首页 > 最新文献

2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)最新文献

英文 中文
Efficient Task Allocation Using Intelligent Bacterial Foraging Optimization (IBFO) Algorithm in Cloud 云环境下基于智能细菌觅食优化(IBFO)算法的高效任务分配
T. Vishrutha, P. Chitra
Cloud usage increases with increase in computational demands. The number of tasks for execution in cloud increases which ends up in complexity of scheduling tasks to resources in an energy efficient manner and with reduction of computation time. To resolve this issue Bacterial Foraging Optimization (BFO) algorithm proves to handle energy and time consumption efficiently. Though Bacterial Foraging Optimization (BFO) is one of the widely known and robust algorithm for handling multi-objective optimization problems, the algorithm is basically static and is run for a fixed number of iterations. Due to the inflexibility of the algorithm, there exists a need for the improvement of the existing Bacterial Foraging Optimization (BFO) algorithm. This paper rolls out an improved version of Bacterial Foraging Optimization (BFO) called Intelligent Bacterial Foraging Optimization (IBFO) algorithm that is dynamic based on the problem. Intelligent Bacterial Foraging Optimization (IBFO) algorithm is found to be more efficient than the existing Bacterial Foraging Optimization (BFO) algorithm in task scheduling in cloud environment.
云的使用随着计算需求的增加而增加。在云中执行的任务数量增加了,这导致以节能方式和减少计算时间将任务调度到资源的复杂性增加。为了解决这一问题,细菌觅食优化算法(BFO)被证明可以有效地处理能量和时间消耗。细菌觅食优化算法(Bacterial Foraging Optimization, BFO)是一种众所周知的鲁棒多目标优化算法,但该算法基本上是静态的,迭代次数是固定的。由于算法的不灵活性,现有的细菌觅食优化(BFO)算法需要改进。本文针对该问题提出了一种改进的细菌觅食优化算法——智能细菌觅食优化算法(Intelligent Bacterial Foraging Optimization, IBFO)。在云环境下的任务调度中,智能细菌觅食优化算法(IBFO)比现有的细菌觅食优化算法(BFO)更有效。
{"title":"Efficient Task Allocation Using Intelligent Bacterial Foraging Optimization (IBFO) Algorithm in Cloud","authors":"T. Vishrutha, P. Chitra","doi":"10.1109/ICIICT1.2019.8741422","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741422","url":null,"abstract":"Cloud usage increases with increase in computational demands. The number of tasks for execution in cloud increases which ends up in complexity of scheduling tasks to resources in an energy efficient manner and with reduction of computation time. To resolve this issue Bacterial Foraging Optimization (BFO) algorithm proves to handle energy and time consumption efficiently. Though Bacterial Foraging Optimization (BFO) is one of the widely known and robust algorithm for handling multi-objective optimization problems, the algorithm is basically static and is run for a fixed number of iterations. Due to the inflexibility of the algorithm, there exists a need for the improvement of the existing Bacterial Foraging Optimization (BFO) algorithm. This paper rolls out an improved version of Bacterial Foraging Optimization (BFO) called Intelligent Bacterial Foraging Optimization (IBFO) algorithm that is dynamic based on the problem. Intelligent Bacterial Foraging Optimization (IBFO) algorithm is found to be more efficient than the existing Bacterial Foraging Optimization (BFO) algorithm in task scheduling in cloud environment.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133185449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Credit Card Fraud Identification Using Machine Learning Approaches 使用机器学习方法识别信用卡欺诈
P. Kumar, Fahad Iqbal
