首页 > 最新文献

2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
An Indirect Method to Estimate Sweet Lime Weight through Machine Learning Algorithm 一种利用机器学习算法间接估计甜石灰重量的方法
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00038
V. Phate, R. Malmathanraj, P. Palanisamy
A fast and indirect method of weighing the sweet lime fruit developed based on the computer vision coupled with machine learning algorithm is investigated in this research work. The developed computer vision system (CVS) has been used to analyze the sweet lime image database. The images have been processed using the developed algorithm to extract seven geometrical attributes. The support vector machine regression (SVMR) modelling technique has been utilized to develop the model for estimating the weight of fruit samples under consideration. Eight different SVMR models have been developed in two SVM type for different kernel type. Relevant statistical analysis and comparison of the developed model is also presented. Finally, the type 2 SVMR model with RBF kernel has been recommended as the model with best performance during training ($R^{2}=$ 0.9867, RMSE = 5.26) and testing ($R^{2} =$ 0.9866, RMSE = 6.435) too. Thus, the presented work provides an indirect way for measuring sweet lime fruit size to estimate its weight. This will be helpful in the design and development of most of the post-harvest equipment.
本文研究了一种基于计算机视觉与机器学习相结合的甜酸橙果实快速间接称重方法。利用开发的计算机视觉系统(CVS)对甜石灰图像数据库进行了分析。利用该算法对图像进行处理,提取出7个几何属性。利用支持向量机回归(SVMR)建模技术建立了水果样本权重估计模型。针对不同的核类型,在两种支持向量机类型中建立了8种不同的支持向量机模型。并对所建立的模型进行了相关的统计分析和比较。最后,在训练($R^{2}=$ 0.9867, RMSE = 5.26)和测试($R^{2}=$ 0.9866, RMSE = 6.435)过程中,推荐具有RBF内核的2型SVMR模型也是表现最好的模型。因此,提出的工作提供了一种间接的方法来测量甜酸橙果实的大小,以估计其重量。这将有助于大多数收获后设备的设计和开发。
{"title":"An Indirect Method to Estimate Sweet Lime Weight through Machine Learning Algorithm","authors":"V. Phate, R. Malmathanraj, P. Palanisamy","doi":"10.1109/ICCMC48092.2020.ICCMC-00038","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00038","url":null,"abstract":"A fast and indirect method of weighing the sweet lime fruit developed based on the computer vision coupled with machine learning algorithm is investigated in this research work. The developed computer vision system (CVS) has been used to analyze the sweet lime image database. The images have been processed using the developed algorithm to extract seven geometrical attributes. The support vector machine regression (SVMR) modelling technique has been utilized to develop the model for estimating the weight of fruit samples under consideration. Eight different SVMR models have been developed in two SVM type for different kernel type. Relevant statistical analysis and comparison of the developed model is also presented. Finally, the type 2 SVMR model with RBF kernel has been recommended as the model with best performance during training ($R^{2}=$ 0.9867, RMSE = 5.26) and testing ($R^{2} =$ 0.9866, RMSE = 6.435) too. Thus, the presented work provides an indirect way for measuring sweet lime fruit size to estimate its weight. This will be helpful in the design and development of most of the post-harvest equipment.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review on Feature Extraction Techniques for Sentiment Classification 面向情感分类的特征提取技术综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000126
K. Kalaivani, S. Uma, C. Kanimozhiselvi
Sentiment analysis is used for social media supervising. It is used to analyze comments, recommendations provided by the reviewers. Depending on this analysis, products will be purchased through either online or offline. Machine learning is an area of artificial intelligence which gives computers the capability to learn without using exceptional computation. Traditional machine learning algorithms used for feature extraction and sentiment classification leads to scalability and computational problems while dealing with a huge amount of data. Deep learning is a field of approach concerned with neural implementations. It is a nonscalable and accurate technique for sentiment classification, automatic feature extraction and dimensionality reduction. Machine learning techniques are easier to implement but give less accuracy compared to deep learning. Deep learning methods are complex to implement from a human point of view, but machines require complex structures to learn large data set easier.
