2014 First International Conference on Computational Systems and Communications (ICCSC)最新文献

筛选
英文 中文
A personalized mobile travel recommender system using hybrid algorithm 基于混合算法的个性化移动旅行推荐系统
Dr. Shini Renjith, C. Anjali
{"title":"A personalized mobile travel recommender system using hybrid algorithm","authors":"Dr. Shini Renjith, C. Anjali","doi":"10.1109/COMPSC.2014.7032612","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032612","url":null,"abstract":"The modern era witnesses the evolution of handheld devices from a simple communication medium to a sophisticated information access platform. Coupling it with intelligent recommendation techniques can transform it to an essential companion for users during their travel, purchases and other routine transactions. A recommender system extracts personalized information relevant to users, thereby limiting the information overload. Our application, Buddy@Move is a hybrid travel recommender which brings together the features of content-based, collaborative and demographic filtering techniques. While travel imprints of the user cater to content-based filtering, resulting in personalized recommendations, the societal transactions provide input for the collaborative portion. The system will make use of the individual demographic information, to suggest what suits the user thereby making it more intelligent and user acceptable.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Implementation of DCT using variable iterations CORDIC algorithm on FPGA 可变迭代CORDIC算法在FPGA上的DCT实现
Ms. Mane, Dhanshree P. Patil, M. Sutaone, Akshay Sadalage
{"title":"Implementation of DCT using variable iterations CORDIC algorithm on FPGA","authors":"Ms. Mane, Dhanshree P. Patil, M. Sutaone, Akshay Sadalage","doi":"10.1109/COMPSC.2014.7032682","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032682","url":null,"abstract":"CORDIC or CO-ordinate Rotation Digital Computer is a fast, simple, coherent and powerful algorithm which is used for diversified Digital Signal Processing applications. In pursuance of speed and accuracy requirements of todays applications, we put forward variable iterations CORDIC algorithm. In this algorithm, to boost speed we can lessen number of iterations in CORDIC algorithm for specific accuracy. This enhances efficiency of conventional CORDIC algorithm which we have used to compute Discrete Cosine Transform for image processing. One Dimensional Discrete Cosine Transform is implemented by using only 6 CORDIC blocks which needs only 6 multipliers. Because of the simplicity in hardware speed of image processing on FPGA is raised. Further increase in speed can be achieved by concurrently processing number of macro-blocks of an image on FPGA.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128427699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards improving the performance of language identification system for Indian languages 改进印度语言识别系统的性能
Abitha Anto, K. T. Sreekumar, C. S. Kumar, P. Raj
{"title":"Towards improving the performance of language identification system for Indian languages","authors":"Abitha Anto, K. T. Sreekumar, C. S. Kumar, P. Raj","doi":"10.1109/COMPSC.2014.7032618","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032618","url":null,"abstract":"In this paper, we present the details of a phonotactic language identification (LID) system developed for five Indian languages, English (Indian), Hindi, Malayalam, Tamil and Kan-nada. Since there are no publicly available speech databases for English, Malayalam and Kannada, we developed the database for each of the target languages by downloading the audio files from YouTube videos and removing the non-speech signals manually. The system was tested using a test data set consisting of 40 utterances with duration of 30, 10, and 3 sees, in each of 5 target languages. The performance evaluation was done separately accordingly to the NIST benchmarking sessions, for 30s, 10s and 3s segments separately. For the baseline system, we got an overall EER of 10.41 %, 19.56 % and 31.45 % for 30, 10, and 3 sees segments when tested with a 3-gram language model. The use of 4-gram language model has helped enhance the performance of the LID system to 9.81 %, 19.38 % and 32.77% respectively for 30,10 and 3 sees test segments. Further, by using the n-gram smoothing, we were able to improve the EER of the LID system, 9.02 %, 18.70 % and 29.24 % for 3-gram language models and 8.88 %, 16.46 % and 32.03 % for 4-gram language models, respectively for 30,10, and 3 sec test segments. The study shows that the use of 4-gram language models can help enhance the performance of LID systems for Indian languages.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126974465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of fast multiplier using modified Radix-4 booth algorithm with redundant binary adder for low energy applications 基于改进的带有冗余二进制加法器的Radix-4 booth算法的快速乘法器实现
Laya Surendran, Rony Antony
