2014 International Conference on Computational Intelligence and Communication Networks最新文献

筛选
英文 中文
Simulation of CMOS IO Standard Based Energy Efficient Gurmukhi Unicode Reader on FPGA 基于CMOS IO标准的节能Gurmukhi Unicode阅读器在FPGA上的仿真
B. Pandey, Gurpreet Singh
{"title":"Simulation of CMOS IO Standard Based Energy Efficient Gurmukhi Unicode Reader on FPGA","authors":"B. Pandey, Gurpreet Singh","doi":"10.1109/CICN.2014.193","DOIUrl":"https://doi.org/10.1109/CICN.2014.193","url":null,"abstract":"In order to fill the research gap of energy efficient hardware design in natural language processing, this project reports the designing of an energy efficient Gurumukhi Unicode Reader on Field Programmable Gate Array (FPGA). To avoid transmission line reflection, a usual problem in hardware design, impedances of transmission line, device and port should be equal. In order to avoid transmission line reflection and make the design energy efficient too, we are using low voltage variants of CMOS: LVCMOS (Low Voltage Complementary Metal oxide Semiconductor) and TTL: LVTTL (Low Voltage Transistor Transistor Logic) I/O standards were used in this project. There is 58.33% and 58.97% decrease in IO power dissipation with LVCMOS12, in compare to LVCMOS25 for 625MHz and 1GHz respectively, with no significant changes in clock power, leakage power and junction temperature. This design is also tested on 25MHz, 125MHz and 25GHz operating frequency with four different LVCMOS.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"26 1","pages":"917-920"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83965533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of High Performance IEEE754 Floating Point Multiplier Using Vedic Mathematics 基于吠陀数学的高性能IEEE754浮点乘法器设计
Sushma S. Mahakalkar, S. Haridas
{"title":"Design of High Performance IEEE754 Floating Point Multiplier Using Vedic Mathematics","authors":"Sushma S. Mahakalkar, S. Haridas","doi":"10.1109/CICN.2014.207","DOIUrl":"https://doi.org/10.1109/CICN.2014.207","url":null,"abstract":"The fundamental and the core of all the Digital Signal Processors (DSPs) are its multipliers and the speed of the DSPs is mainly determined by the speed of its multiplier. In this paper we have synthesized and verified IEEE 754 single and double precision High Speed Floating Point Multiplier using VHDL on Xilinx Virtex - 5 FPGA. The Urdhva-Tiryakbhyam sutra (method) was selected for designing of mantissa. In addition the proposed designed handled underflow, overflow and rounding condition. High speed is achieved by reducing carry propagation delay by using carry save adder while implementation of four (27 × 27 bit multiplier for double precision) and (12 × 12 bit multiplier for single precision).","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"16 1","pages":"985-988"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88523590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Study on Geo-location Authentication Techniques 地理位置认证技术研究
Brinda Shivhare, Gaurav Sharma, S. Kushwah
{"title":"A Study on Geo-location Authentication Techniques","authors":"Brinda Shivhare, Gaurav Sharma, S. Kushwah","doi":"10.1109/CICN.2014.161","DOIUrl":"https://doi.org/10.1109/CICN.2014.161","url":null,"abstract":"The explosive growth of the information over the internet makes a crucial task to make network safe and secure with many users hits and connectivity. Geo location based network provides context-aware services that help associate location with users and content. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based network is to secure system from disparate user, so that the right user can take the right decision for the security of the items which are relevant for them. In this paper we are comparing different techniques on different aspects of systems which is used in Geo location based network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"98 1","pages":"744-748"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88565942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Tuning of PID Controller for a Linear BLDC Motor Using TLBO Technique 基于TLBO技术的线性无刷直流电机PID控制器整定
Pooja Sharma, Rajeev Gupta
{"title":"Tuning of PID Controller for a Linear BLDC Motor Using TLBO Technique","authors":"Pooja Sharma, Rajeev Gupta","doi":"10.1109/CICN.2014.254","DOIUrl":"https://doi.org/10.1109/CICN.2014.254","url":null,"abstract":"In this paper, an optimum tuning of PID Controller is proposed. A Linear Brushless DC motor is known for higher efficiency & lower maintenance. A newly developed algorithm named, teaching learning based optimization algorithm is applied for the PID Controller tuning of Brushless Linear DC Motor. This algorithm is inspired by the teaching learning process and it works on the effect of influence of a teacher on the output of the learners in a class. Teaching -- Learning-Based Optimization (TLBO) algorithms simulate the teaching -- learning phenomenon of a classroom to solve multidimensional, linear and nonlinear problems with appreciable efficiency. TLBO is population based method. The performance of TLBO algorithm compared Mehdi nasri et.at. Realization of TLBO based PID controller for BLDC motor is economic and easily implemented.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"1224-1228"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83321428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Event Driven Dynamic Path Optimization for AODV in MANET 基于事件驱动的maet AODV动态路径优化
