首页 > 最新文献

2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

英文 中文
Analysis based on Different Optimization Algorithms for Landslide Detection 基于不同优化算法的滑坡检测分析
Lijesh L, G. Saroja
The discovery of landslides is essential process in hazard and risk studies and has acquired immense focus among scientists in upcoming years. Remote sensing is an economical solution for detecting landslides and updating classical landslide databases, but discovering landslides in remote sensing data is complex and needs enhancements. The current studies reveal that the deep models enhance the landslide mapping outcomes compared to classical machine learning models. This paper presents the comparative assessment of landslide detection using different optimization algorithms to examine and justify the efficiency of landslide detection. The deep residual network (DRN) is adapted in the process of landslide detection and evaluation will be performed with various optimization algorithms, such as Competitive swarm Optimizer (CSO), Tunicate Swarm Algorithm (TSA), Particle Swarm Optimization (PSO), Water cycle algorithm (WCA), Grey Wolf Optimizer (GWO). The WCPSO-based DRN outperformed with utmost accuracy of 0.964, sensitivity of 0.980 and specificity of 0.943.
滑坡的发现是灾害和风险研究的重要环节,近年来已成为科学家关注的焦点。遥感是一种经济的滑坡检测和更新经典滑坡数据库的解决方案,但在遥感数据中发现滑坡是复杂的,需要改进。目前的研究表明,与经典的机器学习模型相比,深度模型提高了滑坡制图结果。本文对不同优化算法的滑坡检测效果进行了比较评价,以检验和证明滑坡检测的有效性。将深度残差网络(DRN)应用于滑坡检测和评价过程中,将采用各种优化算法,如竞争群优化算法(CSO)、束状群算法(TSA)、粒子群优化算法(PSO)、水循环算法(WCA)、灰狼优化算法(GWO)等。基于wcpso的DRN的最高准确率为0.964,灵敏度为0.980,特异性为0.943。
{"title":"Analysis based on Different Optimization Algorithms for Landslide Detection","authors":"Lijesh L, G. Saroja","doi":"10.1109/ICCT56969.2023.10075907","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075907","url":null,"abstract":"The discovery of landslides is essential process in hazard and risk studies and has acquired immense focus among scientists in upcoming years. Remote sensing is an economical solution for detecting landslides and updating classical landslide databases, but discovering landslides in remote sensing data is complex and needs enhancements. The current studies reveal that the deep models enhance the landslide mapping outcomes compared to classical machine learning models. This paper presents the comparative assessment of landslide detection using different optimization algorithms to examine and justify the efficiency of landslide detection. The deep residual network (DRN) is adapted in the process of landslide detection and evaluation will be performed with various optimization algorithms, such as Competitive swarm Optimizer (CSO), Tunicate Swarm Algorithm (TSA), Particle Swarm Optimization (PSO), Water cycle algorithm (WCA), Grey Wolf Optimizer (GWO). The WCPSO-based DRN outperformed with utmost accuracy of 0.964, sensitivity of 0.980 and specificity of 0.943.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State-Of- The-Art and Research Challenges in Task Scheduling and Resource Allocation Methods for Cloud-Fog Environment 云雾环境下任务调度与资源分配方法的研究现状与挑战
P. Mishra, A. Chaturvedi
When numerous users require a variety of resources to be made available as a service over the internet, fog computing creates an extremely efficient computing environment. It is essential to consume the available resources in fruitful manner in such a way that time must be minimize to execute tasks. Task scheduling is the element of the fog computing environment that is most important and critical. In task scheduling, certain tasks are assigned to specific resources at specific times. To address the issues with task scheduling; various results are suggested. In a fog computing environment, several task scheduling strategies are examined in this paper. To provide a thorough summary of the task scheduling along with resource allocation research that has been done as well as outstanding problems that will be dealt with in the future. This study analyzes current research on task distribution in fog environment. Our paper presents the analysis of job scheduling approaches on the basis of type, categories, execution status & parameters used by numerous researchers.