情感分析用于社交媒体监督。它用于分析评论者提供的评论和建议。根据这一分析,产品将通过在线或离线方式购买。机器学习是人工智能的一个领域,它使计算机能够在不使用特殊计算的情况下学习。传统的机器学习算法用于特征提取和情感分类,在处理大量数据时会导致可扩展性和计算问题。深度学习是一个涉及神经实现的领域。它是一种不可扩展的、精确的情感分类、自动特征提取和降维技术。与深度学习相比,机器学习技术更容易实现,但准确性较低。从人类的角度来看,深度学习方法很难实现,但机器需要复杂的结构才能更容易地学习大型数据集。
{"title":"A Review on Feature Extraction Techniques for Sentiment Classification","authors":"K. Kalaivani, S. Uma, C. Kanimozhiselvi","doi":"10.1109/ICCMC48092.2020.ICCMC-000126","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000126","url":null,"abstract":"Sentiment analysis is used for social media supervising. It is used to analyze comments, recommendations provided by the reviewers. Depending on this analysis, products will be purchased through either online or offline. Machine learning is an area of artificial intelligence which gives computers the capability to learn without using exceptional computation. Traditional machine learning algorithms used for feature extraction and sentiment classification leads to scalability and computational problems while dealing with a huge amount of data. Deep learning is a field of approach concerned with neural implementations. It is a nonscalable and accurate technique for sentiment classification, automatic feature extraction and dimensionality reduction. Machine learning techniques are easier to implement but give less accuracy compared to deep learning. Deep learning methods are complex to implement from a human point of view, but machines require complex structures to learn large data set easier.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fraud Detection and Prevention by using Big Data Analytics 利用大数据分析进行欺诈检测和预防
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00050
Bineet Kumar Jha, G. Sivasankari, K. Venugopal
A retail sector is a group of organization or people who sell goods or services for gaining income. Fraud is wrongful or criminal activities for the economic and personal benefits. Fraud detection is finding actual or expected fraud which takes place in an organization and in the retail market is one of the challenging aspects. Fraud is mischievous activities occur in retail sector includes shoplifting, skimming, replicating cards from skimmed data, counterfeiting, bar code or POS(Point-of-Sale) manipulation, contamination, mislabeling, substitute cheaper ingredients instead of high-quality ingredients. Fraudulent activities occur in the retail sector by both consumer and supplier. Analyzing financial crimes related to fraudulent activities is difficult where traditional data mining techniques fail to address all of them. Big data analytics is used to identify an unusual pattern to detect and prevent fraud in the retail sector. Various predictive analytics tools are used to handle massive data and their pattern.
零售业是指出售商品或服务以获得收入的一组组织或人员。欺诈是为了经济和个人利益而进行的不法或犯罪活动。欺诈检测是发现在组织和零售市场中发生的实际或预期的欺诈行为是具有挑战性的方面之一。欺诈是零售业中发生的有害活动,包括入店行窃,撇脂,从撇脂数据复制卡片,伪造,条形码或POS(销售点)操纵,污染,错误标签,以廉价原料代替高质量原料。在零售业中,消费者和供应商都有欺诈行为。分析与欺诈活动相关的金融犯罪是困难的,因为传统的数据挖掘技术无法解决所有这些问题。大数据分析用于识别不寻常的模式,以检测和防止零售行业的欺诈行为。各种预测分析工具用于处理海量数据及其模式。
{"title":"Fraud Detection and Prevention by using Big Data Analytics","authors":"Bineet Kumar Jha, G. Sivasankari, K. Venugopal","doi":"10.1109/ICCMC48092.2020.ICCMC-00050","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00050","url":null,"abstract":"A retail sector is a group of organization or people who sell goods or services for gaining income. Fraud is wrongful or criminal activities for the economic and personal benefits. Fraud detection is finding actual or expected fraud which takes place in an organization and in the retail market is one of the challenging aspects. Fraud is mischievous activities occur in retail sector includes shoplifting, skimming, replicating cards from skimmed data, counterfeiting, bar code or POS(Point-of-Sale) manipulation, contamination, mislabeling, substitute cheaper ingredients instead of high-quality ingredients. Fraudulent activities occur in the retail sector by both consumer and supplier. Analyzing financial crimes related to fraudulent activities is difficult where traditional data mining techniques fail to address all of them. Big data analytics is used to identify an unusual pattern to detect and prevent fraud in the retail sector. Various predictive analytics tools are used to handle massive data and their pattern.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Enforcement of Context Aware System Security Protocols with the Aid of Multi Factor Authentication 借助多因素认证实现上下文感知系统安全协议
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000138
S. Jose, P. Nayana, N. S. Nair
In this paper, an attempt has been made to describe Kerberos authentication with multi factor authentication in context aware systems. Multi factor authentication will make the framework increasingly secure and dependable. The Kerberos convention is one of the most generally utilized security conventions on the planet. The security conventions of Kerberos have been around for a considerable length of time for programmers and other malware to Figure out how to sidestep it. This has required a quick support of the Kerberos convention to make it progressively dependable and productive. Right now, endeavor to help explain this by strengthening Kerberos with the assistance of multifaceted verification.
