首页 > 最新文献

2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)最新文献

英文 中文
A Classification Method for Brain MRI via AlexNet 基于AlexNet的脑MRI分类方法
Burak Taşcı
The number of people dying from brain tumors is increasing day by day. Early diagnosis is very important in the treatment planning and evaluation of the treatment outcome of brain tumors. A patient with a brain tumor may be more likely to survive by applying the right treatment methods if the disease is diagnosed early. Medical imaging methods have an important role in the identification and diagnosis of brain tumors. One of the most popular medical imaging methods is Magnetic Resonance Imaging, MRI. Determining the presence of tumors and tumor characteristics from MRI is done by specialists. In today's technology, computer-assisted detection applications make great contributions to the field of medicine. Computer-Assisted Detection (CAD) software helps radiologists to detect abnormalities in medical images by using advanced pattern recognition and image processing methods. This software not only saves time for radiologists but also minimizes possible errors in the decision-making phase. In this study, deep features were extracted from a total of 942 MRIs with 599 tumor and 343 normal class labels using the AleXNet-based deep learning model, and classification was performed with the K Nearest Neighbor Classifier (KNN) algorithms. In this study, 1000 deep features were extracted from the MRI data with the trained weights of the fully connected layer named “fc8” of the AlexNet model. Then, these features were reduced by Relieff feature selection algorithm, and the performance of the proposed method was increased. A weighted KNN classifier was used in the classification phase. With the proposed method, 87% classification accuracy was achieved.
死于脑瘤的人数日益增加。早期诊断对脑肿瘤的治疗方案制定和疗效评价具有重要意义。如果早期诊断出脑肿瘤,采用正确的治疗方法,患者可能更有可能存活下来。医学影像学方法在脑肿瘤的鉴别和诊断中具有重要作用。最流行的医学成像方法之一是磁共振成像(MRI)。通过MRI确定肿瘤的存在和肿瘤特征是由专家完成的。在当今的技术中,计算机辅助检测的应用为医学领域做出了巨大的贡献。计算机辅助检测(CAD)软件通过使用先进的模式识别和图像处理方法,帮助放射科医生检测医学图像中的异常情况。该软件不仅为放射科医生节省了时间,而且还最大限度地减少了决策阶段可能出现的错误。在本研究中,使用基于alexnet的深度学习模型从942张mri中提取了599个肿瘤和343个正常类别标签的深度特征,并使用K最近邻分类器(KNN)算法进行分类。在本研究中,使用AlexNet模型中名为“fc8”的全连接层的训练权值,从MRI数据中提取1000个深度特征。然后,通过Relieff特征选择算法对这些特征进行约简,提高了该方法的性能。在分类阶段使用加权KNN分类器。该方法的分类准确率达到87%。
{"title":"A Classification Method for Brain MRI via AlexNet","authors":"Burak Taşcı","doi":"10.1109/CENTCON52345.2021.9688246","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688246","url":null,"abstract":"The number of people dying from brain tumors is increasing day by day. Early diagnosis is very important in the treatment planning and evaluation of the treatment outcome of brain tumors. A patient with a brain tumor may be more likely to survive by applying the right treatment methods if the disease is diagnosed early. Medical imaging methods have an important role in the identification and diagnosis of brain tumors. One of the most popular medical imaging methods is Magnetic Resonance Imaging, MRI. Determining the presence of tumors and tumor characteristics from MRI is done by specialists. In today's technology, computer-assisted detection applications make great contributions to the field of medicine. Computer-Assisted Detection (CAD) software helps radiologists to detect abnormalities in medical images by using advanced pattern recognition and image processing methods. This software not only saves time for radiologists but also minimizes possible errors in the decision-making phase. In this study, deep features were extracted from a total of 942 MRIs with 599 tumor and 343 normal class labels using the AleXNet-based deep learning model, and classification was performed with the K Nearest Neighbor Classifier (KNN) algorithms. In this study, 1000 deep features were extracted from the MRI data with the trained weights of the fully connected layer named “fc8” of the AlexNet model. Then, these features were reduced by Relieff feature selection algorithm, and the performance of the proposed method was increased. A weighted KNN classifier was used in the classification phase. With the proposed method, 87% classification accuracy was achieved.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131870962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Goal Line Technology Using Line axis detection 使用线轴检测的球门线技术
Suraj Ajjampur, Vishnu Shridhar, K. P. Shashikala
The exponential growth of football all around the world has caused the exactness of every single innovation included in the game to be of immense value. Basic circumstances emerge when the referee can't separate a goal or no goal by fine margins because of human visual limitations. In the modern era popular football leagues have adopted the use of hawk-eye technology which is unaffordable by the local football leagues. In this project, we have designed and developed a prototype of an efficient and cost-effective goal-line technology system. The proposed framework utilizes object detection techniques i.e. HSV model and contours. We identify the color of the ball and use line-axis detection to reference the position of the ball with respect to the goal line. If the goal is scored, the updated score line is sent to the referee through an email. The result is also broadcasted to the live audience through a speaker system and LCD screen. This system helps in decision-making, in this manner making the framework quicker to help the referees in quick decision-making and keeping up the momentum of the game.