当众多用户需要在互联网上以服务的形式提供各种资源时,雾计算创建了一个极其高效的计算环境。必须以富有成效的方式消耗可用的资源,这样才能最大限度地减少执行任务的时间。任务调度是雾计算环境中最重要、最关键的元素。在任务调度中,将特定的任务在特定的时间分配给特定的资源。解决任务调度问题;提出了各种结果。在雾计算环境下,研究了几种任务调度策略。对任务调度和资源分配的研究进行了全面的总结,并提出了今后需要解决的突出问题。本文分析了雾环境下任务分配的研究现状。本文在分析前人常用的作业调度方法的基础上,对作业调度方法的类型、类别、执行状态和参数进行了分析。
{"title":"State-Of- The-Art and Research Challenges in Task Scheduling and Resource Allocation Methods for Cloud-Fog Environment","authors":"P. Mishra, A. Chaturvedi","doi":"10.1109/ICCT56969.2023.10076030","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076030","url":null,"abstract":"When numerous users require a variety of resources to be made available as a service over the internet, fog computing creates an extremely efficient computing environment. It is essential to consume the available resources in fruitful manner in such a way that time must be minimize to execute tasks. Task scheduling is the element of the fog computing environment that is most important and critical. In task scheduling, certain tasks are assigned to specific resources at specific times. To address the issues with task scheduling; various results are suggested. In a fog computing environment, several task scheduling strategies are examined in this paper. To provide a thorough summary of the task scheduling along with resource allocation research that has been done as well as outstanding problems that will be dealt with in the future. This study analyzes current research on task distribution in fog environment. Our paper presents the analysis of job scheduling approaches on the basis of type, categories, execution status & parameters used by numerous researchers.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124458200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Wireless Communication Protocols for use in Smart Farming Framework Development 用于智能农业框架开发的无线通信协议的比较研究
Sandeep Bhatia, Z. Jaffery, S. Mehfuz
Over the last few years, the design and development of smart agriculture systems have been an important and emerging concept. Through various smart farming approaches, better crop yield can be achieved and output can be enhanced as well. Internet of things is an emerging concept that gives smart solutions for the implementation of various applications. Integration of IoT with WSN gives a cost-effective solution for increased productivity. IoT-enabled smart farming is a very efficient approach when compared with conventional techniques and methods IoT-WSN-based solutions are being used to monitor agricultural land with minimal human involvement. Many existing wireless protocols are already available, such as Wi-Fi, LoRa WAN, Wi-MAX, LR-WPAN, BLE (Bluetooth low energy), RFID, MQTT, Zigbee and Sigfox etc. This paper gives a review study of the comparison of existing wireless protocols and their effect on the IoT-WSN-enabled implementation of smart farming. It describes the primary components of the smart farming IoT-WSN model. It shows various features of different technologies implied in the IoT-based farming techniques. A rigorous analysis of existing wireless protocols used in IoT-WSN based smart farming has been presented and a detailed view of the role of relevant technologies and present protocols in smart farming is discussed in this paper. The Paper describes the representation of the basic energy consumption states for LoRa WAN, Zigbee, Sigfox, and NB-IoT end-device. This paper highlights the impact of energy-efficient LoRa WAN technology and the proposed WSN-IoT model for implementation.
