2018 Conference on Information and Communication Technology (CICT)最新文献

筛选
英文 中文
Machine Learning based Joint Torque calculations of Industrial Robots 基于机器学习的工业机器人关节扭矩计算
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722353
Aditya Singh, G. Nandi
{"title":"Machine Learning based Joint Torque calculations of Industrial Robots","authors":"Aditya Singh, G. Nandi","doi":"10.1109/INFOCOMTECH.2018.8722353","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722353","url":null,"abstract":"Getting closed-form inverse dynamics solution for a manipulating robot is desirable for real-time torque computation. Some powerful and well-established mechanics based tools like Newton Euler method (N-E), Lagrangian methods are available for developing a mathematical model for manipulating robots. However, the coupled equation being highly non-linear and incomplete (joint friction, dimensional inaccuracies arising due to manufacturing error are very difficult to model) and hence difficult to apply in real life situation which requires accurate joint torque computation. We believe learning based machine intelligence tools can more efficiently and appropriately be utilized for joint torque computations in the inverse dynamics paradigm. In this paper, K-nearest neighbor (KNN) algorithm has been proposed for finding joint torques from the dataset created by solving forward dynamics equation for the manipulating robots, which is comparatively straight forward and rather less complex. However, since computational complexity of KNN is high, we used K-dimensional tree (K-D tree) for decreasing the computational complexity. The simulation result for two-link manipulator shows the proposed method of KNN based joint torque calculation coupled with K-D tree is simple, robust and accurate, which can be emulated for a further higher degrees of freedom robot having six links.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123043487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computational Model for Human Decision Making: A Study of Prospect Theory 人类决策的计算模型:前景理论研究
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722415
Nimisha Gupta, M. K. Ahirwal, M. Atulkar
{"title":"Computational Model for Human Decision Making: A Study of Prospect Theory","authors":"Nimisha Gupta, M. K. Ahirwal, M. Atulkar","doi":"10.1109/INFOCOMTECH.2018.8722415","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722415","url":null,"abstract":"Decision making can be defined as a process of selecting best alternatives among several possible alternatives. In this paper, two decision making theories are compared with the decision of several humans. Decision making theories used in this paper are Expected Utility Theory (EUT) and Prospect Theory (PT). Results are obtained and compared over the examples of gambles. Each example of gamble offers the choice with certainty and uncertainty. The purpose of this paper is to explain how people behave while making decision and how decision making theories predict the decision of peoples.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125409328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fractal on Hemispherical DRA by Descarte’s Circle Theorem for wideband application 利用笛卡尔圆定理在半球形DRA上的分形在宽带中的应用
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/infocomtech.2018.8722417
Shabya Gupta, Monika Chauhan, Biswajeet Mukherjee
{"title":"Fractal on Hemispherical DRA by Descarte’s Circle Theorem for wideband application","authors":"Shabya Gupta, Monika Chauhan, Biswajeet Mukherjee","doi":"10.1109/infocomtech.2018.8722417","DOIUrl":"https://doi.org/10.1109/infocomtech.2018.8722417","url":null,"abstract":"In this paper, a fractal on a Hemispherical Dielectric Resonator Antenna using Descarte’s Circle Theorem is designed and analyzed up to 2nd iteration. The antenna has been excited by a coaxial probe placed at an offset distance from the center for wireless communication application. Proposed antenna based on the Descartes Circle (DC) theorem and iteration of self similar design. Hemispherical dielectric resonator antenna is made up of commercially available FR-4 (lossy) having dielectric constant 4.3 and has dissipation factor (tanδ=0.025). The fractal geometry offers a wide impedance bandwidth of around 2 GHz (41%) for S11<-10 dB at a resonant frequency of 3.6 Proposed antenna offers 80 % efficiency with 8.6 dBi gain .TE111 fundamental mode is observed at 4.3 GHz. Simulations were done on CST Microwave Studio transient solver. Detailed design steps and results for the designs are studied and investigated in this paper.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Underwater Wireless Sensor Networks: A Comprehensive Survey of Routing Protocols 水下无线传感器网络:路由协议综合综述
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722370
Amrita Datta, Mou Dasgupta
{"title":"Underwater Wireless Sensor Networks: A Comprehensive Survey of Routing Protocols","authors":"Amrita Datta, Mou Dasgupta","doi":"10.1109/INFOCOMTECH.2018.8722370","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722370","url":null,"abstract":"Underwater environments present unique challenges in deploying efficient and reliable networks due to temperature and pressure differential, ambient waves and currents that displaces sensor nodes, inability of using RF channels due to signal loss and other chemical and biological factors that hinder effective underwater communication. Though radio signals have been replaced with acoustic channels due to their longer wavelengths and longer distance of signal propagation, achieving energy efficiency in a sensor network has been a significant challenge. A multitude of proposed routing protocols take into consideration the amount of energy that sensor nodes consume in the network. In this document, we implement and analyze four routing protocols proposed for Underwater Wireless Sensor Network, namely, Hop-by-Hop Dynamic Address Based Routing, Depth-Based Routing, Energy aware Opportunistic Routing and Energy-Efficient Depth-Based Routing. Performance of each routing protocols is simulated on the basis of the number of packets sent to Base Station, number of alive nodes, and number of dead nodes. We have used MATLAB to simulate how water currents affect the performance of each of these routing protocols. Our work enables a better understanding of various underwater routing protocols, their performance and helps network managers to choose an appropriate routing protocol under specific situations.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
HAUAR: Home Automation Using Action Recognition HAUAR:使用动作识别的家庭自动化
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722359
Shashank Kotyan, Nishant Kumar, P. Sahu, Venkanna Udutalapally
