2015 Fifth International Conference on Communication Systems and Network Technologies最新文献

筛选
英文 中文
An Unsupervised Approach to Video Shot Boundary Detection Using Fuzzy Membership Correlation Measure 基于模糊隶属度相关测度的无监督视频镜头边界检测方法
Biswanath Chakraborty, S. Bhattacharyya, Susanta Chakraborty
{"title":"An Unsupervised Approach to Video Shot Boundary Detection Using Fuzzy Membership Correlation Measure","authors":"Biswanath Chakraborty, S. Bhattacharyya, Susanta Chakraborty","doi":"10.1109/CSNT.2015.57","DOIUrl":"https://doi.org/10.1109/CSNT.2015.57","url":null,"abstract":"In this paper we propose an improved cut detection or shot detection algorithm adapted to any domain of movies with various result sets. Shot is actually the series of interrelated consecutive pictures or frames taken from a film or part of a film contiguously and representing a continuous action in time and space. Consecutive two different shots produce an important visual discontinuity in the video stream which is called a cut. Here the video shots are assumed to be fuzzy sets and the fuzzy correlation between them is defined on the same universal support. It is shown that Spearman's rank correlation coefficient can be applied if the members of the supports are ranked according to the fuzzy membership values of each set. Next a membership-value-based fuzzy correlation measure is explained with the experimental result. Results indicate encouraging avenues for detection of hard cuts with high precision.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
XLIFF: Complementary for a Complete Localization of Machine Translation Among Divergent Language Families XLIFF:对不同语系间机器翻译完全本地化的补充
Priyanka Pawar, Pratik Ardhapurkar, Priyanka Jain, Anuradha Lele, Ajai Kumar, H. Darbari
{"title":"XLIFF: Complementary for a Complete Localization of Machine Translation Among Divergent Language Families","authors":"Priyanka Pawar, Pratik Ardhapurkar, Priyanka Jain, Anuradha Lele, Ajai Kumar, H. Darbari","doi":"10.1109/CSNT.2015.29","DOIUrl":"https://doi.org/10.1109/CSNT.2015.29","url":null,"abstract":"For the purpose of localization, only textual output is not sufficing the need of Machine Translation unless until it is in a usable format. In Indian scenario, localization as an industry has not been recognized yet which had led to lack of Language Standards leading to varied translation quality. Localization is the process of adapting a product or service to a particular language, culture, and desired local \"look-and-feel\" Machine Translation is one of the most important activities under localization but it is not complete unless until it is adapted by end user in a desired manner. In this paper, we are introducing format retention utility using \"XLIFF\" as an important tool to English to Indian Language Machine Translation. Here, uniqueness and complexity of task has been discussed. In this paper, we are proposing a design and architecture to support the system along with experiments, results and future aspects. It is closely related to the long-term vision of enabling code to support local, regional, language, or culturally related preferences.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121860151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Zero Knowledge Protocol with RSA Cryptography Algorithm for Authentication in Web Browser Login System (Z-RSA) 基于零知识协议和RSA加密算法的Web浏览器登录系统认证(Z-RSA)
Vikash Mainanwal, Mansi Gupta, S. Upadhayay
{"title":"Zero Knowledge Protocol with RSA Cryptography Algorithm for Authentication in Web Browser Login System (Z-RSA)","authors":"Vikash Mainanwal, Mansi Gupta, S. Upadhayay","doi":"10.1109/CSNT.2015.90","DOIUrl":"https://doi.org/10.1109/CSNT.2015.90","url":null,"abstract":"A secure web browser login system has been implemented with the help of any cryptography techniques for authentication purpose. The Zero-Knowledge Proof and RSA algorithm is a concept which has been used here for providing the more authentication cryptographic systems. The Zero knowledge protocol with RSA cryptography algorithm can applied on the client side and it is working between client and server. In this built an algorithm in authentication system as like firewall or with firewall. It allows a party to prove that he/she knows something (i.e. Credential), without having to send over the value of the credential. In this implementation, it will be used to prove the password of the user without sending over the actual password. The system also allows for no password hashes to be stored on the server. The purpose of the implementation is to make confidential and authentication user login password.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimization of Rectangular Patch Antenna at 5GHz Using Bat Search Algorithm 基于Bat搜索算法的5GHz矩形贴片天线优化
M. Kumar, A. B. Sahoo, Ritika Sao, B. B. Mangaraj
