首页 > 最新文献

2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Performance Enhancement of Mutation and Crossover Components by using Differential Evolution Algorithm 利用差分进化算法增强变异和交叉分量的性能
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-0003
Aathira M, G. Jeyakumar
The Differential Evolution (DE) algorithm, under the family of Evolutionary Algorithms (EAs), is one of the powerful algorithms used for solving continuous parameter optimization challenges. The simplistic nature and robustness of the classical DE algorithm have drawn researchers’ attention towards its progressive enhancement. This work reports on an investigation of the behavioral changes of the classical DE algorithm, evoked when its mutation and crossover components are fine tuned for enhancement of DE’s performance. The scope of this study covers the implementation of a mutation level enhancement and a crossover level enhancement, followed by their integration. The mutation and the crossover components are augmented by incorporation of Centroid DE and Superior-Superior & Superior-Inferior DE logics, respectively. The algorithms appraised in this inquiry were classical DE, Centroid based DE(cDE), Superior-Superior based DE (ssDE), Superior-Inferior DE (siDE), Centroid Superior-Superior DE (cssDE) and Centroid Superior-Inferior DE (csiDE). These algorithms were evaluated by comparison of the values of their mean objective function (MOV), and their speed, at solving the global optimization problems in a simple benchmarking function suite with 4 functions of different categories. The study concludes that the DE algorithm shows enhancement performance with modified mutation and crossover components. However, with a trend for inconsistency for varying values of its control parameters and benchmarking problems.
差分进化算法(DE)是进化算法家族中的一种,是解决连续参数优化问题的强大算法之一。经典DE算法的简单性和鲁棒性引起了研究人员对其逐步增强的关注。这项工作报告了经典DE算法的行为变化的研究,当它的突变和交叉成分被微调以提高DE的性能时,会引起行为变化。本研究的范围涵盖了突变水平增强和交叉水平增强的实施,随后是它们的整合。通过引入质心DE和Superior-Superior & superior -劣DE逻辑分别增强了突变分量和交叉分量。本研究评价的算法有经典DE、基于质心的DE(cDE)、基于优-优的DE(ssDE)、优-劣DE(siDE)、质心优-劣DE(cssDE)和质心优-劣DE(csiDE)。通过比较这些算法的平均目标函数(MOV)值,以及它们在一个包含4个不同类别函数的简单基准函数套件中解决全局优化问题的速度,对这些算法进行了评估。研究表明,改进变异和交叉分量后,DE算法具有较好的增强性能。然而,随着其控制参数值的变化而出现不一致的趋势和基准测试问题。
{"title":"Performance Enhancement of Mutation and Crossover Components by using Differential Evolution Algorithm","authors":"Aathira M, G. Jeyakumar","doi":"10.1109/ICCMC48092.2020.ICCMC-0003","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-0003","url":null,"abstract":"The Differential Evolution (DE) algorithm, under the family of Evolutionary Algorithms (EAs), is one of the powerful algorithms used for solving continuous parameter optimization challenges. The simplistic nature and robustness of the classical DE algorithm have drawn researchers’ attention towards its progressive enhancement. This work reports on an investigation of the behavioral changes of the classical DE algorithm, evoked when its mutation and crossover components are fine tuned for enhancement of DE’s performance. The scope of this study covers the implementation of a mutation level enhancement and a crossover level enhancement, followed by their integration. The mutation and the crossover components are augmented by incorporation of Centroid DE and Superior-Superior & Superior-Inferior DE logics, respectively. The algorithms appraised in this inquiry were classical DE, Centroid based DE(cDE), Superior-Superior based DE (ssDE), Superior-Inferior DE (siDE), Centroid Superior-Superior DE (cssDE) and Centroid Superior-Inferior DE (csiDE). These algorithms were evaluated by comparison of the values of their mean objective function (MOV), and their speed, at solving the global optimization problems in a simple benchmarking function suite with 4 functions of different categories. The study concludes that the DE algorithm shows enhancement performance with modified mutation and crossover components. However, with a trend for inconsistency for varying values of its control parameters and benchmarking problems.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CPW Fed Patch Antenna Design for Weather Monitoring, Air Traffic Control and Defense Tracking Applications 用于天气监测、空中交通管制和国防跟踪应用的CPW贴片天线设计
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000185
Sathuluri Mallikharjuna Rao, T. Saikumar, J. Reddy, V.Ravi Chowdary, Ammam.Jaya Apurva Rani
Modern era require modern solutions and modern technologies. Thereby modernizing such in the domain of antennas, a new type of patch antenna intended for C-band applications is designed printing over a FR4_epoxy substrate. whose dimensions, is W$_{1} times L_{1} times h$ as 35mm $times30$ mm $times1.6$ mm the simulations results showed that the antenna works at a single resonant frequency 5.9Ghz, hence covering the applications like military, weather forecasting, defense tracking and air traffic control. The antenna feed with co-planar wave guide (CPW) is a simulation-based design and the parameters of antenna designed are optimized by making use of ANSYS HFSS software.
