首页 > 最新文献

2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

英文 中文
IoT Based Automated Weather Report Generation and Prediction Using Machine Learning 使用机器学习的基于物联网的自动天气报告生成和预测
Anubha Parashar
The weather can have great impact on lives. Weather changes can influence wide range of human activities and affect agriculture and transportation. The main aim of this paper is to monitor and report weather conditions so that one is informed beforehand and necessary actions can be taken to reduce the damage by any calamity by forecasting it. Here we are using various sensors in order to collect the data and previous data is used in order to train the system and with current data collection we do the prediction. We will be analyzing temperature, pollutants, humidity and pressure and will predict the weather. Existing models are expensive in contrast to ours and hence it will make monitoring local area feasible as it will be cheaper.
天气对生活有很大的影响。天气变化可以影响广泛的人类活动,影响农业和交通运输。本文的主要目的是监测和报告天气状况,以便人们事先了解情况,并采取必要的行动,通过预测灾害来减少损失。在这里,我们使用各种传感器来收集数据,使用以前的数据来训练系统,并使用当前收集的数据进行预测。我们将分析温度、污染物、湿度和压力,并预测天气。与我们的模型相比,现有的模型价格昂贵,因此它将使局部区域监测变得可行,因为它将更便宜。
{"title":"IoT Based Automated Weather Report Generation and Prediction Using Machine Learning","authors":"Anubha Parashar","doi":"10.1109/ICCT46177.2019.8968782","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968782","url":null,"abstract":"The weather can have great impact on lives. Weather changes can influence wide range of human activities and affect agriculture and transportation. The main aim of this paper is to monitor and report weather conditions so that one is informed beforehand and necessary actions can be taken to reduce the damage by any calamity by forecasting it. Here we are using various sensors in order to collect the data and previous data is used in order to train the system and with current data collection we do the prediction. We will be analyzing temperature, pollutants, humidity and pressure and will predict the weather. Existing models are expensive in contrast to ours and hence it will make monitoring local area feasible as it will be cheaper.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Smart Forklift to Reduce Accidents 智能叉车减少事故
P. Patil, Vaishnavi D. Rajurkar, A. Salunke, A. Pljonkin
This paper is to design a Smart Forklift model which reduces accident rates. Forklift is a powered industrial truck used to lift and move material over short distance. It is one of the most used machines employed for several types of tasks. Forklift is used on small as well as large scale on multiple locations. Various forklifts are available according to load capacity. Forklifts for general load purpose have capacity from 1 to 5 tons, and that of for heavier loads it has capacity of 50 tons. It has major drawback of severe accidents because of less safety features. To avoid these unwanted accidents, Smart Forklift is introduced, with arduino, gyro sensor, which decreases the rate of accidents and increases the safety of driver as well as vehicle. This design includes a small model which will detect problem whenever Forklift is in danger mode and a security threat indication is sent through a buzzer and light indication to driver.