在过去的几年里,智能农业系统的设计和开发已经成为一个重要的新兴概念。通过各种智能农业方法,可以实现更好的作物产量,也可以提高产量。物联网是一个新兴的概念,它为各种应用的实现提供了智能的解决方案。物联网与WSN的集成为提高生产力提供了经济高效的解决方案。与传统技术和方法相比,基于物联网的智能农业是一种非常有效的方法,基于物联网的解决方案被用于监测农业用地,而人工参与最少。许多现有的无线协议已经可用,如Wi-Fi, LoRa WAN, Wi-MAX, LR-WPAN, BLE(低功耗蓝牙),RFID, MQTT, Zigbee和Sigfox等。本文对现有无线协议的比较及其对支持iot - wsn的智能农业实施的影响进行了综述研究。它描述了智能农业物联网- wsn模型的主要组成部分。它展示了基于物联网的农业技术中隐含的不同技术的各种特征。本文对基于IoT-WSN的智能农业中使用的现有无线协议进行了严格分析,并详细讨论了相关技术和现有协议在智能农业中的作用。本文描述了LoRa WAN、Zigbee、Sigfox和NB-IoT终端设备的基本能耗状态表示。本文重点介绍了节能LoRa WAN技术的影响以及提出的WSN-IoT模型的实施。
{"title":"A Comparative Study of Wireless Communication Protocols for use in Smart Farming Framework Development","authors":"Sandeep Bhatia, Z. Jaffery, S. Mehfuz","doi":"10.1109/ICCT56969.2023.10075696","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075696","url":null,"abstract":"Over the last few years, the design and development of smart agriculture systems have been an important and emerging concept. Through various smart farming approaches, better crop yield can be achieved and output can be enhanced as well. Internet of things is an emerging concept that gives smart solutions for the implementation of various applications. Integration of IoT with WSN gives a cost-effective solution for increased productivity. IoT-enabled smart farming is a very efficient approach when compared with conventional techniques and methods IoT-WSN-based solutions are being used to monitor agricultural land with minimal human involvement. Many existing wireless protocols are already available, such as Wi-Fi, LoRa WAN, Wi-MAX, LR-WPAN, BLE (Bluetooth low energy), RFID, MQTT, Zigbee and Sigfox etc. This paper gives a review study of the comparison of existing wireless protocols and their effect on the IoT-WSN-enabled implementation of smart farming. It describes the primary components of the smart farming IoT-WSN model. It shows various features of different technologies implied in the IoT-based farming techniques. A rigorous analysis of existing wireless protocols used in IoT-WSN based smart farming has been presented and a detailed view of the role of relevant technologies and present protocols in smart farming is discussed in this paper. The Paper describes the representation of the basic energy consumption states for LoRa WAN, Zigbee, Sigfox, and NB-IoT end-device. This paper highlights the impact of energy-efficient LoRa WAN technology and the proposed WSN-IoT model for implementation.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122425799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Technique to Detect URL Phishing based on Feature Count 一种基于特征计数的URL钓鱼检测新技术
Vedanti Dantwala, Rishi Lakhani, N. Shekokar
The advent of internet access to people across the globe, increasing levels of connectivity, remote employment, de-pendence on technology, and automation have presented a rapid rise in cybercrime. There are numerous methods of cybercrime that are frequently used, with phishing being the most significant. Various algorithms have been proposed to classify malicious and legitimate URLs, blacklisting and whitelisting algorithms being the oldest, used for computer security. But these algorithms are time-consuming and involve human labor. Hence, machine learning algorithms were incorporated to improve the effectiveness of classifying URLs. Recent research includes detecting phishing URLs using machine learning classifiers but the accurate classification is a long-term goal. This paper focuses on evaluating models for classifying URLs using different feature counts and deriving a specific model to provide good enough classification with less time complexity.
互联网在全球范围内的普及、连接水平的提高、远程就业、对技术的依赖以及自动化都导致了网络犯罪的迅速上升。有许多经常使用的网络犯罪方法,其中网络钓鱼是最重要的。已经提出了各种算法来分类恶意和合法的url,黑名单和白名单算法是最古老的,用于计算机安全。但这些算法耗时且涉及人力。因此,采用机器学习算法来提高url分类的有效性。最近的研究包括使用机器学习分类器检测网络钓鱼url,但准确分类是一个长期目标。本文的重点是评估使用不同特征计数的url分类模型,并推导出一个特定的模型,以提供足够好的分类和更少的时间复杂度。
{"title":"A Novel Technique to Detect URL Phishing based on Feature Count","authors":"Vedanti Dantwala, Rishi Lakhani, N. Shekokar","doi":"10.1109/ICCT56969.2023.10075943","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075943","url":null,"abstract":"The advent of internet access to people across the globe, increasing levels of connectivity, remote employment, de-pendence on technology, and automation have presented a rapid rise in cybercrime. There are numerous methods of cybercrime that are frequently used, with phishing being the most significant. Various algorithms have been proposed to classify malicious and legitimate URLs, blacklisting and whitelisting algorithms being the oldest, used for computer security. But these algorithms are time-consuming and involve human labor. Hence, machine learning algorithms were incorporated to improve the effectiveness of classifying URLs. Recent research includes detecting phishing URLs using machine learning classifiers but the accurate classification is a long-term goal. This paper focuses on evaluating models for classifying URLs using different feature counts and deriving a specific model to provide good enough classification with less time complexity.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of GPS-GSM Based Intelligent Speed Assistance Systems: Development and Research Opportunities 基于GPS-GSM的智能速度辅助系统综述:发展与研究机遇
