2012 IEEE International Conference on Computational Intelligence and Computing Research最新文献

筛选
英文 中文
Design & simulation of sinusoidal oscillator using 0.18 μm CMOS technology OP-AMP 基于0.18 μm CMOS技术的正弦波振荡器的设计与仿真
Manish Kumar, P. Sahu
{"title":"Design & simulation of sinusoidal oscillator using 0.18 μm CMOS technology OP-AMP","authors":"Manish Kumar, P. Sahu","doi":"10.1109/ICCIC.2012.6510191","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510191","url":null,"abstract":"It introduces a new, extremely simple, sinusoidal oscillator based on op-amp compensation poles. The circuit employs only four components, two internally compensated op-amp, one resistor, one grounded capacitor. It can generate sinusoidal oscillations of frequencies up to the gain bandwidth product of the op-amps. With the help of some modifications using an additional op-amp or two analogue multipliers. This circuit can be converted into a VCO. The experimental results and SPICE simulations de(Op-Amp) have confirmed the work ability of the various modes of operation of the proposed configuration VCO (voltage controlled oscillator) by using 0.18μm CMOS Technology op-amp. It is a very simple circuit employs only four components, two internally compensated 0.18μm CMOS Technology op-amps, one resistor and a grounded capacitor. I used AWR (microwave office) software for implement this work.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data mining method of evaluating classifier prediction accuracy in retinal data 评价视网膜数据分类器预测精度的数据挖掘方法
R. Ramani, B. Lakshmi, S. Jacob
{"title":"Data mining method of evaluating classifier prediction accuracy in retinal data","authors":"R. Ramani, B. Lakshmi, S. Jacob","doi":"10.1109/ICCIC.2012.6510290","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510290","url":null,"abstract":"The research in recent years emphasizes the application of computational techniques in the field of ophthalmology. Diabetic Retinopathy, a retinal disease is the major cause of blindness. Early detection can help in treatment but regular screening for early detection has been a highly labor — and resource-intensive task. Hence automatic detection of the diseases through computational techniques would be a great social cause. In this paper, the classifiers used for the automatic detection of the disease are evaluated using the data mining methods. The prediction accuracy of all the classifiers, evaluated using various evaluation methods is presented. Our results show that a training accuracy of 100% can be achieved by a few classifiers and a prediction accuracy of 76.67%.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130656991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Trust model for a cloud computing application and service 云计算应用程序和服务的信任模型
R. Shaikh, M. Sasikumar
{"title":"Trust model for a cloud computing application and service","authors":"R. Shaikh, M. Sasikumar","doi":"10.1109/ICCIC.2012.6510179","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510179","url":null,"abstract":"Cloud computing has attracted great attention due its various features. There are various rising concerns in its growth, one of which is security. Trust between provider and a user is the most important factor to be considered for achieving security, which is also essential to promote the reputation of various cloud providers and their offered services. Here we present a trust based solution in terms of a trust model that can be used to calculate the security strength of a particular cloud service. The trust value acts as a means for selecting any cloud service.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132447001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Centroid based Hough Transformation for Indian license plate skew detection and correction of IR and color images 基于质心的Hough变换在印度车牌倾斜检测及红外和彩色图像校正中的应用
K. Arulmozhi, S. Perumal, T. T. Deepak, K. Nallaperumal
{"title":"A Centroid based Hough Transformation for Indian license plate skew detection and correction of IR and color images","authors":"K. Arulmozhi, S. Perumal, T. T. Deepak, K. Nallaperumal","doi":"10.1109/ICCIC.2012.6510312","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510312","url":null,"abstract":"Skew Correction is a processing-stage between LP Localization and Character Segmentation in License Plate Recognition system used to identify a vehicle by its number plate. License plate is skewed in captured image due to the positioning of the vehicle with respect to the camera while capturing the LP image. The skewed license plate affects badly on the accurate character segmentation and recognition. After localization skew correction technique is applied in order to get correct character segmentation followed by character recognition. In this paper, a Centroid based Hough Transform technique is presented for skew correction of license plate which performs better than the other approaches of skew correction including Thresholding, Connected Component analysis, Hough Transform and Centroid method. The performance of the proposed algorithm has been tested on live captured LP images, yielding better performance in car license plate segmentation and hence the presented algorithm is good for all types of LP recognition applications due to its direct and simple approach with minimal computational time.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123083300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security role of biometrics in electronic transactions 生物识别技术在电子交易中的安全作用
Anshuman Tyagi, P. Singh, Vikas Yadav, Sangharsh Kumar Singh, A. Tiwari
{"title":"Security role of biometrics in electronic transactions","authors":"Anshuman Tyagi, P. Singh, Vikas Yadav, Sangharsh Kumar Singh, A. Tiwari","doi":"10.1109/ICCIC.2012.6510268","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510268","url":null,"abstract":"As electronics transaction are increasing in day-by-day in common man's life therefore it is luring to people involve in unlawful activity to commit frauds in electronics tractions also. They understand the weakness of the system and exploit. Though may very effective Public-Private-Key based algorithms have be developed providing security for transmissions of electronic data still have room for leakage of key? If we use biometrics based encryption in electronic transmission then we can ensure most safe transmission of data, especially in commercial tractions. Let us understand the biometrics and area which must use it. In any application having electronic communication has some most common security requirements are Authentication, Privacy/confidentiality, Integrity and Non-repudiation. The Cryptography not only protects data from alteration or theft, but it can also be used for user authentication.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122302196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative analysis in satellite image Registration 卫星图像配准中的对比分析
