首页 > 最新文献

2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

英文 中文
Analysing the Need for 5G Networks based on Smartphone Market Penetration 基于智能手机市场渗透率的5G网络需求分析
Chetan Panse, Aayush Chaskar
The term “5G” refers to the latest advancements in mobile technology. The next key stage of mobile communications standards after the soon-to-be-implemented 4G standards is 5G. Due to the development of 5G technology, the bulk of high bandwidth users will change how they access their phones. With 5G pushed via a VOIP-equipped smartphone, people would experience a volume of calls and data transfer unlike anything else. [1] The word “5G” relates to the generation of wireless telecommunications, which will change multiple areas of our daily life. Due to emerging mobile technologies like virtual reality applications, HD video consumption, and cloud-based entertainment, mobile users and their usage is expanding very quickly. The rate of increase in demand and the predicted trends of new technologies, such as driverless vehicles and virtual reality, will far exceed the capacity of 4G networks in a few years Consequently, multiple attempts have been made by industry experts and research associations to make 5G networks a reality soon. Academicians and thought leaders have agreed that these new network systems would employ highly exciting, developed technologies like SDN and NFV to realize their objectives. The transmission speed of 5G is a lot greater than that of the present network Data transmission speeds up to 10Gbps, which are 10 to 100 times faster than 4G and 4G- LTE will be available with 5G. To facilitate the development of new services, 5G is anticipated to merge ultra-broadband networks and incorporate new-age technologies like the Internet of Things (IoT), blockchain, big data, artificial intelligence, machine learning and cloud computing.
“5G”一词指的是移动技术的最新进展。继即将实施的4G标准之后,移动通信标准的下一个关键阶段是5G。由于5G技术的发展,大部分高带宽用户将改变他们访问手机的方式。通过配备voip的智能手机推动5G,人们将体验到前所未有的大量通话和数据传输。[1]“5G”一词与无线通信的产生有关,它将改变我们日常生活的多个领域。由于新兴的移动技术,如虚拟现实应用、高清视频消费和基于云的娱乐,移动用户及其使用正在迅速扩大。需求的增长速度和新技术的预测趋势,如无人驾驶汽车和虚拟现实,将在几年内远远超过4G网络的容量。因此,行业专家和研究协会多次尝试使5G网络早日成为现实。学者和思想领袖一致认为,这些新的网络系统将采用SDN和NFV等非常令人兴奋的先进技术来实现他们的目标。5G的传输速度比目前的网络要快得多,数据传输速度高达10Gbps,比4G和4G快10到100倍- LTE将与5G一起提供。为了促进新业务的发展,5G预计将融合超宽带网络,并融合物联网(IoT)、区块链、大数据、人工智能、机器学习和云计算等新时代技术。
{"title":"Analysing the Need for 5G Networks based on Smartphone Market Penetration","authors":"Chetan Panse, Aayush Chaskar","doi":"10.1109/ICCT56969.2023.10075753","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075753","url":null,"abstract":"The term “5G” refers to the latest advancements in mobile technology. The next key stage of mobile communications standards after the soon-to-be-implemented 4G standards is 5G. Due to the development of 5G technology, the bulk of high bandwidth users will change how they access their phones. With 5G pushed via a VOIP-equipped smartphone, people would experience a volume of calls and data transfer unlike anything else. [1] The word “5G” relates to the generation of wireless telecommunications, which will change multiple areas of our daily life. Due to emerging mobile technologies like virtual reality applications, HD video consumption, and cloud-based entertainment, mobile users and their usage is expanding very quickly. The rate of increase in demand and the predicted trends of new technologies, such as driverless vehicles and virtual reality, will far exceed the capacity of 4G networks in a few years Consequently, multiple attempts have been made by industry experts and research associations to make 5G networks a reality soon. Academicians and thought leaders have agreed that these new network systems would employ highly exciting, developed technologies like SDN and NFV to realize their objectives. The transmission speed of 5G is a lot greater than that of the present network Data transmission speeds up to 10Gbps, which are 10 to 100 times faster than 4G and 4G- LTE will be available with 5G. To facilitate the development of new services, 5G is anticipated to merge ultra-broadband networks and incorporate new-age technologies like the Internet of Things (IoT), blockchain, big data, artificial intelligence, machine learning and cloud computing.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124973076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seismic Lithology Interpretation using Attention based Convolutional Neural Networks 基于注意的卷积神经网络的地震岩性解释
Vineela Chandra Dodda, Lakshmi Kuruguntla, Shaik Razak, A. Mandpura, S. Chinnadurai, Karthikeyan Elumalai
Seismic interpretation is essential to obtain infor-mation about the geological layers from seismic data. Manual interpretation, however, necessitates additional pre-processing stages and requires more time and effort. In recent years, Deep Learning (DL) has been applied in the geophysical domain to solve various problems such as denoising, inversion, fault estimation, horizon estimation, etc. In this paper, we propose an Attention-based Deep Convolutional Neural Network (ACNN) for seismic lithology prediction. We used Continuous Wavelet Transform (CWT) to obtain the time-frequency spectrum of seismic data which is further used to train the network. The attention module is used to scale the features from the convolutional layers thus prioritizing the prominent features in the data. We validated the results on blind wells and observed that the proposed method had shown improved accuracy when compared to the existing basic CNN.