世界范围内足球运动的指数级增长使得足球运动中每一个创新的精确性都具有巨大的价值。当裁判由于人类视觉的限制而无法区分进球或不进球时,就会出现基本情况。在现代,流行的足球联赛采用了鹰眼技术,这是当地足球联赛负担不起的。在这个项目中,我们设计并开发了一个高效、经济的门线技术系统的原型。提出的框架利用目标检测技术,即HSV模型和轮廓。我们识别球的颜色,并使用线轴检测来参考球相对于球门线的位置。如果进球了,更新的分数线将通过电子邮件发送给裁判。比赛结果也通过扬声器系统和液晶显示屏向现场观众转播。这个系统有助于决策,以这种方式使框架更快地帮助裁判快速决策并保持比赛的势头。
{"title":"Goal Line Technology Using Line axis detection","authors":"Suraj Ajjampur, Vishnu Shridhar, K. P. Shashikala","doi":"10.1109/CENTCON52345.2021.9688324","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688324","url":null,"abstract":"The exponential growth of football all around the world has caused the exactness of every single innovation included in the game to be of immense value. Basic circumstances emerge when the referee can't separate a goal or no goal by fine margins because of human visual limitations. In the modern era popular football leagues have adopted the use of hawk-eye technology which is unaffordable by the local football leagues. In this project, we have designed and developed a prototype of an efficient and cost-effective goal-line technology system. The proposed framework utilizes object detection techniques i.e. HSV model and contours. We identify the color of the ball and use line-axis detection to reference the position of the ball with respect to the goal line. If the goal is scored, the updated score line is sent to the referee through an email. The result is also broadcasted to the live audience through a speaker system and LCD screen. This system helps in decision-making, in this manner making the framework quicker to help the referees in quick decision-making and keeping up the momentum of the game.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133251996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Newer Vedic Module to Solve Quadratic Equations 一个新的韦达模块来解决二次方程
P. S, A. R., Chaithra A, S. S
Vedic Mathematics, an ancient system of Indian mathematics discovered in the early twentieth century, is based on the sixteen formulas called as sutras. These methods have the capability to speed up the processor performance. The proposed work is a design for Vedic multiplier using the Vedic sutra to speed up the operation of the processor to calculate the roots of the quadratic equation. The third sutra “Urdhva Tiragbhyam” is adopted for the solving quadratic equations. The design is implemented using Xilinx Tool Suite and the performance is analysed.