现代时代需要现代解决方案和现代技术。因此,在天线领域现代化,一种用于c波段应用的新型贴片天线被设计在fr4_环氧基板上打印。仿真结果表明,该天线工作在5.9Ghz的单谐振频率下,可用于军事、天气预报、国防跟踪和空中交通管制等领域。共面波导馈源是一种基于仿真的天线馈源设计,利用ANSYS HFSS软件对设计的天线参数进行了优化。
{"title":"A CPW Fed Patch Antenna Design for Weather Monitoring, Air Traffic Control and Defense Tracking Applications","authors":"Sathuluri Mallikharjuna Rao, T. Saikumar, J. Reddy, V.Ravi Chowdary, Ammam.Jaya Apurva Rani","doi":"10.1109/ICCMC48092.2020.ICCMC-000185","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000185","url":null,"abstract":"Modern era require modern solutions and modern technologies. Thereby modernizing such in the domain of antennas, a new type of patch antenna intended for C-band applications is designed printing over a FR4_epoxy substrate. whose dimensions, is W$_{1} times L_{1} times h$ as 35mm $times30$ mm $times1.6$ mm the simulations results showed that the antenna works at a single resonant frequency 5.9Ghz, hence covering the applications like military, weather forecasting, defense tracking and air traffic control. The antenna feed with co-planar wave guide (CPW) is a simulation-based design and the parameters of antenna designed are optimized by making use of ANSYS HFSS software.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115878939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Energy Demand in Smart Grid Using Deep Neural Networks with Optimizer Ensembles 基于优化器集成的深度神经网络智能电网能源需求预测
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000109
P. Seethalakshmi, K. Venkatalakshmi
The smart grid is a combination of smart network devices and systems that support the efficient generation, distribution and transmission of energy from source to destination. Energy is becoming one of the most important resources of daily life. In general, technology advancements are rapidly increasing and energy demand is also increasing due to the discovery of new electrical/electronic devices. Most of the conditions, there is a mismatch between energy generation and energy consumption. The big challenge is to maintain a balance between generating energy and using it. The service providers need to forecast the energy demand well in advance with minimal error to maintain the equilibrium state, even a small error in the predictive mechanism leads to a loss for both service providers and consumers. To address these problems we proposed an energy prediction model based on Long Short Term Memory (LSTM). It has emerged as a promising Artificial Neural Network (ANN) technique for predicting time series issues due to the properties of selective retrieval patterns for a long time. Further, the LSTM model is optimized by using Optimizer Ensembles to improve the efficiency of the proposed model. The simulation results show that the proposed LSTM achieves better predictive results (less error, high efficiency) compared to existing methods such as Moving Average (MA), Linear Regression (LR) and k-Nearest Neighbors (k-NN) techniques.