Due to rapid growth of internet, online buying product is an important part of everyone’s lifestyle most of the time MasterCard is employed to pay online for products. It's a straightforward thanks to looking, people will get their required product on your visual display unit or on sensible phone. For online purchase use of MasterCard will increase dramatically however still there's some loop holes in system of online looking that causes online frauds or credit card frauds. Thus, fraud detection systems became essential for all MasterCard supply banks to attenuate their losses. The foremost normally used fraud detection strategies are Neural Network (NN), rule-induction techniques, fuzzy system, call trees, Support Vector Machines (SVM), Logistic Regression, Local Outlier Factor (LOF), Isolation Forest, K-Nearest Neighbor, Genetic algorithms. These techniques are often used alone or unitedly mistreatment ensemble or meta-learning techniques to make classifiers. This paper presents a survey of various techniques utilized in MasterCard fraud detection and evaluates every methodology supported bound criterion
由于互联网的快速发展,网上购买产品是每个人生活方式的重要组成部分,大多数时候使用万事达卡在线支付产品。这是一个简单的感谢看,人们会得到他们所需的产品在你的视觉显示单元或智能手机。在网上购物中,万事达卡的使用将会急剧增加,但网上查询系统仍然存在一些漏洞,导致网上欺诈或信用卡欺诈。因此,欺诈检测系统对所有万事达供应银行来说都是必不可少的,以减少他们的损失。最常用的欺诈检测策略是神经网络(NN)、规则归纳技术、模糊系统、呼叫树、支持向量机(SVM)、逻辑回归、局部离群因子(LOF)、隔离森林、k近邻、遗传算法。这些技术通常单独使用或联合滥用集成或元学习技术来制作分类器。本文介绍了万事达卡欺诈检测中使用的各种技术的调查,并评估了支持绑定标准的每种方法
{"title":"Credit Card Fraud Identification Using Machine Learning Approaches","authors":"P. Kumar, Fahad Iqbal","doi":"10.1109/ICIICT1.2019.8741490","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741490","url":null,"abstract":"Due to rapid growth of internet, online buying product is an important part of everyone’s lifestyle most of the time MasterCard is employed to pay online for products. It's a straightforward thanks to looking, people will get their required product on your visual display unit or on sensible phone. For online purchase use of MasterCard will increase dramatically however still there's some loop holes in system of online looking that causes online frauds or credit card frauds. Thus, fraud detection systems became essential for all MasterCard supply banks to attenuate their losses. The foremost normally used fraud detection strategies are Neural Network (NN), rule-induction techniques, fuzzy system, call trees, Support Vector Machines (SVM), Logistic Regression, Local Outlier Factor (LOF), Isolation Forest, K-Nearest Neighbor, Genetic algorithms. These techniques are often used alone or unitedly mistreatment ensemble or meta-learning techniques to make classifiers. This paper presents a survey of various techniques utilized in MasterCard fraud detection and evaluates every methodology supported bound criterion","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Spectrum Sensing in a VSAT Network Using Cognitive Radio Technology 基于认知无线电技术的VSAT网络频谱感知
S. Ushaa, N. Sangeetha, E. Murugavalli, P. Velmurugan, M. Suresh
Satellite Spectrum is a very scarce and costly natural resource. The rapid development in satellite communications has increased the number of users, which in turn, created a demand for more spectral resources. Also due to the ever-increasing demand for bandwidth resulted from high data rate requirements, one of the main challenges for satellite communication is to continuously improve the utilization efficiency of the limited exclusive satellite spectrum (Ku-band). However, the available spectrum is also not utilized efficiently, which leads to spectrum under-utilization. Cognitive Radio (CR) technology has proved to be a promising option to address the spectrum scarcity. In CR, when a primary user (PU) is not utilizing the spectrum, the secondary users (SUs) are allowed to access the spectrum. This paper discusses the Spectrum Sensing in a Very Small Aperture Terminal (VSAT) network by using CR technology which is a new approach in this area. Also, this work will serve as a forerunner for future developments in this domain. VSATs are terminals that communicate with one another through satellite. Applying CR technology in VSATs, spectrum sensing can be performed to detect the spectrum holes where SUs can be accommodated. The spectrum holes are identified in the spectral domain using Fast Fourier Transform (FFT). The simulation results show the retrieved indices of spectrum holes, where SUs are to be accommodated.