吠陀数学是20世纪早期发现的一种古老的印度数学体系,它基于被称为经文的16个公式。这些方法都具有提高处理器性能的能力。提出的工作是一个吠陀乘法器的设计,使用吠陀经来加快处理器的操作,以计算二次方程的根。求解二次方程采用第三经《乌达瓦·提拉格巴姆》。利用Xilinx Tool Suite实现了该设计,并对其性能进行了分析。
{"title":"A Newer Vedic Module to Solve Quadratic Equations","authors":"P. S, A. R., Chaithra A, S. S","doi":"10.1109/CENTCON52345.2021.9687881","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687881","url":null,"abstract":"Vedic Mathematics, an ancient system of Indian mathematics discovered in the early twentieth century, is based on the sixteen formulas called as sutras. These methods have the capability to speed up the processor performance. The proposed work is a design for Vedic multiplier using the Vedic sutra to speed up the operation of the processor to calculate the roots of the quadratic equation. The third sutra “Urdhva Tiragbhyam” is adopted for the solving quadratic equations. The design is implemented using Xilinx Tool Suite and the performance is analysed.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123313061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Cloud Security and Privacy Using Blockchain 使用区块链改善云安全和隐私
B. Sowmiya, E. Poovammal
In recent years, securely sharing personal information between two parties involves high risk. Most of the medical health records and financial transactions includes huge uncertainty while storing and retrieving from cloud for query processing. Blockchain is an open platform where each transaction is tampered proof. Various methods like zero knowledge proof or hashing methods used to hide the sensitive information from the real world. When associating blockchain with cloud this uncertainty is reduced. The user information is segregated into two categories sensitive and non-sensitive using linear regression method before processing in cloud. To improve security and increase privacy from various attacks, the sensitive part of data is encrypted using ECC and non- sensitive part of data is encrypted using RSA algorithm. Using Ethereum blockchain the policy of the user is verified and query processing is done. The performance of the model is compared with the existing techniques and results are evaluated using the classification error rate and performance of security against manual attacks.
近年来,在双方之间安全地共享个人信息涉及高风险。大多数医疗健康记录和金融交易在存储和从云检索进行查询处理时都存在巨大的不确定性。区块链是一个开放的平台,每个交易都是防篡改的。各种方法,如零知识证明或散列方法,用于向现实世界隐藏敏感信息。当将区块链与云联系起来时,这种不确定性就减少了。在云处理之前,采用线性回归方法将用户信息分为敏感和非敏感两类。为了提高安全性和增加隐私性,数据的敏感部分采用ECC加密,非敏感部分采用RSA算法加密。使用以太坊区块链验证用户的策略并完成查询处理。将该模型的性能与现有技术进行比较,并使用分类错误率和对人工攻击的安全性能对结果进行评估。
{"title":"Improving Cloud Security and Privacy Using Blockchain","authors":"B. Sowmiya, E. Poovammal","doi":"10.1109/CENTCON52345.2021.9688192","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688192","url":null,"abstract":"In recent years, securely sharing personal information between two parties involves high risk. Most of the medical health records and financial transactions includes huge uncertainty while storing and retrieving from cloud for query processing. Blockchain is an open platform where each transaction is tampered proof. Various methods like zero knowledge proof or hashing methods used to hide the sensitive information from the real world. When associating blockchain with cloud this uncertainty is reduced. The user information is segregated into two categories sensitive and non-sensitive using linear regression method before processing in cloud. To improve security and increase privacy from various attacks, the sensitive part of data is encrypted using ECC and non- sensitive part of data is encrypted using RSA algorithm. Using Ethereum blockchain the policy of the user is verified and query processing is done. The performance of the model is compared with the existing techniques and results are evaluated using the classification error rate and performance of security against manual attacks.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115820414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Cloud Security using Cryptography and Steganography Techniques 使用加密和隐写技术增强云安全
K. P. B. Madavi, P. Karthick
Data security is a key concern for organizations considering a transfer of their on-premises applications to the cloud. Organizations must shift their security controls from historical perimeter and detection-based technologies to a focus on establishing enhanced protection at the application and data levels to ensure the confidentiality, integrity, and availability of these various systems and datasets. Data integrity is a critical component of cloud data security, preventing unauthorized alteration or removal and guaranteeing that data stays as it was when it was initially uploaded. This article presents a compacting with steganography technique which is used to hide data with substantial security and also perfect invisibility while utilizing a combination of DES, AES, and RC4 encryption methods. The objective of this study is to provide data security using steganography with the Least Significant Bit (LSB) Algorithm and Hybrid Encryption that encrypts user input and conceals it in an image file to provide the highest level of security for messages sent and received.
