2013 3rd IEEE International Advance Computing Conference (IACC)最新文献

筛选
英文 中文
EMPPC-an evolutionary model based privacy preserving technique for cloud digital data storage emppc——一种基于进化模型的云数字数据存储隐私保护技术
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514200
D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan
{"title":"EMPPC-an evolutionary model based privacy preserving technique for cloud digital data storage","authors":"D. Chandramohan, T. Vengattaraman, D. Rajaguru, R. Baskaran, P. Dhavachelvan","doi":"10.1109/IADCC.2013.6514200","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514200","url":null,"abstract":"This paper spank out the enormity of unknown users hand on web service users' and their data protection level bump up as an issue in cloud users mind. Once hiring a data space in cloud it's the responsibility of both to accustomed the stored information's privacy and preserving it in a secret way. It is noticed by the academicians and researchers oodles and masses of privacy breaches relentlessly observable fact dealt globally. It is one of the hottest research topics. This work targets data privacy and its preservation by proposing an evolutionary approach to safeguard the confidential data stored in the cloud. It also focuses on prominent study of users' privacy need and to preserve data distorted from intermediate digital data thieves.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach for feature selection method TF-IDF in document clustering 一种新的文档聚类特征选择方法TF-IDF
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514339
L. Patil, M. Atique
{"title":"A novel approach for feature selection method TF-IDF in document clustering","authors":"L. Patil, M. Atique","doi":"10.1109/IADCC.2013.6514339","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514339","url":null,"abstract":"Now a day, the text document is spontaneously increasing over the internet, e-mail and web pages and they are stored in the electronic database format. To arrange and browse the document it becomes difficult. To overcome such problem the document preprocessing, term selection, attribute reduction and maintaining the relationship between the important terms using background knowledge, WordNet, becomes an important parameters in data mining. In these paper the different stages are formed, firstly the document preprocessing is done by removing stop words, stemming is performed using porter stemmer algorithm, word net thesaurus is applied for maintaining relationship between the important terms, global unique words, and frequent word sets get generated, Secondly, data matrix is formed, and thirdly terms are extracted from the documents by using term selection approaches tf-idf, tf-df, and tf2 based on their minimum threshold value. Further each and every document terms gets preprocessed, where the frequency of each term within the document is counted for representation. The purpose of this approach is to reduce the attributes and find the effective term selection method using WordNet for better clustering accuracy. Experiments are evaluated on Reuters Transcription Subsets, wheat, trade, money grain, and ship.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"679 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122975028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A noise robust edge detector for color images using Hilbert Transform 基于希尔伯特变换的彩色图像噪声鲁棒边缘检测器
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514399
A. Gupta, A. Ganguly, V. Bhateja
{"title":"A noise robust edge detector for color images using Hilbert Transform","authors":"A. Gupta, A. Ganguly, V. Bhateja","doi":"10.1109/IADCC.2013.6514399","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514399","url":null,"abstract":"This paper proposes a noise robust technique to facilitate edge detection in color images contaminated with Gaussian and Speckle noises. The proposed edge detector uses the concept of Hilbert transform to perform edge sharpening and enhancement. Bilateral Filtering assists in smoothening noisy pixels without affecting high frequency edge contents. Using Bilateral Filtering as a precursor to Hilbert Transform, drastically improves the degree of noise robustness. Simulations have been carried out on medical images and the results have been validated in Gaussian and Speckle noise environment.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123038274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Learning algorithms For intelligent agents based e-learning system 基于智能代理的电子学习系统的学习算法
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514369
N. Pandey, Shashank Sahu, R. K. Tyagi, A. Dwivedi
