2013 5th International Conference on Computational Intelligence and Communication Networks最新文献

筛选
英文 中文
An Efficient Approach for Clustering Uncertain Data Mining Based on Hash Indexing and Voronoi Clustering 基于哈希索引和Voronoi聚类的不确定数据聚类有效方法
Samir N. Ajani, M. Wanjari
{"title":"An Efficient Approach for Clustering Uncertain Data Mining Based on Hash Indexing and Voronoi Clustering","authors":"Samir N. Ajani, M. Wanjari","doi":"10.1109/CICN.2013.106","DOIUrl":"https://doi.org/10.1109/CICN.2013.106","url":null,"abstract":"Recently the classifying uncertain data in spatial database used in data mining attract a main attention by researchers. The main task is to handle the uncertainty of the data in order to classify or cluster it. In order to classify or cluster the valid or certain data, there are various techniques like DTL, Rule based Classification, Naive Bayes Classification and many more techniques. It's easy to classify the certain data but classification of the uncertain data is bit difficult. Generally K-means algorithm is used to make clusters of uncertain of uncertain data but it increases overhead and computation time. Hence to improve the performance of K-means algorithm we are proposing a technique in which K-means is combined with Voronoi clustering but this will increase the prune overhead so to reduce this prune overhead we will add Hash indexing on th uncertain data object. Our technique of combining K-means with hash indexing and Vornoi diagram results better than older technique used for clustering based on K-Means algorithm.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131705100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Environmental Violations Monitoring and Analysis Based on Game Theory 基于博弈论的环境违法监测与分析
Yong Zhu, Zheng Li
{"title":"Environmental Violations Monitoring and Analysis Based on Game Theory","authors":"Yong Zhu, Zheng Li","doi":"10.1109/CICN.2013.129","DOIUrl":"https://doi.org/10.1109/CICN.2013.129","url":null,"abstract":"The difficulty of the environmental management system is that the monitoring and supervision of the environmental violations, the paper constructs a model of Prisoner's Dilemma Game between regulators and sewage companies. Studies have shown that the regulatory frequency with the increase of penalties can effectively reduce illegal polluting behavior, thus helping to improve the level of government environmental governance.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123038277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of IDMA and CODED IDMA System IDMA和编码IDMA系统的性能分析
Anurag Yadav, A. Shukla
{"title":"Performance Analysis of IDMA and CODED IDMA System","authors":"Anurag Yadav, A. Shukla","doi":"10.1109/CICN.2013.60","DOIUrl":"https://doi.org/10.1109/CICN.2013.60","url":null,"abstract":"At the present time, an alternative multiple access scheme baptized interleave-division multiple access (IDMA) has enticed greatly devotion, in which interleavers are recycled as the only means for user parting. It has been displayed that the IDMA can accomplish near single user presentation in multiuse surroundings with very truncated receiver complexity. In this broadsheet We equate the presentation of interleave division multiple-access (IDMA) technique which deeds the interleaving as resources of user parting instead of by different marks as in a conventional code-division multiple-access (CDMA) pattern and coded IDMA arrangement where we use dissimilar codes to diminish bit error rate(BER). This technique take over many compensations from CDMA, such as diversity against fading and mitigation of the wickedest-case user interference problem. This paper offeringsangeneral idea of IDMA and deliberates the main features and regions of application.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Efficient Replacement Policy for Scratch Pad Memory 一种新的高效的刮板存储器替换策略
Shaily Mittal, Nitin
