2013 15th International Conference on Advanced Computing Technologies (ICACT)最新文献

筛选
英文 中文
Studies on identification of medicinal plant variety based on NIR spectroscopy using plant leaves 基于植物叶片近红外光谱的药用植物品种鉴定研究
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710535
Kelina Sahaya Rajesh, C. Kumaravelu, A. Gopal, S. Suganthi
{"title":"Studies on identification of medicinal plant variety based on NIR spectroscopy using plant leaves","authors":"Kelina Sahaya Rajesh, C. Kumaravelu, A. Gopal, S. Suganthi","doi":"10.1109/ICACT.2013.6710535","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710535","url":null,"abstract":"Medicinal plants used very much in herbalism to study the medicinal properties of the plants. The applications of Near-Infrared Spectroscopy (NIRS) have expanded widely in the field of agriculture, plants and various other fields, but the usage for identification of plant variety is still rare. This paper discusses the use of NIRS to distinguish the medicinal plant variety through the spectral signatures of the leaves. Experiments were made on the leaves of five different plants, namely Indian borage, Hibiscus rosa-sinensis, Ocimum tenuiflorum, Solanum trilobatum and Piper betel. Near-infrared (NIR) spectral signatures of the medicinal plant leaves were obtained using XDS™ Optiprobe analyzer from Foss NIR system under reflectance mode. The spectral signatures were collected in two phases, the first set of spectra on the day when the leaves were plucked from the plants and the second set of spectra on dried leaves after three days. Classification model was established for both set of spectral data with suitable preprocessing techniques combined with Principal Component Analysis (PCA). PCA analysis results to discriminate the plant varieties among the dry leaves, which are taken for the experimental purpose. The details of various pre-processing techniques, the analysis and results obtained were presented in this paper. This study shows that NIRS technique can be used to classify for any other medicinal plant varieties.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129299350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Optimum design of buck converter controller using LQR approach 基于LQR方法的降压变换器控制器优化设计
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710514
S. Srivastava, Y. Kumar, A. Misra, S. K. Thakur, V. S. Pandit
{"title":"Optimum design of buck converter controller using LQR approach","authors":"S. Srivastava, Y. Kumar, A. Misra, S. K. Thakur, V. S. Pandit","doi":"10.1109/ICACT.2013.6710514","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710514","url":null,"abstract":"In this paper an optimum design is proposed for the buck converter pulse width modulator controller, which formulates the value of PID parameters using Linear Quadratic Regulator (LQR) approach. The uniqueness of this approach is that it gives the values of PID parameters with minimum cost function. Simulation and experimental results show the effectiveness of the method. Load disturbance and line voltage disturbance show the robustness of the proposed techniques.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An adaptive low overhead routing scheme with priority function for MANETs 一种具有优先级功能的自适应低开销路由方案
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710548
M. Raju, P. Subbaiah
{"title":"An adaptive low overhead routing scheme with priority function for MANETs","authors":"M. Raju, P. Subbaiah","doi":"10.1109/ICACT.2013.6710548","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710548","url":null,"abstract":"Scalability of a network having high mobility and great number of mobile nodes can be enhanced by a reduction of the control overhead, thereby increasing the capacity of the network system. Protocol overhead minimization in performance maintenance becomes important in MANETs [Mobile Ad-hoc Networks] because bandwidth is one of the vital resource. For reducing the control overheads, here we put forward a routing protocol with an adaptive low overhead. The proposal is an enhanced DLPS [Distributed Laxity-Based Priority Scheduling] proposal [18, 19] in Medium Access Control layer for tracing the index of priority of the packets between the source and destination. ODMRP [On Demand Multicast Routing Protocol] [21-26] is used in Network layer for routing these high priority packets. The actual overhead in the system is moderate, as only high priority packets are routed. In order to maintain decreased overhead thereby increasing the efficiency of the system, a dependable ODMRP is proposed. Through simulation, we intend to demonstrate that the proposed adaptive mechanism outperforms the conventional proactive routing protocol.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121493702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic text categorization of marathi documents using clustering technique 基于聚类技术的马拉地语文档自动文本分类
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710543
S. Vispute, M. Potey
