2015 International Conference on Advances in Computer Engineering and Applications最新文献

筛选
英文 中文
Detection and elimination of the topological threats in mobile ad hoc network: A new approach 移动自组织网络中拓扑威胁的检测与消除:一种新方法
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-07-23 DOI: 10.1109/ICACEA.2015.7164834
Swagata Singha, Abhijit Das
{"title":"Detection and elimination of the topological threats in mobile ad hoc network: A new approach","authors":"Swagata Singha, Abhijit Das","doi":"10.1109/ICACEA.2015.7164834","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164834","url":null,"abstract":"A mobile ad hoc network (MANET) is basically a dynamic wireless network in which each individual node acts as a router. Since MANET is infrastructure-less and has no clear line of defense, it is accessible to both legitimate network users and malicious attackers. Hence, to prevent the network from various attacks, scheming of a robust security design is mandatory. Various approaches have been proposed with different cryptographic solutions to countermeasure the attacks against MANET but most of them have focused on specific security threats. In our approach we mainly emphasize on the topology orientation and energy efficiency of nodes in the ad hoc network.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance evaluation of cuckoo search algorithm based FOPID controllers applied to a robotic manipulator with actuator 基于布谷鸟搜索算法的FOPID控制器在带作动器的机械臂上的性能评价
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-07-23 DOI: 10.1109/ICACEA.2015.7164730
Richa Sharma, P. Gaur, Alok Prakash Mittal
{"title":"Performance evaluation of cuckoo search algorithm based FOPID controllers applied to a robotic manipulator with actuator","authors":"Richa Sharma, P. Gaur, Alok Prakash Mittal","doi":"10.1109/ICACEA.2015.7164730","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164730","url":null,"abstract":"A robotic manipulator is a complex nonlinear, coupled and dynamic system. Therefore it is a challenge for the process engineers to design an effective controller for the operation of end-effector of this system. This paper presents Fractional Order Proportional-Integral-Derivative (FOPID) controller for a 2-link planar rigid robot manipulator with actuator for trajectory tracking task. The tuning of controller parameters is done using Cuckoo Search Algorithm (CSA) and Particle Swarm Optimization (PSO) techniques. The Integral Absolute Error (IAE) and Integral Absolute Change in Control Output (IACCO) having equal weights for both the links are chosen as performance indices for minimization. A comparative study is carried out between CSA-tuned FOPID (CSA-FOPID) and PSO-tuned FOPID (PSO-FOPID) controllers for trajectory tracking tasks. The robustness of the proposed controllers is tested for disturbance rejection, model uncertainties, and noise suppression. The numerical simulation results clearly investigate the superiority of CSA-FOPID controllers over PSO-FOPID controllers.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance evaluation of different versions of 2D Torus network 不同版本二维环面网络的性能评价
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-07-23 DOI: 10.1109/ICACEA.2015.7164691
S. Yadav, Richa Mishra, Umesh Gupta
{"title":"Performance evaluation of different versions of 2D Torus network","authors":"S. Yadav, Richa Mishra, Umesh Gupta","doi":"10.1109/ICACEA.2015.7164691","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164691","url":null,"abstract":"Interconnection networks have been emerged as an efficient communication infrastructure to fulfill the heavy communication requirements of several applications. Torus is the most efficient interconnection network for current and future supercomputer systems. The packet delay and throughput are the major performance metrics for evaluating the network topologies in designing a network. This paper, evaluates the performance of different versions of torus interconnection networks viz. classical Torus, XTorus, and CCTorus under two different traffic applications i.e. CBR and FTP, in two different scenarios i.e. at varying simulation time, and varying network size, using dynamic routing. Here the main emphasis is given on the average delay and average throughput performance metrics. NS2 tool is used for designing and simulating the performance of the network. By this analysis we can design a better structure that will give better performance in terms of bandwidth and delay.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"102 1-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114034204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for clustering data streams using granularity technique 一种利用粒度技术聚类数据流的新方法
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-07-23 DOI: 10.1109/ICACEA.2015.7164759
Ankur Kaneriya, M. Shukla