卫星频谱是一种非常稀缺和昂贵的自然资源。卫星通信的快速发展增加了用户数量,这反过来又产生了对更多频谱资源的需求。此外,由于高数据速率对带宽的需求不断增加,不断提高有限的卫星专用频谱(ku波段)的利用效率是卫星通信面临的主要挑战之一。但是,可用的频谱也没有得到有效利用,导致频谱利用率不足。认知无线电(CR)技术已被证明是解决频谱短缺的一种很有前途的选择。在CR中,当主用户(PU)未使用频谱时,允许从用户(su)访问频谱。本文讨论了利用CR技术实现甚小孔径终端(VSAT)网络的频谱感知,这是该领域的一种新方法。同时,这项工作将作为该领域未来发展的先导。vsat是通过卫星相互通信的终端。将CR技术应用于vsat中,可以进行频谱感知,以检测可容纳SUs的频谱孔。利用快速傅里叶变换(FFT)在谱域中识别出谱孔。仿真结果显示了光谱孔的检索指标,其中需要容纳SUs。
{"title":"Spectrum Sensing in a VSAT Network Using Cognitive Radio Technology","authors":"S. Ushaa, N. Sangeetha, E. Murugavalli, P. Velmurugan, M. Suresh","doi":"10.1109/ICIICT1.2019.8741424","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741424","url":null,"abstract":"Satellite Spectrum is a very scarce and costly natural resource. The rapid development in satellite communications has increased the number of users, which in turn, created a demand for more spectral resources. Also due to the ever-increasing demand for bandwidth resulted from high data rate requirements, one of the main challenges for satellite communication is to continuously improve the utilization efficiency of the limited exclusive satellite spectrum (Ku-band). However, the available spectrum is also not utilized efficiently, which leads to spectrum under-utilization. Cognitive Radio (CR) technology has proved to be a promising option to address the spectrum scarcity. In CR, when a primary user (PU) is not utilizing the spectrum, the secondary users (SUs) are allowed to access the spectrum. This paper discusses the Spectrum Sensing in a Very Small Aperture Terminal (VSAT) network by using CR technology which is a new approach in this area. Also, this work will serve as a forerunner for future developments in this domain. VSATs are terminals that communicate with one another through satellite. Applying CR technology in VSATs, spectrum sensing can be performed to detect the spectrum holes where SUs can be accommodated. The spectrum holes are identified in the spectral domain using Fast Fourier Transform (FFT). The simulation results show the retrieved indices of spectrum holes, where SUs are to be accommodated.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121823568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development, Analysis and Evaluation of Arsenic (III) Sensor 砷(III)传感器的研制、分析与评价
H. R, S. M.
Pollution or contamination plays a major part in dreadful health hazards. Water, the most essential entity for life is being consumed without the knowledge of contaminants. Arsenic (As III) above 10µg/L is regarded to be poisonous to life and causes lung or skin cancer and cardiovascular geotaxis, mutagenic &carcinogenicc effects. Contamination of As may not only occurs in under or drinking water but also in sea water which may be a health threat to aquatic lives. Arsenic decontamination need to be strictly adopted upon any form of water purification. A special technique for the determination by express sensing of arsenic ionic level in water was examined on a Smooth or Glassy carbon electrode (GCE) with nano Gold transformation in 0.5 M H2SO4. The nano Gold was setup using a cycling potential continuously ranging from 0.619 to-0.481 V (vs. HAuCl4.3H2O) Chloro Auric Acid in 0.5 M H2SO4 solution. The Gold nano particles are electro-deposited on GCE. The electrode was examined by Differential Pulse Voltammetry (DPV), Anodic Stripping Voltammetry (ASV), Linear Sweep Voltammetry (LSV) and cyclic Voltammetry (CV). After optimization, a LOD (Level Of Detection) of 0.9 parts per billion (ppb) was achieved with a 60s transformation at −0.94 V in 0.5 M H2SO4whereas the WHO’s (World Health Organization) maximum allowable arsenic level is 10 ppb, in drinking water. Mercury Mercurious Sulphate (MMS) was used as standard reference electrode. The developed sensor was evaluated for copper ion interference and was found to have no interfering effect due to ionic copper which is the most potential obstructing ionic species in ionic arsenic determination.