{"title":"Learning algorithms For intelligent agents based e-learning system","authors":"N. Pandey, Shashank Sahu, R. K. Tyagi, A. Dwivedi","doi":"10.1109/IADCC.2013.6514369","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514369","url":null,"abstract":"Requirements are the basic entity which makes the project to be successfully implemented. In the development of the software, theses requirements must be measured accurately and correctly. The requirements of the end users may be changed with respect to different individual personality. As different requirements are given by different customers, all of them cannot be processed by single software system. In such a case, it is essential to make the changes in the software systems automatically which fulfills all the requirements of the user. Such condition is met by the systems with intelligent agents. In this paper, algorithms of intelligent agents adviser agent, personalization agent and content managing agent are proposed to automatically gather the requirements of the students and fulfill them. The algorithms are structured using reinforcement learning. Theses algorithm makes the agents to sense the needs of the students and evolve in the course of their operation. These intelligent agents are applied after the deployment of the e-learning software. All the algorithms have been implemented successfully.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
E-business strategies to cut back cost of business enterprise 降低企业成本的电子商务策略
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514280
A. Siddiqui, A. F. Basha
{"title":"E-business strategies to cut back cost of business enterprise","authors":"A. Siddiqui, A. F. Basha","doi":"10.1109/IADCC.2013.6514280","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514280","url":null,"abstract":"As the time is passing and the world is becoming more virtual and online than physical. This is the time to re-establish the business and to reach more and more people throughout the world. The idea is that it should reach to maximum people living around the world i.e. the business needs to be global and online. Aim of this research paper was to find out the various ways and resources from where we can save the money in traditional business while converting it into e-business. So, the motto is to find out the areas where we can save the money in traditional business. The paper is totally based on personnel observations, others experience and own thoughts etc. Found various areas where we can save good amount of money and also the business can perform in better way. In this paper, the possibility of reducing the business cost through e-business is being explored.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Clustering analysis in social network using Covering Based Rough Set 基于覆盖粗糙集的社交网络聚类分析
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514272
A. Mitra, S. R. Satapathy, S. Paul
{"title":"Clustering analysis in social network using Covering Based Rough Set","authors":"A. Mitra, S. R. Satapathy, S. Paul","doi":"10.1109/IADCC.2013.6514272","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514272","url":null,"abstract":"This paper focuses on solving the problem of classification and clustering in social network by using Rough Set. When the data set consists of missing or uncertain data then the Rough set is proved to be an efficient tool. To solve a problem under the domain of social network, the problem must satisfy the fundamental property of rough set i.e., the attribute of the problem must holds true for equivalence relation. Hence, before implementing rough set to the specific problem of social network, it must be redefined in a way that properties of transitive, symmetric and reflexive should holds true. In this paper, we have studied on the concept of Fiksel's societal network and used it for redefining the social network problem in terms of equivalence relationships. Further, we had defined the Social network in terms of graph theory and mathematical relations. We had proceeded further in defining the Fiksel's societal network and social network with respect to rough set. Fiksel had defined the social network in terms of structural equivalence. We have discussed on the limitation of Rough set and observed that use of Covering Based Rough Set as an extension of Pawlak's rough set seems to be a better alternative. There are six types of covering based rough set. To keep continuity in this paper, we have mentioned about Covering based rough sets. Covering based rough set extends from partitioning in rough sets to covering of the universe and is flexible, when compared with rigid equivalence relation.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Write stability analysis of 8-T novel SRAM cell for high speed application 高速应用新型8-T SRAM单元的写入稳定性分析
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514460
P. Upadhyay, S. Chhotray, R. Kar, D. Mandal, S. Ghoshal
{"title":"Write stability analysis of 8-T novel SRAM cell for high speed application","authors":"P. Upadhyay, S. Chhotray, R. Kar, D. Mandal, S. Ghoshal","doi":"10.1109/IADCC.2013.6514460","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514460","url":null,"abstract":"This paper presents on the stability analysis of the proposed 8-T low power SRAM cell for write operation. Here we propose a novel low power 8-T SRAM cell and compare its stability with conventional 6-T standard models. In the proposed structure we use two voltage sources, one connected with the Bit line and the other connected with the Bit bar line for reducing the voltage swing during the write “0” or write “1” operation. We use 65 nm CMOS technology with 1 volt power supply. Simulation is carried out in Microwind 3.1 by using BSim4 model. We use the approach of write static noise margin, bitline voltage write margin and wordline voltage write margin for analyzing the stability of the proposed SRAM cell. These two extra voltage sources can control the voltage swing at the output node and improve the noise margin during the write operation. The simulation results and the comparison made with that of conventional 6T SRAM justify the efficacy of the superiority of the proposed SRAM structure.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129061446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Deterministic compressed-sensing matrix from grassmannian matrix: Application to speech processing 基于格拉斯曼矩阵的确定性压缩感知矩阵:在语音处理中的应用
