2017 International Conference on Inventive Computing and Informatics (ICICI)最新文献

筛选
英文 中文
Team strategizing using a machine learning approach 使用机器学习方法制定团队战略
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365296
V. Rao, A. Shrivastava
{"title":"Team strategizing using a machine learning approach","authors":"V. Rao, A. Shrivastava","doi":"10.1109/ICICI.2017.8365296","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365296","url":null,"abstract":"Team strategizing is an important aspect which requires critical analysis to ensure a desirable near-optimum performance. The key to solve this issue is by tapping the available talent within the team which at times, can be elusive. With increasing competition, a talented team, with an ineffective and outdated scouting strategy, may have to face unfavourable results. In this paper, we have conducted research in the domain of Sports, specifically Soccer. Strategy considered in the research is centered around deciding the lineup of a team by assessing the skillset of the players. Considering the novelty of the approach, we have developed our own web scraping algorithm to collect the dataset. Machine Learning models like Neural Network(MultiLayer Per-ceptron), Random Forests and Logistic Regression have been used to make predict the position a particular player will perform best at. The accuracy of the said models have been analysed for comparative analysis.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115333999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of ITS project on Mysore city bus transport operations 迈索尔城市公交运营ITS项目绩效评价
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365182
Raviraj H. Mulangi
{"title":"Performance evaluation of ITS project on Mysore city bus transport operations","authors":"Raviraj H. Mulangi","doi":"10.1109/ICICI.2017.8365182","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365182","url":null,"abstract":"Mysore public city bus transport is using intelligent transport system (ITS) to improve their operational efficiency and service to the commuters. Objective of this paper is to identify various parameters and propose methods to evaluate the performance of public transport before and after implementation of ITS by using quantitative data. ITS project has been implemented to Mysore City Transport Division (MCTD) in 2012 by Karnataka state road transport corporation (KSRTC). To measure the performance 2009–10, 2010–11, 2011–12 are considered as non-ITS period and 2012–13, 2013–14 are considered as ITS period. In this paper we present a nonparametric comparative efficiency analysis of 3 depots of MCTD of KSRTC. The present study quantitatively evaluates the performance of 3 depots of MCTD using Data Envelopment Analysis (DEA), with respect to the physical and financial parameters of the depots. It is found that the original efficiency scores are upward biased in DEA. To remove upward bias in DEA results bootstrapping is applied to DEA. Bootstrapped-DEA model has been developed and has shown the discrimination between the efficient and inefficient decision making units (DMUs) by removing the upward bias, which was not observed in DEA alone. This kind of analysis benefits the MCTD to set the benchmark to run the corporation in a profitable way. It is observed that conclude from quantitative data analysis is difficult, so qualitative data has been collected. This paper also discusses in detail the user and operator perception study, to know the impact of ITS implementation on Mysore city bus transportation by collecting the combination of revealed preference survey and stated preference survey data. These surveys reveal that the Mysore ITS project requires attention from the KSRTC.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Q-Leach protocol using intermediate gateway nodes for WSN 基于中间网关节点的无线传感器网络Q-Leach协议
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365191
Vinay Kumar, H. Saini, Varun Marwaha, R. Kumar
{"title":"Q-Leach protocol using intermediate gateway nodes for WSN","authors":"Vinay Kumar, H. Saini, Varun Marwaha, R. Kumar","doi":"10.1109/ICICI.2017.8365191","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365191","url":null,"abstract":"Networks that do not include use of any wires or any physical links are referred to as wireless networks. Node deployment is done in the network that is known as sensor nodes, the responsibility or the task of these nodes is to enable communication in the network. These nodes have some energy value on which the performance of network depends like more the residual energy of nodes, more the network lifetime. The network performance also depends on the round for which first dead node is obtained and the round for which last alive node is achieved. Much advancement has been done in the field of energy efficient protocols to improve the energy efficiency of network. Clustering process was introduced and then techniques for Cluster head selection were developed and still more to come. Two most considered factors for designing energy efficient protocols are distance between the nodes and the energy value of nodes. The conventional protocols like LEACH, HEED, DEEC and QLEACH are designed for improving the energy efficiency in WSNs. The effort in the paper is proposing one such protocol for improving energy efficiency and lifetime of WSNs and this protocol is an enhanced form of QLEACH protocol. The gateway node is introduced in proposed technique for reducing the energy consumption& the distance of nodes. The results are demonstrated and proved using MATLAB. The result section represents the proficiency of the implemented work by demonstrating it using comparison graphs.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124794032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structures for generating admissible grammar case of longest repeat first substitution 生成最长重复第一次替换允许语法格的结构
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365374
Anindya Das, Shovonlal Kundu, Rajdeep Baruri
{"title":"Structures for generating admissible grammar case of longest repeat first substitution","authors":"Anindya Das, Shovonlal Kundu, Rajdeep Baruri","doi":"10.1109/ICICI.2017.8365374","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365374","url":null,"abstract":"Here, we described primary challenges for generating context-free grammar for a given text. Creating rules using repeated or common substrings or patterns, yields compression. Such common patterns overlap with others in a various way. We, first, discussed all such different overlapping patterns and finally generated context-free grammar in polynomial time using all such non-overlapping common substrings.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of MAC protocols in VANET VANET中MAC协议的比较
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365262
Sanika Ajit Lokhande, A. Vidhate