智能电网是智能网络设备和系统的组合,支持能源从源头到目的地的高效发电、分配和传输。能源正在成为日常生活中最重要的资源之一。总的来说,由于新的电气/电子设备的发现,技术进步正在迅速增加,能源需求也在增加。在大多数情况下,能源产生和能源消耗之间存在不匹配。最大的挑战是在发电和使用能源之间保持平衡。服务提供商需要以最小的误差提前较好地预测能源需求以维持平衡状态,即使预测机制中的一个小误差也会导致服务提供商和消费者的损失。为了解决这些问题,我们提出了一个基于长短期记忆(LSTM)的能量预测模型。长期以来,由于选择性检索模式的特性,它已成为预测时间序列问题的一种有前途的人工神经网络(ANN)技术。此外,利用Optimizer Ensembles对LSTM模型进行了优化,提高了模型的效率。仿真结果表明,与移动平均(MA)、线性回归(LR)和k-近邻(k-NN)等现有方法相比,所提出的LSTM获得了更好的预测结果(误差更小,效率更高)。
{"title":"Prediction of Energy Demand in Smart Grid Using Deep Neural Networks with Optimizer Ensembles","authors":"P. Seethalakshmi, K. Venkatalakshmi","doi":"10.1109/ICCMC48092.2020.ICCMC-000109","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000109","url":null,"abstract":"The smart grid is a combination of smart network devices and systems that support the efficient generation, distribution and transmission of energy from source to destination. Energy is becoming one of the most important resources of daily life. In general, technology advancements are rapidly increasing and energy demand is also increasing due to the discovery of new electrical/electronic devices. Most of the conditions, there is a mismatch between energy generation and energy consumption. The big challenge is to maintain a balance between generating energy and using it. The service providers need to forecast the energy demand well in advance with minimal error to maintain the equilibrium state, even a small error in the predictive mechanism leads to a loss for both service providers and consumers. To address these problems we proposed an energy prediction model based on Long Short Term Memory (LSTM). It has emerged as a promising Artificial Neural Network (ANN) technique for predicting time series issues due to the properties of selective retrieval patterns for a long time. Further, the LSTM model is optimized by using Optimizer Ensembles to improve the efficiency of the proposed model. The simulation results show that the proposed LSTM achieves better predictive results (less error, high efficiency) compared to existing methods such as Moving Average (MA), Linear Regression (LR) and k-Nearest Neighbors (k-NN) techniques.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constellation Design for Dual-Mode OFDM-IM 双模OFDM-IM的星座设计
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000150
Shilpa Sridhar, Latha, Arpita Thakre
Dual mode Orthogonal Frequency Division Multiplexing with Index Modulation (DM-OFDM-IM) is a modified version of the orthogonal frequency division multiplexing with index modulation (OFDM-IM). In DMOFDM-IM, sub-carriers in each sub-block are divided into two groups. These two groups are modulated with two different signal constellations, chosen from available standard constellations, for example PSK or QAM. All the subcarriers are used to transmit data, while index bit is used to select the constellation. Therefore, in this system there is an improvement in the spectral efficiency which is always greater than OFDM-IM. In this paper we suggest a new signal constellation design to be used for DM-OFDM-IM that gives reduced bit error rate (BER) compared to conventional DMOFDM-IM system. We also discuss about the rationale between our design here.