{"title":"A New Efficient Replacement Policy for Scratch Pad Memory","authors":"Shaily Mittal, Nitin","doi":"10.1109/CICN.2013.95","DOIUrl":"https://doi.org/10.1109/CICN.2013.95","url":null,"abstract":"With the implausible rise in microprocessor technology having high speed processors and enhanced the processor-memory speed gap, the design of on chip memory hierarchy is a momentous concern in embedded systems. This paper describes a simulation based performance evaluation of typical cache vs. scratch-pad memory (SPM) design issues in embedded systems such as associativity and replacement policies. The evaluation in paper is done using Simple Scalar simulation tools. in addition, we propose the use of new cache replacement policy, called tag based dual cache replacement policy in SPM and access the best approach for replacement in SPM for embedded systems. According to our simulation results, proposed replacement approach in SPM effectively decreases the data miss ratio of the cache. Comparisons against a SPM solution using dual replacement policy show remarkable advantage of up to 20% in cache miss rate for designs of the same memory size.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121438460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Business Process Reengineering for Better Sale of China Lubricant Enterprises 面向中国润滑油企业销售的业务流程再造
Cong Li, Lin Feng, Li Ma
{"title":"Business Process Reengineering for Better Sale of China Lubricant Enterprises","authors":"Cong Li, Lin Feng, Li Ma","doi":"10.1109/CICN.2013.139","DOIUrl":"https://doi.org/10.1109/CICN.2013.139","url":null,"abstract":"With the rapid development of new economy, China lubricant enterprises urgently need to implement effective Customer Relationship Management (CRM) to win the market. By constructing and applying CRM, lubricant enterprises can keep their old customers and find potential customers, so the profit and core competitive power of lubricant enterprises can all be increased. In this paper we optimized the traditional sales process of China lubricant enterprises, designed a new business process reengineering (BPR) and built a pyramid model of CRM application tactics. The new BPR can be helpful for effectively CRM implementation of China lubricant enterprises.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting the DOS Attacks in AOMDV Using AOMDV-IDS Routing 利用AOMDV- ids路由检测AOMDV中的DOS攻击
H. Gupta, Shivshakti Shrivastav, Sanjana Sharma
{"title":"Detecting the DOS Attacks in AOMDV Using AOMDV-IDS Routing","authors":"H. Gupta, Shivshakti Shrivastav, Sanjana Sharma","doi":"10.1109/CICN.2013.84","DOIUrl":"https://doi.org/10.1109/CICN.2013.84","url":null,"abstract":"Mobile Ad-hoc Network (MANET) shows promising applications have now gained significant importance in research as well as in practice, due to their autonomous and self-maintaining nature. From a security design perspective, MANETs have no clear line of defense, i.e. no built-in security. Thus, the wireless channel is accessible to both legitimate network users and malicious attackers. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packages and changes in the incoming packet which aims at disrupting the network routing and overall network reduce performance. We present a AOMDV-IDS protocol for detecting a avoiding the malicious node in MANET.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Comparison of Relational Database with Object Database (DB4o) 关系型数据库与对象数据库(db40)的性能比较
K. E. Roopak, K. S. S. Rao, S. Ritesh, Satyadhyan Chickerur
{"title":"Performance Comparison of Relational Database with Object Database (DB4o)","authors":"K. E. Roopak, K. S. S. Rao, S. Ritesh, Satyadhyan Chickerur","doi":"10.1109/CICN.2013.112","DOIUrl":"https://doi.org/10.1109/CICN.2013.112","url":null,"abstract":"In the present day scenario of mobility and objects, the field of object oriented programming is gaining momentum not only in field of gaming, programming but also in area of DBMS. The paper discusses object oriented approach for solving queries. The queries are executed and analyzed specifically on an object oriented database DB4o. The industry is moving with time from basic models of DBMS to one such DBMS discussed in this paper. Experiments have been carried out using both DB4o and MySQL for a huge airport data base. The paper also discusses two factors namely Querying methodology and Performance analysis in comparison with traditional DBMS like MySQL. The proposed approach proves that ODBMS is more efficient compared to RDBMS.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133089287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Whole Sale Price Index, Financial Indicators and Its Effect on Market and Different Sectors 批发价格指数、财务指标及其对市场和不同行业的影响
Nandita Mishra, J. Patel, S. S. Sarangdevot