本文尝试用上下文感知系统中的多因素身份验证来描述Kerberos身份验证。多因素认证将使框架更加安全可靠。Kerberos约定是世界上最常用的安全约定之一。Kerberos的安全约定已经存在了相当长的一段时间,程序员和其他恶意软件都知道如何避开它。这需要Kerberos约定的快速支持,以使其逐渐变得可靠和高效。现在,我们通过在多方面验证的帮助下加强Kerberos来帮助解释这一点。
{"title":"The Enforcement of Context Aware System Security Protocols with the Aid of Multi Factor Authentication","authors":"S. Jose, P. Nayana, N. S. Nair","doi":"10.1109/ICCMC48092.2020.ICCMC-000138","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000138","url":null,"abstract":"In this paper, an attempt has been made to describe Kerberos authentication with multi factor authentication in context aware systems. Multi factor authentication will make the framework increasingly secure and dependable. The Kerberos convention is one of the most generally utilized security conventions on the planet. The security conventions of Kerberos have been around for a considerable length of time for programmers and other malware to Figure out how to sidestep it. This has required a quick support of the Kerberos convention to make it progressively dependable and productive. Right now, endeavor to help explain this by strengthening Kerberos with the assistance of multifaceted verification.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arduino based Hardware Implementation of Automatic Side Stand for Motor Bike 基于Arduino的摩托车自动侧支架硬件实现
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000116
J. J. Mathavan, K. G. L. Dinakara, P. G. S. G. Premathilaka, H. M. T. D. Herath
Usage of motor bike is preferred by most of the people for it is an easy way for transport and it needs a little space comparatively on parking. But when accidents happen, it causes severe injuries and sometimes deaths as well. There are many reasons for these accidents, internally and externally. Forgetting to lift up the side stand is one of the reasons and it could be avoided by certain technical aspects. This paper presents an automatic side stand for motor bikes, which could be lifted up while the bike starts moving and retrieve back when it stops. The design consists of sensors, relay switches and regulators which are controlled by Arduino UNO program. There is no need to additional energy source or any other complexity since the designed system uses the necessary power from the motor bike battery.
使用摩托车是大多数人的首选,因为它是一种方便的交通方式,相对而言,它需要很少的停车空间。但当事故发生时,它会造成严重的伤害,有时甚至死亡。造成这些事故的原因有很多,有内部的,也有外部的。忘记抬起侧架是其中一个原因,它可以通过某些技术方面来避免。本文介绍了一种摩托车自动侧支架,它可以在自行车开始运动时抬起,在自行车停止时收回。该设计由传感器、继电器开关和调节器组成,并由Arduino UNO程序控制。不需要额外的能源或任何其他复杂性,因为设计的系统使用必要的电力从摩托车电池。
{"title":"Arduino based Hardware Implementation of Automatic Side Stand for Motor Bike","authors":"J. J. Mathavan, K. G. L. Dinakara, P. G. S. G. Premathilaka, H. M. T. D. Herath","doi":"10.1109/ICCMC48092.2020.ICCMC-000116","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000116","url":null,"abstract":"Usage of motor bike is preferred by most of the people for it is an easy way for transport and it needs a little space comparatively on parking. But when accidents happen, it causes severe injuries and sometimes deaths as well. There are many reasons for these accidents, internally and externally. Forgetting to lift up the side stand is one of the reasons and it could be avoided by certain technical aspects. This paper presents an automatic side stand for motor bikes, which could be lifted up while the bike starts moving and retrieve back when it stops. The design consists of sensors, relay switches and regulators which are controlled by Arduino UNO program. There is no need to additional energy source or any other complexity since the designed system uses the necessary power from the motor bike battery.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Insight into the Relevance of Word Ordering for Text Data Analysis 对文本数据分析中词序相关性的洞察
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00040
R. Menon, R. Akhil dev, Sreehari G Bhattathiri
Sentence ordering and word ordering is always remaining as a critical task for natural language processing applications. It is expected that introduction of word order information will lead to improvements in document related tasks like keyword extraction, context identification, topic analysis, intent identification, summary generation, document classification, sentiment analysis, clustering etc. In this paper, we are maintaining the structure of the document data by using various deep learning techniques. Most of the techniques can be compared on the basis of vector similarity. The proposed research work helps to improve the accuracy on the basis of the order of word occurrence. We also compare different types of word ordering techniques to maintain the structure of the document. The obtained results indicate that Doc2Vec model outperforms Tfidf model in terms of word order similarity.