本文旨在设计一种降低事故率的智能叉车模型。叉车是一种动力工业卡车,用于短距离提升和移动材料。它是用于几种任务的最常用的机器之一。叉车既可用于小型作业,也可用于大型作业。根据负载能力,可提供各种叉车。一般载重叉车的载重能力为1 ~ 5吨,载重叉车的载重能力为50吨。由于安全性能较差,存在严重事故的大缺点。为了避免这些意外的发生,我们推出了智能叉车,采用arduino,陀螺仪传感器,降低了事故发生率,提高了驾驶员和车辆的安全性。本设计包括一个小模型,当叉车处于危险模式时,它会检测问题,并通过蜂鸣器和指示灯向驾驶员发送安全威胁提示。
{"title":"Smart Forklift to Reduce Accidents","authors":"P. Patil, Vaishnavi D. Rajurkar, A. Salunke, A. Pljonkin","doi":"10.1109/ICCT46177.2019.8969024","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969024","url":null,"abstract":"This paper is to design a Smart Forklift model which reduces accident rates. Forklift is a powered industrial truck used to lift and move material over short distance. It is one of the most used machines employed for several types of tasks. Forklift is used on small as well as large scale on multiple locations. Various forklifts are available according to load capacity. Forklifts for general load purpose have capacity from 1 to 5 tons, and that of for heavier loads it has capacity of 50 tons. It has major drawback of severe accidents because of less safety features. To avoid these unwanted accidents, Smart Forklift is introduced, with arduino, gyro sensor, which decreases the rate of accidents and increases the safety of driver as well as vehicle. This design includes a small model which will detect problem whenever Forklift is in danger mode and a security threat indication is sent through a buzzer and light indication to driver.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124574154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effective Distribution of Local Intensity Gradient Technique for View Invariant Gait Recognition 局部强度梯度有效分布技术在视觉不变步态识别中的应用
Tejas.K. Rayangoudar, H. Nagaraj
The proposed paper investigates the effectiveness of view invariance in gait recognition by implementing HOG behavioral feature extraction technique on CASIA-B and CMU MoBo gait database in which standard HOG (RHOG), circular HOG and MHOG are considered for feature extraction. The effectiveness of each feature is analyzed and compared using SVM based classifier on gait detection of the subject for changing view angle. 25 subjects are considered with 10 different view angles for each subject. Classification is done based on the influence of individual and combination of above mentioned features. In spatial domain, although the RHOG gives better precision in finding the gait with normal view angle, but when the view angles are changed with respect to binning angles of histograms, the CHOG feature gives up to 97% better and consistent classification rate against RHOG. Further MHOG feature analysis is considered to improve classification results up to 100%, thus addressing the rotational invariance problem. The work carried out shows better gait recognition results than the previous researchers for all the view angles.
本文通过在CASIA-B和CMU MoBo步态数据库上实现HOG行为特征提取技术,分别考虑标准HOG (RHOG)、圆形HOG和MHOG进行特征提取,研究了视角不变性在步态识别中的有效性。利用基于支持向量机的分类器对变换视角下被测对象的步态检测进行有效性分析和比较。25个主题,每个主题有10个不同的视角。根据个体的影响和上述特征的组合进行分类。在空间域中,虽然RHOG在正常视角下的步态识别精度更高,但当视角相对于直方图的起始角度发生变化时,CHOG特征的分类率比RHOG高97%,且分类率一致。进一步的MHOG特征分析被认为可以将分类结果提高到100%,从而解决旋转不变性问题。所进行的工作表明,在所有视角下,步态识别结果都比以前的研究人员更好。
{"title":"Effective Distribution of Local Intensity Gradient Technique for View Invariant Gait Recognition","authors":"Tejas.K. Rayangoudar, H. Nagaraj","doi":"10.1109/ICCT46177.2019.8968784","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968784","url":null,"abstract":"The proposed paper investigates the effectiveness of view invariance in gait recognition by implementing HOG behavioral feature extraction technique on CASIA-B and CMU MoBo gait database in which standard HOG (RHOG), circular HOG and MHOG are considered for feature extraction. The effectiveness of each feature is analyzed and compared using SVM based classifier on gait detection of the subject for changing view angle. 25 subjects are considered with 10 different view angles for each subject. Classification is done based on the influence of individual and combination of above mentioned features. In spatial domain, although the RHOG gives better precision in finding the gait with normal view angle, but when the view angles are changed with respect to binning angles of histograms, the CHOG feature gives up to 97% better and consistent classification rate against RHOG. Further MHOG feature analysis is considered to improve classification results up to 100%, thus addressing the rotational invariance problem. The work carried out shows better gait recognition results than the previous researchers for all the view angles.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121178310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approach to Reduce the Replication of Information and to Increase the Reliability of End to End Data Transmission in WSN 无线传感器网络中减少信息复制和提高端到端数据传输可靠性的新方法
Shilpa Choudhary, Lokesh Sharma, A. Kaushik, A. Mishra
Presently, WSN (Wireless Sensor Network) is the most standard administrations utilized in business and mechanical applications, due to its specialized advancement in a processor, correspondence, and low-control utilization of implanted registering gadgets. As of late a proficient plan of a Wireless Sensor Network has turned into a main zone of research. A Sensor is a gadget that reacts and recognizes some sort of contribution from both the physical or ecological conditions, for example, weight, heat, light, and so on. The output of the sensor nodes is commonly used as an electrical flag that is transmitted to a controller for further handling. Challenging task in WSN configuration is the means by which to spare node energy while keeping up the required network behavior. Any WSN can just satisfy its central goal as long as it is considered alive (till the sensor nodes are alive or battery control exhaustion) however not after that. Once any of the sensor nodes is declared dead, it will not involve in further data transmission process.In this paper a novel approach has been discussed to reduce the replication of information shared by the sensor nodes and to increase the reliability of end to end data transmission.