{"title":"Optimization of Rectangular Patch Antenna at 5GHz Using Bat Search Algorithm","authors":"M. Kumar, A. B. Sahoo, Ritika Sao, B. B. Mangaraj","doi":"10.1109/CSNT.2015.47","DOIUrl":"https://doi.org/10.1109/CSNT.2015.47","url":null,"abstract":"A rectangular micro strip antenna is widely used now a days. It is analyzed with the length, width of the rectangular patch and height, dielectric constant of substrate being optimized to make the antenna resonate at 5GHz. The optimization is done through programs based on bat algorithm using MATLAB R2009b and the obtained results are used to design of the antenna using CST Studio Suite 2011. The S-parameter plot is then observed after the transient solver step of the antenna is completed.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125873995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Data-Driven Approach to Predict Default Risk of Loan for Online Peer-to-Peer (P2P) Lending 基于数据驱动的P2P网络借贷违约风险预测方法
Yu Jin, Yu Zhu
{"title":"A Data-Driven Approach to Predict Default Risk of Loan for Online Peer-to-Peer (P2P) Lending","authors":"Yu Jin, Yu Zhu","doi":"10.1109/CSNT.2015.25","DOIUrl":"https://doi.org/10.1109/CSNT.2015.25","url":null,"abstract":"Online Peer-to-Peer (P2P) lending has achieved explosive development recently, which could be beneficial to both sides of individual lending. In this study, a data mining (DM) approach to predict the performance of P2P loan before funded is proposed. Using data from the Lending Club, we explore the characteristics of loan and its applicant and use random forest to do the feature selection in the modeling phase. The Difference from other risk prediction models is that the prediction is classified into three or four categories, rather than just two the default and not default classes. Then we compare five DM models: two decision trees (DTs), two neural networks (NNs) and one support vector machine (SVM) and use two metrics: average percent hit rate and area of the lift cumulative curve to evaluate the prediction results. The Empirical result shows that the term of loan, annual income, the amount of loan, debt-to-income ratio, credit grade and revolving line utilization play an important role in loan defaults. And SVM, Classification and Regression Tree (CART) and Multi-layer perceptron (MPL)'s prediction performance are almost equal.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129325581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Association Rule Mining Based on Density and Regional Minimum Support 基于密度和区域最小支持度的关联规则挖掘
K. Soni, Jitendra Agrawal, S. Sharma, Shikha Agrawal
{"title":"Association Rule Mining Based on Density and Regional Minimum Support","authors":"K. Soni, Jitendra Agrawal, S. Sharma, Shikha Agrawal","doi":"10.1109/CSNT.2015.227","DOIUrl":"https://doi.org/10.1109/CSNT.2015.227","url":null,"abstract":"Data mining means looking for specific examples inside expansive sets of data, which makes a considerable measure of conceivable outcomes for business administrators and leaders. In true, data mining examiners typically are gone up against with a nature; the database would be changed about whether, and the experts may need to set diverse support stipulations to uncover genuine educational standards. Productively upgrading the found affiliation administers subsequently turns into a critical issue. In this paper, we consider the issue of element mining of affiliation tenets with grouping cosmology and with single numerous minimum supports requirement. We explore how to effectively upgrade the ran across affiliation guidelines when there is transaction redesign to the database and the expert has refined the support imperative. Mining regular examples in transaction databases, time-arrangement databases, and numerous different sorts of databases has been examined prominently in data mining exploration. We utilize thickness minimum support so we diminish the execution time. Our methodology supports the zonal minimum support, by this methodology we can keep the transaction on the predictable timetable, then we give three unique thickness zone centered around the transaction and minimum support which is low (L), Medium (M), High (H). Considering the zonal support, we sort the thing set for pruning. So our methodology is useful for pruning the data zone smart, because the support order is not same in all, it must be arranged by the populace guests. So the fundamental point is to group and location naturally thickness savvy. Our calculation gives the adaptability to enhanced affiliation and element support.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130583231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speech Bandwidth Extension Based on GMM and Clustering Method 基于GMM和聚类方法的语音带宽扩展
Yingxue Wang, Shenghui Zhao, Yibiao Yu, Jingming Kuang