句子排序和词排序一直是自然语言处理应用中的一个关键问题。语序信息的引入有望改善与文档相关的任务,如关键词提取、上下文识别、主题分析、意图识别、摘要生成、文档分类、情感分析、聚类等。在本文中,我们通过使用各种深度学习技术来维护文档数据的结构。大多数技术可以在向量相似性的基础上进行比较。本文提出的研究工作有助于提高基于单词出现顺序的准确性。我们还比较了维护文档结构的不同类型的单词排序技术。结果表明,Doc2Vec模型在词序相似度方面优于Tfidf模型。
{"title":"An Insight into the Relevance of Word Ordering for Text Data Analysis","authors":"R. Menon, R. Akhil dev, Sreehari G Bhattathiri","doi":"10.1109/ICCMC48092.2020.ICCMC-00040","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00040","url":null,"abstract":"Sentence ordering and word ordering is always remaining as a critical task for natural language processing applications. It is expected that introduction of word order information will lead to improvements in document related tasks like keyword extraction, context identification, topic analysis, intent identification, summary generation, document classification, sentiment analysis, clustering etc. In this paper, we are maintaining the structure of the document data by using various deep learning techniques. Most of the techniques can be compared on the basis of vector similarity. The proposed research work helps to improve the accuracy on the basis of the order of word occurrence. We also compare different types of word ordering techniques to maintain the structure of the document. The obtained results indicate that Doc2Vec model outperforms Tfidf model in terms of word order similarity.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
State of Charge based Control Strategy for Battery Energy Storage System in DC Microgrid 基于充电状态的直流微电网电池储能系统控制策略
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00081
Dipali Kataruka, S. Behera
In order to achieve proper bus voltage and desired power-sharing and charging/ discharging of Battery Energy Storage System (BESS) in consideration with the state of charge (SOC) of the battery, the control design is proposed. The design is mainly proposed for the bidirectional converter of BESS in a DC Microgrid (MG). The proposed controller employs the locally obtained measurements of battery voltage as a state in control design, thereby keeps aside the use of high bandwidth communication. On sudden failure of the grid, it must be compensated by other sources in the MG and continuous supply to the load is a must. Thus the reliability of the system is achieved by operating the MG employing mode switching in between three modes: power regulation mode (PRM), constant voltage (CV) mode and voltage regulation mode (VRM) implementing control scheme of BESS. Transient performance validation is done by simulating different system disturbances such as accidental grid isolation and uncertain loading conditions taking into account the line parameters in the transmission line. To show the proof of the proposed concept of the control strategy, simulation results are provided.
为了在考虑电池荷电状态(SOC)的情况下实现合适的母线电压和理想的电池储能系统(BESS)的功率共享和充放电,提出了控制设计。本文主要针对直流微电网中BESS的双向变换器进行设计。该控制器在控制设计中采用局部获得的电池电压测量值作为状态,从而避免了高带宽通信的使用。当电网突然发生故障时,必须由电网中的其他电源进行补偿,并且必须持续向负载供电。因此,通过在功率调节模式(PRM)、恒压模式(CV)和电压调节模式(VRM)之间进行模式切换来实现BESS控制方案,从而实现了系统的可靠性。在考虑线路参数的情况下,通过模拟电网意外隔离、不确定负载等不同系统扰动进行暂态性能验证。为了证明所提出的控制策略概念的正确性,给出了仿真结果。
{"title":"State of Charge based Control Strategy for Battery Energy Storage System in DC Microgrid","authors":"Dipali Kataruka, S. Behera","doi":"10.1109/ICCMC48092.2020.ICCMC-00081","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00081","url":null,"abstract":"In order to achieve proper bus voltage and desired power-sharing and charging/ discharging of Battery Energy Storage System (BESS) in consideration with the state of charge (SOC) of the battery, the control design is proposed. The design is mainly proposed for the bidirectional converter of BESS in a DC Microgrid (MG). The proposed controller employs the locally obtained measurements of battery voltage as a state in control design, thereby keeps aside the use of high bandwidth communication. On sudden failure of the grid, it must be compensated by other sources in the MG and continuous supply to the load is a must. Thus the reliability of the system is achieved by operating the MG employing mode switching in between three modes: power regulation mode (PRM), constant voltage (CV) mode and voltage regulation mode (VRM) implementing control scheme of BESS. Transient performance validation is done by simulating different system disturbances such as accidental grid isolation and uncertain loading conditions taking into account the line parameters in the transmission line. To show the proof of the proposed concept of the control strategy, simulation results are provided.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the Keras Model for Accurate and Rapid Gender Identification through Detection of Facial Features 利用Keras模型通过检测面部特征进行准确快速的性别识别