污染或污染在可怕的健康危害中起着重要作用。水,生命最基本的实体,在不知道污染物的情况下被消耗。砷(As III)超过10 μ g/L被认为是对生命有毒的,并导致肺癌或皮肤癌和心血管的地致性,致突变和致癌作用。砷污染不仅可能发生在地下水或饮用水中,也可能发生在海水中,这可能对水生生物的健康构成威胁。任何形式的水净化都需要严格采用砷净化。研究了在0.5 M H2SO4中纳米金转化的光滑碳或玻碳电极(GCE)上快速测定水中砷离子水平的特殊技术。在0.5 M H2SO4溶液中,使用0.619 ~ 0.481 V (vs. HAuCl4.3H2O)氯金酸连续循环电位建立纳米金。将金纳米颗粒电沉积在GCE上。采用差分脉冲伏安法(DPV)、阳极溶出伏安法(ASV)、线性扫描伏安法(LSV)和循环伏安法(CV)对电极进行检测。优化后,在- 0.94 V条件下,在0.5 M h2so4中进行60秒的转化,LOD(检测水平)达到了十亿分之0.9 (ppb),而WHO(世界卫生组织)在饮用水中允许的最大砷含量为10 ppb。以硫酸汞(MMS)为标准参比电极。对所研制的传感器进行了铜离子干扰评价,发现铜离子是离子砷测定中最潜在的阻碍离子,对传感器无干扰作用。
{"title":"Development, Analysis and Evaluation of Arsenic (III) Sensor","authors":"H. R, S. M.","doi":"10.1109/ICIICT1.2019.8741476","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741476","url":null,"abstract":"Pollution or contamination plays a major part in dreadful health hazards. Water, the most essential entity for life is being consumed without the knowledge of contaminants. Arsenic (As III) above 10µg/L is regarded to be poisonous to life and causes lung or skin cancer and cardiovascular geotaxis, mutagenic &carcinogenicc effects. Contamination of As may not only occurs in under or drinking water but also in sea water which may be a health threat to aquatic lives. Arsenic decontamination need to be strictly adopted upon any form of water purification. A special technique for the determination by express sensing of arsenic ionic level in water was examined on a Smooth or Glassy carbon electrode (GCE) with nano Gold transformation in 0.5 M H2SO4. The nano Gold was setup using a cycling potential continuously ranging from 0.619 to-0.481 V (vs. HAuCl4.3H2O) Chloro Auric Acid in 0.5 M H2SO4 solution. The Gold nano particles are electro-deposited on GCE. The electrode was examined by Differential Pulse Voltammetry (DPV), Anodic Stripping Voltammetry (ASV), Linear Sweep Voltammetry (LSV) and cyclic Voltammetry (CV). After optimization, a LOD (Level Of Detection) of 0.9 parts per billion (ppb) was achieved with a 60s transformation at −0.94 V in 0.5 M H2SO4whereas the WHO’s (World Health Organization) maximum allowable arsenic level is 10 ppb, in drinking water. Mercury Mercurious Sulphate (MMS) was used as standard reference electrode. The developed sensor was evaluated for copper ion interference and was found to have no interfering effect due to ionic copper which is the most potential obstructing ionic species in ionic arsenic determination.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reforming Cyber Security with Coding 用编码改革网络安全
M. Shilpa, Er. Rahul Sharma, Ms. Sonam, Mr. Sartaj Singh
Today, a large number of transactions and data exchanged over internet through different data transaction layers among network. There is need to put a security or some patches to private data among military, commercial or financial sector. A number of cryptographic methods have recently proposed and implemented because of strong demand for encryption and decryption process against cyber-attacks. Most recent encrypting or encoding methods include many iterations and substitution processes to encounter some issues such as lack of robustness and valuable amount of time. In our proposed research, we introduce method based upon idea of encoding with programming to achieve cyber security. We use ASCII to build an encoding table with different way to enhance security and save cost and time.
今天,大量的交易和数据在互联网上通过不同的数据交易层在网络之间交换。有必要对军事、商业或金融部门的私人数据设置安全或一些补丁。由于对加密和解密过程抵御网络攻击的强烈需求,近年来提出并实现了许多加密方法。大多数最新的加密或编码方法包括许多迭代和替换过程,从而遇到一些问题,例如缺乏健壮性和宝贵的时间。在我们的研究中,我们引入了基于编码与编程思想的方法来实现网络安全。采用ASCII码构建不同方式的编码表,提高了安全性,节约了成本和时间。
{"title":"Reforming Cyber Security with Coding","authors":"M. Shilpa, Er. Rahul Sharma, Ms. Sonam, Mr. Sartaj Singh","doi":"10.1109/ICIICT1.2019.8741407","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741407","url":null,"abstract":"Today, a large number of transactions and data exchanged over internet through different data transaction layers among network. There is need to put a security or some patches to private data among military, commercial or financial sector. A number of cryptographic methods have recently proposed and implemented because of strong demand for encryption and decryption process against cyber-attacks. Most recent encrypting or encoding methods include many iterations and substitution processes to encounter some issues such as lack of robustness and valuable amount of time. In our proposed research, we introduce method based upon idea of encoding with programming to achieve cyber security. We use ASCII to build an encoding table with different way to enhance security and save cost and time.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on Breast Cancer Based on Extreme Learning Machine Features 基于极限学习机特征的乳腺癌调查
Zhiqiong Wangi, Hanyu Jiang
Extreme Learning Machine algorithm which it is an optimization based learning framework for compression, feature, clustering, regression and classification. It is an artificial hidden nodes and proposed to overcome these issues and offer better generalization performance by Unique minimum solution. In this paper Computer-aided diagnosis (CAD) based on Convolutional Neural Network (CNN) feature and they are based on deep, morphological, texture and density features. Mammography concept is been more used and to detect early stage of breast cancer and can helps out whether they are Malignant or Benign in CAD system they are classified by normal or abnormal tissue with the help of mammography images. The main objective of this paper is to detect the stage of breast cancer tissue is harmful or not in this algorithm.
