2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)最新文献

筛选
英文 中文
Understanding and formulation of various kernel techniques for suport vector machines 理解和表述支持向量机的各种核技术
P. Bohra, Dr Hemant Palivela
{"title":"Understanding and formulation of various kernel techniques for suport vector machines","authors":"P. Bohra, Dr Hemant Palivela","doi":"10.1109/ICCIC.2015.7435804","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435804","url":null,"abstract":"Support Vector Machines (SVM's) are supervised learning algorithms which can be used for analyzing patterns and classifying data. This supervised algorithm is applicable for binary class as well as multiclass classification. The core idea is to build a hyperplane which can easily separate the training examples. For binary class, SVM constructs a hyper-plane which can easily separate d-dimensional training examples perfectly into 2-classes. but sometimes, the training examples are not linearly separable. Thus, for non-linear training examples, SVM introduced Kernel functions which transforms the data into high dimensional space where the data can be separated linearly. For minimizing the test error and for improving classification accuracy, kernels functions are used. This paper explains applications of kernels in support vector machine and provide information about the properties of these kernels and situations in which they can be used.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tele-monitoring vehicle system for secured travelling 安全行车远程监控车辆系统
M. Bhille, Namrata D. Hiremath
{"title":"Tele-monitoring vehicle system for secured travelling","authors":"M. Bhille, Namrata D. Hiremath","doi":"10.1109/ICCIC.2015.7435759","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435759","url":null,"abstract":"In real world many people face a lot of problem to contact other people while travelling and inform about their location details; in such cases this application solves the problem by first tracking the location of the person and then sending a text message to other person to the pre-set numbers periodically. An attempt is been made to develop a vehicle for the purpose of detecting the location and position of the vehicle carrying people or any asset. This information can be sent to remote user through global system for mobile communication. It provides a remote monitoring system for secured transportation for local conveyances. The Proposed system is equipped with GPS & GSM enabled embedded system along with microcontroller in the vehicle. GPS-GSM module helps the remote user to continuously track the location of the vehicle and activity of the driver.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design an M-learning framework for smart learning in ad hoc network of Android devices 为Android设备自组织网络中的智能学习设计一个移动学习框架
M. Aljohani, Tanweer Alam
{"title":"Design an M-learning framework for smart learning in ad hoc network of Android devices","authors":"M. Aljohani, Tanweer Alam","doi":"10.1109/ICCIC.2015.7435817","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435817","url":null,"abstract":"Android smart devices are ubiquitous in our daily life and becoming valuable device with the capabilities of wireless networking that are typically used with an IEEE 802.11 access point. Ad hoc network provides facilities to access devices in infrastructure less system without a centralized approach. Android smart devices are dynamically joined and create an ad hoc network on their own. Android based smart configuration don't need centralized infrastructure for making connection in own created network. smart devices creates the network and start communication. M-learning is a key point for effective learning in this network. The main goal of this paper is to design a new M-learning framework for smart learning in Ad Hoc Network architecture among Android based Wi-Fi devices. Android is an open platform system with the feature of wireless. In our research we select Android and develop Android application for M-Learning through android based smart devices. we developed Android application for connecting android devices together in an ad hoc network without centralized approach. M-learning System has been implemented and results in Wi-Fi and Bluetooth were collected. The proposed system have been tested in android ad hoc network system. Application has been figured in Wi-Fi and Bluetooth ad hoc network environment.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123634763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Rider assistance system with an active safety mechanism 骑手辅助系统与主动安全机制
Gangatharan Kumarasamy, N. Prakash, P. Mohan
