2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)最新文献

筛选
英文 中文
GP-GPU based high-performance test equipment for debugging radar digital units 基于GP-GPU的高性能雷达数字单元调试测试设备
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684173
R. Badarinath, M. Abhilash
{"title":"GP-GPU based high-performance test equipment for debugging radar digital units","authors":"R. Badarinath, M. Abhilash","doi":"10.1109/SAPIENCE.2016.7684173","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684173","url":null,"abstract":"Modern active phased array radars are made to optimize the size, weight and power without compromising its capability to combat with advanced electronic warfare. To accomplish this task, the signal is digitized at element level or at sub-array level and processed with the help of advanced digital signal processor. Proving the capabilities of this firmware at bench level helps to reduce the overall development time. Hence, it is necessary to have a built-in test unit or test vector generator to verify the optimal performance of digital modules. The best way to accomplish this goal is to use a high speed baseband I & Q radar data generator which helps in testing, identifying and segregating the problems at various stages. In this paper we have explored the capability of latest general purpose graphical processing unit (GP-GPU) as software defined built in test vector generator with high throughput for active array radar applications.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114153589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient video Steganography technique for secured data transmission 一种用于安全数据传输的高效视频隐写技术
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684125
Dhanya Job, V. Paul
{"title":"An efficient video Steganography technique for secured data transmission","authors":"Dhanya Job, V. Paul","doi":"10.1109/SAPIENCE.2016.7684125","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684125","url":null,"abstract":"Secured data transmission is an important problem faced by everyone nowadays. Steganography is an efficient technique to provide secure data transmission over the network, as the number of users increases effectively. This paper, proposes a video Steganography technique for secured data transmission. Video Steganography refers to the process of hiding the data into video. The proposed method not only hides the data, but also it converts the original data into secret code. The proposed mechanism is developed using MATLAB and the Peak Signal to Noise ratio are also calculated.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115008250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-document text summarization - a survey 多文档文本摘要-一项调查
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684115
A. Tandel, Brijesh Modi, Priyasha Gupta, Shreya Wagle, Sujata Khedkar
{"title":"Multi-document text summarization - a survey","authors":"A. Tandel, Brijesh Modi, Priyasha Gupta, Shreya Wagle, Sujata Khedkar","doi":"10.1109/SAPIENCE.2016.7684115","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684115","url":null,"abstract":"In today's world, the daily hustle-bustle does not permit a human being to devote time for manually summarizing various lengthy documents. Hence it is of utmost importance to devise an application that will facilitate automated text summarization. Not only will this application save time but also render higher scope of efficiency. This application will allow the user to automatically summarize relevant information from various sources.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Prediction of election result by enhanced sentiment analysis on twitter data using classifier ensemble Approach 基于分类器集成的twitter数据增强情感分析预测选举结果
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684133
R. Jose, Varghese S. Chooralil
{"title":"Prediction of election result by enhanced sentiment analysis on twitter data using classifier ensemble Approach","authors":"R. Jose, Varghese S. Chooralil","doi":"10.1109/SAPIENCE.2016.7684133","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684133","url":null,"abstract":"Sentiment analysis is the computational study of opinions, sentiments, evaluations, attitudes, views and emotions expressed in text. It refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive or negative sentiment. Sentiment analysis over Twitter offers people a fast and effective way to measure the public's feelings towards their party and politicians. The primary issue in previous sentiment analysis techniques is the determination of the most appropriate classifier for a given classification problem. If one classifier is chosen from the available classifiers, then there is no surety in the best performance on unseen data. So to reduce the risk of selecting an inappropriate classifier, we are combining the outputs of a set of classifiers. Thus in this paper, we use an approach that automatically classifies the sentiment of tweets by combining machine learning classifiers with lexicon based classifier. The new combination of classifiers are SentiWordNet classifier, naive bayes classifier and hidden markov model classifier. Here positivity or negativity of each tweet is determined by using the majority voting principle on the result of these three classifiers. Thus we were used this sentiment classifier for finding political sentiment from real time tweets. Thus we have got an improved accuracy in sentiment analysis using classifier ensemble Approach. Our method also uses negation handling and word sense disambiguation to achieve high accuracy.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125537308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Application of Data Mining in Higher Secondary Directorate of Kerala 数据挖掘在喀拉拉邦高等中学理事会的应用