极限学习机算法,它是一个基于优化的学习框架,用于压缩、特征、聚类、回归和分类。为了克服这些问题,提出了一种人工隐藏节点,并通过唯一最小解提供更好的泛化性能。本文介绍了基于卷积神经网络(CNN)特征的计算机辅助诊断(CAD),它们基于深度特征、形态特征、纹理特征和密度特征。乳房x线摄影的概念被更多地用于早期发现乳腺癌,可以帮助CAD系统判断其是恶性还是良性,通过乳房x线摄影图像来区分正常或异常组织。本文的主要目的是在该算法中检测乳腺癌组织的阶段是有害的还是无害的。
{"title":"Survey on Breast Cancer Based on Extreme Learning Machine Features","authors":"Zhiqiong Wangi, Hanyu Jiang","doi":"10.1109/ICIICT1.2019.8741497","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741497","url":null,"abstract":"Extreme Learning Machine algorithm which it is an optimization based learning framework for compression, feature, clustering, regression and classification. It is an artificial hidden nodes and proposed to overcome these issues and offer better generalization performance by Unique minimum solution. In this paper Computer-aided diagnosis (CAD) based on Convolutional Neural Network (CNN) feature and they are based on deep, morphological, texture and density features. Mammography concept is been more used and to detect early stage of breast cancer and can helps out whether they are Malignant or Benign in CAD system they are classified by normal or abnormal tissue with the help of mammography images. The main objective of this paper is to detect the stage of breast cancer tissue is harmful or not in this algorithm.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"5 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Compact-Circular Monopole UWB Antenna with Dual Notch Bands 双陷波带紧凑圆形单极超宽带天线的设计
P. S, M. C, Esther Florence S
A current UWB antenna with compact-circular monopole UWB antenna support by a microstrip line with a semi-rectangular ground plane is given in this paper to realize an operating bandwidth from 3.3GHz to 12GHz. Low-cost FR4-lossy material with a dimension of 12mm×18mm×1.6mm has taken place used to design the antenna. The proposed antenna is incorporated with L-shape complimentary slots with discontinuities. The I-shape slots are placed in such that the discontinuities face in the feed line and it will generate a static resonance which is the reason for the dual notch bands covering the frequency ranges of WiMAX and WLAN.