{"title":"Comparison of MAC protocols in VANET","authors":"Sanika Ajit Lokhande, A. Vidhate","doi":"10.1109/ICICI.2017.8365262","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365262","url":null,"abstract":"To avoid transmission collisions in vehicular ad hoc networks, a efficient and reliable medium access control protocol is needed. In VANET, vehicle act as a nodes and vehicle is having high mobility. There are different MAC protocols considering for the communication between the VANET.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Safe and high secured ranked keyword searchover an outsourced cloud data 安全,高安全排名关键字搜索外包云数据
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365348
K. K. Kumar, Srilatha Kumar, Srihari Rao, Sri Sk John Sydulu
{"title":"Safe and high secured ranked keyword searchover an outsourced cloud data","authors":"K. K. Kumar, Srilatha Kumar, Srihari Rao, Sri Sk John Sydulu","doi":"10.1109/ICICI.2017.8365348","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365348","url":null,"abstract":"Cloud computing empowers the prototypical of data service outsourcing. To defend data concealment, penetrating cloud data has to be encrypted before outsourced to the salable public cloud. Traditional searchable encryption techniques provision only Boolean search and are not yet plenty to meet the operative data utilization need that is inherently demanded by large number of users and enormous amount of data files in cloud. In this project, we delineate and elucidate the tricky of sheltered ranked keyword search over encrypted cloud data. Ranked search momentously enhances system usability by enabling search result relevance ranking in its place of sending undifferentiated results, and auxiliarywarrants the file retrieval precision. we explore the statistical measure methodology, i.e. relevance score, from information retrieval to physique a sheltered searchable index, and progress a one-to-many order-preserving mapping technique to appropriatelyshelter those penetrating score information.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122296967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of G.723.1Decoder on Zynq FPGA using HLS 基于HLS的g .723.1解码器在Zynq FPGA上的实现
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365351
M. Koushik, Shashidhar Shivanagi, Gaurav Gupta, J. Qumar, D. Saravanan
{"title":"Implementation of G.723.1Decoder on Zynq FPGA using HLS","authors":"M. Koushik, Shashidhar Shivanagi, Gaurav Gupta, J. Qumar, D. Saravanan","doi":"10.1109/ICICI.2017.8365351","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365351","url":null,"abstract":"For the speech communication techniques there is a lot of scope nowadays. Due to number of applications increasing, there is a need for the approach for the data compression techniques which uses bandwidth and storage space. In this MP-MLQ excitation which has high rate working mode ITU-T G723.1 algorithm is implemented. The G723.1 Decoder is implemented through HLS on to the Zynq-7 ZC706 FPGA Evaluation Board. The comparison of the area utilization is done at C-synthesis level, post-synthesis level, post-implementation level.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121866507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computer vision based approach to detect rice leaf diseases using texture and color descriptors 基于纹理和颜色描述符的水稻叶片病害检测方法
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365305
Bhagyashri S. Ghyar, G. Birajdar
{"title":"Computer vision based approach to detect rice leaf diseases using texture and color descriptors","authors":"Bhagyashri S. Ghyar, G. Birajdar","doi":"10.1109/ICICI.2017.8365305","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365305","url":null,"abstract":"One of the major reason behind degradation of quality and quantity of rice crop is pest. The lack of technical and scientific knowledge to prevent pest diseases is the main reason for low production of these commodities. This article aims to develop a computer vision based automatic system for the diagnosis of diseases caused by pests in the rice plants. Automatic disease detection using computer vision approach involves three types of feature extraction in this experiment. Diseased area of the leaf, textural descriptors using gray level co-occurrence matrix (GLCM) and color moments are extracted from diseased and non-diseased leaf images resulting in 21-D feature vector. Genetic algorithm based feature selection approach is employed to select relevant features and to discard redundant features, generating a 14-D feature vector that reduces the complexity. Artificial neural network (ANN) and support vector machine (SVM) is used for classification. The proposed algorithm results in classification accuracy of 92.5% using SVM and 87.5% using ANN.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122033933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A realtime image encryption based on chaos 一种基于混沌的实时图像加密方法
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365375
M. Devipriya, M. Brindha
{"title":"A realtime image encryption based on chaos","authors":"M. Devipriya, M. Brindha","doi":"10.1109/ICICI.2017.8365375","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365375","url":null,"abstract":"In this work, a novel real time encryption is proposed using chaotic map and S-box. The key matrix is generated from the S-box and for achieving better randomness, 1 to n mapping is applied over the S-box. The resultant cipher image is having less correlation and uniform histogram distribution. The proposed work achieves better level in security and it can be used for real time applications.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116605126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Aspect based sentiment analysis of students opinion using machine learning techniques 使用机器学习技术对学生意见进行基于方面的情感分析
2017 International Conference on Inventive Computing and Informatics (ICICI) Pub Date : 2017-11-01 DOI: 10.1109/ICICI.2017.8365231
M. Sivakumar, Dr. U. Srinivasulu Reddy
{"title":"Aspect based sentiment analysis of students opinion using machine learning techniques","authors":"M. Sivakumar, Dr. U. Srinivasulu Reddy","doi":"10.1109/ICICI.2017.8365231","DOIUrl":"https://doi.org/10.1109/ICICI.2017.8365231","url":null,"abstract":"Recent times, customer wants to share good and bad opinions about their experience like usage of recently purchased product, services provided by a hospital, education and so on over social media, micro blogs, review sites and etc. Today smart phones become mandatory for most of the college students. They share their experience and feelings immediately over internet applications with others. Student opinions can be collected through the internet applications and can be categorized based on various entities. We propose a new method of analyzing online student feedback collected from twitter API by measuring semantic relatedness between aspect word and student opinion sentence. The results of this work will help the students to improve their studies and helps the instructors to improve their teaching skills. In this work classification and clustering techniques have been used to categorize the opinions.","PeriodicalId":369524,"journal":{"name":"2017 International Conference on Inventive Computing and Informatics (ICICI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信