{"title":"Rider assistance system with an active safety mechanism","authors":"Gangatharan Kumarasamy, N. Prakash, P. Mohan","doi":"10.1109/ICCIC.2015.7435675","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435675","url":null,"abstract":"This paper discusses on the design and use of emerging technologies to provide a rider assistance system with an integrated safety mechanism for two wheelers (2W). This paper identifies the most frequent causes of two wheeler accidents and how the rider interacts with the vehicle during the pre-crash phase and vehicle behavior by analyzing the two wheeler accident data. Rider Assistance System (RAS) shall identify the existing technologies and safety systems in passenger cars and assess their usability or with modifications in two wheelers. This system shall continuously monitor the approaching path for any stationary or moving obstacles. And also monitors the rider's field of vision for any deviation from the intended path. These inputs shall be achieved either by range sensor based technology or/and a computer vision based technology. These input parameters shall be processed by an Electronic Control Unit (ECU) to take an autonomous decision to avoid a crash or to warn the rider to take an action. The autonomous decision shall be de-accelerating the vehicle by intervening the rider's acceleration inputs. With this autonomous action of the system, a possible crash shall be prevented ensuring rider's safety.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and analysis of a 16-bit 10MHz pipeline ADC in 0.25μ CMOS 0.25μ CMOS 16位10MHz流水线ADC的设计与分析
C. S. Datta, G. Prasad, V. Shiva, Prasad Nayak, G. Bhargav
{"title":"Design and analysis of a 16-bit 10MHz pipeline ADC in 0.25μ CMOS","authors":"C. S. Datta, G. Prasad, V. Shiva, Prasad Nayak, G. Bhargav","doi":"10.1109/ICCIC.2015.7435769","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435769","url":null,"abstract":"This paper discusses the design and analysis of a 16-bit 10MHz pipeline Analog to Digital Converter (ADC). A system and circuit level design of each component of the ADC was created in Cadence. Features of ADC were simulated in Matlab to test and examine its basic functionality. Transient analysis of the design was conducted to verify the performance of the ADC. Methods to correct non-linarites were identified and investigated. The goal of this Major Qualifying Project is to design and fabricate a 16-bit 10MHz Pipeline Analog to Digital Converter (ADC) using 0.25μm CMOS. The motivation for designing a Pipeline ADC comes from the desire to characterize and test the functionality of the novel \"Split ADC\" Architecture concept [3] using a non-algorithmic ADC. We successfully characterized the System-level functionality of a Pipeline ADC by simulating its features through Matlab. A major part of the analog subsystem of the ADC was designed in Cadence. The simulation work corroborates with our theory and helped us to analyze the design block. It has provided us an opportunity to compare and contrast the ideal and non-ideal behavior of an ADC. Once the layout of the IC has been designed and fabricated, we shall move on to further work needed for data acquisition using a software package similar to LabView or Python.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance comparison of various clustering techniques for diagnosis of breast cancer 各种聚类技术在乳腺癌诊断中的性能比较
R. Delshi Howsalya Devi, P. Deepika
{"title":"Performance comparison of various clustering techniques for diagnosis of breast cancer","authors":"R. Delshi Howsalya Devi, P. Deepika","doi":"10.1109/ICCIC.2015.7435711","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435711","url":null,"abstract":"Breast Cancer is a decisive disease when compared to all other cancers in worldwide. Diagnosis of breast cancer is normally clinical and biological in nature. In general we used some of the data mining clustering techniques to predict breast cancer. The objective of this paper is to compare the performance of different Clustering techniques to diagnosis the cancer either benign or malignant. According to the results of our experimental work, we compared five clustering techniques such as DBSCAN, Farthest first, canopy, LVQ and hierarchical clustering in Weka software and comparison results show that Farthest First clustering has higher prediction accuracy i.e. 72% than DBSCAN, Canopy, LVQ and Hierarchical clustering methods.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124849339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Speech emotion recognition using DWT 基于小波变换的语音情感识别
S. Lalitha, Anoop Mudupu, Bala Visali Nandyala, Renuka Munagala
{"title":"Speech emotion recognition using DWT","authors":"S. Lalitha, Anoop Mudupu, Bala Visali Nandyala, Renuka Munagala","doi":"10.1109/ICCIC.2015.7435630","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435630","url":null,"abstract":"Emotion recognition from speech helps us in improving the effectiveness of human-machine interaction. This paper presents a method to identify suitable features in DWT domain and improve good accuracy. In this work, 7 emotions (Berlin Database) are recognized using Support Vector Machine (SVM) classifier. Entropy of Teager Energy operated Discrete Wavelet Transform (DWT) coefficients, Linear Predictive Cepstral Coefficients(LPCC), Mel Energy Spectral Dynamic Coefficients(MEDC), Zero Crossing Rate (ZCR), shimmer, spectral roll off, spectral flux, spectral centroid, pitch, short time energy and Harmonic to Noise Ratio (HNR) are considered as features. The obtained average accuracy is 82.14 % Earlier work done on emotion recognition using DWT coefficients yielded an accuracy of 63.63 % and 68.5% for 4 emotions on Berlin and Malayalam databases respectively. The proposed algorithm shows a significant increase in accuracy of about 15% to 20% for 7 emotions on Berlin database. Also, 100% efficiency has been achieved for four emotions with Simple Logistic classifier of WEKA 3.6 tool.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"44 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129680150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET) 安全增强对自主移动网状网络(AMMNET)的影响