地震解释对于从地震资料中获得有关地质层的信息至关重要。然而,手动解释需要额外的预处理阶段,并且需要更多的时间和精力。近年来,深度学习(Deep Learning, DL)已被应用于地球物理领域,用于解决诸如去噪、反演、断层估计、层位估计等各种问题。本文提出了一种基于注意力的深度卷积神经网络(ACNN)用于地震岩性预测。利用连续小波变换(CWT)得到地震数据的时频谱,并利用该时频谱对网络进行训练。注意模块用于从卷积层缩放特征,从而优先考虑数据中的突出特征。我们在盲井中验证了结果,并观察到与现有的基本CNN相比,所提出的方法具有更高的准确性。
{"title":"Seismic Lithology Interpretation using Attention based Convolutional Neural Networks","authors":"Vineela Chandra Dodda, Lakshmi Kuruguntla, Shaik Razak, A. Mandpura, S. Chinnadurai, Karthikeyan Elumalai","doi":"10.1109/ICCT56969.2023.10075964","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075964","url":null,"abstract":"Seismic interpretation is essential to obtain infor-mation about the geological layers from seismic data. Manual interpretation, however, necessitates additional pre-processing stages and requires more time and effort. In recent years, Deep Learning (DL) has been applied in the geophysical domain to solve various problems such as denoising, inversion, fault estimation, horizon estimation, etc. In this paper, we propose an Attention-based Deep Convolutional Neural Network (ACNN) for seismic lithology prediction. We used Continuous Wavelet Transform (CWT) to obtain the time-frequency spectrum of seismic data which is further used to train the network. The attention module is used to scale the features from the convolutional layers thus prioritizing the prominent features in the data. We validated the results on blind wells and observed that the proposed method had shown improved accuracy when compared to the existing basic CNN.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"421 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132553275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison of Neural Networks and Machine Learning Methods for Prediction of Heart Disease 神经网络与机器学习方法在心脏病预测中的比较
Omkar Subhash Ghongade, S. K. S. Reddy, Srilatha Tokala, K. Hajarathaiah, M. Enduri, Satish Anamalamudi
Heart disease is a major cause of death and disability across the world. Heart disease mortality and morbidity rates can be greatly decreased with early detection and treatment. Hence, the development of efficient and accurate methods for early diagnosis of heart disease has become a priority in the medical field. In this study, we did a comparative study of exiting supervised machine learning approaches for predicting heart disease diagnosis and also improved the accuracy of KNN by changing K values. We used a dataset that consists of a variety of features such as age, gender and other important indicators for heart disease diagnosis. We then explored and evaluated traditional ML algorithms such as logistic regression, decision tree, random forest and SVM for the predictive analysis. A number of criteria, including accuracy, precision, recall, and F1 Score, were used to assess the models' performance. This study provides evidence that ML algorithms can be used to forecast the diagnosis of heart disease. Healthcare providers and medical practitioners can utilize the outcomes of this study for early detection and management of cardiac disease. Further research will aim to analyse and evaluate additional machine learning algorithms to enhance precision and performance.