Krishna Mahajan, D. Malik, M. Rizvi, D. S. Karaulia
{"title":"Event Driven Dynamic Path Optimization for AODV in MANET","authors":"Krishna Mahajan, D. Malik, M. Rizvi, D. S. Karaulia","doi":"10.1109/CICN.2014.105","DOIUrl":"https://doi.org/10.1109/CICN.2014.105","url":null,"abstract":"Route discovery and maintenance in Mobile Ad-hoc Network (MANET) is a problem of long standing interest. In ad-hoc networks the Ad-hoc on demand Distance Vector (AODV) protocol assumes that discovered route is optimal and transmits data on it for the entire data session, whereas due to dynamic topology nodes change position dynamically, the optimum route may change. Thus, node mobility may give rise to more optimal path than already discovered one, making the optimal path suboptimal. AODV does not re-initiate route discovery until link failure or route break occurs which incurs large overhead and increase in delay and is not energy efficient. Therefore, dynamic optimal route discovery should be done. An attempt is made in this paper to find an event based optimum path which is created because of the dynamic topology of the Ad-hoc network and its advantages in data transmission in terms of delay and energy efficiency. Moreover routing information on nodes of active route remains correct. In the literature Anticipated Route Maintenance (ARM), path compression algorithm (PCA), etc. Are some of the approaches used for dynamic route discovery.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"137 1","pages":"448-452"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78186077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Designing an Enhanced Selective Encryption Method for Securing Mobile Ad Hoc Network 设计一种增强的选择性加密方法来保护移动自组织网络
A. Kushwaha, H. Sharma
{"title":"Designing an Enhanced Selective Encryption Method for Securing Mobile Ad Hoc Network","authors":"A. Kushwaha, H. Sharma","doi":"10.1109/CICN.2014.170","DOIUrl":"https://doi.org/10.1109/CICN.2014.170","url":null,"abstract":"As the globular progression is taking place, a hub for wireless network is broadening swiftly. Exploitation of Mobile Ad hoc Network is no exception to that. Effortlessness to use, enclosing extensive applications and independence from fixed infrastructure makes Mobile Ad hoc Network, one of the most alarming areas of research today. The article presents a thorough study of Mobile Ad hoc Network, which takes into account the variety of attacks. The approach also presents a concise summary of selective encryption and our proposed method, Selective Significant Data Encryption (SSDE). The technique is based on selective encryption which selects specific words to be encrypted, so that time overhead of encryption can be reduced, thereby making the encryption procedure more effective. Set of experiments are performed in ns 2.35 simulator. This manuscript offers the methodology for the future enhancement for Securing MANET.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"8 1","pages":"793-798"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89437552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of FORE Toolkit: Cyber Forensic Tool for the Eucalyptus Software as a Service Cloud Model FORE工具箱的设计与实现:用于Eucalyptus软件即服务云模型的网络取证工具
Asish Srivastava, Amit Gupta, Tinesh Kumar Goyal, P. Saxena
{"title":"Design and Implementation of FORE Toolkit: Cyber Forensic Tool for the Eucalyptus Software as a Service Cloud Model","authors":"Asish Srivastava, Amit Gupta, Tinesh Kumar Goyal, P. Saxena","doi":"10.1109/CICN.2014.124","DOIUrl":"https://doi.org/10.1109/CICN.2014.124","url":null,"abstract":"In the research paper, primarily there will be description about cyber forensics tools for SaaS application for eucalyptus continued with implementation and finally the evaluation. FORE endow us to dedicated capabilities of forensics for Eucalyptus cloud platform. Eucalyptus is open source software which is providing us with various cloud deployment model. FORE implementation supports for SaaS application. FORE cyber investigation related to the SaaS application which is hosted on virtual machine and virtual operating system using SaaS application logs, virtual volume logs and user activity logs. [2][8] In simple Web application we easily perform forensics activity, but in cloud platform it is very difficult to perform forensics activity because all servers operated virtually. This type of forensics investigate on a Web based approach may required for log investigation. In virtual environment user also responsible for their data security, so user need to self audit of account activity. In this paper, we explore the basic requirement for a cloud forensics and develop forensic tool for auditing and investigation for SaaS model.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"10 1","pages":"546-550"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74464303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive Segmentation of Capsule Endoscopy Images Using Grow Cut Method 基于生长切口法的胶囊内窥镜图像交互式分割
