首页 > 最新文献

2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)最新文献

英文 中文
Low Power Emg Front-End For Face Paralysis 用于面瘫的低功率肌电信号前端
Aanchal Jha, Ganesh Lakshamana Kumar M
Facial paralysis patients have a high risk of loosing the vision of eye, so Functional Electrical Simulation(FES) has the potential to solve this problem but people are looking for the low power to minimize the pain and the low power EMG Extraction device is designed here using an inverter. Inverter based OTA is designed to achieve low power with low voltage supply. This EMG Extractor is designed with UMC 180nm technology consuming 1.5μW with supply of 1V.For designing EMG EXTRACTOR preamplifier is designed as it can bring the signal to the required voltage, then Band pass filter is used as we require strong filtration. Programmable gain amplifier is also used as it provides differential gain and to maintain one level of signal such that ADC can detect the variation. The amplifier circuit unity gain bandwidth is 2.51189 MHz, gain is 63.427 dB, input referred noise of the circuit @ 270 Hz is 91.5858 nV/sqrt(Hz) and @ 470 Hz is 76.8615 nV/sqrt(Hz). The power supply rejection ratio of the circuit is 80 dB. Programmable Gain is achieved from 0 dB to 23 dB @ 47 Hz to 78 Hz. Here all the circuits are operating at a frequency range of 270 Hz to 470 Hz. Area of the amplifier 61.99μW × 79.78 μW, preamplifier and programmable gain amplifier area is 262.73μW × 423.77μW.
面瘫患者失去视力的风险很高,因此功能电模拟(FES)有可能解决这一问题,但人们一直在寻找低功率以最大限度地减少疼痛,这里设计了使用逆变器的低功率肌电信号提取装置。基于逆变器的OTA设计是为了实现低电压供电的低功耗。EMG提取器采用UMC 180nm工艺设计,功耗为1.5μW,电源为1V。在设计EMG EXTRACTOR时,先设计前置放大器,使信号达到所需电压,再采用带通滤波器,满足强滤波的要求。可编程增益放大器也被使用,因为它提供差分增益,并保持一个电平的信号,使ADC可以检测到变化。放大电路单位增益带宽为2.51189 MHz,增益为63.427 dB,电路输入参考噪声@ 270 Hz为91.5858 nV/sqrt(Hz), @ 470 Hz为76.8615 nV/sqrt(Hz)。电路的电源抑制比为80db。可编程增益实现从0 dB到23 dB @ 47 Hz到78 Hz。这里所有的电路都在270赫兹到470赫兹的频率范围内工作。放大器面积为61.99μW × 79.78 μW,前置放大器和可编程增益放大器面积为262.73μW × 423.77μW。
{"title":"Low Power Emg Front-End For Face Paralysis","authors":"Aanchal Jha, Ganesh Lakshamana Kumar M","doi":"10.1109/ICAECC.2018.8479503","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479503","url":null,"abstract":"Facial paralysis patients have a high risk of loosing the vision of eye, so Functional Electrical Simulation(FES) has the potential to solve this problem but people are looking for the low power to minimize the pain and the low power EMG Extraction device is designed here using an inverter. Inverter based OTA is designed to achieve low power with low voltage supply. This EMG Extractor is designed with UMC 180nm technology consuming 1.5μW with supply of 1V.For designing EMG EXTRACTOR preamplifier is designed as it can bring the signal to the required voltage, then Band pass filter is used as we require strong filtration. Programmable gain amplifier is also used as it provides differential gain and to maintain one level of signal such that ADC can detect the variation. The amplifier circuit unity gain bandwidth is 2.51189 MHz, gain is 63.427 dB, input referred noise of the circuit @ 270 Hz is 91.5858 nV/sqrt(Hz) and @ 470 Hz is 76.8615 nV/sqrt(Hz). The power supply rejection ratio of the circuit is 80 dB. Programmable Gain is achieved from 0 dB to 23 dB @ 47 Hz to 78 Hz. Here all the circuits are operating at a frequency range of 270 Hz to 470 Hz. Area of the amplifier 61.99μW × 79.78 μW, preamplifier and programmable gain amplifier area is 262.73μW × 423.77μW.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On sparse Audio Data Watermarking by Exploiting Haar Transform Structure 利用Haar变换结构的稀疏音频数据水印
Electa Alice Jayarani. A, M. R. Bhatt, G. D
In the past decade the world has seen a monumental growth in technology. At the same time the technology has lead the human kind to a threat as always there is an exploit of the invention. The current trend is posting all multimedia files on internet instantly without any security. This has lead to tremendous problem to the owners of multimedia file. Thus prevention of multimedia file has given higher priority in recent years. In this paper on sparse audio data watermarking by exploiting Haar transform structure is discussed. Experimental results are provided to analysis the proposed algorithm without degrading the quality of the audio.