本文给出了一种采用半矩形接平面微带线支撑的紧凑圆形单极超宽带天线的电流超宽带天线,其工作带宽从3.3GHz到12GHz。尺寸为12mm×18mm×1.6mm的低成本fr4损耗材料已被用于设计天线。所提出的天线结合了具有不连续的l形互补槽。i型槽的位置使得不连续面朝向馈线,它会产生静态共振,这就是WiMAX和WLAN的双陷波带覆盖频率范围的原因。
{"title":"Design of Compact-Circular Monopole UWB Antenna with Dual Notch Bands","authors":"P. S, M. C, Esther Florence S","doi":"10.1109/ICIICT1.2019.8741500","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741500","url":null,"abstract":"A current UWB antenna with compact-circular monopole UWB antenna support by a microstrip line with a semi-rectangular ground plane is given in this paper to realize an operating bandwidth from 3.3GHz to 12GHz. Low-cost FR4-lossy material with a dimension of 12mm×18mm×1.6mm has taken place used to design the antenna. The proposed antenna is incorporated with L-shape complimentary slots with discontinuities. The I-shape slots are placed in such that the discontinuities face in the feed line and it will generate a static resonance which is the reason for the dual notch bands covering the frequency ranges of WiMAX and WLAN.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Garbage Monitoring System 基于物联网的垃圾监控系统
S. Chandra, G. Sravanthi, B. Prasanthi, V. R
In the recent spans of years, Urbanization has inflated terribly nice in size and there's a rise in waste production. Waste management has been a typical issue to be thought of. during this paper, sensible bin is constructed with ARM microcontroller that is interfaced With UART and IR sensors. IR sensors square measure placed at each ends of trash bin. They work under AND operation. When the dust bin is filled message will be sent to the respective mobile displaying "Garbage is filled". It ceaselessly alerts the specified authority till the rubbish within the garbage can is press. Once the garbage can is press, individuals will recycle the garbage can. Once these dustbins are enforced on an outsized scale, by substitution ancient bins, waste will be re-used expeditiously and avoids gratuitous lumping of wastes on road aspect. Foul smell from these rotten wastes that remained untreated for while, because of neglectfulness of authorities and public could cause sturdy issues. Breeding of insects and mosquitoes will produce nuisance around promoting unclean atmosphere. this might even cause dreadful diseases.
在最近的几年里,城市化的规模膨胀得非常大,废物的产生也在增加。废物管理一直是一个需要考虑的典型问题。本文采用ARM微控制器与UART和红外传感器相连接,构建了感应箱。红外传感器方形测量放置在垃圾桶的两端。它们在AND操作下工作。当垃圾桶被填满时,将发送消息到相应的手机显示“垃圾被填满”。它不断地向指定的当局发出警报,直到垃圾桶内的垃圾被压满。一旦按下垃圾桶,个人就会回收垃圾桶。一旦这些垃圾桶被大规模实施,取代旧的垃圾桶,废物将被迅速再利用,避免不必要的垃圾堆积在道路上。由于当局和公众的疏忽,这些腐烂的废物在一段时间内没有得到处理,散发出恶臭,可能会引起严重的问题。昆虫和蚊子孳生,会对周围环境造成滋扰,造成空气不洁净。这甚至可能导致可怕的疾病。
{"title":"IoT Based Garbage Monitoring System","authors":"S. Chandra, G. Sravanthi, B. Prasanthi, V. R","doi":"10.1109/ICIICT1.2019.8741414","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741414","url":null,"abstract":"In the recent spans of years, Urbanization has inflated terribly nice in size and there's a rise in waste production. Waste management has been a typical issue to be thought of. during this paper, sensible bin is constructed with ARM microcontroller that is interfaced With UART and IR sensors. IR sensors square measure placed at each ends of trash bin. They work under AND operation. When the dust bin is filled message will be sent to the respective mobile displaying \"Garbage is filled\". It ceaselessly alerts the specified authority till the rubbish within the garbage can is press. Once the garbage can is press, individuals will recycle the garbage can. Once these dustbins are enforced on an outsized scale, by substitution ancient bins, waste will be re-used expeditiously and avoids gratuitous lumping of wastes on road aspect. Foul smell from these rotten wastes that remained untreated for while, because of neglectfulness of authorities and public could cause sturdy issues. Breeding of insects and mosquitoes will produce nuisance around promoting unclean atmosphere. this might even cause dreadful diseases.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124898452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced Performance of Cryptographic Mechanism using Randomized Generation Technique for Secure Transmission of Data 利用随机生成技术提高数据安全传输的加密机制性能
Pallab Banerjee, Vijendra Kumar, R. Raj
The rapid growth of electronic devices depending on the internet has solved many problems that the humans were facing. The major challenge is “To transmit secure data over the network and to assure its confidentiality, integrity and availability”. The solution is to transfer encrypted data over the network to prevent its unauthorized identification, modification, destruction etc. A new proposed encryption and decryption algorithm has been designed in this paper, in which the data is mathematically scrambled to a form such that the original data is surrounded by a set of randomly generated alphabets. The encrypted format is based on the collection of ASCII codes. This form is used to transfer the data over the insecure network channels.