Abdulsalam Ya'u Gital, Mahmood Abdulhamid, M. Abdulhameed, F. Zambuk, Musa Nehemiah, Mustapha Abdulrahman Lawal, Zahraddeen Ismail Yakubu
About two billion passenger cars travel the roads of the world and this is projected to double by the year 2050. This calls for the need to create real time surveillance systems to manage the impending dangers of on-road traffic and to meet the objective of intelligent transport systems (ITS). Nowadays, speed control and monitoring is mostly handled using speed law enforcement measures, such as speed bumps, speed limits, signs, speed guns, road designs, speed cameras and intelligent speed assistance (ISA). Previous surveys have not given enough attention to the application of Global Positioning System (GPS) combined with Global System for Mobile Communication (GSM) based ISA systems with respect to their types. To fill this gap, this review aims to study the different development and applications of GPS and GSM based ISA systems with the focus on their types, technology and analysis environment. Although, the development of ISA systems is not recent, the full potentials of using ISA systems are still a persistent pursuit. The study concludes by highlighting limitations and research opportunities mined from the reviewed papers to enable improvements and novel researches from the ITS research community and vehicle manufacturers' companies.
世界上大约有20亿辆乘用车,预计到2050年这一数字将翻一番。这就要求有必要建立实时监视系统,以管理道路交通迫在眉睫的危险,并实现智能运输系统(ITS)的目标。现时,车速管制和监察主要是使用速度执法措施,例如减速带、速度限制、标志、测速枪、道路设计、测速摄影机和智能测速辅助系统(ISA)。以往的调查对全球定位系统(GPS)与基于全球移动通信系统(GSM)的ISA系统的结合应用在其类型上的关注不够。为了填补这一空白,本文综述了基于GPS和GSM的ISA系统的不同发展和应用,重点介绍了它们的类型、技术和分析环境。虽然,ISA系统的发展不是最近的,但充分利用ISA系统的潜力仍然是一个坚持不懈的追求。该研究最后强调了从审查论文中挖掘的局限性和研究机会,以促进ITS研究界和汽车制造商公司的改进和新研究。
{"title":"Review of GPS-GSM Based Intelligent Speed Assistance Systems: Development and Research Opportunities","authors":"Abdulsalam Ya'u Gital, Mahmood Abdulhamid, M. Abdulhameed, F. Zambuk, Musa Nehemiah, Mustapha Abdulrahman Lawal, Zahraddeen Ismail Yakubu","doi":"10.1109/ICCT56969.2023.10076115","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076115","url":null,"abstract":"About two billion passenger cars travel the roads of the world and this is projected to double by the year 2050. This calls for the need to create real time surveillance systems to manage the impending dangers of on-road traffic and to meet the objective of intelligent transport systems (ITS). Nowadays, speed control and monitoring is mostly handled using speed law enforcement measures, such as speed bumps, speed limits, signs, speed guns, road designs, speed cameras and intelligent speed assistance (ISA). Previous surveys have not given enough attention to the application of Global Positioning System (GPS) combined with Global System for Mobile Communication (GSM) based ISA systems with respect to their types. To fill this gap, this review aims to study the different development and applications of GPS and GSM based ISA systems with the focus on their types, technology and analysis environment. Although, the development of ISA systems is not recent, the full potentials of using ISA systems are still a persistent pursuit. The study concludes by highlighting limitations and research opportunities mined from the reviewed papers to enable improvements and novel researches from the ITS research community and vehicle manufacturers' companies.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124713522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Detailed Investigation of Wireless Sensor Network Energy Harvesting Schemes to Maximize Lifetime of Sensor Nodes 最大化传感器节点寿命的无线传感器网络能量收集方案详细研究
Hardeep Singh Dhillon, Kuldip Kumar, Paras Chawla
For many years, energy harvesting wireless sensor networks (EH-WSNs) development and implementation have been an important and emerging concept in developing technology, considering various EH techniques. This paper includes an investigation of EH-WSN schemes and discussion on various parameters like latency, network size, network density, distance, throughput, lifetime, power consumption, and efficiency related to different energy harvesting schemes. The proposed model demonstrates EH-WSN schemes using different techniques. This paper represents a comparison of various energy harvesting schemes in terms of nodes power consumption. This paper discusses the characteristics and attributes of energy harvesting wireless sensor networks (EH-WSNs). There are several methods to save energy in EH-WSN but they are based on static approach of sensor nodes so we use dynamic approach to minimize energy consumption of wireless sensor nodes. Our primary objective is to maximize lifetime of sensor nodes by minimize the average power consumption. We focus on maximum utilization of node battery, effective distribution of power from the energy harvester to reduce distance between cluster head and source of power. This paper is also highlights the challenges of EH-WSN and technical specifications of various energy harvesting systems. The proposed EH-WSN model replenished the sensor node battery recharging after they become out of service in an efficient way. For this purpose we will use mobile charger which travels to cluster head and provide energy. This article concludes on the compatible EH-WSNs scheme should be used to enhance system efficiency and focus on practical real-life applications of WSN based EH.