在过去的十年里,世界见证了科技的巨大发展。与此同时,这项技术也给人类带来了威胁,因为这项发明总是会被利用。目前的趋势是在没有任何安全措施的情况下将所有多媒体文件立即发布到互联网上。这给多媒体文件的所有者带来了巨大的问题。因此,对多媒体文件的防范已成为近年来研究的重点。本文讨论了利用Haar变换结构对稀疏音频数据进行水印的方法。实验结果表明,在不降低音频质量的前提下,该算法的有效性得到了验证。
{"title":"On sparse Audio Data Watermarking by Exploiting Haar Transform Structure","authors":"Electa Alice Jayarani. A, M. R. Bhatt, G. D","doi":"10.1109/ICAECC.2018.8479528","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479528","url":null,"abstract":"In the past decade the world has seen a monumental growth in technology. At the same time the technology has lead the human kind to a threat as always there is an exploit of the invention. The current trend is posting all multimedia files on internet instantly without any security. This has lead to tremendous problem to the owners of multimedia file. Thus prevention of multimedia file has given higher priority in recent years. In this paper on sparse audio data watermarking by exploiting Haar transform structure is discussed. Experimental results are provided to analysis the proposed algorithm without degrading the quality of the audio.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPMS: A Scientific Decision Framework forbSmartphone Manufacturer Selection using Linguistic Preferences SPMS:使用语言偏好进行智能手机制造商选择的科学决策框架
R. Krishankumar, K. S. Ravichandran, J. Premaladha, M. I. Ahmed
The usage of smart phones by Indian students is tremendously growing at faster pace. To cope with the high-end demand, mobile manufacturers have to make rational decisions regarding the market expansion and quality improvement. To critical decision, in this paper, a new scientific decision framework called SPMS is (smart phone manufacturer selector) presented. The SPMS consist of three stages viz., data acquisition and pre-processing stage, data fusion and criteria weighting stage and selection/ranking stage. The data is collected from questionnaires which are completed by students of colleges in and around Thanjavur district. The missing information in the dataset are completed using bin by mean method, followed by feature set reduction is done using Gini index method. In the second stage, linguistic information are aggregated using frequency match aggregation (FMA) operator with unconstrained weight values. Further, criteria weights are determined using standard variance (SV) method under linguistic context. Finally, ranking of smart phone manufacturers is done using VIKOR method under linguistic context. The practicality and usefulness of the proposed framework is demonstrated using a case study for smart phone selection. The strength and weakness of the proposal is also realized by comparison with other state-of-art frameworks.