目前,无线传感器网络(WSN, Wireless Sensor Network)由于其在处理器、通信和低控制利用等方面的特殊优势,成为商业和机械应用中最标准的管理方式。近年来,无线传感器网络的设计已成为研究的热点。传感器是一种能对物理或生态条件做出反应和识别的小工具,例如,重量、热量、光线等。传感器节点的输出通常用作传输到控制器进行进一步处理的电子标志。在WSN配置中,如何在保证网络性能的同时节省节点能量是一项具有挑战性的任务。任何WSN都可以满足其中心目标,只要它被认为是活着的(直到传感器节点是活着的或电池控制耗尽),但之后就不是这样了。一旦任何一个传感器节点被宣布死亡,它将不再参与进一步的数据传输过程。本文讨论了一种新的方法来减少传感器节点间共享信息的重复,提高端到端数据传输的可靠性。
{"title":"Novel Approach to Reduce the Replication of Information and to Increase the Reliability of End to End Data Transmission in WSN","authors":"Shilpa Choudhary, Lokesh Sharma, A. Kaushik, A. Mishra","doi":"10.1109/ICCT46177.2019.8968785","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968785","url":null,"abstract":"Presently, WSN (Wireless Sensor Network) is the most standard administrations utilized in business and mechanical applications, due to its specialized advancement in a processor, correspondence, and low-control utilization of implanted registering gadgets. As of late a proficient plan of a Wireless Sensor Network has turned into a main zone of research. A Sensor is a gadget that reacts and recognizes some sort of contribution from both the physical or ecological conditions, for example, weight, heat, light, and so on. The output of the sensor nodes is commonly used as an electrical flag that is transmitted to a controller for further handling. Challenging task in WSN configuration is the means by which to spare node energy while keeping up the required network behavior. Any WSN can just satisfy its central goal as long as it is considered alive (till the sensor nodes are alive or battery control exhaustion) however not after that. Once any of the sensor nodes is declared dead, it will not involve in further data transmission process.In this paper a novel approach has been discussed to reduce the replication of information shared by the sensor nodes and to increase the reliability of end to end data transmission.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Sensor based Secured Health Monitoring and Alert Technique using IoMT 基于传感器的IoMT安全健康监测与报警技术
Surabhi Joshi, S. Joshi
A reliable health monitoring system essentially requires real time and continuous monitoring of critical health parameters of the patient and a prognostic approach to generate and send an alert during medical emergency. This paper proposes a sensor based health monitoring technique with adequate security features using Huffman Compression Coding and Rivest Shamir Adleman (RSA) encryption technique. Further, based on a prognostic approach an alert mechanism is developed with embedded software and internet of things. This proposed system is an improved version of existing systems and can be useful for patients on move or in intensive care unit.