心脏病是世界范围内导致死亡和残疾的主要原因。心脏病的死亡率和发病率可以通过早期发现和治疗大大降低。因此,开发高效、准确的心脏病早期诊断方法已成为医疗领域的当务之急。在这项研究中,我们对现有的用于预测心脏病诊断的监督机器学习方法进行了比较研究,并通过改变K值来提高KNN的准确性。我们使用的数据集包含各种特征,如年龄、性别和心脏病诊断的其他重要指标。然后,我们探索和评估了传统的机器学习算法,如逻辑回归、决策树、随机森林和支持向量机,用于预测分析。许多标准,包括准确性、精度、召回率和F1分数,被用来评估模型的性能。本研究为机器学习算法可以用于预测心脏病的诊断提供了证据。医疗保健提供者和医疗从业者可以利用这项研究的结果来早期发现和管理心脏病。进一步的研究将旨在分析和评估其他机器学习算法,以提高精度和性能。
{"title":"A Comparison of Neural Networks and Machine Learning Methods for Prediction of Heart Disease","authors":"Omkar Subhash Ghongade, S. K. S. Reddy, Srilatha Tokala, K. Hajarathaiah, M. Enduri, Satish Anamalamudi","doi":"10.1109/ICCT56969.2023.10076174","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076174","url":null,"abstract":"Heart disease is a major cause of death and disability across the world. Heart disease mortality and morbidity rates can be greatly decreased with early detection and treatment. Hence, the development of efficient and accurate methods for early diagnosis of heart disease has become a priority in the medical field. In this study, we did a comparative study of exiting supervised machine learning approaches for predicting heart disease diagnosis and also improved the accuracy of KNN by changing K values. We used a dataset that consists of a variety of features such as age, gender and other important indicators for heart disease diagnosis. We then explored and evaluated traditional ML algorithms such as logistic regression, decision tree, random forest and SVM for the predictive analysis. A number of criteria, including accuracy, precision, recall, and F1 Score, were used to assess the models' performance. This study provides evidence that ML algorithms can be used to forecast the diagnosis of heart disease. Healthcare providers and medical practitioners can utilize the outcomes of this study for early detection and management of cardiac disease. Further research will aim to analyse and evaluate additional machine learning algorithms to enhance precision and performance.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"30 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133267266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Predictive Maintenance Technique for Manufacturing Semiconductors using Machine Learning 基于机器学习的半导体制造最优预测性维护技术
Dyd Pradeep, Bitragunta Vivek Vardhan, Shaik Raiak, I. Muniraj, Karthikeyan Elumalai, S. Chinnadurai
As global competitiveness in the semiconductor sector intensifies, companies must continue to improve manufacturing techniques and productivity in order to sustain competitive advantages. In this research paper, we have used machine learning (ML) techniques on computational data collected from the sensors in the manufacturing unit to predict the wafer failure in the manufacturing of the semiconductors and then lower the equipment failure by enabling predictive maintenance and thereby increasing productivity. Training time has been greatly reduced through the proposed feature selection process with maintaining high accuracy. Logistic Regression, Random Forest Classifier, Support Vector Machine, Decision Tree Classifier, Extreme Gradient Boost, and Neural Networks are some of the model-building techniques that are performed in this work. Numerous case studies were undertaken to examine accuracy and precision. Random Forest Classifier surpassed all the other models with an accuracy of over 93.62%. Numerical results also show that the ML techniques can be implemented to predict wafer failure, perform predictive maintenance and increase the productivity of manufacturing the semiconductors.