对于考虑将其本地应用程序迁移到云的组织来说,数据安全性是一个关键问题。组织必须将其安全控制从历史边界和基于检测的技术转移到专注于在应用程序和数据级别建立增强的保护,以确保这些不同系统和数据集的机密性、完整性和可用性。数据完整性是云数据安全的关键组成部分,防止未经授权的更改或删除,并保证数据保持最初上传时的状态。本文介绍了一种压缩隐写技术,该技术利用DES、AES和RC4加密方法的组合来隐藏数据,具有很高的安全性和完美的不可见性。本研究的目的是使用最低有效位(LSB)算法的隐写术和混合加密来提供数据安全性,混合加密对用户输入进行加密并将其隐藏在图像文件中,为发送和接收的消息提供最高级的安全性。
{"title":"Enhanced Cloud Security using Cryptography and Steganography Techniques","authors":"K. P. B. Madavi, P. Karthick","doi":"10.1109/CENTCON52345.2021.9687919","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687919","url":null,"abstract":"Data security is a key concern for organizations considering a transfer of their on-premises applications to the cloud. Organizations must shift their security controls from historical perimeter and detection-based technologies to a focus on establishing enhanced protection at the application and data levels to ensure the confidentiality, integrity, and availability of these various systems and datasets. Data integrity is a critical component of cloud data security, preventing unauthorized alteration or removal and guaranteeing that data stays as it was when it was initially uploaded. This article presents a compacting with steganography technique which is used to hide data with substantial security and also perfect invisibility while utilizing a combination of DES, AES, and RC4 encryption methods. The objective of this study is to provide data security using steganography with the Least Significant Bit (LSB) Algorithm and Hybrid Encryption that encrypts user input and conceals it in an image file to provide the highest level of security for messages sent and received.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117095560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hate Speech Detection using Text and Image Tweets Based On Bi-directional Long Short-Term Memory 基于双向长短期记忆的文本和图像推文仇恨语音检测
Priyesh Kumar, K. Varalakshmi
Due to the obvious exponential growth in the usage of the internet by individuals of all ethnicities and educational backgrounds, dangerous internet media has become a serious concern in today's society. In the automated identification of hazardous text material, distinguishing between offensive speech and offensive language is a major problem. Most of the current approaches revolve around TF-IDF feature extraction, followed by the traditional classification techniques like Support Vector Machines (SVM), Decision Trees etc., As a result, there is a scope of improvement in the Accuracy of Emotion Detection and long training times. Most of the works considered only tweet data only. But in this work, we would like to include image characters and image components also. We propose a technique in this study for automatically classifying tweets on Twitter into two categories: Hate speech, Offensive speech and non-hate speech. A training and testing step are included in the suggested technique. Traditional Tweet preparation procedures such as removing Twitter handles, URLs, punctuation, stop words, and stemming were used. In both testing and training, we pad each tweet to its maximum length based on the vocabulary. This padding can have an impact on how the network works and can have a significant impact on performance and accuracy. The normalized characteristics are supplied into Bi-directional Long Short-Term Memory, which learns bidirectional long-term relationships between time steps in a time series or sequential twitter data. In comparison research, we compare the models utilizing each of these approaches. We used the Kaggle data set to predict Hate, offensive and Neutral Messages. After conducting many tests, we discovered that the suggested technique outperforms state-of-the-art algorithms by more than 90 percent.
由于不同种族和教育背景的个人使用互联网的人数呈指数级增长,危险的网络媒体已成为当今社会的一个严重问题。在危险文本材料的自动识别中,区分攻击性言论和攻击性语言是一个主要问题。目前的方法大多以TF-IDF特征提取为中心,其次是传统的分类技术,如支持向量机(SVM)、决策树等,因此在情感检测的准确性上存在一定的提高范围,并且训练时间长。大多数作品只考虑推特数据。但在这项工作中,我们还想包括图像字符和图像组件。在这项研究中,我们提出了一种技术,可以自动将Twitter上的推文分为两类:仇恨言论、攻击性言论和非仇恨言论。建议的技术包括培训和测试步骤。使用了传统的Tweet准备程序,例如删除Twitter句柄、url、标点符号、停止词和词干。在测试和训练中,我们根据词汇量将每条tweet填充到最大长度。这种填充会对网络的工作方式产生影响,并对性能和准确性产生重大影响。归一化特征提供给双向长短期记忆,学习时间序列或顺序推特数据中时间步长之间的双向长期关系。在比较研究中,我们比较了利用这些方法的模型。我们使用Kaggle数据集来预测仇恨、攻击性和中性信息。经过多次测试,我们发现建议的技术比最先进的算法高出90%以上。