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684139
S. Mathew, John T. Abraham
{"title":"Application of Data Mining in Higher Secondary Directorate of Kerala","authors":"S. Mathew, John T. Abraham","doi":"10.1109/SAPIENCE.2016.7684139","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684139","url":null,"abstract":"In this paper, we discuss Data Mining and its application in Higher Secondary Directorate of Kerala. Data Mining process has a set of functionalities among which classification has wide application in real world data processing. We examine the Naïve Bayes classification techniques. In the third section, we explain Naïve Bayes Theorem using an experiment. This experiment covers attributes like School Type, Candidate Type, Study Type, Districts, etc. These attribute values, we are using to analysing the result of Higher Secondary First Year Improvement Examination held in September 2015. This will improve the performance and data processing speed of Higher Education Directorate. This paper demonstrates the application of Data Mining in Higher Secondary Examination result. This will help further research and will improvise the activity of Higher Secondary Directorate.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accelerometer based human activities and posture recognition 基于人类活动和姿势识别的加速度计
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684120
A. Babu, Kudakwashe Dube, S. Mukhopadhyay, H. Ghayvat, Kumar M. V. Jithin
{"title":"Accelerometer based human activities and posture recognition","authors":"A. Babu, Kudakwashe Dube, S. Mukhopadhyay, H. Ghayvat, Kumar M. V. Jithin","doi":"10.1109/SAPIENCE.2016.7684120","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684120","url":null,"abstract":"The quantity of elderly people like to live in their homes, secluded, in their brilliant age is expanding exponentially. This is not a perfect path for an elderly individual to live. However, the urbanization and resultant change of the social and social conduct makes it a more regular event. Falls are a noteworthy reason for death and horribleness in more established grown-ups. In this way, it has turn into an opportune need to create mechanized look after the elderly. The first end, purpose of such fall computer looking-glass is to ready caregivers of the fall event, which can then start an earlier process. In the present study, we amplify the use of wearable inertial sensors for fall identification and information of human posture and activities, by creating and assessing the precision of a sensor framework for identifying the same. We found that our system could discover fall events and monitor human activities with at least 95% accuracy.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An effective communication framework for data management using query caching in Mobile Location based Services (LBS) 基于移动位置服务(LBS)的查询缓存数据管理的有效通信框架
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684119
R. Gobi, E. Kirubakaran
{"title":"An effective communication framework for data management using query caching in Mobile Location based Services (LBS)","authors":"R. Gobi, E. Kirubakaran","doi":"10.1109/SAPIENCE.2016.7684119","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684119","url":null,"abstract":"Technology has transformed the mobile phone as a big medium for communication and offered a pool of services to the subscriber. Among those services, Location Based Services (LBS) is prominent to get services based on current geographic location. The services include right from information to entertainment and the services offered by LBS are highly dynamic because its access pattern is different from one location to another location. It directly deals with positioning the location and providing the information. Since it deals with dynamic and real time, conventional data handling techniques may not suitable and there are several issues like increased communication cost, increased query processing time, in-ability of accurate positioning needs to be addressed to utilize the full benefit of LBS. Hence this research work focuses on providing solution for data management issues. Based on classification of applications and categorization of services in LBS, a communication framework (ComFrame) with several layers is proposed. The framework applies a data management technique called q-caching to store user's frequent queries in Cache Manager (Local Manager), and this approach has been implemented in both on client and server side with Android API and Java Remote Method Invocation (RMI) services. The proposed scheme results in reduced communication cost, query handling time and data volume by applying Cost Benefit Analysis techniques. In summary, dynamic data management principles enhances Mobile Location based Services. This framework can further be enhanced to Governance and Business sectors for effective utilization of mobile data management in future.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on Down syndrome detection based on Artificial Neural Network in Ultra sonogram images 基于人工神经网络的超声像图唐氏综合征检测研究