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000106
A. Vani, R. N. Raajan, D. Haretha Winmalar., R. Sudharsan
As the need for person-aligned, effective, and ethical structures emerges, automatic identification of gender is gaining interest in the era of machine-man interactions. Most of the systems for gender detection were analysed using textual or audiovisual sources. Far too many suggested different approaches for automatic identification of gender using the characteristics acquired from people’s bodies and/or behaviours. But the accuracy has always been a question or a drawback in automated gender detection. In the proposed research work, First, the faces and the facial features which includes eyes, mouth, and nose are detected using Haar Cascade based on Viola-Jones face detection algorithm. Before, the gender detection, the noise is reduced by applying adaptive filters, thereby increasing the accuracy. The obtained facial features are given as the input or test data to the neural network. The neural network is designed to obtain the features and acts as a classifier to detect the genders. Simply, the feature extraction and gender detection is performed using the open source neural network called keras.
随着对以人为本的、有效的和合乎伦理的结构的需求的出现,性别的自动识别在人机交互的时代越来越受到关注。大多数性别检测系统都是使用文字或视听来源进行分析的。太多的人提出了使用从人的身体和/或行为中获得的特征来自动识别性别的不同方法。但准确性一直是自动性别检测的一个问题或缺陷。首先,采用基于Viola-Jones人脸检测算法的Haar Cascade对人脸及其眼、口、鼻特征进行检测;在性别检测之前,通过应用自适应滤波器来降低噪声,从而提高准确性。得到的面部特征作为神经网络的输入或测试数据。神经网络被设计用来获取特征,并作为分类器来检测性别。简单地说,特征提取和性别检测是使用名为keras的开源神经网络执行的。
{"title":"Using the Keras Model for Accurate and Rapid Gender Identification through Detection of Facial Features","authors":"A. Vani, R. N. Raajan, D. Haretha Winmalar., R. Sudharsan","doi":"10.1109/ICCMC48092.2020.ICCMC-000106","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000106","url":null,"abstract":"As the need for person-aligned, effective, and ethical structures emerges, automatic identification of gender is gaining interest in the era of machine-man interactions. Most of the systems for gender detection were analysed using textual or audiovisual sources. Far too many suggested different approaches for automatic identification of gender using the characteristics acquired from people’s bodies and/or behaviours. But the accuracy has always been a question or a drawback in automated gender detection. In the proposed research work, First, the faces and the facial features which includes eyes, mouth, and nose are detected using Haar Cascade based on Viola-Jones face detection algorithm. Before, the gender detection, the noise is reduced by applying adaptive filters, thereby increasing the accuracy. The obtained facial features are given as the input or test data to the neural network. The neural network is designed to obtain the features and acts as a classifier to detect the genders. Simply, the feature extraction and gender detection is performed using the open source neural network called keras.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122668706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
VLSI Implementation of Turbo Coder for LTE using Verilog HDL 基于Verilog HDL的LTE Turbo编码器VLSI实现
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00051
Akshaya V, Sreehari K N, Anu Chalil
Turbo codes are error correction codes that are widely used in communication systems. Turbo codes exhibits high error correction capability as compared with other error correction codes. This paper proposes a Very Large Scale Integration (VLSI) architecture for the implementation of Turbo decoder. Soft-in-soft out decoders, interleavers and deinterleavers is used in the decoder side which employs Maximum-a-Posteriori (MAP) algorithm. The number of iterations required to decode the information bits being transmitted is reduced by the use of MAP algorithm. For the encoder part, this paper uses a system which contains two Recursive convolutional encoders along with pseudorandom interleaver in encoder side. The Turbo encoding and decoding is done using Octave, Xilinx Vivado, Cadence tools. The system is implemented and synthesized in Application Specific Integrated Circuit (ASIC).Timing analysis has been done and GDSII file has been generated.