{"title":"Automatic text categorization of marathi documents using clustering technique","authors":"S. Vispute, M. Potey","doi":"10.1109/ICACT.2013.6710543","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710543","url":null,"abstract":"The purpose of the present work is creating an intelligent system to retrieve desired documents in Marathi language. The system also focuses on providing the personalized documents in Marathi language to the end user based on their interests identified from the browsing history. This paper presents the automatic categorization of Marathi documents and the literature survey of the related work done in automatic categorization of text documents. Several supervised learning techniques are exists for the classification of text documents namely Decision trees, Support Vector machine (SVM), Neural Network, Ada Boost and Naïve Bayes etc. Several clustering techniques are also available for text categorization namely K-means, Suffix Tree Clustering (STC), Semantic Online Hierarchical Clustering (SHOC), Label Induction Grouping Algorithm (LINGO) etc. In the literature survey it is found that vector space model (VSM) gives better result than probabilistic model. This paper presents categorization of the Marathi text documents using Lingo Clustering algorithm based on VSM. The data set consists of 107 Marathi documents of 3 different categories-Tourism, Health Programmes and Maharashtra festivals. The result shows that the performance of the LINGO clustering algorithm is good for categorizing the Marathi text documents. For the Marathi documents overall accuracy of the system is 91.10%.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"22 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120859253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Information retrieval in Telugu language using Synset relationships 使用同义词集关系的泰卢固语信息检索
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710540
Kolikipogu Ramakrishna, P. Rani, D. Subrahmanyam
{"title":"Information retrieval in Telugu language using Synset relationships","authors":"Kolikipogu Ramakrishna, P. Rani, D. Subrahmanyam","doi":"10.1109/ICACT.2013.6710540","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710540","url":null,"abstract":"Information Technology brought many applications of Information Retrieval as simple as possible through Web and other Digital Information Access Environment. There is a demand in building Applications of IR in Local languages, which allows common people with minimal knowledge in at least one language to avail the information services. Word mismatch is a common problem in IR System Applications. The research is started to overcome this problem in 4 decades back and still the problem is unsolved. The methods were moving from word replacement to knowledge replacement to solve word mismatch and concept mismatches. This paper mainly explored towards solving word mismatch problem in India language context particularly Telugu language. IR in Telugu Language is in inception phase and need huge research to solve many issues in information processing and retrieval. Cross Lingual IR is quite comfortable stage with parallel rule conversion techniques, where as it is difficult to process Telugu alone and build Information Retrieval System. Telugu is morphologically rich with high conflational rate. In this paper we build IR in Telugu Language and extended to solve vocabulary mismatch problem using Synset relationships. When compared to base Retrieval system, expanded search yield offered results. This paper identified many issues related to topical search and given direction to solve with base proof with implementation results. We found improvement in Recall and precision with Expanded Search with Non-Expanded Retrieval.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120871742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An effective 6-bit flash ADC using low power CMOS technology 采用低功耗CMOS技术的高效6位闪存ADC
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710493
M. S. Reddy, S. Rahaman
{"title":"An effective 6-bit flash ADC using low power CMOS technology","authors":"M. S. Reddy, S. Rahaman","doi":"10.1109/ICACT.2013.6710493","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710493","url":null,"abstract":"In present day communication technology, Digital communication plays a tremendous role in effective power utilization of resources. In many aspects of Digital communication, both wired and wireless communication technologies are covered. To implement a digital communication system, Analog to Digital Conversion is must as the source of many systems is analog in nature. The effectiveness of Digital communication systems relay on speed of ADC. For this, there exist many types of ADCs such as Counter type ADC, Successive approximation type ADC, Flash Type ADC and Wilkinson type ADC. Among them Flash Type ADC has high ADC rate but with a drawback of high power consumptions. This drawback of high power consumption for Flash Type ADC is over come in our proposed method where a new 6-bit Flash Type ADC with less complexity and a conversion rate of 1-GS/s is implemented which results in low power consumption using low power CMOS technology. Here we use tools such as Micro Wind and Digital Schematic.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improved deterministic packet marking algorithm 改进的确定性数据包标记算法
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710539
A. Parashar, R. Radhakrishnan
