2017 IEEE 7th International Advance Computing Conference (IACC)最新文献

筛选
英文 中文
Hadoop Approach to Cluster Based Cache Oblivious Peano Curves 基于集群的缓存无关Peano曲线的Hadoop方法
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0037
Gurpinder Kaur, Sachin Bagga, K. Mann
{"title":"Hadoop Approach to Cluster Based Cache Oblivious Peano Curves","authors":"Gurpinder Kaur, Sachin Bagga, K. Mann","doi":"10.1109/IACC.2017.0037","DOIUrl":"https://doi.org/10.1109/IACC.2017.0037","url":null,"abstract":"Hadoop is one of the most popular technologies used in the big data landscape for evaluating the data through Hadoop Distributed File System and Map-Reduce. Problems which are larger in size are becoming tough to handle by a single system these days because the execution time for such problems will be very high in such platform. Instead of processing the tasks in a sequential approach, when the processing is done in parallel through the MapReduce method, then results with better efficiency can be expected. In the present method, firstly the Map task decomposes the input into the intermediate keys and then the intermediate keys are sent to the reduce function for processing of data. The algorithm used for performing matrix multiplication is cache oblivious in nature, for better utilization of the memory hierarchy. Processing with the cache oblivious approach increases the re-usability power of the elements and thus decreases the overall execution time. The proposed work for matrix multiplication shall be fault tolerant in nature as there is a replication of data at three places on three different data nodes.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":" 51","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Optimal Neural Network Classifier for Cervical Pap Smear Data 子宫颈涂片数据的神经网络分类器
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0036
K. Hemalatha, K. U. Rani
{"title":"An Optimal Neural Network Classifier for Cervical Pap Smear Data","authors":"K. Hemalatha, K. U. Rani","doi":"10.1109/IACC.2017.0036","DOIUrl":"https://doi.org/10.1109/IACC.2017.0036","url":null,"abstract":"Neural Networks are one of the widely used Soft Computing Techniques. Neural Networks are adaptive and learn from past examples. Neural Networks are used successfully in extensive range of applications related to different areas particularly in Medical Domain. Neural Networks mimic human brain to solve problems concern to non-linear and complex data such as clinical samples. Cervical Cancer is a silent cancer which does not disclose any pain and symptoms. But it becomes dangerous silently with in a long period of 10-15 years. Hence early diagnosis is an essential action to prevent it in early stages. In this study most commonly used Neural Networks such as Multi Layer Perceptron (MLP), Probabilistic Neural Network (PNN), Radial Basic Function (RBF) and Linear Vector Quantization (LVQ) networks are used. Dimensionally reduced Cervical Pap smear Dataset using Fuzzy Edge Detection method is considered for classification. The Four Neural Networks are compared and the best suitable network to classify the dataset is evaluated.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122125594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation 基于动态网络的信息交换可视化:以火灾紧急搜救行动为例
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0068
Vimala Nunavath, A. Prinz
{"title":"Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation","authors":"Vimala Nunavath, A. Prinz","doi":"10.1109/IACC.2017.0068","DOIUrl":"https://doi.org/10.1109/IACC.2017.0068","url":null,"abstract":"To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this paper, we provide a concept of a time varying data analysis and present findings from a fire emergency serious game.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122198362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Leakage in 32-Bit Adders in 45 nm Technology 45纳米技术中32位加法器的泄漏分析
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0092
M. Ahmad, K. Manjunathachari, K. Lalkishore
{"title":"Analysis of Leakage in 32-Bit Adders in 45 nm Technology","authors":"M. Ahmad, K. Manjunathachari, K. Lalkishore","doi":"10.1109/IACC.2017.0092","DOIUrl":"https://doi.org/10.1109/IACC.2017.0092","url":null,"abstract":"In this paper 32 bit adders are designed usingexisting full adders and proposed adders. Average leakage andaverage power consumed in all 32 full adders is small comparedto all existing, proposed 15 transistor based 32 bit adder andproposed 13 transistor based 32 bit adder.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Reversible RIE Based Watermarking Scheme 一种基于RIE的可逆水印方案
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0188
V. M. Sekhar, C. Kumar, K.Venkateswara Rao, N. S. Rao, M. Gopichand