Turbo码是一种广泛应用于通信系统的纠错码。Turbo码与其他纠错码相比,具有较高的纠错能力。本文提出了一种实现Turbo解码器的超大规模集成(VLSI)架构。译码端采用软入软出译码器、交织器和去交织器,并采用MAP算法。通过使用MAP算法,减少了对传输的信息位进行解码所需的迭代次数。对于编码器部分,本文采用了包含两个递归卷积编码器和编码器侧伪随机交织器的系统。Turbo编码和解码是使用Octave, Xilinx Vivado, Cadence工具完成的。该系统在专用集成电路(ASIC)中实现和合成。进行了时序分析,并生成了GDSII文件。
{"title":"VLSI Implementation of Turbo Coder for LTE using Verilog HDL","authors":"Akshaya V, Sreehari K N, Anu Chalil","doi":"10.1109/ICCMC48092.2020.ICCMC-00051","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00051","url":null,"abstract":"Turbo codes are error correction codes that are widely used in communication systems. Turbo codes exhibits high error correction capability as compared with other error correction codes. This paper proposes a Very Large Scale Integration (VLSI) architecture for the implementation of Turbo decoder. Soft-in-soft out decoders, interleavers and deinterleavers is used in the decoder side which employs Maximum-a-Posteriori (MAP) algorithm. The number of iterations required to decode the information bits being transmitted is reduced by the use of MAP algorithm. For the encoder part, this paper uses a system which contains two Recursive convolutional encoders along with pseudorandom interleaver in encoder side. The Turbo encoding and decoding is done using Octave, Xilinx Vivado, Cadence tools. The system is implemented and synthesized in Application Specific Integrated Circuit (ASIC).Timing analysis has been done and GDSII file has been generated.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
HVDC based Power Loss Reduction and Estimation of Power Transmission 基于HVDC的输电损耗降低与估计
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000180
P. Sharma, A. Kori
This research work proposes a synchronous air conditioning dc power stream conspire through similar lines that are used for transmission to enjoy the benefits and as well as enhance the steadiness. Just the fundamental thought is proposed alongside the possibility study utilizing rudimentary lab work. The essential component is to underline chances of concurrent air conditioning in the DC transmission and its characteristic bit of leeway of intensity stream control. Control strategies dependent on particular symphonious end pulse width regulation (PWM) methods with energy unit framework offer the most reduced conceivable number of exchanging changes and enhances the SAF transmissions voltage level. The component additionally brings about the most reduced conceivable degree of converter exchanging misfortunes. Therefore, they are extremely alluring strategies for the HVDC-high voltage dc with the VSC-voltage-source convertor for power transmission frameworks.
本研究提出了一种由相似线路组成的空调直流同步输电系统,既能获得输电效益,又能增强系统的稳定性。只是提出了基本的思想,并利用基本的实验室工作进行可能性研究。其基本组成部分是强调直流输电中并发空调的可能性及其强度流控制的特征余地。基于特定的协调端脉宽调节(PWM)方法和能量单元框架的控制策略提供了尽可能少的交换变化数量,并提高了SAF传输电压水平。另外,该部件还使转炉交换事故的可想象程度降到最低。因此,它们是极具吸引力的hvdc -高压直流与电压源变换器的电力传输框架的策略。
{"title":"HVDC based Power Loss Reduction and Estimation of Power Transmission","authors":"P. Sharma, A. Kori","doi":"10.1109/ICCMC48092.2020.ICCMC-000180","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000180","url":null,"abstract":"This research work proposes a synchronous air conditioning dc power stream conspire through similar lines that are used for transmission to enjoy the benefits and as well as enhance the steadiness. Just the fundamental thought is proposed alongside the possibility study utilizing rudimentary lab work. The essential component is to underline chances of concurrent air conditioning in the DC transmission and its characteristic bit of leeway of intensity stream control. Control strategies dependent on particular symphonious end pulse width regulation (PWM) methods with energy unit framework offer the most reduced conceivable number of exchanging changes and enhances the SAF transmissions voltage level. The component additionally brings about the most reduced conceivable degree of converter exchanging misfortunes. Therefore, they are extremely alluring strategies for the HVDC-high voltage dc with the VSC-voltage-source convertor for power transmission frameworks.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121926323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1