2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)最新文献

筛选
英文 中文
The effectiveness of cloud databases 云数据库的有效性
Niraja Jain, A. Deshpande, B. Raghu, V. Khanaa
{"title":"The effectiveness of cloud databases","authors":"Niraja Jain, A. Deshpande, B. Raghu, V. Khanaa","doi":"10.1109/ICAMMAET.2017.8186694","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186694","url":null,"abstract":"‘Utility computing’ was the concept introduced by John McCarthy in 1961 in a speech given at MIT. He proposed that sharing the computing power on a time-sharing basis will help grow business of ‘providing computing power as an utility’ and this was the inception of the cloud computing. Cloud computing can deliver the best to the end users either through the private, public or hybrid cloud infrastructures. As the databases are of significance importance, it is a mandate that they ought to be designed compatible to the rising cloud technology. Cloud computing has changed the face of the IT industry. But in the current scenario there are many database issues that are not addressed. With tremendous data growth, the need for the paradigm shift in the technology to be used to store, manage and retrieve data is awaited. Databases have changed from file storages to relational databases and further transformed to today's cloud databases. Still the need to process the query efficiently without losing the data privacy had been the topmost priority. The resource optimization and query dynamism are the major unchanged aspects in this changing scenario. The timing constraints on the query execution could be leisurely, indefinite, urgent or instantaneous. In almost all the scenarios, the effective storage, elastic manipulation and efficient data retrieval is the key.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A study on protection issues in presence of distributed generation 分布式电源存在时的保护问题研究
Dhananjay M. Chahyal, M. Kalgunde, A. Kalage
{"title":"A study on protection issues in presence of distributed generation","authors":"Dhananjay M. Chahyal, M. Kalgunde, A. Kalage","doi":"10.1109/ICAMMAET.2017.8186734","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186734","url":null,"abstract":"Distributed generation (DG) is very effective way to absorb the local clusters of renewable energy pockets. The locally formed grids serve the best purpose of supporting the main grid and to reach the far customer to be supplied by the energy. The conventional generation systems when integrated with DG leads to many issues for the protection aspect of the system. This paper presents the analysis and discuss the various probable fault issues while integration. The study is done with and without DG systems. The attempt of probable solutions to be implemented can also to be discussed. The classical method of fault calculation using the power world simulator is also tried for the effective and accurate analysis. The obtained results are presented and discussed.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124332794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pairwise error probability analysis and optimal power allocation for selective decode-forward protocol over Nakagami-m fading channels Nakagami-m衰落信道上选择性译码转发协议的两两错误概率分析和最优功率分配
Ravi Shankar, I. Kumar, Aradhana Kumari, K. Pandey, R. Mishra
{"title":"Pairwise error probability analysis and optimal power allocation for selective decode-forward protocol over Nakagami-m fading channels","authors":"Ravi Shankar, I. Kumar, Aradhana Kumari, K. Pandey, R. Mishra","doi":"10.1109/ICAMMAET.2017.8186700","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186700","url":null,"abstract":"This paper provides an enlightment into the pairwise error probability (PEP) of multi-antenna (MIMO) space-time code (STC) based selective decode then forward cooperative scheme considering Nakagami-m channel. We examine the pairwise error probability at the destination node, and we have formulated the closed form expression for pairwise error probability. We have achieved full diversity order in our proposed cooperative scheme. We have formulated the asymptotic end-to-end pairwise error probability, and our simulation results show that it is tight at high signal-to-noise ratio (SNR) scenario. Later, simulation results are given for the optimum power allocation of source relay towards the end-to-end minimization of error. We have achieved a diversity gain and improvement in PEP as compared to another relaying scheme.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115982986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A modified genetic algorithm for community detection in complex networks 一种用于复杂网络社区检测的改进遗传算法
Songran Liu, Zhe Li
{"title":"A modified genetic algorithm for community detection in complex networks","authors":"Songran Liu, Zhe Li","doi":"10.1109/ICAMMAET.2017.8186747","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186747","url":null,"abstract":"Community detection has a very important role in data processing and analysis, which is very hot in recent years. However, traditional algorithms have shortcomings in both time complexity and precision. In this paper, we introduce a Modified Genetic Algorithm (MGA) that with alleles encoding and half uniform crossover to detect community structure. In the algorithm, each allele of the chromosome stands for the community index of the corresponding node. At the same time, half uniform crossover can better prevent the elite individuals from destroying. And we choose modularity function as its fitness function. It does not need to know how many communities the network has. In order to identify our algorithm is effective. We use both artificial random network and real networks to test our algorithm. The experimental results show that the MGA algorithm can be applied to community detection, and its accuracy and time complexity can reach the effect of classical algorithms.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123338493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A classified study on semantic analysis of video summarization 视频摘要语义分析的分类研究