随着半导体行业的全球竞争加剧,企业必须继续提高制造技术和生产率,以保持竞争优势。在这篇研究论文中,我们使用机器学习(ML)技术对从制造单元的传感器收集的计算数据进行预测,以预测半导体制造中的晶圆故障,然后通过实现预测性维护来降低设备故障,从而提高生产率。通过所提出的特征选择过程,大大减少了训练时间,同时保持了较高的准确率。逻辑回归、随机森林分类器、支持向量机、决策树分类器、极端梯度增强和神经网络是在这项工作中执行的一些模型构建技术。进行了许多案例研究以检查准确性和精确性。随机森林分类器的准确率超过93.62%,超过了所有其他模型。数值结果还表明,机器学习技术可以用于预测晶圆故障,进行预测性维护,提高半导体制造的生产率。
{"title":"Optimal Predictive Maintenance Technique for Manufacturing Semiconductors using Machine Learning","authors":"Dyd Pradeep, Bitragunta Vivek Vardhan, Shaik Raiak, I. Muniraj, Karthikeyan Elumalai, S. Chinnadurai","doi":"10.1109/ICCT56969.2023.10075658","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075658","url":null,"abstract":"As global competitiveness in the semiconductor sector intensifies, companies must continue to improve manufacturing techniques and productivity in order to sustain competitive advantages. In this research paper, we have used machine learning (ML) techniques on computational data collected from the sensors in the manufacturing unit to predict the wafer failure in the manufacturing of the semiconductors and then lower the equipment failure by enabling predictive maintenance and thereby increasing productivity. Training time has been greatly reduced through the proposed feature selection process with maintaining high accuracy. Logistic Regression, Random Forest Classifier, Support Vector Machine, Decision Tree Classifier, Extreme Gradient Boost, and Neural Networks are some of the model-building techniques that are performed in this work. Numerous case studies were undertaken to examine accuracy and precision. Random Forest Classifier surpassed all the other models with an accuracy of over 93.62%. Numerical results also show that the ML techniques can be implemented to predict wafer failure, perform predictive maintenance and increase the productivity of manufacturing the semiconductors.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115103626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Received Signal Strength and Optimized Support Vector Machine based Sybil Attack Detection Scheme in Smart Grid 基于接收信号强度和优化支持向量机的智能电网Sybil攻击检测方案
R. Sriranjani, N. Hemavathi, A. Parvathy, B. Salini, L. Nandhini
As smart grid enables two-way flow of data and electricity with Advanced Metering Infrastructure, it is prone to security vulnerabilities. Sybil attack, one such vulnerability exhibits multiple identities of same node. As a consequence, the compromised or malicious nodes present in smart grid inject false information that would cause a serious impact in a critical infrastructure i.e. smart grid. Hence, the proposal aims to detect this attack based on node's Received Signal Strength, address, energy consumption and distance using machine learning algorithm. Support vector machine outperforms other machine learning algorithms like logistic regression, K-Nearest Neighborhood, Naive Baye's, and K-Nearest Neighborhood in terms of accuracy, training time, misclassification cost, prediction speed, sensitivity or recall, specificity, F1 score, precision, and Area Under the Curve (AUC) and Receiver Operating Characteristic Curve (ROC). Further, the performance of the model is optimized using hyper parameter tuning. The proposal is implemented in MATLAB. The results exhibit 96.5% accuracy that clearly demonstrates the efficacy of the model.
智能电网通过先进的计量基础设施实现数据和电力的双向流动,容易出现安全漏洞。Sybil攻击,一个这样的漏洞展示了同一节点的多个身份。因此,智能电网中存在的受损或恶意节点注入虚假信息,这将对关键基础设施(即智能电网)造成严重影响。因此,该提案旨在使用机器学习算法基于节点的接收信号强度,地址,能耗和距离来检测这种攻击。支持向量机在准确性、训练时间、误分类成本、预测速度、灵敏度或召回率、特异性、F1分数、精度、曲线下面积(AUC)和接受者工作特征曲线(ROC)等方面优于其他机器学习算法,如逻辑回归、k近邻、朴素贝叶斯和k近邻。此外,采用超参数调优对模型的性能进行了优化。该方案在MATLAB中实现。结果显示准确率为96.5%,表明该模型的有效性。
{"title":"Received Signal Strength and Optimized Support Vector Machine based Sybil Attack Detection Scheme in Smart Grid","authors":"R. Sriranjani, N. Hemavathi, A. Parvathy, B. Salini, L. Nandhini","doi":"10.1109/ICCT56969.2023.10075848","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075848","url":null,"abstract":"As smart grid enables two-way flow of data and electricity with Advanced Metering Infrastructure, it is prone to security vulnerabilities. Sybil attack, one such vulnerability exhibits multiple identities of same node. As a consequence, the compromised or malicious nodes present in smart grid inject false information that would cause a serious impact in a critical infrastructure i.e. smart grid. Hence, the proposal aims to detect this attack based on node's Received Signal Strength, address, energy consumption and distance using machine learning algorithm. Support vector machine outperforms other machine learning algorithms like logistic regression, K-Nearest Neighborhood, Naive Baye's, and K-Nearest Neighborhood in terms of accuracy, training time, misclassification cost, prediction speed, sensitivity or recall, specificity, F1 score, precision, and Area Under the Curve (AUC) and Receiver Operating Characteristic Curve (ROC). Further, the performance of the model is optimized using hyper parameter tuning. The proposal is implemented in MATLAB. The results exhibit 96.5% accuracy that clearly demonstrates the efficacy of the model.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132796325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of ISP-Perf and TEMs in Mobile Broadband QoS Metrics Measurement 移动宽带QoS度量中ISP-Perf和TEMs的比较分析
S. I. Orakwue, H. M. Al-Khafaji, Amit Rathi
This paper compares the performance of a developed web-based application named ISP-Perf with test mobile systems (TEMs) in a mobile broadband measurement environment. The quality of service (QoS) metrics such as upload and download speeds, as well as the latency of 3G MTN network, were quantified concurrently at three major urban centers in Port Harcourt, Nigeria. The measurements have been carried out at different times of the day for a specified period. ISP-Perf has been shown to have a low error margin when compared to TEMs, hence it is recommended for measuring network performance.