{"title":"Improved deterministic packet marking algorithm","authors":"A. Parashar, R. Radhakrishnan","doi":"10.1109/ICACT.2013.6710539","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710539","url":null,"abstract":"Today, Internet has become the primary source of communication in networks. The attack on its infrastructure poses a great challenge in its expansion. Distributed Denial of Service attacks is major source of attacks over the past decade. The goal of the attacker is to spoof the source of IP address to hide its source. Various IP traceback schemes such as Probabilistic Packet Marking, Deterministic Packet marking, TTL base Packet Marking and Hash base IP traceback schemes are proposed to trace source of the attacker. This paper discusses the Improved deterministic packet marking algorithm that is effective in taking appropriate action for the spoof packets along with identification of attacker.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
FPGAs in software defined radio 软件无线电中的fpga
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710521
R. Kodali, Lakshmi Boppana, G. Gayathri
{"title":"FPGAs in software defined radio","authors":"R. Kodali, Lakshmi Boppana, G. Gayathri","doi":"10.1109/ICACT.2013.6710521","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710521","url":null,"abstract":"Software defined radio (SDR) technology has been gaining more prominence today as it is the design which includes very minimal hard-wired analog components and more software programmable functions. The reconfigurability of SDR enables this technology applicable across a wide range of areas within the wireless industry. The re-usability and flexibility of SDR depends on the FPGA it uses. This paper concentrates on how various components SDR are implemented using FPGA and also gives a note of comparison analysis of FPGAs offered by various vendors.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134301942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rubik's cube based private key management in wireless networks 无线网络中基于魔方的私钥管理
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710515
Siddharth C. Naik, P. Mahalle
{"title":"Rubik's cube based private key management in wireless networks","authors":"Siddharth C. Naik, P. Mahalle","doi":"10.1109/ICACT.2013.6710515","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710515","url":null,"abstract":"Key management using public key cryptography is less preferable due to several limitations like relatively high computation cost, encryption of preferably short messages, complex encryption-decryption algorithms etc. So we resort to private key management technique. In order to exchange messages between nodes in a Wireless Network, secret shared cryptographic keys must be established between the nodes of the network. Key management is a challenging task in wireless networks as the hostile environment of wireless networks makes it more prone to attacks. In order to ensure safe key management, dynamic generation of keys must occur. Hence the need of this study. This paper proposes a completely novel method for key generation using the concept which is slightly based on design of the Rubik's cube. As the complexity to solve the cube is quite high, it is almost impossible for an outsider to obtain the key that is shared among nodes. Also, a node Hop Count check is provided, which reduces the possibility of procurement of the keys on node capture. The main advantage of the method suggested in this paper is that keys are not exchanged between the nodes over the network, which reduces the possibility of key capture to a great extent.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"465 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116178850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
JCADS: Semi-supervised clustering algorithm for network anomaly intrusion detection systems 网络异常入侵检测系统的半监督聚类算法
2013 15th International Conference on Advanced Computing Technologies (ICACT) Pub Date : 2013-09-01 DOI: 10.1109/ICACT.2013.6710498
Rajendra Prasad Palnaty, A. Rao
{"title":"JCADS: Semi-supervised clustering algorithm for network anomaly intrusion detection systems","authors":"Rajendra Prasad Palnaty, A. Rao","doi":"10.1109/ICACT.2013.6710498","DOIUrl":"https://doi.org/10.1109/ICACT.2013.6710498","url":null,"abstract":"Detection of the anomaly activities in the network has been a growing problem, motivating widespread research in the area of automated intrusion detection systems. In the automated intrusion detection systems, classification of n-dimensional vectors of the network traffic is a challenging area. Several research works was already done on this topic. But most of the works were presented to have high detection rates, But with false positives. In this paper, we presented a novel approach to have a high detection rate and very low false positives and false negatives in the classification of network traffic using jaccords coefficient (JC) similarity. The proposed approach is employed on low dimensional space of network traffic profiles with the KDDCUP99 dataset. The experimental study shows that the use of jaccords coefficient similarity clustering on the network traffic profile will increases the detection rate and avoids the false positives in the classification.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信