T. Moses, K. Balachandran
{"title":"A classified study on semantic analysis of video summarization","authors":"T. Moses, K. Balachandran","doi":"10.1109/ICAMMAET.2017.8186684","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186684","url":null,"abstract":"In today's world data represented in the form of a video are prolific and has increased the requisite of storage devices unconditionally. These video sets takes up a huge space for amassing data and takes a long time to ascertain the content that requires a higher cognitive process for content search and retrieval. The efficient method for storing video data is to remove high-degree redundancies and for creating an index of important events, objects and a preview video based on vital key-frames. These requirements imbibes the need to build algorithms that can concise the necessity of space and time for video and adequate approaches are to be developed to solve the needs of summarization. The three effective attributes for a semantic summarized video system are Un-supervision, efficient and dynamically scalable system that can help in reducing time and space complexities. Dimensionality reduction based on sub space analysis helps in plummeting the multidimensional data into a low-dimensional data to enable faster feature extraction and summarization. In this paper we have made a study and description related to several summarization methodologies for video's that are available.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122498105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach 防御manet中恶意节点的协同攻击:一种协同诱饵检测方法
J. Deny, A. S. Kumar, M. Sundarajan, Vishal Khanna
{"title":"Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach","authors":"J. Deny, A. S. Kumar, M. Sundarajan, Vishal Khanna","doi":"10.1109/ICAMMAET.2017.8186703","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186703","url":null,"abstract":"Because of the far reaching accessibility of cell phones, portable specially appointed systems (MANETs) have been generally utilized for different essential applications, for example, military emergency operations and crisis readiness and reaction operations. This is principally because of their framework less property. In a MANET, every hub functions as a host as well as go about as a switch. While getting information, hubs additionally require collaboration with each other to forward the information bundles, along these lines framing a remote neighborhood. These extraordinary elements likewise accompany genuine downsides from a security perspective. Undoubtedly, the previously mentioned applications force some stringent imperatives on the security of the system topology, steering, and information activity. For example, the nearness and joint effort of noxious hubs in the system may disturb the directing procedure, prompting to a breaking down of the system operations. A system [so-called Cooperative Bait Detection Scheme (CBDS)] is introduced that adequately recognizes the vindictive hubs that endeavor to dispatch grayhole/community oriented blackhole assaults. In the proposed conspire, the address of an adjoining hub is utilized as snare goal deliver to goad pernicious hubs to send an answer RREP message, and malevolent hubs are identified utilizing an invert following strategy. Any distinguished noxious hub is kept in a blackhole list so that every other hub that take an interest to the directing of the message are cautioned to quit speaking with any hub in that rundown. The proposed inquire about endeavors to determine this issue by outlining a dynamic source steering (DSR)-based directing system, which is alluded to as the CBDS, that incorporates the upsides of both proactive and receptive guard designs. Our CBDS strategy executes a turn around following method to help in accomplishing the expressed objective. Recreation results will be given, demonstrating that within the sight of pernicious hub assaults, the CBDS outflanks the DSR, 2ACK, and best-exertion blame tolerant steering (BFTR) conventions (picked as benchmarks) as far as parcel conveyance proportion and directing overhead (picked as execution measurements). Additionally, expect to 1) research the achievability of changing our CBDS way to deal with address different sorts of cooperative assaults on MANETs and to 2) explore the incorporation of the CBDS with other surely understood message security plots keeping in mind the end goal to develop a far reaching secure directing structure to ensure MANETs against scoundrels. Also, exhibit the advantages of our plans through reproduction in ns2.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125789540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 203
A study on knowledge based e-learning in teaching learning process 基于知识的电子学习在教学学习过程中的应用研究
G. Deena, K. Raja