本文在移动宽带测量环境下,对基于web开发的ISP-Perf应用程序与测试移动系统(tem)的性能进行了比较。服务质量(QoS)指标,如上传和下载速度,以及3G MTN网络的延迟,在尼日利亚哈科特港的三个主要城市中心同时量化。测量是在一天的不同时间进行的。与tem相比,ISP-Perf已被证明具有较低的误差范围,因此建议将其用于测量网络性能。
{"title":"Comparative Analysis of ISP-Perf and TEMs in Mobile Broadband QoS Metrics Measurement","authors":"S. I. Orakwue, H. M. Al-Khafaji, Amit Rathi","doi":"10.1109/ICCT56969.2023.10076198","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076198","url":null,"abstract":"This paper compares the performance of a developed web-based application named ISP-Perf with test mobile systems (TEMs) in a mobile broadband measurement environment. The quality of service (QoS) metrics such as upload and download speeds, as well as the latency of 3G MTN network, were quantified concurrently at three major urban centers in Port Harcourt, Nigeria. The measurements have been carried out at different times of the day for a specified period. ISP-Perf has been shown to have a low error margin when compared to TEMs, hence it is recommended for measuring network performance.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review of Task Offloading & Load Balancing Methods in a Fog Computing Environment: Major Highlights & Research Areas 雾计算环境下任务卸载和负载平衡方法的系统综述:主要亮点和研究领域
Gaurav Goel, A. Chaturvedi
Fog computing allows for the availability of services and resources exterior of the computing resources, closer to end devices on the network edge, and finally at regions mandated by service level agreement. Fog nodes along with deployed Cloud is a strong additional support for computation. It allows for processing at the edge while yet allowing for cloud interaction. A crucial component of fog networks is load balancing, which put off some fog nodes from getting unutilized or extra loaded. Load balancing can improve service quality (QoS) factors such latency, resource usage, throughput, response or execution time, cost incurred and energy consumed for passive nodes. The job offloading and load redistribution strategies which are used in a fog network are reviewed in detail in this study. The review is divided into two categories: single parameter optimization algorithms and multi-objective parameter optimization algorithms, both with their suggested ideas. The review is also analysed in various ways, including the proportion of articles published by publisher, methods based on optimization parameters, performance evaluation metrics, simulation evaluation tools, and upcoming research areas in the fog computing field.