一个可靠的健康监测系统本质上需要实时和持续地监测患者的关键健康参数,以及在医疗紧急情况下产生和发送警报的预后方法。本文提出了一种基于传感器的健康监测技术,该技术采用霍夫曼压缩编码和RSA (Rivest Shamir Adleman)加密技术。此外,基于预测方法,利用嵌入式软件和物联网开发了警报机制。该系统是现有系统的改进版本,可用于移动或重症监护病房的患者。
{"title":"A Sensor based Secured Health Monitoring and Alert Technique using IoMT","authors":"Surabhi Joshi, S. Joshi","doi":"10.1109/ICCT46177.2019.8969047","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969047","url":null,"abstract":"A reliable health monitoring system essentially requires real time and continuous monitoring of critical health parameters of the patient and a prognostic approach to generate and send an alert during medical emergency. This paper proposes a sensor based health monitoring technique with adequate security features using Huffman Compression Coding and Rivest Shamir Adleman (RSA) encryption technique. Further, based on a prognostic approach an alert mechanism is developed with embedded software and internet of things. This proposed system is an improved version of existing systems and can be useful for patients on move or in intensive care unit.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130813534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Online CAPTCHA Replacement through Face Detection 通过人脸检测在线更换验证码
Rutwik Chinchole, Aditya Kakad, S. Bhirud, A. Raghunath, Ms. Snehal Mumbaikar
The sensitive information stored on the internet should not be easily accessible by any unauthorized personnel, it should be readily available only to the authorized people. Thus integrity, security and confidentiality need to be maintained. There needs to be a security check before any kind of access is granted to any kind of sensitive information. CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) is a popular way for authenticating a user. The main goal of any technique is to recognize whether it is a human who is accessing the content or a robot via some recognition techniques. The advancement in recognition technologies has enabled humans to develop bots which can now bypass common authentication techniques which have been in use for a long time. CAPTCHA has been in use since a very long time and has some serious drawbacks. Facial recognition alongside with artificial intelligence can overcome drawbacks like difficulty in solving, ambiguity, and sometimes easy prey for trained bots of CAPTCHA and can easily replace it.
储存在互联网上的敏感资料不应被任何未经授权的人员轻易查阅,而应只供获授权的人士随时查阅。因此,需要保持完整性、安全性和保密性。在授予对任何敏感信息的任何访问权限之前,都需要进行安全检查。CAPTCHA(完全自动化的公共图灵测试来区分计算机和人类)是一种流行的用户身份验证方式。任何技术的主要目标都是通过一些识别技术来识别访问内容的是人还是机器人。识别技术的进步使人类能够开发机器人,这些机器人现在可以绕过已经使用了很长时间的常见身份验证技术。CAPTCHA已经使用了很长时间,并且有一些严重的缺点。面部识别与人工智能一起可以克服解决困难、模棱两可、有时容易被训练有素的CAPTCHA机器人捕获等缺点,并且可以很容易地取代它。
{"title":"Online CAPTCHA Replacement through Face Detection","authors":"Rutwik Chinchole, Aditya Kakad, S. Bhirud, A. Raghunath, Ms. Snehal Mumbaikar","doi":"10.1109/ICCT46177.2019.8969072","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969072","url":null,"abstract":"The sensitive information stored on the internet should not be easily accessible by any unauthorized personnel, it should be readily available only to the authorized people. Thus integrity, security and confidentiality need to be maintained. There needs to be a security check before any kind of access is granted to any kind of sensitive information. CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) is a popular way for authenticating a user. The main goal of any technique is to recognize whether it is a human who is accessing the content or a robot via some recognition techniques. The advancement in recognition technologies has enabled humans to develop bots which can now bypass common authentication techniques which have been in use for a long time. CAPTCHA has been in use since a very long time and has some serious drawbacks. Facial recognition alongside with artificial intelligence can overcome drawbacks like difficulty in solving, ambiguity, and sometimes easy prey for trained bots of CAPTCHA and can easily replace it.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Botnet in Cyber Security 僵尸网络在网络安全中的研究进展
Syeda Farjana Shetu, M. Saifuzzaman, Nazmun Nessa Moon, Fernaz Narin Nur
Botnets is one of the most critical cyber security threats that confronted by organizations day by day. Botnet has used distinctive strategies, topologies and communication protocol in specific levels in their life cycle. Identifying of botnets has emerged as a very challenging topic, particularly for the reason that they can improve their method at any time. Nowadays, most of the recent botnet detection techniques cannot locate modern botnets in an early stage. Mainly, botnets follow command and control infrastructure. Nowadays, botnet is an interesting and very vital research topic for researchers in our cyber security. This Paper represents a completely comprehensive evaluation that extensively discusses the botnet problem; this survey classifies all of the possible botnet detection methods, also summarizes previously published studies and recent works.