{"title":"Hate Speech Detection using Text and Image Tweets Based On Bi-directional Long Short-Term Memory","authors":"Priyesh Kumar, K. Varalakshmi","doi":"10.1109/CENTCON52345.2021.9688115","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688115","url":null,"abstract":"Due to the obvious exponential growth in the usage of the internet by individuals of all ethnicities and educational backgrounds, dangerous internet media has become a serious concern in today's society. In the automated identification of hazardous text material, distinguishing between offensive speech and offensive language is a major problem. Most of the current approaches revolve around TF-IDF feature extraction, followed by the traditional classification techniques like Support Vector Machines (SVM), Decision Trees etc., As a result, there is a scope of improvement in the Accuracy of Emotion Detection and long training times. Most of the works considered only tweet data only. But in this work, we would like to include image characters and image components also. We propose a technique in this study for automatically classifying tweets on Twitter into two categories: Hate speech, Offensive speech and non-hate speech. A training and testing step are included in the suggested technique. Traditional Tweet preparation procedures such as removing Twitter handles, URLs, punctuation, stop words, and stemming were used. In both testing and training, we pad each tweet to its maximum length based on the vocabulary. This padding can have an impact on how the network works and can have a significant impact on performance and accuracy. The normalized characteristics are supplied into Bi-directional Long Short-Term Memory, which learns bidirectional long-term relationships between time steps in a time series or sequential twitter data. In comparison research, we compare the models utilizing each of these approaches. We used the Kaggle data set to predict Hate, offensive and Neutral Messages. After conducting many tests, we discovered that the suggested technique outperforms state-of-the-art algorithms by more than 90 percent.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115447373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved Energy Lifetime of Integrated LEACH Protocol for Wireless Sensor Network 改进无线传感器网络集成LEACH协议的能量寿命
Chongtham Pankaj, Gurumayum Nirmal Sharma, Khoirom Rajib Singh
Wireless Sensor network (WSN) is widely used in many applications such as Defense, Agriculture, Road Transport and Highways, Healthcare, Shopping Malls. The usage of IoT devices has risen rapidly with the advancement of WSN techniques. WSN is the dominant techniques over low-cost, easy to use, scalability and portability. The major concern that arise with WSN are battery lifetime, energy consumption and short lifetime of sensor nodes. Hence, different routing network sensor protocols improve the ways of data aggregation and transmission to Base Station in the wireless sensor network. The Low Energy Adaptive Clustering Hierarchy (LEACH) is well used routing protocol based on hierarchical network flow. Researchers improves the traditional LEACH over years. In this work, traditional and integrated LEACH protocol are considered which integrated LEACH improves the threshold equation of sensor nodes for selecting cluster head. A* search algorithm is used with integrated LEACH protocol to form the tree of the sensor nodes that searches the shortest path for selecting the cluster head. This minimizes dead sensor nodes and improve the average energy residual of the sensor nodes. Using MATLAB application, simulation of the protocol is observed that finds 30 percent reduce the dead sensor nodes over integrated LEACH and improve average energy residual.
无线传感器网络(WSN)广泛应用于国防、农业、道路运输和高速公路、医疗保健、购物中心等领域。随着无线传感器网络技术的进步,物联网设备的使用迅速增加。无线传感器网络具有低成本、易于使用、可扩展性和可移植性等优势。WSN出现的主要问题是电池寿命,能量消耗和传感器节点的短寿命。因此,不同的路由网络传感器协议改进了无线传感器网络中数据汇聚和向基站传输的方式。低能量自适应聚类层次(LEACH)是一种基于分层网络流的路由协议。研究人员多年来一直在改进传统的LEACH。本文将传统LEACH协议与集成LEACH协议进行了比较,其中集成LEACH协议改进了传感器节点的阈值方程,用于簇头选择。采用A*搜索算法,结合LEACH协议形成传感器节点树,搜索选择簇头的最短路径。这样可以最大限度地减少失效传感器节点,提高传感器节点的平均能量残差。利用MATLAB应用程序对该协议进行了仿真,发现与集成LEACH相比,该协议减少了30%的传感器死节点,并提高了平均能量剩余。