多年来,能量收集无线传感器网络(EH- wsns)的开发和实现一直是发展技术中一个重要的新兴概念,考虑到各种EH技术。本文包括对EH-WSN方案的研究,并讨论了与不同能量收集方案相关的各种参数,如延迟、网络大小、网络密度、距离、吞吐量、寿命、功耗和效率。提出的模型演示了使用不同技术的EH-WSN方案。本文从节点功耗的角度对各种能量收集方案进行了比较。本文讨论了能量采集无线传感器网络(EH-WSNs)的特点和属性。EH-WSN有几种节能方法,但它们都是基于传感器节点的静态方法,因此我们采用动态方法来最小化无线传感器节点的能耗。我们的主要目标是通过最小化平均功耗来最大化传感器节点的使用寿命。我们的重点是最大限度地利用节点电池,有效地分配能量采集器的功率,以减少簇头和电源之间的距离。本文还重点介绍了EH-WSN面临的挑战和各种能量收集系统的技术规范。提出的EH-WSN模型能够有效地补充传感器节点电池失效后的充电。为此,我们将使用移动充电器,它移动到簇头并提供能量。本文总结了为提高系统效率应采用的兼容EH- wsns方案,并重点介绍了基于WSN的EH的实际应用。
{"title":"A Detailed Investigation of Wireless Sensor Network Energy Harvesting Schemes to Maximize Lifetime of Sensor Nodes","authors":"Hardeep Singh Dhillon, Kuldip Kumar, Paras Chawla","doi":"10.1109/ICCT56969.2023.10075842","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075842","url":null,"abstract":"For many years, energy harvesting wireless sensor networks (EH-WSNs) development and implementation have been an important and emerging concept in developing technology, considering various EH techniques. This paper includes an investigation of EH-WSN schemes and discussion on various parameters like latency, network size, network density, distance, throughput, lifetime, power consumption, and efficiency related to different energy harvesting schemes. The proposed model demonstrates EH-WSN schemes using different techniques. This paper represents a comparison of various energy harvesting schemes in terms of nodes power consumption. This paper discusses the characteristics and attributes of energy harvesting wireless sensor networks (EH-WSNs). There are several methods to save energy in EH-WSN but they are based on static approach of sensor nodes so we use dynamic approach to minimize energy consumption of wireless sensor nodes. Our primary objective is to maximize lifetime of sensor nodes by minimize the average power consumption. We focus on maximum utilization of node battery, effective distribution of power from the energy harvester to reduce distance between cluster head and source of power. This paper is also highlights the challenges of EH-WSN and technical specifications of various energy harvesting systems. The proposed EH-WSN model replenished the sensor node battery recharging after they become out of service in an efficient way. For this purpose we will use mobile charger which travels to cluster head and provide energy. This article concludes on the compatible EH-WSNs scheme should be used to enhance system efficiency and focus on practical real-life applications of WSN based EH.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131598929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Beamforming for Intelligent Reflecting Surface Assisted MISO Wireless Communications 智能反射面辅助MISO无线通信的安全波束形成
R. Kaur, Bajrang Bansal
This paper provides a method to provide physical layer security (PLS) between the source and the authorised user in the event that a direct line-of-sight (LoS) path is not feasible by using an intelligent reflecting surface (IRS). A new beamforming solution is proposed that can offer maximum gain at the intended user without any information leakage to eavesdropper when multiple-antenna base station (BS) with single antenna at legitimate user and eavesdropper (i.e., multiple-input-single-output, or MISO) is taken into consideration. In the absence of LoS, the proposed IRS-assisted approach can establish a communication link between the BS and the authorised user by combining maximum ratio transmission (MRT) with traditional zero-forcing (ZF) beamforming. The suggested approach is compared to other beamforming methods like MRT and traditional ZF in terms of performance metrics like channel capacity and secrecy capacity for the Rayleigh dispersed channel. The proposed approach outperforms the other techniques, it is concluded. In the end, the performance of secrecy is also examined in relation to many parameters, such as IRS elements or transmit antennas, and it is concluded that the provided method exhibits the most suitable performance.