僵尸网络是组织每天面临的最严重的网络安全威胁之一。僵尸网络在其生命周期的特定阶段使用了独特的策略、拓扑结构和通信协议。识别僵尸网络已经成为一个非常具有挑战性的话题,特别是因为他们可以随时改进他们的方法。目前,大多数最新的僵尸网络检测技术都无法对现代僵尸网络进行早期定位。僵尸网络主要遵循命令和控制基础设施。目前,僵尸网络是网络安全领域一个非常有趣和重要的研究课题。本文代表了一个全面的评估,广泛讨论了僵尸网络问题;本调查分类了所有可能的僵尸网络检测方法,也总结了以前发表的研究和最近的工作。
{"title":"A Survey of Botnet in Cyber Security","authors":"Syeda Farjana Shetu, M. Saifuzzaman, Nazmun Nessa Moon, Fernaz Narin Nur","doi":"10.1109/ICCT46177.2019.8969048","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969048","url":null,"abstract":"Botnets is one of the most critical cyber security threats that confronted by organizations day by day. Botnet has used distinctive strategies, topologies and communication protocol in specific levels in their life cycle. Identifying of botnets has emerged as a very challenging topic, particularly for the reason that they can improve their method at any time. Nowadays, most of the recent botnet detection techniques cannot locate modern botnets in an early stage. Mainly, botnets follow command and control infrastructure. Nowadays, botnet is an interesting and very vital research topic for researchers in our cyber security. This Paper represents a completely comprehensive evaluation that extensively discusses the botnet problem; this survey classifies all of the possible botnet detection methods, also summarizes previously published studies and recent works.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Analysis of Object Classification and Detection Methods to Mitigate Power Utilization 降低功耗的目标分类和检测方法分析
S. Talokar, Gajrajsingh Narde, Mohit Chaudhari
Now a day’s computing technology being grows rapidly so that object detection or identification is crucial in industry. The object detection is a technology related to computer perception and image processing for detecting samples of items to certain shapes in digital images and videos. The ultimate aim of object detection is segmenting the area of notified from a moving spot and to detecting of its motion, place and blockage. The Pattern recognition and classification introduced the pace for recognition of an object in sequence of images. This paper describes the different object detection, object classification methods including the analysis and comparative investigation of various methods and techniques useful for tracking the objects. Along with these the paper gives short idea about energy saving in industry by having application if image or video processing.