双模指数调制正交频分复用(DM-OFDM-IM)是指数调制正交频分复用(OFDM-IM)的改进版本。在DMOFDM-IM中,每个子块中的子载波被分成两组。这两个组用两个不同的信号星座调制,从可用的标准星座中选择,例如PSK或QAM。所有子载波用于传输数据,索引位用于选择星座。因此,在该系统中,频谱效率的提高总是大于OFDM-IM。本文提出了一种新的用于DM-OFDM-IM的信号星座设计,与传统的DMOFDM-IM系统相比,它具有更低的误码率(BER)。我们还在这里讨论了我们设计之间的基本原理。
{"title":"Constellation Design for Dual-Mode OFDM-IM","authors":"Shilpa Sridhar, Latha, Arpita Thakre","doi":"10.1109/ICCMC48092.2020.ICCMC-000150","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000150","url":null,"abstract":"Dual mode Orthogonal Frequency Division Multiplexing with Index Modulation (DM-OFDM-IM) is a modified version of the orthogonal frequency division multiplexing with index modulation (OFDM-IM). In DMOFDM-IM, sub-carriers in each sub-block are divided into two groups. These two groups are modulated with two different signal constellations, chosen from available standard constellations, for example PSK or QAM. All the subcarriers are used to transmit data, while index bit is used to select the constellation. Therefore, in this system there is an improvement in the spectral efficiency which is always greater than OFDM-IM. In this paper we suggest a new signal constellation design to be used for DM-OFDM-IM that gives reduced bit error rate (BER) compared to conventional DMOFDM-IM system. We also discuss about the rationale between our design here.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Crime Analysis and Prediction using Optimized K-Means Algorithm 基于优化k -均值算法的犯罪分析与预测
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000169
S. Krishnendu, P. Lakshmi, L. Nitha
In India, the crime rate is increasing each day. In the current situation, recent technological influence, effects of social media and modern approaches help the offenders to achieve their crimes. Both analysis and prediction of crime is a systematized method that classifies and examines the crime patterns. There exist various clustering algorithms for crime analysis and pattern prediction but they do not reveal all the requirements. Among these, K means algorithm provides a better way for predicting the results. The proposed research work mainly focused on predicting the region with higher crime rates and age groups with more or less criminal tendencies. We propose an optimized K means algorithm to lower the time complexity and improve efficiency in the result.
在印度,犯罪率每天都在上升。在目前的情况下,最近的技术影响,社会媒体的影响和现代手段帮助罪犯实现他们的犯罪。犯罪分析和预测都是对犯罪模式进行分类和检验的系统化方法。目前已有各种聚类算法用于犯罪分析和模式预测,但它们并不能反映所有的要求。其中,K均值算法为预测结果提供了较好的方法。建议的研究工作主要集中在预测犯罪率高的地区和犯罪倾向多或少的年龄组。我们提出了一种优化的K均值算法来降低时间复杂度,提高结果的效率。
{"title":"Crime Analysis and Prediction using Optimized K-Means Algorithm","authors":"S. Krishnendu, P. Lakshmi, L. Nitha","doi":"10.1109/ICCMC48092.2020.ICCMC-000169","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000169","url":null,"abstract":"In India, the crime rate is increasing each day. In the current situation, recent technological influence, effects of social media and modern approaches help the offenders to achieve their crimes. Both analysis and prediction of crime is a systematized method that classifies and examines the crime patterns. There exist various clustering algorithms for crime analysis and pattern prediction but they do not reveal all the requirements. Among these, K means algorithm provides a better way for predicting the results. The proposed research work mainly focused on predicting the region with higher crime rates and age groups with more or less criminal tendencies. We propose an optimized K means algorithm to lower the time complexity and improve efficiency in the result.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fault Detection of Electric Vehicle Charging Piles Based on Extreme Learning Machine Algorithm 基于极限学习机算法的电动汽车充电桩故障检测
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000157
Xinming Gao, Gaoteng Yuan, Mengjiao Zhang
With electric cars, large-scale development, in order to make the electric vehicles charging more convenient and efficient, public charging piles began to be used on a large scale. However, traditional fault detection methods are still used in charging piles, which makes the detection efficiency low. This paper proposes an error detection procedure of charging pile founded on ELM method. Different from the traditional charging pile fault detection model, this method constructs data for common features of the charging pile and establishes a classification prediction frame work that relies on the Extreme Learning Machine (ELM) algorithm. Experimental results evinces that the frame works accuracy is 83%, with a high efficiency, strong practicability, and is easy to popularize.