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684172
Devi V. K. Vincy, R. Rajesh
{"title":"A study on Down syndrome detection based on Artificial Neural Network in Ultra sonogram images","authors":"Devi V. K. Vincy, R. Rajesh","doi":"10.1109/SAPIENCE.2016.7684172","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684172","url":null,"abstract":"Down syndrome is a genetic disorder in which disrupts infants, physical and cognitive development. Down syndrome is characterized by the absence of nasal bone during the late first trimester of pregnancy. Presently Down syndrome is identified by visually examining the ultra sonogram image of foetus of 11 to 13 weeks of gestation for the presence of nasal bone. The visually identification by the change in the contrast of nasal bone region of ultra sonogram is a very difficult task. So the image processing based features extraction by considering various parameters have been extremely important. This paper provides comprehensive survey on various medical imaging techniques that can be effectively used for detecting the syndrome in the early stage of pregnancy. Our proposed survey consider different methods based on the various parameters extracted using a series of operations such as Region Of Interest (ROI), Nasal Bone (NB) segmentation using morphological, Otsu thresholding and logical operations from the ultra sonogram images, both in spatial domain as well as transform domain using Discrete Cosine Transform (DCT) and wavelet transforms. The extracted data is normalized and used to train classifiers like Back Propagation Neural Network (BPNN). This paper illustrates overview of various states of methods available in the Down syndrome detection and comparison analysis of each method is discussed.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132887068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methods to detect different types of outliers 检测不同类型异常值的方法
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684114
D. Divya, S. Babu
{"title":"Methods to detect different types of outliers","authors":"D. Divya, S. Babu","doi":"10.1109/SAPIENCE.2016.7684114","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684114","url":null,"abstract":"Outliers are those data that deviates significantly from the remaining data. Outliers has emerging applications in irregular credit card transactions, used to find credit card fraud, or identifying patients who shows abnormal symptoms due to suffering from a particular type of disease. This paper gives an idea about the various approaches and techniques used in outlier detection and the areas in which outlier detection is used and also about how outlier detection is handled in higher dimensional data.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115917852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Modified autonomy oriented computing based network immunization by considering betweenness centrality 考虑中间中心性的改进自主计算网络免疫
2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) Pub Date : 2016-03-16 DOI: 10.1109/SAPIENCE.2016.7684128
Susan K. Paul, Biju Abraham Narayamparambil
{"title":"Modified autonomy oriented computing based network immunization by considering betweenness centrality","authors":"Susan K. Paul, Biju Abraham Narayamparambil","doi":"10.1109/SAPIENCE.2016.7684128","DOIUrl":"https://doi.org/10.1109/SAPIENCE.2016.7684128","url":null,"abstract":"As many people rely on Internet and mobile phone for many applications, it is very crucial for society. Networks, formed by the connection of devices following some relationships among users, provide good platforms for virus spread. Viruses can cause data leakage and can even jam wireless services by sending thousands of Spam messages, and reduce the quality of voice communication. In order to protect devices from virus attack several immunization methods are used, where some nodes in a network are immunized so that they cannot be infected by a virus. Due to high cost of immunization, the main aim of immunization becomes how to immunize a small or minimum number of important nodes in order to prevent a virus from spreading to major parts of the network. Most of the immunization methods are executed in centralized and static networks but in actual situation computer networks are decentralized, dynamic and scalable in nature. In the method discussed here some entities are deployed into the network, these entities interact with each other to locate highly connected nodes. The goal of this work is to implement modified AOC based immunization by considering betweenness centrality and analyze its results on different network topology.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115384963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信