Rishikesh J. Teke, M. Chaudhari, R. Prasad
{"title":"Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)","authors":"Rishikesh J. Teke, M. Chaudhari, R. Prasad","doi":"10.1109/ICCIC.2015.7435739","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435739","url":null,"abstract":"The Mobile Ad-hoc Networks (MANET) are suffering from network partitioning when there is group mobility and thus cannot efficiently provide connectivity to all nodes in the network. Autonomous Mobile Mesh Network (AMMNET) is a new class of MANET which will overcome the weakness of MANET, especially from network partitioning. However, AMMNET is vulnerable to routing attacks such as Blackhole attack in which malicious node can make itself as intragroup, intergroup or intergroup bridge router and disrupt the network. In AMMNET, To maintain connectivity, network survivability is an important aspect of reliable communication. Maintaning security is a challenge in the self organising nature of the topology. To address this weakness proposed approach measured the performance of the impact of security enhancement on AMMNET with the basis of bait detection scheme. Modified bait approach that will prevent blackhole node entering into the network and helps to maintain the reliability of the network. The proposed scheme uses the idea of Wumpus World concept from Artificial Intelligence. Modified bait scheme will prevent the blackhole attack and secures network.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132106295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel Bi-level Artificial Bee Colony algorithm and its application to image segmentation 一种新的双层人工蜂群算法及其在图像分割中的应用
B. A. Dakshitha, V. Deekshitha, K. Manikantan
{"title":"A novel Bi-level Artificial Bee Colony algorithm and its application to image segmentation","authors":"B. A. Dakshitha, V. Deekshitha, K. Manikantan","doi":"10.1109/ICCIC.2015.7435656","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435656","url":null,"abstract":"Image segmentation requires optimum multilevel threshold values obtained from the image in order to partition it into multiple regions. Estimating these thresholds poses a great challenge. In this paper, we propose a novel swarm intelligence technique, namely Bi-level Artificial Bee Colony (BABC) algorithm, to obtain the optimum thresholds by using the Tsallis Entropy as an objective function. BABC is used, along with a Sinusoidal Evaluation of Fitness Function (SEFF), to ensure that all the threshold values of the image are examined before arriving at the best possible solution. Experimental results show the promising performance of BABC for image segmentation as compared to other optimization algorithms like Particle Swarm Optimization (PSO), Genetic Algorithm (GA) and Bacterial Foraging (BF) Algorithm.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126693603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Control parameter adaptation strategies for mutation and crossover rates of differential evolution algorithm - An insight 差分进化算法中变异和交叉率的控制参数自适应策略
P. Pranav, G. Jeyakumar
{"title":"Control parameter adaptation strategies for mutation and crossover rates of differential evolution algorithm - An insight","authors":"P. Pranav, G. Jeyakumar","doi":"10.1109/ICCIC.2015.7435788","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435788","url":null,"abstract":"Differential Evolution (DE), an optimization algorithm under the roof of Evolutionary Algorithms (EAs), is well known for its efficiency in solving optimization problems which are non-linear and non-differentiable. DE has many good qualities such as algorithmic simplicity, robustness and reliability. DE also has the quality of solving the given problem with few control parameters (NP - population size, F - mutation rate and Cr - crossover rate). However, suitable setting of values to these parameters is a complicated task. Hence, various adaptation strategies to tune these parameters during the run of DE algorithm are proposed in the literature. Choosing the right adaptation strategy itself is another difficult task, which need in-depth understanding of existing adaptation strategies. The aim of this paper is to summarize various adaptation strategies proposed in DE literature for adapting F and Cr. The adaptation strategies are categorized based on the logic used by the authors for adaptation, and brief insights about each of the categories along with the corresponding adaptation strategies are presented.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126508970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信