印度学生使用智能手机的速度正在以更快的速度大幅增长。为了应对高端需求,手机制造商必须在市场扩张和质量改进方面做出理性决策。对于关键决策,本文提出了一种新的科学决策框架SPMS(智能手机制造商选择器)。SPMS包括三个阶段,即数据采集及预处理阶段、数据融合及准则加权阶段和选择/排序阶段。数据来自Thanjavur地区及周边地区高校学生填写的问卷。采用bin均值法对数据集中的缺失信息进行补全,然后采用基尼指数法对特征集进行约简。在第二阶段,使用无约束权值的频率匹配聚合算子对语言信息进行聚合。在语言语境下,采用标准方差法确定标准权重。最后,在语言语境下使用VIKOR方法对智能手机厂商进行排名。通过智能手机选择的案例研究证明了所提出框架的实用性和有用性。通过与其他最先进框架的比较,也认识到该方案的优点和缺点。
{"title":"SPMS: A Scientific Decision Framework forbSmartphone Manufacturer Selection using Linguistic Preferences","authors":"R. Krishankumar, K. S. Ravichandran, J. Premaladha, M. I. Ahmed","doi":"10.1109/ICAECC.2018.8479520","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479520","url":null,"abstract":"The usage of smart phones by Indian students is tremendously growing at faster pace. To cope with the high-end demand, mobile manufacturers have to make rational decisions regarding the market expansion and quality improvement. To critical decision, in this paper, a new scientific decision framework called SPMS is (smart phone manufacturer selector) presented. The SPMS consist of three stages viz., data acquisition and pre-processing stage, data fusion and criteria weighting stage and selection/ranking stage. The data is collected from questionnaires which are completed by students of colleges in and around Thanjavur district. The missing information in the dataset are completed using bin by mean method, followed by feature set reduction is done using Gini index method. In the second stage, linguistic information are aggregated using frequency match aggregation (FMA) operator with unconstrained weight values. Further, criteria weights are determined using standard variance (SV) method under linguistic context. Finally, ranking of smart phone manufacturers is done using VIKOR method under linguistic context. The practicality and usefulness of the proposed framework is demonstrated using a case study for smart phone selection. The strength and weakness of the proposal is also realized by comparison with other state-of-art frameworks.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel LCP substrate dual band antenna loaded with T-shaped resonator and Circular slot 一种新型的带t型谐振腔和圆形槽的LCP基板双频天线
Imran Khan, G. D, S. R., T. Ali, R. Biradar
A novel Liquid Crystal Polymer (LCP) substrate based dual band antenna for C-band and satellite applications is proposed. The novel LCP substrate is made by suitable proportionate concentration of Liquid Crystal and a Polymer. The antenna designed by this substrate shows the resonance at 4.45 & 6.9GHz with $S_{11} < -10$dB bandwidth of about 6.02% (4.31-4.584GHz) and 2.89% (6.83–7.03GHz) respectively. The proposed design has a compact size of $0.59lambda_{l}times0.59lambda_{l}times 0.01lambda_{l}$ at a lowest resonant frequency of 4.45GHz. The proposed antenna exhibits good impedance matching and overall radiation characteristics.
提出了一种新型的基于液晶聚合物(LCP)衬底的c波段和卫星双频天线。该新型LCP衬底由适当比例浓度的液晶和聚合物制成。该基板设计的天线在4.45 ghz和6.9GHz处谐振,$S_{11} < -10$dB带宽分别约为6.02% (4.31-4.584GHz)和2.89% (6.83-7.03GHz)。所提出的设计在4.45GHz的最低谐振频率下具有$0.59lambda_{l}times0.59lambda_{l}times 0.01lambda_{l}$的紧凑尺寸。该天线具有良好的阻抗匹配和整体辐射特性。
{"title":"A Novel LCP substrate dual band antenna loaded with T-shaped resonator and Circular slot","authors":"Imran Khan, G. D, S. R., T. Ali, R. Biradar","doi":"10.1109/ICAECC.2018.8479428","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479428","url":null,"abstract":"A novel Liquid Crystal Polymer (LCP) substrate based dual band antenna for C-band and satellite applications is proposed. The novel LCP substrate is made by suitable proportionate concentration of Liquid Crystal and a Polymer. The antenna designed by this substrate shows the resonance at 4.45 & 6.9GHz with $S_{11} < -10$dB bandwidth of about 6.02% (4.31-4.584GHz) and 2.89% (6.83–7.03GHz) respectively. The proposed design has a compact size of $0.59lambda_{l}times0.59lambda_{l}times 0.01lambda_{l}$ at a lowest resonant frequency of 4.45GHz. The proposed antenna exhibits good impedance matching and overall radiation characteristics.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130918232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two Layer Cloud Security Set Architecture On Hypervisor Hypervisor上的两层云安全集架构
Nivedha Sathyanarayanan, M. Nanda
In the super accoutered and highly advanced world of technology, there exists a need to configure and proffer the spasmodic requisites of the administrators with least service provider interaction. This was envisaged nebulously in “CLOUD COMPUTING”. Security is the super eminent engrossment factor when entrusting an organization’s critical information to geographically dispersed cloud platforms not under the direct control of that organization. [1] In such scenarios, it is indispensable to develop a contrivance that provides integrated control along with high level of security. To mitigate the risks of hyper jacking in a hypervisor, various new ideas are being developed. Our proposed solution persists of a two-layer security set architecture that barricades, tracks and reciprocates when it senses hyper jacking. The two layers in the architecture are the Prevention phase that is further classified into Authentication and Encryption/Decryption phases and the Detection Phase which includes Detection followed by Responding using Honeyd. In the primary layer of Prevention the data to be stocked is authenticated using Challenge Handshake Authentication Protocol and later encrypted/decrypted using Advanced Encryption Standards using Rijndael Ciphers for secure storage. [8] Though this provides exhaustive security, considering the chances of the prevention phase failure, the next phase of detection and responding by using Honeyd (Honeypot) is implemented. This phase simulates the features which resembles an operating system and handles external penetration and interacts with the malicious user as a host itself. [5] Thus the system could be camouflaged by monitoring and alerting the users about the possible network intrusions to enhance its security, apart from protecting the data.