随着电动汽车的规模化发展,为了使电动汽车充电更加便捷高效,公共充电桩开始大规模使用。然而,充电桩故障检测仍采用传统的检测方法,检测效率较低。提出了一种基于ELM方法的充电桩误差检测方法。与传统的充电桩故障检测模型不同,该方法对充电桩的共同特征进行数据构建,建立基于极限学习机(ELM)算法的分类预测框架。实验结果表明,该框架工作精度达83%,效率高,实用性强,易于推广。
{"title":"Fault Detection of Electric Vehicle Charging Piles Based on Extreme Learning Machine Algorithm","authors":"Xinming Gao, Gaoteng Yuan, Mengjiao Zhang","doi":"10.1109/ICCMC48092.2020.ICCMC-000157","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000157","url":null,"abstract":"With electric cars, large-scale development, in order to make the electric vehicles charging more convenient and efficient, public charging piles began to be used on a large scale. However, traditional fault detection methods are still used in charging piles, which makes the detection efficiency low. This paper proposes an error detection procedure of charging pile founded on ELM method. Different from the traditional charging pile fault detection model, this method constructs data for common features of the charging pile and establishes a classification prediction frame work that relies on the Extreme Learning Machine (ELM) algorithm. Experimental results evinces that the frame works accuracy is 83%, with a high efficiency, strong practicability, and is easy to popularize.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121605689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network Slicing in 5G and the Security Concerns 5G中的网络切片和安全问题
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00014
A. Mathew
The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.
第五代移动通信(5G)目前正在推出,服务提供商正在其网络中采用它。5G可以连接多个设备并通过互联网进行通信,从而使其能够支持物联网(IoT)。其支持多种设备的技术之一是网络切片技术,该技术有助于管理由不同用户设备组成的逻辑网络。本研究的目的是探索网络切片技术,并调查其给5G带来的安全问题。本研究采用定性研究方法——系统评价法来收集和分析数据。该综述包括对从Google Scholar、IEEE和Cochrane图书馆获得的各种文献来源的分析。数据分析过程本质上是主题性的,重点关注安全挑战、解决方案和网络切片的优点。文献研究结果表明,网络切片存在两大挑战,即安全性和5G无线接入网络(RAN)的实现以适应切片。应对这些挑战的潜在解决方案包括通过切片、加密、身份验证和手动将切片分配给不同设备来实现网络隔离。从本研究中得出的主要结论是,网络切片适用于5G,并且解决方案在最大限度地降低其对网络构成的安全风险方面仍然有效。
{"title":"Network Slicing in 5G and the Security Concerns","authors":"A. Mathew","doi":"10.1109/ICCMC48092.2020.ICCMC-00014","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00014","url":null,"abstract":"The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Enhance Safety and Security System for Children in School Campus by using Wearable Sensors 利用可穿戴式传感器增强校园儿童安全保障系统
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000183
R. Kamalraj, E. S. Madhan, K. Ghamya, V. Bhargavi
Child security in the school campus is most important in building a good society. In and around the world the children are abused and killed also in sometimes by the people those who are not in good attitude in the school campus. To track and resolve such issues an enhanced security feature system is required. Hence in this paper an enhanced version of security system for children is proposed by using ‘Wearable Sensors’. In this proposed method two wearable sensors nodes such as ‘Staff Node’ and ‘Student Node’ are paired by using ‘Bluetooth’ communication technology and Smart Watch technology is also used to communicate the Security Center or Processing Node for tracking them about their location and whether the two nodes are moved away from the classroom. If the child node is not moving for a long period then it may be notified by the center and they will inform the security officers near to the place. This proposed method may satisfy the need of school management about the staff movements with students and the behavior of students to avoid unexpected issues.