{"title":"A novel approach for clustering data streams using granularity technique","authors":"Ankur Kaneriya, M. Shukla","doi":"10.1109/ICACEA.2015.7164759","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164759","url":null,"abstract":"Data Stream mining has large scope due to their usage in vice variety of application and business purpose. It provides the meaning full usage information which use full to take decision and also for planning purpose. According to application needs on particular parameter consideration there will be change in clustering method use in a stream Data mining. The purpose behind survey paper is explore the widely use clustering method StreamKM++ beneficial over the different clustering method and resolve issues of traditional clustering. Also contain different clustering method like hierarchical, density base, Partitioning Method study, Parameter and their operational methodology. BIRCH is faster than StreamKM++ but output of it not efficient and same way compare it with StreamLS, which partitions input data stream into chunk and clustering each chunk base on local search. Outcome of that is quality comparable and StreamKM++ significant better scalable with number of cluster. Clustering method apply using 2-phase method. Setting the arrival rate of input stream Data using AIG, same way sets the memory for output using AOG, and setting processing to consume less resources using AIP. Using both method that's providing the better quality with respect to time clustering of stream data.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125401867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Classifier based text simplification for improved machine translation 基于分类器的文本简化改进机器翻译
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-07-12 DOI: 10.1109/ICACEA.2015.7164711
Shruti Tyagi, Deepti Chopra, Iti Mathur, Nisheeth Joshi
{"title":"Classifier based text simplification for improved machine translation","authors":"Shruti Tyagi, Deepti Chopra, Iti Mathur, Nisheeth Joshi","doi":"10.1109/ICACEA.2015.7164711","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164711","url":null,"abstract":"Machine Translation is one of the research fields of Computational Linguistics. The objective of many MT Researchers is to develop an MT System that produce good quality and high accuracy output translations and which also covers maximum language pairs. As internet and Globalization is increasing day by day, we need a way that improves the quality of translation. For this reason, we have developed a Classifier based Text Simplification Model for English-Hindi Machine Translation Systems. We have used support vector machines and Naïve Bayes Classifier to develop this model. We have also evaluated the performance of these classifiers.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
sOverview of IP tracebacking using packet marking techniques 使用包标记技术的IP回溯概述
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164816
Swapnil M. Sanap, P. Pawar
{"title":"sOverview of IP tracebacking using packet marking techniques","authors":"Swapnil M. Sanap, P. Pawar","doi":"10.1109/ICACEA.2015.7164816","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164816","url":null,"abstract":"A network comprises of a plurality of nodes working together to perform similar or different tasks. The network has a huge room for attacks so as to make the network inefficient. The major attacks that are causing huge turbulences to the network and its equivalent resources include Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks. In prior-art there are many techniques that can sense and avoid these attacks. Packet Marking (PM) techniques are the most widely used successful techniques towards avoiding these attacks. However, there are some critical issues with the PM techniques, as these attacks are becoming more complicated due to growing talent in the market. PM technique can be used further to traceback the origin of attacks. In this traceback the major contest is to minimize the amount of packets in successful traceback of these attacks. The packets that are originating from the sources are not enough to traceback the origin. The paper discusses various known PM techniques available for fighting back against the mentioned attacks. Further, the paper also discloses the implementation of these techniques, their advantages, disadvantages, complexity analysis, and the results measured. Future trends including the need for effective and efficient defense mechanism are also discussed.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multilingual text summarization with UNL 使用UNL的多语言文本摘要
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164787
Sherry, Parteek Bhatia