{"title":"A Reversible RIE Based Watermarking Scheme","authors":"V. M. Sekhar, C. Kumar, K.Venkateswara Rao, N. S. Rao, M. Gopichand","doi":"10.1109/IACC.2017.0188","DOIUrl":"https://doi.org/10.1109/IACC.2017.0188","url":null,"abstract":"Today people are more interconnected with Internet ever before. Internet not only brought advantages, it also brings security threats, cyberattacks, phishing, etc. To mitigate cybercrimes governments are enforcing cyberlaws. In this process authentication of digital objects are essential. To provide authentication many watermarking schemes are proposed. Among edge based watermarking schemes special category because of low distortion while watermarking. However, present edge based watermarking scheme are suffering from smoothing effect and also reversibility is an uncertain parameter. In this paper we are proposing a Reference Image and Edge (RIE) based watermarking scheme to overcome smoothing effect problem in existing edge based watermarking schemes. RIE watermarking scheme also consider cover content information while embedding watermark pattern. Compared to existing edge based data hiding schemes proposed RIE watermark scheme improves visual perception with more or less same embedding capacity.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of System Level Computational Platform for IP-BTS Telecom Application IP-BTS电信应用系统级计算平台的开发
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0099
M. Prasad, D. Reddy
{"title":"Development of System Level Computational Platform for IP-BTS Telecom Application","authors":"M. Prasad, D. Reddy","doi":"10.1109/IACC.2017.0099","DOIUrl":"https://doi.org/10.1109/IACC.2017.0099","url":null,"abstract":"IP-BTS (Internet Protocol Based Base Transceiver Station) is a small computing hardware module designed for integration into an industry standard tower PC housing which provides a complete GSM Access Point. It is used to optimize cost of transmission line for high density multi-band base stations. This paper describes the detailed procedure to develop system level boot loader software (universal boot loader-u-boot) for IP-BTS which is a customized hardware with PowerPC based processor board running on RTLinux operating system. This paper also discusses the brief presentation of the customized hardware platform at system level and the boot loader software development procedure for embedded telecom application IP-BTS. Designing suitable boot software at system or boot level is a complex and challenging task which is included in development of an embedded system for telecom applications. The boot loader connects application software through customized hardware and Real-Time Operating System (RTOS). It is not only responsible for initialization of the processor board and other module of IP-BTS software also upgrades operating system images and IP-BTS software versions. The early initialization code is always developed in the processor's native assembly language. In this paper we presented detailed procedure to transplant boot loader (u-boot) on Power PC based customized board and tested successfully with results.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence to Impart Surveillance, Tracking, & Actuation on Suspicious Activities 对可疑活动进行监视、跟踪和驱动的人工智能
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0016
Surajit Bhattacherjee, G. Somashekhar
{"title":"Artificial Intelligence to Impart Surveillance, Tracking, & Actuation on Suspicious Activities","authors":"Surajit Bhattacherjee, G. Somashekhar","doi":"10.1109/IACC.2017.0016","DOIUrl":"https://doi.org/10.1109/IACC.2017.0016","url":null,"abstract":"Along with the fast growing economy of a developing country as far as India is concerned, there has been reported an emerging number of crime and criminal offences. In many of the cases the suspects are quite freely escaped because of the insufficient testimonials and lack of communication links in time. As an instance, suppose a bank robbery takes place and right then no one is able to press the emergency buzzer or to dial up to nearest police station. Eventually, when the nearest police station is informed about the fact, the gang is beyond the reach leaving no clue behind. Same is observed in many cases as rash driving and hit and run, eve teasing and molestation of women at less crowded streets, pick pocketing and blackmailing at Automatic Teller Machines at roadside and many more. Where there is a crime involved, there has to be a quality surveillance and expert actuation to stand against all these activities with minimum human intervention. Our goal is to design an intelligent device that can continuously keep an eye on any activity happening around it and on administrator's request it can track any suspect, be it an object or a human being, with minimum power consumption and least human efforts. As an actuator it sends a signal to the nearest traffic control or police station intimating the state of crime along with its location and also tells about which direction it is heading to. In view of a real-time establishment of the concept, the flying device is designed to be a robot that looks and flies like a Bird, the processor is chosen to be ARDUINO UNO, the image processing is made by mat-lab tool and the communication link between the administrator and the device is via RFID system and between device and the police control is achieved by GPS/GSM technology.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123503452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Chip-Based Key Distribution Technique for Security Enhancement in Hierarchical Wireless Sensors Networks 基于芯片的分层无线传感器网络安全增强密钥分发技术