校园儿童安全对建设良好社会至关重要。在世界各地,孩子们被虐待和杀害,有时也被那些在校园里态度不好的人杀害。为了跟踪和解决这些问题,需要一个增强的安全功能系统。因此,本文提出了一种使用“可穿戴传感器”的儿童安全系统的增强版本。在这种方法中,两个可穿戴传感器节点,如“员工节点”和“学生节点”,通过使用“蓝牙”通信技术配对,智能手表技术也用于与安全中心或处理节点通信,以跟踪它们的位置以及两个节点是否被移出教室。如果子节点长时间不移动,那么中心可能会通知它,他们将通知该地点附近的安全人员。该方法可以满足学校管理人员对学生活动和学生行为的需求,避免意外事件的发生。
{"title":"Enhance Safety and Security System for Children in School Campus by using Wearable Sensors","authors":"R. Kamalraj, E. S. Madhan, K. Ghamya, V. Bhargavi","doi":"10.1109/ICCMC48092.2020.ICCMC-000183","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000183","url":null,"abstract":"Child security in the school campus is most important in building a good society. In and around the world the children are abused and killed also in sometimes by the people those who are not in good attitude in the school campus. To track and resolve such issues an enhanced security feature system is required. Hence in this paper an enhanced version of security system for children is proposed by using ‘Wearable Sensors’. In this proposed method two wearable sensors nodes such as ‘Staff Node’ and ‘Student Node’ are paired by using ‘Bluetooth’ communication technology and Smart Watch technology is also used to communicate the Security Center or Processing Node for tracking them about their location and whether the two nodes are moved away from the classroom. If the child node is not moving for a long period then it may be notified by the center and they will inform the security officers near to the place. This proposed method may satisfy the need of school management about the staff movements with students and the behavior of students to avoid unexpected issues.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"695 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126241554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Video-based Evidence Analysis and Digital Forensic 基于视频的证据分析与数字取证研究综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00024
R. Mante, Reshma Khan
In the past couple of decades, the most emerging domain across the globe is Information Technology [IT]. It has made a significant contribution in cracking the criminal case and preparing the strong cases in the court of justice. IT technologies have become a vital tool for examination and gathering of the digital evidences. As crime rate is increasing day-by-day, in order to reduce the occurrence of crime and bring the culprit of the crime to justice, the computer forensics plays an indispensable role. With the recent technological developments, it has become more powerful and portable. Large amount of data has created stored and accessed everyday. Many technologically advanced devices are acting as repositories for the collected personal information. Such devices remain portable and accessible with a single click or even to the voice command. To have such large-scale information is important to get the conviction for the culprits but at the same time, investigating agencies has to maintain the privacy of the recovered data to make it admissible in the court. This gives rise to the security mechanism for such data. Collection, analysis, investigation and reporting of the digital data come under forensic science, which is a part of digital forensics domain. In this paper, we have presented a review on the existing researches available in the field of video forensic analysis.