{"title":"Improved Energy Lifetime of Integrated LEACH Protocol for Wireless Sensor Network","authors":"Chongtham Pankaj, Gurumayum Nirmal Sharma, Khoirom Rajib Singh","doi":"10.1109/CENTCON52345.2021.9688050","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688050","url":null,"abstract":"Wireless Sensor network (WSN) is widely used in many applications such as Defense, Agriculture, Road Transport and Highways, Healthcare, Shopping Malls. The usage of IoT devices has risen rapidly with the advancement of WSN techniques. WSN is the dominant techniques over low-cost, easy to use, scalability and portability. The major concern that arise with WSN are battery lifetime, energy consumption and short lifetime of sensor nodes. Hence, different routing network sensor protocols improve the ways of data aggregation and transmission to Base Station in the wireless sensor network. The Low Energy Adaptive Clustering Hierarchy (LEACH) is well used routing protocol based on hierarchical network flow. Researchers improves the traditional LEACH over years. In this work, traditional and integrated LEACH protocol are considered which integrated LEACH improves the threshold equation of sensor nodes for selecting cluster head. A* search algorithm is used with integrated LEACH protocol to form the tree of the sensor nodes that searches the shortest path for selecting the cluster head. This minimizes dead sensor nodes and improve the average energy residual of the sensor nodes. Using MATLAB application, simulation of the protocol is observed that finds 30 percent reduce the dead sensor nodes over integrated LEACH and improve average energy residual.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116856154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comprehensive Analysis of Fused Descriptors for Image Retrieval 融合描述符在图像检索中的综合分析
Ganesh A Siva Raja, Maddi Siddart, S. Kashyap, P. Ramadevi
Content Based Image Retrieval (CBIR) systems are used to retrieve similar images to the query image from a large database. This paper represents a CBIR model which has been tested with multiple feature descriptors such as Scale-Invariant Feature Transform (SIFT), Speeded Up Robust Features (SURF), Binary Robust Independent Elementary Features (BRIEF), Oriented FAST and rotated BRIEF (ORB) and combinations of them. Multiple linguistic processing techniques such as Bag of Words and Topic modelling have been used for optimizing the image retrieval and making them meaningful based on human semantics. Using a combination of descriptors and Latent Dirichlet Allocation, our model has proven to yield high precision when tested against standard image retrieval data set.
基于内容的图像检索(CBIR)系统用于从大型数据库中检索与查询图像相似的图像。提出了一种基于尺度不变特征变换(SIFT)、加速鲁棒特征(SURF)、二值鲁棒独立基本特征(BRIEF)、定向FAST和旋转BRIEF (ORB)及其组合的CBIR模型。多种语言处理技术,如词袋和主题建模,已被用于优化图像检索,使其具有基于人类语义的意义。使用描述符和潜在狄利克雷分配的组合,我们的模型在对标准图像检索数据集进行测试时已被证明具有很高的精度。
{"title":"Comprehensive Analysis of Fused Descriptors for Image Retrieval","authors":"Ganesh A Siva Raja, Maddi Siddart, S. Kashyap, P. Ramadevi","doi":"10.1109/CENTCON52345.2021.9687860","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687860","url":null,"abstract":"Content Based Image Retrieval (CBIR) systems are used to retrieve similar images to the query image from a large database. This paper represents a CBIR model which has been tested with multiple feature descriptors such as Scale-Invariant Feature Transform (SIFT), Speeded Up Robust Features (SURF), Binary Robust Independent Elementary Features (BRIEF), Oriented FAST and rotated BRIEF (ORB) and combinations of them. Multiple linguistic processing techniques such as Bag of Words and Topic modelling have been used for optimizing the image retrieval and making them meaningful based on human semantics. Using a combination of descriptors and Latent Dirichlet Allocation, our model has proven to yield high precision when tested against standard image retrieval data set.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126957547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT based Vehicle Over-Speed Detection and Accident Avoidance System 基于物联网的车辆超速检测和事故避免系统
Hari Chandan T., S. Nagaraju, Bharath Nandan Varma, K. M., M. S, Mukund K. V.
Vehicle over-speed detection and accident-avoidance system is an Internet of Things (IoT) based system which collects data via sensors such as ultrasonic sensors and alerts the driver. The sensor is mounted upon a microcontroller i.e. Arduino which is responsible for the sensors to work. This system consists of an Ultrasonic Sensor, Arduino UNO, Potentiometer, CAN Controller, DC Motor, GSM, LCD display and a buzzer. The ultrasonic sensor detects the object/vehicle ahead of the vehicle and sends the data to Arduino UNO, if a particular vehicle is in close proximity to the front vehicle, the proposed system automatically controls the vehicle speed. This system also consists of an over-speed detection, which detects the speed and alerts the driver if the vehicle reaches a specific speed limit. Also, in the proposed system in case if driver overspeeds, an SMS alert would be sent to cab company or car rental agency concerned person's cellphone.