{"title":"Speech Bandwidth Extension Based on GMM and Clustering Method","authors":"Yingxue Wang, Shenghui Zhao, Yibiao Yu, Jingming Kuang","doi":"10.1109/CSNT.2015.233","DOIUrl":"https://doi.org/10.1109/CSNT.2015.233","url":null,"abstract":"Conventional Gaussian mixture model (GMM) Speech Bandwidth Extension (BWE) methods often suffer from the overly smoothed problem. Thus, a method of BWE based on a cluster process and GMM whose parameters are determined by expectation-Maximization (EM) is proposed. Firstly, a cluster process is used to cluster the low frequency and high frequency parameters, and then the GMM for each cluster is established. Later on, the parameters of low frequency are transformed to the parameters of high frequency according to the learned mapping function of the corresponding GMM. Self-organization Feature Mapping (SOFM) and Vector Quantization (VQ) are applied as the cluster. It is shown by subjective evaluation and objective evaluation that, the proposed method improves the quality of the synthesized speech signals compared with the conventional GMM-based BWE method and overcomes the over-smoothed problem caused by the traditional GMM-based BWE method largely.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130884843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Reconstruction of an Archeological Site in Real Time Domain by Using Software Techniques 基于软件技术的考古遗址实时重建
B. Koyuncu, A. Gokce, Pejman Panahi
{"title":"Reconstruction of an Archeological Site in Real Time Domain by Using Software Techniques","authors":"B. Koyuncu, A. Gokce, Pejman Panahi","doi":"10.1109/CSNT.2015.44","DOIUrl":"https://doi.org/10.1109/CSNT.2015.44","url":null,"abstract":"A Roman temple named Temple of Augustus is reconstructed in real time by using virtual reality techniques and programming. The temple in ruins in its present form is considered. Reconstruction of the temple is animated in slow speed in front of the onlookers and it is brought to its former glory. Special effects of movements, lighting and rendering are deployed to make the final appearance of the temple real life like. Unity game engine is included during the reconstruction and visitors are provided with movement around the temple.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121601617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Composition of ECC-PAKE Protocol for Multilayer Consensus Using Signcryption 基于签名加密的多层一致性ECC-PAKE协议的安全组成
G. Kumar, H. Saini
{"title":"Secure Composition of ECC-PAKE Protocol for Multilayer Consensus Using Signcryption","authors":"G. Kumar, H. Saini","doi":"10.1109/CSNT.2015.91","DOIUrl":"https://doi.org/10.1109/CSNT.2015.91","url":null,"abstract":"The manuscript provides a derivation approach based on the challenge response session specific protocol, wherever similar methods are applies for alternative algorithms, such as Diffie-Hellman, RSA, Elliptic Curve Cryptography etc. The only change in the primitive generators. Further, described the key generation for password authenticated key exchange for multilayer consensus and then after signcryption approach applied which logically combines the computational cost and communicational cost into a single stride. Proposed methodology using signcryption potentially reduces the overall computation time, needed for key generation and signature. The results of multilayer consensus key generation approach are tested on SPAN and Automated Validation of Internet Security Protocol Architecture (AVISAP) tool.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Planar Coupled-Fed Multiband Antenna for Mobile Handset Application 手机用平面耦合馈电多波段天线
Wei‐Chieh Chang, Chia-Hao Ku
{"title":"The Planar Coupled-Fed Multiband Antenna for Mobile Handset Application","authors":"Wei‐Chieh Chang, Chia-Hao Ku","doi":"10.1109/CSNT.2015.209","DOIUrl":"https://doi.org/10.1109/CSNT.2015.209","url":null,"abstract":"The planar multiband monopole antenna with a coupled shorted strip and a main antenna suited to smart phone applications is proposed in the paper. The antenna occupies 52.5×15 mm2 and printed on a single layer 0.8mm-thick FR4 substrate. By properly designing the dimensions of the antenna and tuning a coupling gap, it can be excited successfully multiple resonances covering our desired frequency bands. The measured results show that the antenna with enough impedance bandwidths ranged from 684-1142 MHz and 1618-2935 MHz, based on 6 dB return loss. In addition, the antenna has good radiation properties including nearly onmi-directional radiation patterns in the horizontal planes, efficiencies varied from 54 - 95% and gains from 1 - 4.2 dBi, respectively. Thus, it can fully covers ten-bands LTE-700/2300/2500, GSM-850/900, DCS-1800, PCS-1900, UMTS-2000, WiMAX-2300, WLAN-2400. It is suitable for smart handset applications.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信