如今,计算机技术正在飞速发展,因此物体检测或识别在工业中至关重要。物体检测是一种与计算机感知和图像处理相关的技术,用于检测数字图像和视频中特定形状的物体样本。目标检测的最终目的是将目标区域从运动点中分割出来,并检测其运动、位置和阻塞。模式识别和分类引入了在图像序列中识别物体的步骤。本文介绍了不同的目标检测、目标分类方法,包括对各种对目标跟踪有用的方法和技术的分析和比较调查。同时对图像或视频处理在工业节能方面的应用作了简要的介绍。
{"title":"Analysis of Object Classification and Detection Methods to Mitigate Power Utilization","authors":"S. Talokar, Gajrajsingh Narde, Mohit Chaudhari","doi":"10.1109/ICCT46177.2019.8969025","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969025","url":null,"abstract":"Now a day’s computing technology being grows rapidly so that object detection or identification is crucial in industry. The object detection is a technology related to computer perception and image processing for detecting samples of items to certain shapes in digital images and videos. The ultimate aim of object detection is segmenting the area of notified from a moving spot and to detecting of its motion, place and blockage. The Pattern recognition and classification introduced the pace for recognition of an object in sequence of images. This paper describes the different object detection, object classification methods including the analysis and comparative investigation of various methods and techniques useful for tracking the objects. Along with these the paper gives short idea about energy saving in industry by having application if image or video processing.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129212714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Design and Simulation Model of Coherent Optical DQPSK Modulation Technique for Long-Haul Communication 远距离通信相干光DQPSK调制技术的系统设计与仿真模型
Naresh Sothuku, V. A., Hemavathy Muthusamy
Coherent communication technologies extensively is used for high speed optical communications because it is tolerant to many dispersions like polarization mode dispersion (PMD) tolerance, chromatic dispersion (CD) mitigation, and provide high spectral efficiency. Coherent detection technique has the nature of preserving the phase information of the received optical signal. In DQPSK (Differential Quadrature Phase-Shift-Keying) format modulation, each symbol transmits 2 bits so that the symbol rate is half the bit rate, with reduced complexity of the system compared to QPSK. The biggest advantage of this coherent optical modulation DQPSK compared to QPSK is that it requires no optical phase lock loop at the receiver as the information is encoded in the differential phase. However, the transmitter requires an extra precoder component to map information in the differential phase. In this paper, the digital coherent DQPSK working principles and typical system design of optical communications is been explained and the simulation experiment shows the feasibility to transmit 20-Gb/s DQPSK signals with channel bandwidth of 10 GHz over more than 100 km. With that spectral efficiency improved by 2 bps/Hz. Also, this paper discusses about detailed simulation set up and various results of 20Gbps coherent DQPSK generated through simulation software.
相干通信技术由于能够容忍偏振模色散(PMD)、色散(CD)等多种色散,并具有较高的频谱效率,被广泛应用于高速光通信中。相干检测技术具有保留接收光信号的相位信息的特性。在DQPSK(微分正交相移键控)格式调制中,每个符号传输2位,使符号速率为比特率的一半,与QPSK相比降低了系统的复杂性。与QPSK相比,这种相干光调制DQPSK的最大优点是在接收端不需要光锁相环,因为信息是在差分相位编码的。然而,发射器需要一个额外的预编码器组件来映射差分相位中的信息。本文阐述了数字相干DQPSK的工作原理和典型的光通信系统设计,并通过仿真实验证明了在超过100 km的范围内传输20 gb /s信道带宽为10 GHz的DQPSK信号的可行性。频谱效率提高了2 bps/Hz。此外,本文还讨论了20Gbps相干DQPSK的详细仿真设置以及通过仿真软件生成的各种结果。
{"title":"System Design and Simulation Model of Coherent Optical DQPSK Modulation Technique for Long-Haul Communication","authors":"Naresh Sothuku, V. A., Hemavathy Muthusamy","doi":"10.1109/ICCT46177.2019.8969026","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969026","url":null,"abstract":"Coherent communication technologies extensively is used for high speed optical communications because it is tolerant to many dispersions like polarization mode dispersion (PMD) tolerance, chromatic dispersion (CD) mitigation, and provide high spectral efficiency. Coherent detection technique has the nature of preserving the phase information of the received optical signal. In DQPSK (Differential Quadrature Phase-Shift-Keying) format modulation, each symbol transmits 2 bits so that the symbol rate is half the bit rate, with reduced