在高度发达的技术世界中,需要以最少的服务提供者交互来配置和提供管理员的间歇性需求。这在“云计算”中被模糊地设想过。当将组织的关键信息委托给地理上分散的云平台时,安全性是最重要的关注因素,而云平台不受该组织的直接控制。[1]在这种情况下,开发一种既能提供综合控制又能提供高水平安全性的设备是必不可少的。为了减轻管理程序中过度劫持的风险,正在开发各种新想法。我们提出的解决方案是一个两层安全集架构,当它感知到过度劫持时,它会封锁、跟踪和响应。体系结构中的两层是预防阶段(进一步分为身份验证和加密/解密阶段)和检测阶段(包括检测,然后使用Honeyd进行响应)。在预防的主要层中,要存储的数据使用挑战握手认证协议进行身份验证,然后使用高级加密标准使用Rijndael密码进行加密/解密,以确保安全存储。[8]虽然这提供了彻底的安全性,但考虑到预防阶段失败的可能性,下一阶段的检测和响应是通过使用蜜罐(Honeypot)实现的。这个阶段模拟类似于操作系统的特性,处理外部渗透,并作为主机本身与恶意用户交互。[5]因此,除了保护数据外,该系统还可以通过监视和提醒用户可能的网络入侵来伪装,以增强其安全性。
{"title":"Two Layer Cloud Security Set Architecture On Hypervisor","authors":"Nivedha Sathyanarayanan, M. Nanda","doi":"10.1109/ICAECC.2018.8479440","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479440","url":null,"abstract":"In the super accoutered and highly advanced world of technology, there exists a need to configure and proffer the spasmodic requisites of the administrators with least service provider interaction. This was envisaged nebulously in “CLOUD COMPUTING”. Security is the super eminent engrossment factor when entrusting an organization’s critical information to geographically dispersed cloud platforms not under the direct control of that organization. [1] In such scenarios, it is indispensable to develop a contrivance that provides integrated control along with high level of security. To mitigate the risks of hyper jacking in a hypervisor, various new ideas are being developed. Our proposed solution persists of a two-layer security set architecture that barricades, tracks and reciprocates when it senses hyper jacking. The two layers in the architecture are the Prevention phase that is further classified into Authentication and Encryption/Decryption phases and the Detection Phase which includes Detection followed by Responding using Honeyd. In the primary layer of Prevention the data to be stocked is authenticated using Challenge Handshake Authentication Protocol and later encrypted/decrypted using Advanced Encryption Standards using Rijndael Ciphers for secure storage. [8] Though this provides exhaustive security, considering the chances of the prevention phase failure, the next phase of detection and responding by using Honeyd (Honeypot) is implemented. This phase simulates the features which resembles an operating system and handles external penetration and interacts with the malicious user as a host itself. [5] Thus the system could be camouflaged by monitoring and alerting the users about the possible network intrusions to enhance its security, apart from protecting the data.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129678063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart-Cart for Smart-Cities 智慧城市的智慧车
P. G, Sushruth B Bangre, K. M, V. M, Anupama R
In the current scenario, smart devices and smart technology are gaining high momentum for Automatic Identification and Data Capture(AIDC). Radio Frequency Identification and Detection(RFID) are one of the promising solutions for AIDC. Here, we present a smart solution for automatic billing enabled by RFID. We have proposed new methodology to simplify the billing process and reduce the time spent in searching products in the supermarket. Every product and customers details is uniquely identified by the RFID. An Authenticated customer can choose the products from the list displayed on the user interface. Then the smart cart automatically routes itself to the location of the product. Every purchased products price and weight is to be read by the RFID reader on the Smart-Cart through RFID tag on the product. Concurrent billing and calculation is done by the website developed. When the shopping is completed, the amount gets debited from the customers prepaid account.