R. Reji, R. Vidya
{"title":"Comparative analysis in satellite image Registration","authors":"R. Reji, R. Vidya","doi":"10.1109/ICCIC.2012.6510182","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510182","url":null,"abstract":"This paper proposes a comparative study and analysis in satellite image Registration. Image registration techniques are aimed to improve the geometrical consistency of satellite images. This technique can be employed for the detection of changes in images. We are analyzing Point based, Edge based and Contour based image registration techniques. In the first method control points are selected manually and registration is performed using cross correlation. Edge based image registration emphasized on corner features. Two pairs of optimal matching corners were selected from matched corners as control points and transformation is applied. In contour based approach contour points are extracted from image and based on the contour points image registration is performed. Finally localization error and matching error is calculated and analyzed.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125817238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Survey and evaluation of various reversible carry skip BCD adders 各种可逆进位跳跃式BCD加法器的调查与评价
M. Praveena, K. Thanushkodi
{"title":"Survey and evaluation of various reversible carry skip BCD adders","authors":"M. Praveena, K. Thanushkodi","doi":"10.1109/ICCIC.2012.6510244","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510244","url":null,"abstract":"Reversible circuits has gained remarkable attention due to its ability to recover from bit loss through unique mapping between its input and output vectors. This factor urges to perform the performance analysis of different reversible carry skip BCD adders. The different adders are analyzed individually to understand the various combinations of reversible gates used in the design construction of these adders. Moreover, the results highlights the strengths and weakness of various carry skip BCD adders.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"63 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and development of automated water distribution and metering system for residential buildings 住宅楼宇自动配水计量系统的设计与开发
P. Eswaran, Aswin Kumar
{"title":"Design and development of automated water distribution and metering system for residential buildings","authors":"P. Eswaran, Aswin Kumar","doi":"10.1109/ICCIC.2012.6510242","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510242","url":null,"abstract":"In this paper, we developed a conceptual design of automated water distribution and metering system for residential building. The need and requirement for this system was emphasized. Prototype model of water metering system was developed for eight users. Simulation of this system model circuit was carried out in proteus 7.6 simulator for different real time input and output conditions. Finally, implementation of closed loop water metering system was done for two users and tested successfully. GUI also developed for this application.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116588079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Particle Swarm Optimization for the single container loading problem 单集装箱装载问题的粒子群算法
B. M. Domingo, S. Ponnambalam, G. Kanagaraj
{"title":"Particle Swarm Optimization for the single container loading problem","authors":"B. M. Domingo, S. Ponnambalam, G. Kanagaraj","doi":"10.1109/ICCIC.2012.6510262","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510262","url":null,"abstract":"This paper presents a Particle Swarm Optimization (PSO) algorithm to solve the Container Loading Problem (CLP) where a set of rectangular boxes of different sizes are packed into a single rectangular container. The CLP uses a packing scheme to generate feasible packing plan and calculate volume utilisation of the container. The packing scheme is based on the layer building approach which group boxes of the same type to create layers. The spaces where layers may be packed are represented by maximal empty spaces which are created using the Difference Process. A back bottom left heuristics is used to select the maximal empty space for each layer built. The PSO is used to evolve the order of box type sequence and layer type vector used in the packing scheme. The performance of the algorithm is tested on seven test cases; each test case consists of 100 instances. The results show that PSO performs very well in terms of significant improvement in volume utilization.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125616476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel algorithm for pectoral muscle removal and auto-cropping of neoplasmic area from mammograms 乳房x光片中胸肌切除及肿瘤区域自动裁剪的新算法
M. Hanmandlu, A. Khan, A. Saha
{"title":"A novel algorithm for pectoral muscle removal and auto-cropping of neoplasmic area from mammograms","authors":"M. Hanmandlu, A. Khan, A. Saha","doi":"10.1109/ICCIC.2012.6510254","DOIUrl":"https://doi.org/10.1109/ICCIC.2012.6510254","url":null,"abstract":"Presence of pectoral muscle has always been a hindrance in neoplasm detection in screening mammography. Mediolateral-oblique (MLO) x-ray view of the breast taken while screening mammography shows the presence of pectoral muscle. The intensity range shared by pectoral muscle, masses and calcification clusters being almost the same makes pectoral muscle removal a vital or necessary step to attain proper segmentation of actual region of interest (ROI) i.e. the neoplasmic region. This paper provides a novel algorithm for automatic detection and removal of pectoral muscle along with breast boundary detection and several artefacts removal present in digital mammograms. A concatenation of an auto-cropping algorithm to pectoral removal step gives a précise RoI which helps in stepping up the lesion detection accuracy of the Computer-Aided Detection (CAD) system. This composite method has been has been implemented and applied to mini-MIAS which is one of the most challenging digital database consisting 322 MLO view mammograms. The algorithm shows an accuracy of around 83.89% on a set of 298 mammogram images.","PeriodicalId":340238,"journal":{"name":"2012 IEEE International Conference on Computational Intelligence and Computing Research","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122686318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信