{"title":"Implementation of fast multiplier using modified Radix-4 booth algorithm with redundant binary adder for low energy applications","authors":"Laya Surendran, Rony Antony","doi":"10.1109/COMPSC.2014.7032660","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032660","url":null,"abstract":"The main objective of this paper is to implement a multiplier for high speed and low energy applications. Multipliers are the building blocks of high performance systems like FIR filters, Digital signal processors, etc in which speed is the dominating factor. There are many multiplier architectures developed to increase the speed of algebra. Booth algorithm is the most effective algorithm used for fast performances. This works by introducing a high performance multiplier using Modified Radix-4 booth algorithm with Redundant Binary Adder to get high speed. A comparative study of different booth algorithms in terms of power consumption, delay, area, energy and energy delay product is also discussed in this work. All the circuits are simulated in the Cadence simulation tool using 180nm technology. The experimental results show that the proposed booth multiplier shows high speed, low energy and low energy delay product compared to the existing booth multipliers.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122084856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Blind iterative carrier frequency offset estimation in orthogonal frequency division multiplexing system with non-constant modulus signalling 非常模正交频分复用系统中的盲迭代载波频偏估计
S. Sreedevi, R. Susan
{"title":"Blind iterative carrier frequency offset estimation in orthogonal frequency division multiplexing system with non-constant modulus signalling","authors":"S. Sreedevi, R. Susan","doi":"10.1109/COMPSC.2014.7032639","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032639","url":null,"abstract":"This paper introduces a blind carrier frequency offset (CFO) estimation scheme for orthogonal frequency division multiplexing (OFDM) systems. The proposed estimator is blind and can be used with non-constant modulus subcarrier modulations such as quadrature amplitude modulation (QAM). The proposed method is a novel technique to estimate CFO in orthogonal frequency division multiplexing systems involving both magnitude and angular methods of offset estimation. A major drawback for several CFO estimation techniques is the constant modulus constraint. The proposed estimate involve angular method where estimation depends only on the argument of the frequency domain signals. Hence, the modulus of the received symbols have no effect on the performance of the proposed algorithm. The estimation range is enhanced using magnitude method of offset estimation.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The use of bees algorithm for RA and MA based resource allocation in OFDMA 利用蜜蜂算法进行基于RA和MA的OFDMA资源分配
C. Archana, K. N. Rejith
{"title":"The use of bees algorithm for RA and MA based resource allocation in OFDMA","authors":"C. Archana, K. N. Rejith","doi":"10.1109/COMPSC.2014.7032674","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032674","url":null,"abstract":"The problem of resource allocation in multiuser orthogonal frequency division multiplexing (OFDM) system is a combinatorial optimization problem. The conventional methods for the problem demand high computational complexity and are found to be long iterative algorithms. Intelligent techniques such as genetic algorithms (GAs), simulated annealing, particle swarm optimization (PSO), Tabu search and others offer more speedy and robust solutions. Thus the use of bio-inspired approach to solve NP hard problems for obtaining optimal solutions is gaining importance in networking scenario. This paper suggests the use of Bees Algorithm (BA) as a new method for resource allocation in OFDMA systems. The margin and rate adaptive loading strategies are dealt using Bees algorithm. The results obtained using BA is compared with PSO based resource allocation in OFDMA .","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126462524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Accelerating functional verification of PCI express endpoint by emulating host system using PCI express core 利用PCI express内核仿真主机系统,加速PCI express端点的功能验证
S. Badhe, Kedar Kulkarni, G. Gadre
{"title":"Accelerating functional verification of PCI express endpoint by emulating host system using PCI express core","authors":"S. Badhe, Kedar Kulkarni, G. Gadre","doi":"10.1109/COMPSC.2014.7032673","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032673","url":null,"abstract":"PCI Express is a high-performance I/O bus protocol. The PCI Express protocol provides higher bandwidth than the legacy buses that makes PCI Express as an ideal choice for a wide variety of applications such as Network Interface, Graphics Accelerators, and Storage Controllers (SSD). The PCI Express protocol supports many features to improve performance of I/O Bus, so verification of a design based on this protocol is a very long and time consuming process. As an application based on the PCI Express protocol becomes more and more complex the verification complexity increases many folds. PCI Express Endpoint device communicates with the host (Processor/Memory) using the Host Interface logic. This logic plays a vital role as it can affect the overall performance of the Endpoint device. The Host Interface logic is protocol specific and responsible for the data transfer from host to device and vice versa. Strategically, as this logic is very crucial, it has to be verified properly. There are multiple ways to verify the host interface logic. However, there is a trade-off between design development time (including verification time) and overall cost. In this paper we present a novel approach to verify the Host Interface Logic. Our method uses a PCI Express core that will act as the Root Complex connected to the Host Interface Logic, i.e. Design Under Test (DUT), this will help to minimize overall design development time by reducing verification time.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129007769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Memory optimization of HMAC/SHA-2 encryption HMAC/SHA-2加密的内存优化