complexity of the system compared to QPSK. The biggest advantage of this coherent optical modulation DQPSK compared to QPSK is that it requires no optical phase lock loop at the receiver as the information is encoded in the differential phase. However, the transmitter requires an extra precoder component to map information in the differential phase. In this paper, the digital coherent DQPSK working principles and typical system design of optical communications is been explained and the simulation experiment shows the feasibility to transmit 20-Gb/s DQPSK signals with channel bandwidth of 10 GHz over more than 100 km. With that spectral efficiency improved by 2 bps/Hz. Also, this paper discusses about detailed simulation set up and various results of 20Gbps coherent DQPSK generated through simulation software.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"20 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Iris Recognition using Sobel Edge Detection for Secured Authentication 利用索贝尔边缘检测进行安全认证的生物特征虹膜识别
Nisha Vishwakarma, Vinod Patel
Recognition of iris is basically a technique used by taking out the mathematical forms biometrically over any video-based images either of the eyes that consists of complex pattern which are exclusive and static in nature. Iris is a favoured biometric feature equated to supplementary biometrics due to its specificity and constancy characteristics. The first developed systems are often relied on bad edge recognition methods and filters. Various Recognition methods like Canny Edge Detection, Huff Transform, Gabor Filters, Dagman’s Operator Iris, are often utilized in the arena. There are some confines in the form of complex computational tactics, lack of precision for the images that contains complex noise, impediment due to lens, lashes of eyes and reflection observed in pre-work. The structure proposes a recognition of an iris or a validation system utilizing the method of Sobel Age Detection for the extraction of Iris feature. The tactic also evidences that the figurative depiction efficiently handles noise and declines, considering low resolutions, specular reflections and features that creates obstacle in the eye. The proposed system delivers improved safety results with the exact feature extraction here.
虹膜识别基本上是一种从任何基于视频的图像中提取数学形式的生物识别技术,这些图像由眼睛的复杂图案组成,这些图案在本质上是排他的和静态的。虹膜是一种受欢迎的生物特征,因其特异性和恒常性而等同于补充生物特征。最初开发的系统通常依赖于较差的边缘识别方法和滤波器。各种识别方法,如Canny边缘检测、Huff变换、Gabor滤波器、Dagman算子虹膜,经常被用于竞技场。在复杂的计算策略,缺乏精确的图像,包含复杂的噪声,由于镜头的障碍,眼睛的睫毛和反射观察到的预工作形式的限制。该结构提出了一种利用索贝尔年龄检测方法提取虹膜特征的虹膜识别或验证系统。这种策略还证明,考虑到低分辨率、镜面反射和在眼睛中产生障碍的特征,具象描绘有效地处理了噪音和下降。本文提出的系统通过精确的特征提取提高了安全性。
{"title":"Biometric Iris Recognition using Sobel Edge Detection for Secured Authentication","authors":"Nisha Vishwakarma, Vinod Patel","doi":"10.1109/ICCT46177.2019.8969040","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969040","url":null,"abstract":"Recognition of iris is basically a technique used by taking out the mathematical forms biometrically over any video-based images either of the eyes that consists of complex pattern which are exclusive and static in nature. Iris is a favoured biometric feature equated to supplementary biometrics due to its specificity and constancy characteristics. The first developed systems are often relied on bad edge recognition methods and filters. Various Recognition methods like Canny Edge Detection, Huff Transform, Gabor Filters, Dagman’s Operator Iris, are often utilized in the arena. There are some confines in the form of complex computational tactics, lack of precision for the images that contains complex noise, impediment due to lens, lashes of eyes and reflection observed in pre-work. The structure proposes a recognition of an iris or a validation system utilizing the method of Sobel Age Detection for the extraction of Iris feature. The tactic also evidences that the figurative depiction efficiently handles noise and declines, considering low resolutions, specular reflections and features that creates obstacle in the eye. The proposed system delivers improved safety results with the exact feature extraction here.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124429126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1