{"title":"HAUAR: Home Automation Using Action Recognition","authors":"Shashank Kotyan, Nishant Kumar, P. Sahu, Venkanna Udutalapally","doi":"10.1109/INFOCOMTECH.2018.8722359","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722359","url":null,"abstract":"Today, many of the home automation systems deployed are mostly controlled by humans. This control by humans restricts the automation of home appliances to an extent. Also, most of the deployed home automation systems use the Internet of Things technology to control the appliances. In this paper, we propose a system developed using action recognition to fully automate the home appliances. We recognize the three actions of a person (sitting, standing and lying) along with the recognition of an empty room. The accuracy of the system was 90% in the real-life test experiments. With this system, we remove the human intervention in home automation systems for controlling the home appliances and at the same time we ensure the data privacy and reduce the energy consumption by efficiently and optimally using home appliances.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130446745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Least Square Intra-Prediction Mode Prediction Based Video Compression 基于最小二乘内预测模式预测的视频压缩
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722371
L. K. Jiwani
{"title":"Least Square Intra-Prediction Mode Prediction Based Video Compression","authors":"L. K. Jiwani","doi":"10.1109/INFOCOMTECH.2018.8722371","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722371","url":null,"abstract":"In H.264/AVC and HEVC video coding intra-prediction video compression step plays an important role in. Intra prediction is used whenever the scene changes quickly over time. In intra-prediction mode, the I-frame is divided into blocks and for each of this block a prediction mode for pixels’ value of the block is to be found from nine possible modes for prediction. This requires comparison with given block’s pixel values and computation of Sum of Absolute Error for each of the nine cases, hence is computationally intensive activity. Here a least-square method is proposed to predict the mode of intra prediction of pixel values, based on the neighboring pixels. For this neighboring block’s features are used. To further reduce the complexity different variants of the proposed method are proposed. The simulation results have demonstrated a reduction of more than 30% in computationally cost without adversely affecting the visual quality of the scene.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115697226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FPGA Implementation of Zero Frequency Filter 零频率滤波器的FPGA实现
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722384
N. Srinivas, G. Pradhan, P. Kumar
{"title":"FPGA Implementation of Zero Frequency Filter","authors":"N. Srinivas, G. Pradhan, P. Kumar","doi":"10.1109/INFOCOMTECH.2018.8722384","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722384","url":null,"abstract":"Epoch is the instant of significant excitation during the production of a speech signal. Due to time varying nature of the excitation source and the vocal tract system, accurate detection of epochs from the speech remains a challenging area of research. Over the years several algorithms have been proposed for the detection of epochs. Among different techniques proposed in the literature, the zero frequency filter (ZFF) approach provides better performance for clean and degraded speech. The filter design originally proposed in ZFF has an infinite impulse response (IIR) filter followed by two detrenders. Later, the IIR implementation is simplified to finite impulse response(FIR) realization. In this paper, we have designed the efficient architecture for IIR, FIR realization of ZFF and implemented these two realizations on field programmable gate array (FPGA).","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124355052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Twitter Sentiment Analysis using Dynamic Vocabulary 使用动态词汇进行Twitter情感分析
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722407
Hrithik Katiyar, Monika, Parveen Kumar, Ambalika Sharma
{"title":"Twitter Sentiment Analysis using Dynamic Vocabulary","authors":"Hrithik Katiyar, Monika, Parveen Kumar, Ambalika Sharma","doi":"10.1109/INFOCOMTECH.2018.8722407","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722407","url":null,"abstract":"Technology has always led to advancements in research works. Today, Twitter is one of the most visited social networking sites by millions of users. A significant way of expressing the opinion for the people is through the Internet. Opinions tend to reflect beliefs as well as feelings. To know the polarity of the opinions a sentiment analysis can be done, this will let us know whether the opinion is negative, neutral or positive. Sentiment Analysis finds its applications in many places like an opinion of the customer on a particular product is to be known by the company, movie review opinion or sentiment analysis of political opinions. This paper introduced a technique of dynamic vocabulary, in which the vocabulary develops as the training is done. The experimental result shows the performance of the proposed technique is satisfactory.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116930184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Double Strained Channel MOSFET: Deep Into Sub-Microns 双应变沟道MOSFET:深入亚微米
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722385
Lalthanpuii Khiangte, R. Dhar
{"title":"Double Strained Channel MOSFET: Deep Into Sub-Microns","authors":"Lalthanpuii Khiangte, R. Dhar","doi":"10.1109/INFOCOMTECH.2018.8722385","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722385","url":null,"abstract":"Development of MOSFET with an intrusion of two strained silicon layers in the channel region has been carried out leading to the advent of 50nm and 100nm channel length devices. Further scalability and device sustainability analysis for reduced gate length of sub-50nm regime have been due, which has been now the focus of this paper. The 50nm technology node device has been scaled down to 30nm channel length and the device characteristics have been examined leading to ~88% enhancement in drive curren.t","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"432 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116344130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CICT 2018 Technical Program CICT 2018技术计划
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/infocomtech.2018.8722430
{"title":"CICT 2018 Technical Program","authors":"","doi":"10.1109/infocomtech.2018.8722430","DOIUrl":"https://doi.org/10.1109/infocomtech.2018.8722430","url":null,"abstract":"","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123692586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信