{"title":"A study on knowledge based e-learning in teaching learning process","authors":"G. Deena, K. Raja","doi":"10.1109/ICAMMAET.2017.8186686","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186686","url":null,"abstract":"The fast increase in the development in Information and Communication Technology (ICT), a new era comes in the education system. To survive in today's world, the life time learning is very much important with a new cognitive strategy forever. Electronic learning or E-Learning is a kind of skill that supported in the recent teaching learning system. E-Learning refers to anytime any where learning and the medium of education is through computer technology. It also plays the major role in business and corporate industry. The purpose of the learning system is to develop quality of learning. The various learning style will helps to increase the learner's performance. The learning styles of the learner are identified through their behavioural characteristics and cognitive skills. The main objective of the E-learning is to offer the communication platform for teaching learning process. Intelligent Tutoring System (ITS) is an interdisciplinary field that examines to provide instruction to the needs of learner and tutors. This paper aims to develop the knowledge based E-learning by incorporating ITS in Teaching Learning Process. The knowledge based E-Learning system will identify the cognitive level of the learner to understand the concept in better way.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131308591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
State-of-the-art techniques on medical image retrieval using Hadoop 使用Hadoop进行医学图像检索的最新技术
N. Renukadevi
{"title":"State-of-the-art techniques on medical image retrieval using Hadoop","authors":"N. Renukadevi","doi":"10.1109/ICAMMAET.2017.8186743","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186743","url":null,"abstract":"The role of medical imaging in today's system of health care is very prominent and its wide usage as now created databases of images called PACS or Picture Archiving and Communication Systems. Large storage facilities for computers are employed by departments of medical imaging though the PACS method. Images from different modalities like multidimensional and also 2D images as well as multimodality images are now stored. These images can result in more efficient diagnosis, and also better teaching and research. This necessitates the right method to be employed for searching images having the same traits to their region of interest. CBIR or Content-based image retrieval can be taken as a technique for retrieving images which enables a balance between the conventional methods of text based retrieval that uses visual features like colour, shape, texture etc. Medical CBIR is now a field of study that has established itself and has proved to be true when it is applied to multimodality as well as multidimensional medical data. An image retrieval system that is based on content and further on Hadoop, which is a projected solution for big image database that provides safe and effective search methods and also retrieves those images that are similar to the Query image of the database.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127022817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic design of low power CMOS buffer-chain circuit using differential evolutionary algorithm and particle swarm optimization 基于差分进化算法和粒子群优化的低功耗CMOS缓冲链电路自动设计
Bhoomi Thakkar, V. Nayak
{"title":"Automatic design of low power CMOS buffer-chain circuit using differential evolutionary algorithm and particle swarm optimization","authors":"Bhoomi Thakkar, V. Nayak","doi":"10.1109/ICAMMAET.2017.8186702","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186702","url":null,"abstract":"PSO and DE algorithms and its variants are used for the optimization of a buffer-chain circuit and the results of all the algorithms are compared in this literature. By testing these algorithms on different mathematical benchmark functions the best parameter values of buffer chain circuit are obtained in such a way that it reduces the error between simulated output and optimized output, hence giving the best circuit performance. Evolutionary algorithms are better in performance and speed than the classical methods. 130nm CMOS technology has been used in this work. With the help of these parameter values the circuit simulator gives the values of power consumption, symmetry, rise time and fall time, which are almost closer to the desired specification of the buffer chain circuit.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126481314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative evaluation of image compression techniques 图像压缩技术的比较评价
N. Harikrishnan, V. V. Menon, Manoj S Nair, Gayathri Narayanan
{"title":"Comparative evaluation of image compression techniques","authors":"N. Harikrishnan, V. V. Menon, Manoj S Nair, Gayathri Narayanan","doi":"10.1109/ICAMMAET.2017.8186637","DOIUrl":"https://doi.org/10.1109/ICAMMAET.2017.8186637","url":null,"abstract":"Picture compression could be a wide dynamic investigation space. In the present time, a few redesigns are made in compression systems and more advancements are imperative since the excitement for limit and transmission of visual data is perseveringly on an augmentation. This paper analyses compression utilizing visual redundancy and examines a couple of customary schemes used in picture compression, couple of present day compression frameworks towards visual quality, execution, method predictability and intricacy as opposed to pixel-wise dependability. The paper demonstrates the correlation of transforms: Discrete Cosine Transform, Haar Wavelet Transform and Karhunen-Loeve Transform and picture compression schemes: JPEG and BPG for execution in an exceedingly still-compression framework and highlight the upsides of those transforms and schemes in today's ways. The paper analyses DCT, KLT and HWT in the light of PSNR, compression extent and time intricacy and shows that DCT is the perfect among the considered transforms. The paper likewise exhibits that BPG is that the best scheme strengthened by its compression quality.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114507414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信