车辆超速检测和事故避免系统是一种基于物联网(IoT)的系统,它通过超声波传感器等传感器收集数据并提醒驾驶员。传感器安装在微控制器上,即Arduino,它负责传感器的工作。该系统由超声波传感器、Arduino UNO、电位器、CAN控制器、直流电机、GSM、LCD显示器和蜂鸣器组成。超声波传感器检测车辆前方的物体/车辆,并将数据发送到Arduino UNO,如果特定车辆靠近前方车辆,该系统将自动控制车辆速度。该系统还包括超速检测,它检测速度并在车辆达到特定速度限制时向驾驶员发出警报。此外,在该系统中,如果司机超速行驶,将向出租车公司或汽车租赁公司发送短信警报。
{"title":"IoT based Vehicle Over-Speed Detection and Accident Avoidance System","authors":"Hari Chandan T., S. Nagaraju, Bharath Nandan Varma, K. M., M. S, Mukund K. V.","doi":"10.1109/CENTCON52345.2021.9688241","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688241","url":null,"abstract":"Vehicle over-speed detection and accident-avoidance system is an Internet of Things (IoT) based system which collects data via sensors such as ultrasonic sensors and alerts the driver. The sensor is mounted upon a microcontroller i.e. Arduino which is responsible for the sensors to work. This system consists of an Ultrasonic Sensor, Arduino UNO, Potentiometer, CAN Controller, DC Motor, GSM, LCD display and a buzzer. The ultrasonic sensor detects the object/vehicle ahead of the vehicle and sends the data to Arduino UNO, if a particular vehicle is in close proximity to the front vehicle, the proposed system automatically controls the vehicle speed. This system also consists of an over-speed detection, which detects the speed and alerts the driver if the vehicle reaches a specific speed limit. Also, in the proposed system in case if driver overspeeds, an SMS alert would be sent to cab company or car rental agency concerned person's cellphone.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128056165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Simulation of Indoor Localization and Navigation of Turtlebot 3 using Real Time Object Detection 基于实时目标检测的Turtlebot 3室内定位与导航仿真
Chandran Nandkumar, Pranshu Shukla, Viren Varma
This paper proposes a method for indoor localization and navigation of Turtlebot 3 using Real Time Object Detection (RTOD). The robot is capable of recognizing the room it is placed inside based on the knowledge of positions of certain fixed arbitrary objects. The robot then proceeds to understand its position inside the room and is capable of moving to other locations. The robot is simulated using the ROS and Gazebo framework. The RTOD is trained to identify certain distinct objects like a rover, bowl, quadcopter and wheel based on which the robot is able to ascertain its location.
提出了一种基于实时目标检测(Real Time Object Detection, RTOD)的Turtlebot 3室内定位与导航方法。机器人能够基于某些固定任意物体的位置知识来识别它所在的房间。然后,机器人继续了解自己在房间内的位置,并能够移动到其他位置。利用ROS和Gazebo框架对机器人进行仿真。RTOD经过训练,可以识别某些不同的物体,如漫游者、碗、四轴飞行器和轮子,机器人可以根据这些物体确定自己的位置。
{"title":"Simulation of Indoor Localization and Navigation of Turtlebot 3 using Real Time Object Detection","authors":"Chandran Nandkumar, Pranshu Shukla, Viren Varma","doi":"10.1109/CENTCON52345.2021.9687937","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687937","url":null,"abstract":"This paper proposes a method for indoor localization and navigation of Turtlebot 3 using Real Time Object Detection (RTOD). The robot is capable of recognizing the room it is placed inside based on the knowledge of positions of certain fixed arbitrary objects. The robot then proceeds to understand its position inside the room and is capable of moving to other locations. The robot is simulated using the ROS and Gazebo framework. The RTOD is trained to identify certain distinct objects like a rover, bowl, quadcopter and wheel based on which the robot is able to ascertain its location.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131382776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1