在当前的情况下,智能设备和智能技术在自动识别和数据捕获(AIDC)方面获得了很高的动力。无线射频识别与检测(RFID)是一种很有前途的AIDC解决方案。在这里,我们提出了一个智能的解决方案,为自动计费启用RFID。我们提出了新的方法来简化结账过程,减少在超市寻找产品所花费的时间。每个产品和客户的详细信息都是由RFID唯一识别的。通过身份验证的客户可以从用户界面上显示的列表中选择产品。然后,智能购物车自动将自己路由到产品的位置。每一个购买的产品的价格和重量都是通过产品上的RFID标签由智能车上的RFID读取器读取的。并发计费和计算是由网站开发完成的。当购物完成后,这笔钱会从顾客的预付账户中扣除。
{"title":"Smart-Cart for Smart-Cities","authors":"P. G, Sushruth B Bangre, K. M, V. M, Anupama R","doi":"10.1109/ICAECC.2018.8479485","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479485","url":null,"abstract":"In the current scenario, smart devices and smart technology are gaining high momentum for Automatic Identification and Data Capture(AIDC). Radio Frequency Identification and Detection(RFID) are one of the promising solutions for AIDC. Here, we present a smart solution for automatic billing enabled by RFID. We have proposed new methodology to simplify the billing process and reduce the time spent in searching products in the supermarket. Every product and customers details is uniquely identified by the RFID. An Authenticated customer can choose the products from the list displayed on the user interface. Then the smart cart automatically routes itself to the location of the product. Every purchased products price and weight is to be read by the RFID reader on the Smart-Cart through RFID tag on the product. Concurrent billing and calculation is done by the website developed. When the shopping is completed, the amount gets debited from the customers prepaid account.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Relay Assisted Cooperative Communication for Wireless Sensor Networks 无线传感器网络中继辅助协同通信
M. Aishwarya, S. Kirthiga
In this proposed work, Cooperative Communica-tion in Wireless Sensor Networks is analyzed.The Cooperative Communication helps in reliable information transfer consuming minimum energy and ensuring reduced error performance. Energy Efficiency and error performance are critical in the design of cooperation in a Wireless Sensor Network System as they decide node lifespan. In this paper, a $100times 100$ sq m farm area is considered for isolating crop disease. The information required for the crop disease is transferred to the remote destination in three ways Direct path, Singlehop and Multihop depending on the Channel State Information and Farm area.One of the above configuration is chosen based on the Bit error rate and energy efficiency. It is found that the Multihop has better energy efficiency compared to Singlehop and Directpath.