{"title":"Whole Sale Price Index, Financial Indicators and Its Effect on Market and Different Sectors","authors":"Nandita Mishra, J. Patel, S. S. Sarangdevot","doi":"10.1109/CICN.2013.127","DOIUrl":"https://doi.org/10.1109/CICN.2013.127","url":null,"abstract":"Whole sale price index is a reflection of the government policy, it accounts for all trends in demand and supply and it's truly right when we say it is the index of all the goods which is necessity of life. Research paper mainly concentrates on the secondary data and looking to find out relation between the analyse Wholesale Price Index (Average of Weeks) - Annual Variation and its affect on different sector, overview new model of wpi launch by government of India, analyse role of reserve bank of India and Indian government, to look after the aspects and derive outcome of market and financial indicator and to have special look on the developing economy scenario in terms of the GDP, interest rate and inflation. Beside this objective some derived interpretation has been done based on the resultant. Bar graph and pie chart has been included in order to have quick look on the facts. Certain websites like trading economics can be check for authenticity but in general reserve bank of India can be check out for complete set of data and its relevance. Whole sale price index. It provides wide scope of opportunity to analyse and review whole sale price index and its impact on different sector. I wish to propose special thought on the inflation and to check the impact of the external factor on the different sector. I decide to take all current data and to analyse the factor yearly, monthly and weekly basis.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115867226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proficient Data Communication in MANET Using Spanning Tree 基于生成树的MANET数据通信
Priyanka B. Patil, M. Sahu, M. Rizvi
{"title":"Proficient Data Communication in MANET Using Spanning Tree","authors":"Priyanka B. Patil, M. Sahu, M. Rizvi","doi":"10.1109/CICN.2013.38","DOIUrl":"https://doi.org/10.1109/CICN.2013.38","url":null,"abstract":"Extensive researches are going on in the area of wireless ad hoc networks focuses on a wide range. Among them, mounting efficient data broadcasting algorithms is considered to be an important research focus because the broadcast method is broadly used in a number of routing protocols and, since the devices in these networks usually have a limited power supply, simply adopting the broadcast methods used in wired networks may lead to a high number of unnecessary transmissions, thus resulting in energy wastage and congestion in wireless ad hoc networks. Therefore, improving the efficiency of broadcast protocols has a very significant impact on the stability of these networks. In this paper an attempt is made to solve above discussed issues like energy, node departure, stability, scalability using spanning tree shaped network.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124666519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IO Standard Based Green Multiplexer Design and Implementation on FPGA 基于IO标准的绿色多路复用器设计与FPGA实现
B. Pandey, Rajendra Aaseri, Deepa Singh, Balkishan Dabas Sweety
{"title":"IO Standard Based Green Multiplexer Design and Implementation on FPGA","authors":"B. Pandey, Rajendra Aaseri, Deepa Singh, Balkishan Dabas Sweety","doi":"10.1109/CICN.2013.94","DOIUrl":"https://doi.org/10.1109/CICN.2013.94","url":null,"abstract":"In this work, we are using Stub Series Transistor Logic (SSTL) on the simplest VLSI circuit multiplexer and analyze the power dissipation with different class. Using SSTL15 in place of SSTL2_II_DCI, there is reduction of 304mW power i.e. 76.19% power reduction. Using HSTL_I_12 in place of HSTL_III_DCI_18, there is reduction of 157mW power i.e. 62.3% power reduction. HSTL and SSTL are IO standards taken under consideration. SSTL minimum power consumption is almost same as HSTL. But, the power dissipation of SSTL is 58.73% higher than HSTL, when we consider maximum power dissipation of both. Virtex-6 is an FPGA on which we implement this low power design. Xilinx ISE 14.1 is an ISE tool to design and synthesize multiplexer.","PeriodicalId":415274,"journal":{"name":"2013 5th International Conference on Computational Intelligence and Communication Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124882981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信