雾计算允许计算资源之外的服务和资源的可用性,更靠近网络边缘的终端设备,并最终在服务级别协议规定的区域。雾节点和部署的云是对计算的一个强大的额外支持。它允许在边缘处理,同时允许云交互。雾网络的一个重要组成部分是负载平衡,它可以避免一些雾节点未被利用或额外负载。负载均衡可以改善被动节点的服务质量(QoS)因素,如延迟、资源使用、吞吐量、响应或执行时间、产生的成本和能耗。本文对雾网络中使用的作业卸载和负载再分配策略进行了详细的综述。综述分为两类:单参数优化算法和多目标参数优化算法,以及各自提出的思想。该综述还从多个方面进行了分析,包括发布者发表的文章比例、基于优化参数的方法、性能评估指标、模拟评估工具以及雾计算领域即将开展的研究领域。
{"title":"A Systematic Review of Task Offloading & Load Balancing Methods in a Fog Computing Environment: Major Highlights & Research Areas","authors":"Gaurav Goel, A. Chaturvedi","doi":"10.1109/ICCT56969.2023.10075966","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075966","url":null,"abstract":"Fog computing allows for the availability of services and resources exterior of the computing resources, closer to end devices on the network edge, and finally at regions mandated by service level agreement. Fog nodes along with deployed Cloud is a strong additional support for computation. It allows for processing at the edge while yet allowing for cloud interaction. A crucial component of fog networks is load balancing, which put off some fog nodes from getting unutilized or extra loaded. Load balancing can improve service quality (QoS) factors such latency, resource usage, throughput, response or execution time, cost incurred and energy consumed for passive nodes. The job offloading and load redistribution strategies which are used in a fog network are reviewed in detail in this study. The review is divided into two categories: single parameter optimization algorithms and multi-objective parameter optimization algorithms, both with their suggested ideas. The review is also analysed in various ways, including the proportion of articles published by publisher, methods based on optimization parameters, performance evaluation metrics, simulation evaluation tools, and upcoming research areas in the fog computing field.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review on Unconstrained Real-Time Rotation-Invariant Face Detection 无约束实时旋转不变人脸检测研究进展
S. Agrwal, Sudheer Kumar Sharma, Vibhor Kant
With the amazing growth of image and video databases, there is a vast need for intelligent systems to automatically understand and look at information since doing it by hand is getting very hard. Faces are significant in social interactions because they show the feelings and identity of a person. People are not much better than machines at recognizing different faces. The automatic face detection system is a key in head pose tracking, face verification, face recognition, face tracking, face animation, face modeling, facial expression recognition, age and gender recognition, and behavior analysis in a crowd. Face detection is a way for a computer to find out the size and location of a face in an image. Face detection has been an outstanding issue in computer vision literature. This paper provides an overview of pose and rotation invariant face detection approaches with architecture designs and performance on popular benchmark datasets. The benchmark datasets used for face detection are listed as their key features. This paper also talks about different applications and challenges with face detection. Also, we set up special discussions on the practical aspects of making a face-detection system that works well. We end this paper by suggesting a few promising directions for future research.
随着图像和视频数据库的惊人增长,由于手工操作变得非常困难,因此对自动理解和查看信息的智能系统的需求非常大。脸在社会交往中很重要,因为它显示了一个人的感情和身份。人类在识别不同面孔方面并不比机器强多少。人脸自动检测系统是实现头部姿态跟踪、人脸验证、人脸识别、人脸跟踪、人脸动画、人脸建模、面部表情识别、年龄与性别识别、人群行为分析等功能的关键。人脸检测是计算机在图像中找出人脸的大小和位置的一种方法。人脸检测一直是计算机视觉文献中的一个突出问题。本文概述了姿态和旋转不变人脸检测方法的架构设计和在流行基准数据集上的性能。列出了用于人脸检测的基准数据集作为其关键特征。本文还讨论了人脸检测的不同应用和面临的挑战。此外,我们还就制作一个工作良好的面部检测系统的实际方面进行了特别讨论。最后,我们提出了未来研究的几个有希望的方向。
{"title":"A Review on Unconstrained Real-Time Rotation-Invariant Face Detection","authors":"S. Agrwal, Sudheer Kumar Sharma, Vibhor Kant","doi":"10.1109/ICCT56969.2023.10076222","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076222","url":null,"abstract":"With the amazing growth of image and video databases, there is a vast need for intelligent systems to automatically understand and look at information since doing it by hand is getting very hard. Faces are significant in social interactions because they show the feelings and identity of a person. People are not much better than machines at recognizing different faces. The automatic face detection system is a key in head pose tracking, face verification, face recognition, face tracking, face animation, face modeling, facial expression recognition, age and gender recognition, and behavior analysis in a crowd. Face detection is a way for a computer to find out the size and location of a face in an image. Face detection has been an outstanding issue in computer vision literature. This paper provides an overview of pose and rotation invariant face detection approaches with architecture designs and performance on popular benchmark datasets. The benchmark datasets used for face detection are listed as their key features. This paper also talks about different applications and challenges with face detection. Also, we set up special discussions on the practical aspects of making a face-detection system that works well. We end this paper by suggesting a few promising directions for future research.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127726590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Emerging Detection Design Adopting Two-Keying Technique in SAC-OCDMA-Based MDW Code 基于sac - ocdma的MDW码中采用双键控技术的一种新型检测设计
H. M. Al-Khafaji, S. Aljunid, Amit Rathi
This paper aims to enable the two-keying approach in spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) system that employs modified double weight (MDW) code. To achieve this goal, two-keying subtraction detection (TKSD) is suggested, which also declines the impact of multiuser interference (MUI) and phase-induced intensity noise (PIIN). The results of simulation test demonstrate that the TKSD is efficient in realizing the two-keying detection feature in SAC-OCDMA system with superior bit-error rate (BER) performance, security, and transmission rate.