P. Shanmugasundaram, N. Santhiyakumari
{"title":"Interactive Segmentation of Capsule Endoscopy Images Using Grow Cut Method","authors":"P. Shanmugasundaram, N. Santhiyakumari","doi":"10.1109/CICN.2014.52","DOIUrl":"https://doi.org/10.1109/CICN.2014.52","url":null,"abstract":"High incidence of Gastrointestinal (GI) tract related diseases are common nowadays, which leads to cancer. Diagnose of these kind of diseases is not easy in the early stage. This makes the researchers to develop an automated screening technique for early detection, many modalities are employed to view the GI tract but complete visualization is not possible. Wireless Capsule Endo scopy (WCE) is a modern modality which helps to view the complete GI tract, This claims an computational assistances which automatically segment the defective frames with the help of computer assisted diagnosis, In this paper the author describes an semi-automated interactive grow cut algorithm for segmenting capsule endoscopy (CE) images as foreground and background image by iterative process with a small number of user-labeled pixel the rest of the images are segmented with less human input. User can view and guide the algorithm without any additional user effort a semi automated segmentation is computed using mat lab.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"29 1","pages":"190-192"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79319214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Opinion Spam Detection Using Feature Selection 基于特征选择的垃圾邮件检测
Rinki Patel, Priyank Thakkar
{"title":"Opinion Spam Detection Using Feature Selection","authors":"Rinki Patel, Priyank Thakkar","doi":"10.1109/CICN.2014.127","DOIUrl":"https://doi.org/10.1109/CICN.2014.127","url":null,"abstract":"In modern times, it has become very essential for e-commerce businesses to empower their end customers to write reviews about the services that they have utilized. Such reviews provide vital sources of information on these products or services. This information is utilized by the future potential customers before deciding on purchase of new products or services. These opinions or reviews are also exploited by marketers to find out the drawbacks of their own products or services and alternatively to find the vital information related to their competitor's products or services. This in turn allows to identify weaknesses or strengths of products. Unfortunately, this significant usefulness of opinions has also raised the problem for spam, which contains forged positive or spiteful negative opinions. This paper focuses on the detection of deceptive opinion spam. A recently proposed opinion spam detection method which is based on n-gram techniques is extended by means of feature selection and different representation of the opinions. The problem is modelled as the classification problem and Naïve Bayes (NB) classifier and Least Squares Support Vector Machine (LS-SVM) are used on three different representations (Boolean, bag-of-words and term frequency -- inverse document frequency (TF-IDF) ) of the opinions. All the experiments are carried out on widely used gold-standard dataset.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"117 1","pages":"560-564"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79394472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Projectile-Deviation Measuring Technology Literature Review 弹丸偏差测量技术文献综述
Shang Zaifei, Wang Chunping
{"title":"Projectile-Deviation Measuring Technology Literature Review","authors":"Shang Zaifei, Wang Chunping","doi":"10.1109/CICN.2014.228","DOIUrl":"https://doi.org/10.1109/CICN.2014.228","url":null,"abstract":"Projectile-Deviation measurement is a key part of shooting calibration of anti-aircraft artillery systems. In recent years, as the imaging and computer processing speed improved significantly, it makes real-time analysis and getting the deviation from projectile-shooting scene possible. This paper makes a deep research on projectile-deviation measurement using image processing technology, combined with the small target detection algorithm, discusses target detection approach of projectile, and small target detection algorithm is given the main features and trends, research in this field has a certain significance.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":"116 1","pages":"1088-1091"},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79252010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信