本文提供了一种方法,在使用智能反射面(IRS)的直接视距(LoS)路径不可行的情况下,在源和授权用户之间提供物理层安全性(PLS)。提出了一种新的波束形成方案,该方案在考虑合法用户和窃听者处具有单天线的多天线基站(即多输入单输出,MISO)时,可以在目标用户处提供最大的增益,而不会向窃听者泄露任何信息。在没有LoS的情况下,提出的irs辅助方法可以通过将最大比传输(MRT)与传统的零强迫(ZF)波束形成相结合,在BS和授权用户之间建立通信链路。根据瑞利分散信道的信道容量和保密容量等性能指标,将建议的方法与MRT和传统的ZF等其他波束形成方法进行了比较。结果表明,该方法优于其他方法。最后,研究了与IRS元件或发射天线等参数有关的保密性能,并得出结论,所提供的方法具有最合适的性能。
{"title":"Secure Beamforming for Intelligent Reflecting Surface Assisted MISO Wireless Communications","authors":"R. Kaur, Bajrang Bansal","doi":"10.1109/ICCT56969.2023.10075734","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075734","url":null,"abstract":"This paper provides a method to provide physical layer security (PLS) between the source and the authorised user in the event that a direct line-of-sight (LoS) path is not feasible by using an intelligent reflecting surface (IRS). A new beamforming solution is proposed that can offer maximum gain at the intended user without any information leakage to eavesdropper when multiple-antenna base station (BS) with single antenna at legitimate user and eavesdropper (i.e., multiple-input-single-output, or MISO) is taken into consideration. In the absence of LoS, the proposed IRS-assisted approach can establish a communication link between the BS and the authorised user by combining maximum ratio transmission (MRT) with traditional zero-forcing (ZF) beamforming. The suggested approach is compared to other beamforming methods like MRT and traditional ZF in terms of performance metrics like channel capacity and secrecy capacity for the Rayleigh dispersed channel. The proposed approach outperforms the other techniques, it is concluded. In the end, the performance of secrecy is also examined in relation to many parameters, such as IRS elements or transmit antennas, and it is concluded that the provided method exhibits the most suitable performance.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About ICCT '23 关于ICCT '23
{"title":"About ICCT '23","authors":"","doi":"10.1109/icct56969.2023.10075825","DOIUrl":"https://doi.org/10.1109/icct56969.2023.10075825","url":null,"abstract":"","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rapport of Counterfeit Profiles in Social Networking using Machine Learning Techniques 使用机器学习技术在社交网络中伪造个人资料
M. A. Jyothi, T. Sridevi, KV Rajani, Ugranada Channabasava, Srikanth Bethu
Day-By-Day the number is been increasing of individuals who clench accounts on the platform named social media but they conceal their identity for the motives of malevolent. Regrettably, we have done a small investigation to date to determine fake identifications that are been designed by the individuals mainly on social media. In the contradistinction, huge samples are subsisted in the form of cases as the fake accounts are been generated by automation or personal computers and these are dug out by utilizing the models of machine learning techniques. In the case of automation, models of machine learning are depending on the attributes of the engineered employing as the proportion of companion to followers. These attributes are brought out from the features like the count of the companion and the count of the follower that is straightly obtainable in the profiles of the social media. The investigation debated in this paper appeals to the similar attributes for the fake accounts so there will be some desire of proceeding the fake profiles detection which are been generated by individuals on the medial platform.