R. S. Rubayya, R. Resmi
{"title":"Memory optimization of HMAC/SHA-2 encryption","authors":"R. S. Rubayya, R. Resmi","doi":"10.1109/COMPSC.2014.7032663","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032663","url":null,"abstract":"Society is undergoing a paradigm shift where the Information and Communication Technology revolution goes along with the evolution of the humankind The Internet is all around us and plays a crucial role in our ability to communicate We often distribute our personal and other classified information using the benefits of the global network Our demands to conceal confidential data are therefore being strongly manifested and become very important By ensuring the objectives of information security, such as confidentiality, data integrity, entity authentication, non-repudiation, and many more, cryptography provides a natural solution to the issue of data protection Modelling and simulation of this technology is an important and sensitive issue. In this work, a combination of two cryptographic techniques namely Secure Hash Algorithm and Hash Message Authentication Code are used. This proposes novel schemes for the Hash Message Authentication Code / Secure Hash Algorithm-2 (HMAC/SHA-2) family of hash functions show that it uses less area and consumes less power than the commonly used technique These results are crucial for supporting low area and low power cryptographic primitives in satellites.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133017360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel algorithm for traffic reduction in wireless sensor networks 一种新的无线传感器网络流量减少算法
Asish P. Mathew, Abey Abraham, K. Preetha
{"title":"A novel algorithm for traffic reduction in wireless sensor networks","authors":"Asish P. Mathew, Abey Abraham, K. Preetha","doi":"10.1109/COMPSC.2014.7032649","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032649","url":null,"abstract":"In Wireless Sensor Network, the communication generally takes higher energy than other operations like sensing and data processing. So the traffic reduction in communication is one of the most important concern for prolong the life of sensors. This paper presents three traffic reduction techniques based on dominating set. In the first approach base station is dynamically relocate to the sensing area in which heavy packet traffic. The selection of base station depends on various performance metrics such as energy, signal strength and the location of the selected node. The second approach intelligently distributes the burden of broadcasting process by applying the concept of localized domination set based multicast. In the third approach i.e., Dominant Set Pruning (DSP) is used to avoid unnecessary control packet flooding in sensor network The efficiency of dominant-set-based broadcasting or routing mainly depends on the overhead in constructing the Connected Dominating Set (CDS) and the size of the dominating set. The paper proposes a novel algorithm for determine the CDS with less computation complexity. The performance of the algorithm is evaluated by using simulation. The modified algorithm has a tremendous reduction in traffic than the existing AODV algorithm.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133402593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel architecture for ROF-WDM PON integration using PDM and remote modulation 一种利用PDM和远程调制技术实现ROF-WDM PON集成的新架构
V. Mohan, R. Pradeep, N. Vijayakumar
{"title":"A novel architecture for ROF-WDM PON integration using PDM and remote modulation","authors":"V. Mohan, R. Pradeep, N. Vijayakumar","doi":"10.1109/COMPSC.2014.7032629","DOIUrl":"https://doi.org/10.1109/COMPSC.2014.7032629","url":null,"abstract":"A novel scheme for the integration of Radio Over Fiber technique with WDM-passive optical Networks is presented. WDM Passive Optical Network (WDM-PON) is an emerging solution for the ever increasing bandwidth requirements that can support a large number of users. Wireless communication now relies on RoF technology for meeting increased demand for capacity. This work proposes a scheme to integrate Radio over Fiber with WDM-Passive Optical Networks with dual polarisation, in which a wired baseband data and a wireless radio signal are modulated onto the two polarised components of a light source. The wavelength for upstream transmission is send to the BS from the Central Station. This remote modulation achieves Base Station design simplification, which is a critical aspect in future pico cellular approach.","PeriodicalId":388270,"journal":{"name":"2014 First International Conference on Computational Systems and Communications (ICCSC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信