2018 International Conference on Computer Communication and Informatics (ICCCI)最新文献

筛选
英文 中文
High Speed Efficient Multiplier Design using Reversible Gates 采用可逆门的高速高效倍增器设计
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441326
N. Radha, M. Maheswari
{"title":"High Speed Efficient Multiplier Design using Reversible Gates","authors":"N. Radha, M. Maheswari","doi":"10.1109/ICCCI.2018.8441326","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441326","url":null,"abstract":"Now-$a$-days, reversible logic is getting huge interest among the IC designer because it consumes less power. Reversible logic has been found in applications like Digital signal processing, DNA and quantum computing and high speed VLSI design. The implementation of reversible logic contains number of reversible logic gates. In this work, a multiplier is designed using HNG gate. An efficient high speed multiplier has been proposed using verilog coding and Cadence 180 nm technology is used for its implementation. Compared to the existing multiplier, the proposed multiplier consumes less power and comparatively less quantum cost. Hence, the proposed multiplier results in less power consumption without sacrificing the speed.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128556808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
T2FLC based CHBMLI DSTATCOM for power quality Improvement 基于T2FLC的CHBMLI DSTATCOM的电能质量改进
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441224
D. Suresh, K. Venkateswarlu, S. Singh
{"title":"T2FLC based CHBMLI DSTATCOM for power quality Improvement","authors":"D. Suresh, K. Venkateswarlu, S. Singh","doi":"10.1109/ICCCI.2018.8441224","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441224","url":null,"abstract":"In this paper, a cascaded PWM five level inverter used as DSTATCOM. The multilevel inverter has capabilities to suppress low harmonics distortion with reduced switching losses. And also compensate the reactive current of nonlinear load. The DSTATCOM control strategy is based on neural network (least mean square (LMS)). The dc link voltage of the shunt DSTATCOM is regulated with type-2 fuzzy logic controller (T2FLC). The performance of the T2FLC dc link voltage controller is simulated with MATLAB/Simulink Simpower block sets. The obtained result shows that the proposed DSTATCOM has desired performance.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Contrast of Gaussian Mixture Model and Clustering Algorithm for Singer Identification 高斯混合模型与聚类算法在歌手识别中的对比
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441491
D. Dharini, A. Revathy, M. Kalaivani
{"title":"Contrast of Gaussian Mixture Model and Clustering Algorithm for Singer Identification","authors":"D. Dharini, A. Revathy, M. Kalaivani","doi":"10.1109/ICCCI.2018.8441491","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441491","url":null,"abstract":"The intension is to provide the contrast between Clustering Algorithm and Gaussian Mixture Model using Perceptual Linear Prediction features to assess the singer identification structure using two phases, phase 1 as training and phase 2 as testing over the film tracks(vocal with background music). The intent of assessing of singer is to categorize different singers impartial of data that is trained in phase 1. The aspects for two phases are executed for downright tracks from films for 20 different singers. In phase 1 aspects, for individual singer 15 tracks are loaded as input data. Now loaded datas are shaped to go through a deck of pre-handling steps. The pre-handling steps includes three more internal stages with stage1 as Pre-emphasis, stage2 as Frame Blocking and stage3 as Windowing. From individual context of pre-handled signal PLP features are evolved. Using the K-Means Clustering Algorithm and GMM the phase1 output is developed for individual singers. In Clustering algorithm the singer is categorized deployed with choice of the model that gives mean value as minimum. In GMM, by using Maximum Likelihood (ML) algorithm singers are categorized deployed with choice of the model that gives maximum likelihood. Depending on identity of accuracy the singer identification structure is performed. (Abstract)","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131627940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on different data mining classifiers 不同数据挖掘分类器的研究
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441285
R. Katarya, V. Gangwar, Ishita Jaisia
{"title":"A Study on different data mining classifiers","authors":"R. Katarya, V. Gangwar, Ishita Jaisia","doi":"10.1109/ICCCI.2018.8441285","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441285","url":null,"abstract":"Data mining is a process of finding patterns in a large dataset. It involves various algorithmic classifiers. Almost everyone in the IT sector is utilizing data mining techniques to understand different patterns in a large dataset. Classification is required to find out in which group the given instance of the testing dataset is related to a given class of a training dataset. It partitions given information into its subclasses which are dependent upon some observed parameters. Several different types of techniques used for data mining are - Decision Trees (ID3, C4.5, CART), k-nearest neighbours, Apriori algorithm, Naive Bayes, Neural Networks. Comprehensively, The three approaches followed for classification technique are Machine Learning, Statistical Based and Neural Networks. Considering these approaches broadly we can define different classifiers. The classification has innumerable applications in speech recognition, computer vision, Geostatistics, Biological classification. This study presents a comprehensive survey of different data mining classifiers and compares them on different parameters.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Assisted Automatic Irrigation System using Wireless Sensor Nodes 使用无线传感器节点的物联网辅助自动灌溉系统
