of cloud computing. Job scheduling is an essential and most important part in any cloud environment. With increasing number of users, Job scheduling becomes a strenuous task. Ordering the jobs by scheduler while maintaining the balance between quality of services (QoS), efficiency and fairness of jobs is quite challenging. Scheduling algorithms are implemented considering parameters such as throughput, resource utilization, latency, cost, priority, computational time, physical distances, performance, bandwidth, resource availability. Though there are different scheduling algorithms available in cloud computing, a very less comparative study has been done on performance of various scheduling algorithms with respect to above mentioned parameters. This paper aims at a comparative study of various types of job scheduling algorithms that provide efficient cloud services.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"128 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73323997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Performance analysis of 1 bit full adder using GDI logic 使用GDI逻辑的1位全加法器的性能分析
S. Mohan, N. Rangaswamy
{"title":"Performance analysis of 1 bit full adder using GDI logic","authors":"S. Mohan, N. Rangaswamy","doi":"10.1109/ICICES.2014.7034029","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034029","url":null,"abstract":"This paper focuses on the design of 1 bit full adder circuit using Gate Diffusion Input Logic. The proposed adder schematics are developed using DSCH2 CAD tool, and their layouts are generated with Microwind 3 VLSI CAD tool. A 1 bit adder circuits are analyzed using standard CMOS 120nm features with corresponding voltage of 1.2V. The Simulated results of the proposed adder is compared with those of Pass transistor, Transmission Function, and CMOS based adder circuits. The proposed adder dissipates low power and responds faster.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"8 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74460985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing high throughput group-based MAC for WLANs 为无线局域网实现高吞吐量的基于组的MAC
E. Porkodi, M. .. Kumar, J. Gobinath
{"title":"Implementing high throughput group-based MAC for WLANs","authors":"E. Porkodi, M. .. Kumar, J. Gobinath","doi":"10.1109/ICICES.2014.7034136","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034136","url":null,"abstract":"The IEEE 802.11n-2009 based Wireless Local Area Networks (WLANs) standard presents very high data rate at the physical layer and seeks to attain a throughput at the Medium Access Control (MAC) layer that is higher than 100 Mbps. The mechanism of frame aggregation and Block-ACK frames are implemented to increase the MAC efficiency. However the standard does not introduce a mechanism to reduce the probability of collision. Where, with high data rate, an AP would able to serve more number of stations, which results in a high collision rate. This paper proposes a Group-based MAC (GMAC) scheme that minimizes the probability of collision and also applies frame aggregation to improve the efficiency. Here, grouping the contending station in such a way that each group has one station that is the group leader. This means that only the leader stations contend, hence, reduces the probability of a collision. We evaluate the performance of our proposal with analytic result. The result shows that GMAC attain a high throughput, high fairness, low delay and attains a high performance with high data rates.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"38 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74579760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nepotism responsive of data mining for prejudice inimitability 裙带关系对偏见不可模仿性数据挖掘的响应
C. B. Saravanan, R. Sugumar
{"title":"Nepotism responsive of data mining for prejudice inimitability","authors":"C. B. Saravanan, R. Sugumar","doi":"10.1109/ICICES.2014.7033813","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033813","url":null,"abstract":"In the milieu of civil rights law, favoritism refers to undue or crooked healing of people based on affiliate-ship to a sort or a marginal, without gaze at to dignitary merit. Rules extract from statistics bases by in filament mining piece, such as classification or pact rules, when used for verdict tasks such as benefit or acclaim endorsement, can be prejudiced in the above sense. In this paper, the impression of inequitable classification rules is forging and premeditated. On stipulation that a pledge of non-favoritism is exposed to be a non-trivial task. A naive loom, like captivating away all bigoted constituencies, is exposed to be not ample when other milieu fluency is available. Loom lead to a strict formulation of the redlining crisis alongside with a ritual corollary pertaining to prejudiced rules with apparently safe ones by affluence of milieu acuity.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"20 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74885095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信