本文的目的是在采用改进双权码(MDW)的频谱-幅度编码光码分多址(SAC-OCDMA)系统中实现双键方法。为了实现这一目标,提出了双键减差检测(TKSD),该检测还降低了多用户干扰(MUI)和相位诱导强度噪声(PIIN)的影响。仿真测试结果表明,TKSD能够有效地实现SAC-OCDMA系统的双钥检测功能,具有良好的误码率性能、安全性和传输速率。
{"title":"An Emerging Detection Design Adopting Two-Keying Technique in SAC-OCDMA-Based MDW Code","authors":"H. M. Al-Khafaji, S. Aljunid, Amit Rathi","doi":"10.1109/ICCT56969.2023.10076193","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076193","url":null,"abstract":"This paper aims to enable the two-keying approach in spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) system that employs modified double weight (MDW) code. To achieve this goal, two-keying subtraction detection (TKSD) is suggested, which also declines the impact of multiuser interference (MUI) and phase-induced intensity noise (PIIN). The results of simulation test demonstrate that the TKSD is efficient in realizing the two-keying detection feature in SAC-OCDMA system with superior bit-error rate (BER) performance, security, and transmission rate.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121410302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Cryptographic Methods in the Cloud: A Comparative Study 云中的密钥加密方法:比较研究
Vikas Yadav, M. Kumar
With cloud computing becoming an inseparable part of human daily life and making its way in every field of technology during the last decade with smarter human generation and adoption of new data policies, data security has become a significant pillar of trust. The standard of data security ensures the quality of privacy while availing various services over the internet. To achieve a step forward against always developing exploiters various algorithms have been developed which come under the wing of cryptography. Cryptography is the branch that ensures confidentiality, integrity, authentication, privacy, and security of the data of a consumer. This paper has dis-cussed and analyzed DES, triple DES, Blowfish, AES, IDEA, RC4, RSA, and ECC cryptography algorithms based on their ability of key size, block size, encryption time, decryption time, and total time in the Node JavaScript environment. Since, JavaScript powers 80% of the internet, this paper provides a production-level real-world analysis of various algorithms at present time.
随着云计算成为人类日常生活中不可分割的一部分,并在过去十年中随着更智能的人类一代和新数据策略的采用,在每个技术领域取得了进展,数据安全已成为信任的重要支柱。数据安全标准确保了在互联网上使用各种服务时的隐私质量。为了对抗不断发展的漏洞利用者,已经开发了各种算法,这些算法都属于密码学的范畴。密码学是确保消费者数据的机密性、完整性、身份验证、隐私性和安全性的分支。本文根据DES、triple DES、Blowfish、AES、IDEA、RC4、RSA、ECC等加密算法在Node JavaScript环境下的密钥大小、块大小、加密时间、解密时间、总时间等能力,对其进行了讨论和分析。由于JavaScript为80%的互联网提供动力,因此本文提供了目前各种算法的生产级实际分析。
{"title":"Key Cryptographic Methods in the Cloud: A Comparative Study","authors":"Vikas Yadav, M. Kumar","doi":"10.1109/ICCT56969.2023.10076165","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076165","url":null,"abstract":"With cloud computing becoming an inseparable part of human daily life and making its way in every field of technology during the last decade with smarter human generation and adoption of new data policies, data security has become a significant pillar of trust. The standard of data security ensures the quality of privacy while availing various services over the internet. To achieve a step forward against always developing exploiters various algorithms have been developed which come under the wing of cryptography. Cryptography is the branch that ensures confidentiality, integrity, authentication, privacy, and security of the data of a consumer. This paper has dis-cussed and analyzed DES, triple DES, Blowfish, AES, IDEA, RC4, RSA, and ECC cryptography algorithms based on their ability of key size, block size, encryption time, decryption time, and total time in the Node JavaScript environment. Since, JavaScript powers 80% of the internet, this paper provides a production-level real-world analysis of various algorithms at present time.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133206920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1