在过去的几十年里,全球最新兴的领域是信息技术(IT)。它在破获刑事案件和准备法庭上强有力的案件方面作出了重大贡献。信息技术已成为审查和收集数字证据的重要工具。随着犯罪率的日益上升,为了减少犯罪的发生,将罪犯绳之以法,计算机取证发挥着不可或缺的作用。随着最近技术的发展,它变得更加强大和便携。每天都有大量的数据产生、存储和访问。许多技术先进的设备充当了收集的个人信息的存储库。这样的设备仍然是便携的,只需点击一下,甚至通过语音命令就可以访问。拥有如此大规模的信息对于罪犯的定罪至关重要,但与此同时,调查机构必须保持恢复数据的隐私,使其在法庭上成为可接受的证据。这就产生了此类数据的安全机制。数字数据的收集、分析、调查和报告属于法医学,是数字取证领域的一部分。本文对视频取证分析领域的现有研究进行了综述。
{"title":"A Survey on Video-based Evidence Analysis and Digital Forensic","authors":"R. Mante, Reshma Khan","doi":"10.1109/ICCMC48092.2020.ICCMC-00024","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00024","url":null,"abstract":"In the past couple of decades, the most emerging domain across the globe is Information Technology [IT]. It has made a significant contribution in cracking the criminal case and preparing the strong cases in the court of justice. IT technologies have become a vital tool for examination and gathering of the digital evidences. As crime rate is increasing day-by-day, in order to reduce the occurrence of crime and bring the culprit of the crime to justice, the computer forensics plays an indispensable role. With the recent technological developments, it has become more powerful and portable. Large amount of data has created stored and accessed everyday. Many technologically advanced devices are acting as repositories for the collected personal information. Such devices remain portable and accessible with a single click or even to the voice command. To have such large-scale information is important to get the conviction for the culprits but at the same time, investigating agencies has to maintain the privacy of the recovered data to make it admissible in the court. This gives rise to the security mechanism for such data. Collection, analysis, investigation and reporting of the digital data come under forensic science, which is a part of digital forensics domain. In this paper, we have presented a review on the existing researches available in the field of video forensic analysis.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127276437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fuzzy c-means Segmentation on Enhanced Mammograms Using CLAHE and Fourth Order Complex Diffusion 基于CLAHE和四阶复扩散的增强乳房x线图像模糊c均值分割
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000120
M. Mohan, Lekshmi Priya T, L. S. Nair
Cancer statistics all around the globe are rising day by day, out of which breast cancer is the dominating one in women. Mammography is used to detect the presence of cancerous cells and computer-aided detection technologies are used to get more accurate results. There are different image processing techniques which are applied for cancer detection in mammograms. In this work, a combined methodology is used for enhancing the contrast of the mammogram which includes contrast limited histogram equalization (CLAHE), morphological gradient and fourth order nonlinear complex diffusion based unsharpening. The enhanced mammogram is then segmented using fuzzy c-means. An analysis is done on each of the following cases with Fuzzy-c means segmentation: CLAHE enhanced, morphologicall gradient enhanced, fourth order nonlinear complex diffusion enhanced and combined enhanced image using the above methods.
全球的癌症统计数据每天都在上升,其中乳腺癌在女性中占主导地位。乳房x线照相术用于检测癌细胞的存在,计算机辅助检测技术用于获得更准确的结果。有不同的图像处理技术应用于乳房x光检查中的癌症检测。在这项工作中,使用了一种组合方法来增强乳房x线照片的对比度,包括对比度限制直方图均衡化(CLAHE),形态梯度和基于四阶非线性复杂扩散的非锐化。然后使用模糊c均值对增强的乳房x光片进行分割。分析了采用上述方法对CLAHE增强、形态学梯度增强、四阶非线性复扩散增强和组合增强图像进行模糊均值分割的情况。
{"title":"Fuzzy c-means Segmentation on Enhanced Mammograms Using CLAHE and Fourth Order Complex Diffusion","authors":"M. Mohan, Lekshmi Priya T, L. S. Nair","doi":"10.1109/ICCMC48092.2020.ICCMC-000120","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000120","url":null,"abstract":"Cancer statistics all around the globe are rising day by day, out of which breast cancer is the dominating one in women. Mammography is used to detect the presence of cancerous cells and computer-aided detection technologies are used to get more accurate results. There are different image processing techniques which are applied for cancer detection in mammograms. In this work, a combined methodology is used for enhancing the contrast of the mammogram which includes contrast limited histogram equalization (CLAHE), morphological gradient and fourth order nonlinear complex diffusion based unsharpening. The enhanced mammogram is then segmented using fuzzy c-means. An analysis is done on each of the following cases with Fuzzy-c means segmentation: CLAHE enhanced, morphologicall gradient enhanced, fourth order nonlinear complex diffusion enhanced and combined enhanced image using the above methods.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1