{"title":"Multilingual text summarization with UNL","authors":"Sherry, Parteek Bhatia","doi":"10.1109/ICACEA.2015.7164787","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164787","url":null,"abstract":"The paper presents an algorithm for single document text summarization. Text Summarization is extraction of important information from the large documents by neglecting the unnecessary information with the help of different algorithms and providing the summary in compressed way which is very useful. Since UNL is language independent i.e. summarization with UNL is carried out by analyzing and removing the unnecessary relations. UNL is used in text summarization due to the reason that user can get the summary in his own native language.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124856103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancementof gain, bandwidth and directivity of a patch antenna by increasing dielectric layers of the substrate through micromachining technique for RFID application 通过微加工技术增加基片的介电层来提高贴片天线的增益、带宽和指向性
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164723
R. Saha, S. Maity, Nripendra Trigunayat
{"title":"Enhancementof gain, bandwidth and directivity of a patch antenna by increasing dielectric layers of the substrate through micromachining technique for RFID application","authors":"R. Saha, S. Maity, Nripendra Trigunayat","doi":"10.1109/ICACEA.2015.7164723","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164723","url":null,"abstract":"Bandwidth is the primary resource of any communication system, as the radio spectrum is fixed. The high gain and directivity is also the major issue for a wireless network. Microstrip antenna has popular attractive features such as low profile, low cost, small size and easily integrated with RF devices; but has narrow bandwidth and low gain. This paper comprises one novel technique in order to increase the bandwidth, gain and directivity of the conventional rectangular patch antenna. In this paper gain, directivity and bandwidth of a conventional patch antenna is enhanced by increasing dielectric layer between the patch and ground through silicon micromachining technique. In Radio Frequency Identification (RFID) technology, these types of antenna provide superior performance and all the simulation has been carried out in high frequency structure simulator (HFSS).","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125120018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Reducing RMS noise in CMOS dynamic reconfigurable latched comparator in 50 nm 50nm CMOS动态可重构锁存比较器RMS噪声的降低
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164766
M. Kumar, Manish Singhal
{"title":"Reducing RMS noise in CMOS dynamic reconfigurable latched comparator in 50 nm","authors":"M. Kumar, Manish Singhal","doi":"10.1109/ICACEA.2015.7164766","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164766","url":null,"abstract":"This paper presents a new dynamic reconfigurable CMOS latched comparator that demonstrates low RMS noise, low offset and high gain. In this dynamic comparator circuit we make an independent inputs transistor and its input inverter circuit PMOS connected to clk1 with tail transistor. The proposed comparator circuit shows better RMS noise response i.e. 704.38μV as compare to previous comparator circuit i.e. 1.1208mV and better output driving capacity as compare to conventional comparator circuit. The proposed comparator is simulated and implemented in LT SPICE 50nm technology.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization of solar powered ericsson cycle using genetic algorithm and fuzzy decision making 基于遗传算法和模糊决策的太阳能爱立信循环多目标优化
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164754
R. Arora, S. Kaushik, Raj Kumar
{"title":"Multi-objective optimization of solar powered ericsson cycle using genetic algorithm and fuzzy decision making","authors":"R. Arora, S. Kaushik, Raj Kumar","doi":"10.1109/ICACEA.2015.7164754","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164754","url":null,"abstract":"Solar driven Ericsson heat engine has been considered for multi-objective thermodynamic optimization. Multi-objective genetic algorithm (MOGA) and finite time thermodynamic (FTT) approaches are implemented for optimization of power output and thermal efficiency which are considered as objectives in the study. Simultaneous optimization of power output and thermal efficiency are achieved using evolutionary algorithm based on MOGA. Various effectiveness of heat exchangers and temperatures of source and sink side working fluid are considered as decision variables. Pareto front between dual objectives is found in MATLAB 7.8. Further, Fuzzy Bellman-Zadeh decision making method is used to extract best optimal values of dual objective. Simultaneous optimization of power output and thermal efficiency of proposed model is obtained at optimal values of source side heat exchanger effectiveness, sink side heat exchanger effectiveness, regenerator side heat exchanger effectiveness, and source side working fluid and sink side working fluid as 0.79, 0.79, 0.88, 901 K and 436 K respectively.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115021136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信