依赖互联网的电子设备的快速增长解决了人类面临的许多问题。主要的挑战是“通过网络传输安全的数据,并确保其保密性、完整性和可用性”。解决方案是通过网络传输加密数据,以防止未经授权的识别、修改、破坏等。本文设计了一种新的加密和解密算法,该算法将原始数据用数学方法进行置乱,使原始数据被一组随机生成的字母包围。加密格式是基于ASCII码的集合。此表单用于在不安全的网络通道上传输数据。
{"title":"Enhanced Performance of Cryptographic Mechanism using Randomized Generation Technique for Secure Transmission of Data","authors":"Pallab Banerjee, Vijendra Kumar, R. Raj","doi":"10.1109/ICIICT1.2019.8741408","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741408","url":null,"abstract":"The rapid growth of electronic devices depending on the internet has solved many problems that the humans were facing. The major challenge is “To transmit secure data over the network and to assure its confidentiality, integrity and availability”. The solution is to transfer encrypted data over the network to prevent its unauthorized identification, modification, destruction etc. A new proposed encryption and decryption algorithm has been designed in this paper, in which the data is mathematically scrambled to a form such that the original data is surrounded by a set of randomly generated alphabets. The encrypted format is based on the collection of ASCII codes. This form is used to transfer the data over the insecure network channels.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Recommendation System Based on Human Interest 基于人类兴趣的视频推荐系统
Shainee Jain, Tejaswi Pawar, Heth Shah, Omkar Morye, B. Patil
In today’s world watching online videos have become a popular trend and a daily habit of our new generation. Videos are a reliable source for gaining knowledge and it is easier to grasp information through videos than reading. The internet is flooded with billions of videos hence it is a time consuming task for user to find a relevant video. So to save time as well as efforts there is a necessity to build a strong, efficient and accurate recommendation system which will display appropriate videos for the users. Video recommendation system saves users from browsing lots of videos to choose the appropriate ones, and on the other hand, it also brings the video websites more network traffic and user stickiness. The main task of the system is to provide personalized recommendations using Web Crawler, Rating Factor Neural Network, Slope one, and Slope one based Map Reduce of two types, one is Content-based filtering, and the other is Collaborative Filtering. Presentation of recommendations is an important part of the overall user experience. Video recommendation algorithm is the core of the system. The proposed paper is about the system which allows user to search for their favorite videos and the system recommends videos relevant to their choice.
在当今世界,观看在线视频已经成为一种流行趋势和我们新一代的日常习惯。视频是获取知识的可靠来源,通过视频比阅读更容易掌握信息。互联网上充斥着数十亿的视频,因此用户找到相关视频是一项耗时的任务。因此,为了节省时间和精力,有必要建立一个强大、高效、准确的推荐系统,为用户展示合适的视频。视频推荐系统使用户不必浏览大量视频来选择合适的视频,另一方面也为视频网站带来了更多的网络流量和用户粘性。系统的主要任务是利用网络爬虫、评级因子神经网络、斜率一和基于斜率一的地图约简两种类型提供个性化推荐,一种是基于内容的过滤,另一种是协同过滤。推荐的呈现是整个用户体验的重要组成部分。视频推荐算法是系统的核心。提出的论文是关于一个允许用户搜索他们喜欢的视频并推荐与他们选择相关的视频的系统。
{"title":"Video Recommendation System Based on Human Interest","authors":"Shainee Jain, Tejaswi Pawar, Heth Shah, Omkar Morye, B. Patil","doi":"10.1109/ICIICT1.2019.8741428","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741428","url":null,"abstract":"In today’s world watching online videos have become a popular trend and a daily habit of our new generation. Videos are a reliable source for gaining knowledge and it is easier to grasp information through videos than reading. The internet is flooded with billions of videos hence it is a time consuming task for user to find a relevant video. So to save time as well as efforts there is a necessity to build a strong, efficient and accurate recommendation system which will display appropriate videos for the users. Video recommendation system saves users from browsing lots of videos to choose the appropriate ones, and on the other hand, it also brings the video websites more network traffic and user stickiness. The main task of the system is to provide personalized recommendations using Web Crawler, Rating Factor Neural Network, Slope one, and Slope one based Map Reduce of two types, one is Content-based filtering, and the other is Collaborative Filtering. Presentation of recommendations is an important part of the overall user experience. Video recommendation algorithm is the core of the system. The proposed paper is about the system which allows user to search for their favorite videos and the system recommends videos relevant to their choice.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1