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0079
Naveen Kumar K, M. Nene
{"title":"Chip-Based Key Distribution Technique for Security Enhancement in Hierarchical Wireless Sensors Networks","authors":"Naveen Kumar K, M. Nene","doi":"10.1109/IACC.2017.0079","DOIUrl":"https://doi.org/10.1109/IACC.2017.0079","url":null,"abstract":"Realization of an application using Wireless Sensor Networks (WSNs) using Sensor Nodes (SNs) brings in profound advantage of ad-hoc and flexible network deployment. Implementation of these networks face immense challenges due to short wireless range; along with limited power, storage & computational capabilities of SNs. Also, due to the tiny physical attributes of the SNs in WSNs, they are prone to physical attacks. In the context of WSNs, the physical attacks may range from destroying, lifting, replacing and adding new SNs. The work in this paper addresses the threats induced due to physical attacks and, further proposes a methodology to mitigate it. The methodology incorporates the use of newly proposed secured and efficient key distribution technique based on the additional commodity hardware Trusted Platform Module (TPM). Further, the paper demonstrates the merits of the proposed methodology. With some additional economical cost for the hardware, the proposed technique can fulfill the security requirement of WSNs, like confidentiality, integrity, authenticity, resilience to attack, key connectivity and data freshness","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Video Skimming for Lecture Video Sequences Using Histogram Based Low Level Features 使用基于直方图的低水平特征对讲座视频序列进行视频浏览
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0143
B. Subudhi, T. Veerakumar, Deepak Yadav, Amol P. Suryavanshi, S. N. Disha
{"title":"Video Skimming for Lecture Video Sequences Using Histogram Based Low Level Features","authors":"B. Subudhi, T. Veerakumar, Deepak Yadav, Amol P. Suryavanshi, S. N. Disha","doi":"10.1109/IACC.2017.0143","DOIUrl":"https://doi.org/10.1109/IACC.2017.0143","url":null,"abstract":"In this article, we create a capsule of a lecture video using visual quality techniques which is a abstract of the lecture video. We first perform temporal segmentation to divide the video into number of shots. The activities of a lecture video can be divided into three categories: slide show, talking head, writing hand. We have developed a different and new approach for determining the quality of non-content and content frames crucial in the lecture video. Different features of the frame histogram are exploited to derive a quality factor for the detected frames. Hence we are able to extract high quality frames with high information content as well as few non content frames (talking head frames) for video clip selection. Finally in recreation of media to produce the capsule of the video, we select a video segments around these selected non content and content frames. Using this technique we are able to obtain a preview of the video which can be viewed in lesser time, hence it is beneficial to the viewers.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of Intelligent Powerd Wheelchair 智能电动轮椅的研制
2017 IEEE 7th International Advance Computing Conference (IACC) Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0121
Ramachandra Kallam, Harish Sharma
{"title":"Development of Intelligent Powerd Wheelchair","authors":"Ramachandra Kallam, Harish Sharma","doi":"10.1109/IACC.2017.0121","DOIUrl":"https://doi.org/10.1109/IACC.2017.0121","url":null,"abstract":"Independent mobility is an important aspectof self-esteem and plays a pivotal role in ”aging in place”.The smart wheelchair is an effort to provide an independentmobility to those persons who are unable to travel freely. Asmart wheelchair is an amalgamation of a standard powerdriving modules and a collection of sensors with an interfacingsection.Input control signal may be given by means of wirelessjoystick or touchpad that can be mounted on armrest also.Thisfeature makes it useful for the disabled persons who are ableto control the joystick and touchpad, and also it can be helpfulfor the caregiver like a nurse. Ultrasonic and infrared sensorsystems are going to be integrated into this wheelchair forproviding best possible and safe movement.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130196013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信