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441209
Aashika Premkumar, K. Thenmozhi, P. Praveenkumar, P. Monishaa, Rengarajan Amirtharajan
{"title":"IoT Assisted Automatic Irrigation System using Wireless Sensor Nodes","authors":"Aashika Premkumar, K. Thenmozhi, P. Praveenkumar, P. Monishaa, Rengarajan Amirtharajan","doi":"10.1109/ICCCI.2018.8441209","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441209","url":null,"abstract":"India is an agricultural country with an abundance of fertile lands. It is thereby highly crucial, that as engineers it is necessary to contribute to the growth of this primary sector. Agricultural sectors have failed to realise that technology can, not only be utilised for modernisation but also for restoring our heritage. Agriculture is the heart of our vibrant culture, and this should, without doubt, flourish in our nation. There is an exponential rise in population which induces a need to use our resources judiciously. As the demand for food grains increases so does the demand for water. This thought was the foundation for our project and the objective of this paper, is to automate the irrigation system. The proposed methodology uses Arduino for moisture sensing and controlling water supply and Node Microcontroller Unit (MCU) for notifying the status of the designed irrigation system to the farmers through mobile communication. The idea of Internet of Things (IOT) has been integrated with automation to design the proposed “Automatic Irrigation System”.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Sentiment Analysis of Digital Wallets and UPI Systems in India Post Demonetization Using IBM Watson 使用IBM Watson对印度废钞后数字钱包和UPI系统的情绪分析
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441441
Pallavi Maindola, Neetu Singhal, A. Dubey
{"title":"Sentiment Analysis of Digital Wallets and UPI Systems in India Post Demonetization Using IBM Watson","authors":"Pallavi Maindola, Neetu Singhal, A. Dubey","doi":"10.1109/ICCCI.2018.8441441","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441441","url":null,"abstract":"The digital payment landscape is sprouting in the country at a dizzying step. After the demonetization, complete turnaround in the payment landscape has been observed. The technology revolution and government initiative of cashless economy, followed by demonetization saga has enabled the evolution of multiple non-banking players in the payment space. While these e-wallets have made substantial grounds in the Indian economy system, it becomes eminent to analyze the customers' perception towards these e-wallets. In this paper authors attempt to analyze the sentiments of digital wallet users in India over different payment applications. The authors analyses sentiments by using the IBM Watson software tools in various social networks by taking different payment system into consideration. The authors analyzed the documents, forums, tweets and other sources where the users shared their feedback for the wallets from 8th November 2016 to 7thNovember 2017. This study brings various interesting insights about India's readiness to adopt change for digital payment options and sentiments of the users for the same.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117045110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
HAAMD: Hybrid Analysis for Android Malware Detection HAAMD: Android恶意软件检测混合分析
2018 International Conference on Computer Communication and Informatics (ICCCI) Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441295
M. Choudhary, B. Kishore
{"title":"HAAMD: Hybrid Analysis for Android Malware Detection","authors":"M. Choudhary, B. Kishore","doi":"10.1109/ICCCI.2018.8441295","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441295","url":null,"abstract":"With the growth in popularity of smartphone and the number of its users, the dispersion of mobile malware on Android platform has also increased. Currently Android is the hot target of attackers because it has occupied most of the market share. The growing popularity and demand of the smartphone, the large portion of market share covered by Android and the open nature of the android make an android more eye-catching platform for malwares. Scientifically, it is very crucial for an examiner to observe the malicious app's behavior to understand the danger to privacy and security. It may not be possible for an approach to detect the malware at alone, sufficiently, as many advanced techniques are there. So, we can use multiple approaches for effective detection of malware. In this paper, comparison among various kind of analysis techniques (static, dynamic) for Android malware is emphasized. This paper also accommodates different sub-techniques of these analysis techniques, with their functionality used for detection of malware and the comparative facts between these two type of analysis is discussed. In this research, the new technique has been evolved by combining static and dynamic analysis which is named as hybrid analysis and then the effectiveness of this new technique(hybrid analysis) is compared with pre-existed techniques.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121670109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信