每天都有越来越多的人在社交媒体平台上注册账户,但出于恶意,他们隐瞒了自己的身份。遗憾的是,到目前为止,我们已经做了一个小调查,以确定个人主要在社交媒体上设计的假身份。相比之下,由于假账户是由自动化或个人电脑生成的,并利用机器学习技术的模型挖掘出来的,因此以案例的形式存在着巨大的样本。在自动化的情况下,机器学习模型依赖于被设计对象的属性,如同伴与追随者的比例。这些属性是从同伴数量和追随者数量等特征中得出的,这些特征可以在社交媒体的个人资料中直接获得。本文讨论的调查呼吁对虚假账户进行类似的属性,因此会有一些希望对媒体平台上个人生成的虚假个人资料进行检测。
{"title":"Rapport of Counterfeit Profiles in Social Networking using Machine Learning Techniques","authors":"M. A. Jyothi, T. Sridevi, KV Rajani, Ugranada Channabasava, Srikanth Bethu","doi":"10.1109/ICCT56969.2023.10076017","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076017","url":null,"abstract":"Day-By-Day the number is been increasing of individuals who clench accounts on the platform named social media but they conceal their identity for the motives of malevolent. Regrettably, we have done a small investigation to date to determine fake identifications that are been designed by the individuals mainly on social media. In the contradistinction, huge samples are subsisted in the form of cases as the fake accounts are been generated by automation or personal computers and these are dug out by utilizing the models of machine learning techniques. In the case of automation, models of machine learning are depending on the attributes of the engineered employing as the proportion of companion to followers. These attributes are brought out from the features like the count of the companion and the count of the follower that is straightly obtainable in the profiles of the social media. The investigation debated in this paper appeals to the similar attributes for the fake accounts so there will be some desire of proceeding the fake profiles detection which are been generated by individuals on the medial platform.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122310241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voice-Based Interaction for an Aging Population: A Systematic Review 基于语音的人口老龄化互动:系统综述
S. Pednekar, Palka Dhirawani, Richa N Shah, N. Shekokar, K. Ghag
In the past twenty years, voice-based systems have emerged as a technology with high usability and accessibility. Research in the field of Human-Computer Interaction (HCI) has investigated this trend and how these systems can bridge the gap in technology use across all generations, specifically for older adults. This study aims to conduct a systematic literature review of research on voice-based systems for older adults published in the past twenty years. These articles were obtained from reputed databases, filtered out based on specific eligibility criteria, and perused by the authors of this study. This study answers questions concerning the research methodologies often employed for this particular topic and the trends in existing voice-based systems studied in research experiments. It discusses the benefits of voice technologies for the elderly, their challenges, and how to address them.
在过去的二十年中,基于语音的系统已经成为一种高可用性和可访问性的技术。人机交互(HCI)领域的研究已经调查了这一趋势,以及这些系统如何弥合各代人,特别是老年人在技术使用方面的差距。本研究旨在对近二十年来针对老年人语音系统的研究进行系统的文献综述。这些文章是从知名数据库中获得的,根据特定的资格标准进行筛选,并由本研究的作者仔细阅读。本研究回答了关于这个特定主题经常使用的研究方法的问题,以及在研究实验中研究的现有基于语音的系统的趋势。它讨论了语音技术对老年人的好处、挑战以及如何解决这些问题。
{"title":"Voice-Based Interaction for an Aging Population: A Systematic Review","authors":"S. Pednekar, Palka Dhirawani, Richa N Shah, N. Shekokar, K. Ghag","doi":"10.1109/ICCT56969.2023.10075801","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075801","url":null,"abstract":"In the past twenty years, voice-based systems have emerged as a technology with high usability and accessibility. Research in the field of Human-Computer Interaction (HCI) has investigated this trend and how these systems can bridge the gap in technology use across all generations, specifically for older adults. This study aims to conduct a systematic literature review of research on voice-based systems for older adults published in the past twenty years. These articles were obtained from reputed databases, filtered out based on specific eligibility criteria, and perused by the authors of this study. This study answers questions concerning the research methodologies often employed for this particular topic and the trends in existing voice-based systems studied in research experiments. It discusses the benefits of voice technologies for the elderly, their challenges, and how to address them.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1