本文对无线传感器网络中的协作通信进行了分析。通过协作通信,实现信息的可靠传递,消耗最小的能量,降低错误性能。在无线传感器网络系统的协作设计中,能量效率和误差性能是至关重要的,因为它们决定了节点的寿命。本文考虑100 × 100平方米的农场面积来隔离作物病害。作物病害所需的信息根据通道状态信息和农场区域以三种方式传输到远程目的地:直接路径、单跳和多跳。根据误码率和能源效率来选择上述配置之一。研究发现,与单跳和直接路径相比,多跳具有更好的能量效率。
{"title":"Relay Assisted Cooperative Communication for Wireless Sensor Networks","authors":"M. Aishwarya, S. Kirthiga","doi":"10.1109/ICAECC.2018.8479524","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479524","url":null,"abstract":"In this proposed work, Cooperative Communica-tion in Wireless Sensor Networks is analyzed.The Cooperative Communication helps in reliable information transfer consuming minimum energy and ensuring reduced error performance. Energy Efficiency and error performance are critical in the design of cooperation in a Wireless Sensor Network System as they decide node lifespan. In this paper, a $100times 100$ sq m farm area is considered for isolating crop disease. The information required for the crop disease is transferred to the remote destination in three ways Direct path, Singlehop and Multihop depending on the Channel State Information and Farm area.One of the above configuration is chosen based on the Bit error rate and energy efficiency. It is found that the Multihop has better energy efficiency compared to Singlehop and Directpath.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125277168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Code obfuscating a Kotlin-based App with Proguard 用Proguard混淆基于kotlin的应用程序的代码
Y. Shah, Jimil Shah, Krishna B. Kansara
The convenience of using Android-based smartphones has made Android immensely popular. Until now, Java dominated other Android App Development languages such as C# and Corona, while Kotlin seems to be the future of Android App Development. Though Kotlin provides additional perks to Android app developers, some loopholes still exist that provide a way for security threats to penetrate. One of the most common security threats is App Repackaging. It is a dangerous and malicious attack which exploits the open-source platform. App Repackaging can be minimized by Proguard, a multi-purpose code obfuscator. In this paper, we have implemented prevention against App Repackaging using Proguard with Kotlin-developed Android app. It aims to assist android app developers in securing their apps against App Repackaging attacks.
使用基于Android的智能手机的便利性使得Android非常受欢迎。到目前为止,Java主导着其他Android应用开发语言,如c#和Corona,而Kotlin似乎是Android应用开发的未来。尽管Kotlin为Android应用开发者提供了额外的好处,但仍然存在一些漏洞,为安全威胁提供了渗透的途径。最常见的安全威胁之一是应用程序重新包装。这是一种利用开源平台的危险恶意攻击。Proguard是一个多用途的代码混淆器,可以最大限度地减少应用程序的重新包装。在本文中,我们使用Proguard对kotlin开发的Android应用程序实施了防止应用程序重新包装的措施。它旨在帮助Android应用程序开发人员保护他们的应用程序免受应用程序重新包装攻击。
{"title":"Code obfuscating a Kotlin-based App with Proguard","authors":"Y. Shah, Jimil Shah, Krishna B. Kansara","doi":"10.1109/ICAECC.2018.8479507","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479507","url":null,"abstract":"The convenience of using Android-based smartphones has made Android immensely popular. Until now, Java dominated other Android App Development languages such as C# and Corona, while Kotlin seems to be the future of Android App Development. Though Kotlin provides additional perks to Android app developers, some loopholes still exist that provide a way for security threats to penetrate. One of the most common security threats is App Repackaging. It is a dangerous and malicious attack which exploits the open-source platform. App Repackaging can be minimized by Proguard, a multi-purpose code obfuscator. In this paper, we have implemented prevention against App Repackaging using Proguard with Kotlin-developed Android app. It aims to assist android app developers in securing their apps against App Repackaging attacks.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126423811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Contextual Care Protocol using Neural Networks and Decision Trees 基于神经网络和决策树的情境关怀协议
Yash Sinha, Pranshu Malviya, Minerva Panda, Syed Mohd Ali
A contextual care protocol is used by a medical practitioner for patient healthcare, given the context or situation that the specified patient is in. This paper proposes a method to build an automated self-adapting protocol which can help make relevant, early decisions for effective healthcare delivery. The hybrid model leverages neural networks and decision trees. The neural network estimates the chances of each disease and each tree in the decision trees represents care protocol for a disease. These trees are subject to change in case of aberrations found by the diagnosticians. These corrections or prediction errors are clustered into similar groups for scalability and review by the experts. The corrections as suggested by the experts are incorporated into the model.