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514392
V. Abrol, Pulkit Sharma, S. Budhiraja
{"title":"Deterministic compressed-sensing matrix from grassmannian matrix: Application to speech processing","authors":"V. Abrol, Pulkit Sharma, S. Budhiraja","doi":"10.1109/IADCC.2013.6514392","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514392","url":null,"abstract":"Reconstruction of a signal based on Compressed Sensing (CS) framework relies on the knowledge of the sparse basis & measurement matrix used for sensing. While most of the studies so far focus on the prominent random Gaussian, Bernoulli or Fourier matrices, we have proposed construction of efficient sensing matrix we call Grassgram Matrix using Grassmannian matrices. This work shows how to construct effective deterministic sensing matrices for any known sparse basis which can fulfill incoherence or RIP conditions with high probability. The performance of proposed approach is evaluated for speech signals. Our results shows that these deterministic matrices out performs other popular matrices.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127037817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Finding zeros for linear phase FIR filters 寻找线性相位FIR滤波器的零点
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514381
Priyanka, Brishbhan Singh, Panwar Shiv, Dutt Joshi, Iit Delhi
{"title":"Finding zeros for linear phase FIR filters","authors":"Priyanka, Brishbhan Singh, Panwar Shiv, Dutt Joshi, Iit Delhi","doi":"10.1109/IADCC.2013.6514381","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514381","url":null,"abstract":"This paper presents a new technique to find zeros of a real, linear phase, FIR filter. Properties of Z-transform and constraints on location of zeros for this type of filter have been used to reduce search space for zeros. Furthermore, the obtained information on zeros is subsequently used in WDK formulas to obtain more accurate and precise location of zeros. Simulation results validating the proposed technique are also presented.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121135216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tumbling Multilevel Channel Conflicts in Mobile Ad Hoc Networks 移动自组织网络中翻滚的多层信道冲突
2013 3rd IEEE International Advance Computing Conference (IACC) Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514216
Mohamed Abd Elhamid Abbas, Husain Shahnawaz
{"title":"Tumbling Multilevel Channel Conflicts in Mobile Ad Hoc Networks","authors":"Mohamed Abd Elhamid Abbas, Husain Shahnawaz","doi":"10.1109/IADCC.2013.6514216","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514216","url":null,"abstract":"Due to the huge compulsion in which collective wireless technologies should act below an abstinent awning. Mobile Ad Hoc Networks are leaving to accomplish this mandate. Wireless technologies are abstruse in itself along with we are going to adhere them in an abstinent awning they inherited the clashes form their parental technologies and frequent additional confrontations will broaden. WiMax / UMTS infrastructure is observing for expediency of Mobile Ad Hoc Networks. The core analysis challenge in WiMax is about the anode allowance. additionally destined to deficient anode affiliate and bulky amplification in mobile consumers, the difficulty of contest free channels allocation dovetails very arrogant. Hence, the main objective of this paper is to reduce the Multilevel Channel Conflicts in Mobile Ad Hoc Networks .Channel allowance is an elementary affair of resource activity that aggregates the comprehension and extent of attendants. As dormant channel apportionment misses the heuristic applications to allot the channels to the cages. headed channel assignment behaves beneficially inferior leaden traffic. assiduous channel allowance apprise behaves inferior brightness as well as alleviated traffic. To advance the benefit of the channel chunk we try an alloyed application for channel allowance in which FCA and DCA apprises coupled will work concomitantly. The results depict that the proposed mechanism is able to allot the conflict free channels to all enclosures according to the constraint of the enclosures. This allocation is able to reduce the conflicts in multi level channels in ad hock networks. For replication we apprise only four cells clusters architecture and seven cells cluster arrangement and consequences arises that allocated channels are conflict free and based on the compatibility matrix which is allocation methodology.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信