根据指定患者所处的上下文或情况,医生使用上下文护理协议进行患者保健。本文提出了一种构建自动自适应协议的方法,该协议可以帮助为有效的医疗保健服务做出相关的早期决策。混合模型利用神经网络和决策树。神经网络估计每种疾病的几率,决策树中的每棵树代表一种疾病的护理方案。如果诊断人员发现异常,这些树可能会发生变化。这些修正或预测错误被聚集到类似的组中,以供专家进行可伸缩性和审查。专家建议的修正被纳入模型。
{"title":"Contextual Care Protocol using Neural Networks and Decision Trees","authors":"Yash Sinha, Pranshu Malviya, Minerva Panda, Syed Mohd Ali","doi":"10.1109/ICAECC.2018.8479433","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479433","url":null,"abstract":"A contextual care protocol is used by a medical practitioner for patient healthcare, given the context or situation that the specified patient is in. This paper proposes a method to build an automated self-adapting protocol which can help make relevant, early decisions for effective healthcare delivery. The hybrid model leverages neural networks and decision trees. The neural network estimates the chances of each disease and each tree in the decision trees represents care protocol for a disease. These trees are subject to change in case of aberrations found by the diagnosticians. These corrections or prediction errors are clustered into similar groups for scalability and review by the experts. The corrections as suggested by the experts are incorporated into the model.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse Reconstruction of Hyperspectral Image using Bregman Iterations 基于Bregman迭代的高光谱图像稀疏重建
K. Gunasheela, H. S. Prasantha
Hyperspectral image processing plays an important role in satellite communication. Hyperspectral Image (HSI) processing generally requires very high ‘computational resources’ in terms of computational time and storage due to extremely large volumes of data collected by imaging spectrometers on-board the satellite. The bandwidth available to transmit the image data from satellite to the ground station is limited. As a result, Hyperspectral image compression is an active research area in the research community in past few years. The research work in the paper proposes a new scheme, Sparsification of HSI and reconstruction (SHSIR) for the reconstruction of hyperspectral image data acquired in Compressive sensing (CS) fashion. Compressed measurements similar to compressive sensing acquisition are generated using measurement matrices containing gaussian i.i. d entries. Now the reconstruction is solving the constrained optimization problem with non smooth terms. Adaptive Bregman iterations method of multipliers is used to convert the difficult optimization problem into a simple cyclic sequence problem. Experimental results from research work indicates that the proposed method performs better than the other existing techniques.
高光谱图像处理在卫星通信中起着重要的作用。高光谱图像(HSI)处理通常需要非常高的计算时间和存储资源,因为卫星上的成像光谱仪收集了非常大量的数据。从卫星向地面站传输图像数据的可用带宽是有限的。因此,高光谱图像压缩是近年来研究界的一个活跃研究领域。本文的研究工作提出了一种基于压缩感知(CS)方式的高光谱图像数据重建新方案——HSI和重建的稀疏化(SHSIR)。压缩测量类似于压缩感知采集,使用包含高斯i.i.d条目的测量矩阵生成。现在的重构是解决带有非光滑项的约束优化问题。采用乘法器的自适应Bregman迭代法,将复杂的优化问题转化为简单的循环序列问题。研究工作的实验结果表明,该方法的性能优于现有的其他技术。
{"title":"Sparse Reconstruction of Hyperspectral Image using Bregman Iterations","authors":"K. Gunasheela, H. S. Prasantha","doi":"10.1109/ICAECC.2018.8479473","DOIUrl":"https://doi.org/10.1109/ICAECC.2018.8479473","url":null,"abstract":"Hyperspectral image processing plays an important role in satellite communication. Hyperspectral Image (HSI) processing generally requires very high ‘computational resources’ in terms of computational time and storage due to extremely large volumes of data collected by imaging spectrometers on-board the satellite. The bandwidth available to transmit the image data from satellite to the ground station is limited. As a result, Hyperspectral image compression is an active research area in the research community in past few years. The research work in the paper proposes a new scheme, Sparsification of HSI and reconstruction (SHSIR) for the reconstruction of hyperspectral image data acquired in Compressive sensing (CS) fashion. Compressed measurements similar to compressive sensing acquisition are generated using measurement matrices containing gaussian i.i. d entries. Now the reconstruction is solving the constrained optimization problem with non smooth terms. Adaptive Bregman iterations method of multipliers is used to convert the difficult optimization problem into a simple cyclic sequence problem. Experimental results from research work indicates that the proposed method performs better than the other existing techniques.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"14 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1