首页 > 最新文献

2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Crime Analysis and Prediction using Optimized K-Means Algorithm 基于优化k -均值算法的犯罪分析与预测
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000169
S. Krishnendu, P. Lakshmi, L. Nitha
In India, the crime rate is increasing each day. In the current situation, recent technological influence, effects of social media and modern approaches help the offenders to achieve their crimes. Both analysis and prediction of crime is a systematized method that classifies and examines the crime patterns. There exist various clustering algorithms for crime analysis and pattern prediction but they do not reveal all the requirements. Among these, K means algorithm provides a better way for predicting the results. The proposed research work mainly focused on predicting the region with higher crime rates and age groups with more or less criminal tendencies. We propose an optimized K means algorithm to lower the time complexity and improve efficiency in the result.
在印度,犯罪率每天都在上升。在目前的情况下,最近的技术影响,社会媒体的影响和现代手段帮助罪犯实现他们的犯罪。犯罪分析和预测都是对犯罪模式进行分类和检验的系统化方法。目前已有各种聚类算法用于犯罪分析和模式预测,但它们并不能反映所有的要求。其中,K均值算法为预测结果提供了较好的方法。建议的研究工作主要集中在预测犯罪率高的地区和犯罪倾向多或少的年龄组。我们提出了一种优化的K均值算法来降低时间复杂度,提高结果的效率。
{"title":"Crime Analysis and Prediction using Optimized K-Means Algorithm","authors":"S. Krishnendu, P. Lakshmi, L. Nitha","doi":"10.1109/ICCMC48092.2020.ICCMC-000169","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000169","url":null,"abstract":"In India, the crime rate is increasing each day. In the current situation, recent technological influence, effects of social media and modern approaches help the offenders to achieve their crimes. Both analysis and prediction of crime is a systematized method that classifies and examines the crime patterns. There exist various clustering algorithms for crime analysis and pattern prediction but they do not reveal all the requirements. Among these, K means algorithm provides a better way for predicting the results. The proposed research work mainly focused on predicting the region with higher crime rates and age groups with more or less criminal tendencies. We propose an optimized K means algorithm to lower the time complexity and improve efficiency in the result.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Constellation Design for Dual-Mode OFDM-IM 双模OFDM-IM的星座设计
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000150
Shilpa Sridhar, Latha, Arpita Thakre
Dual mode Orthogonal Frequency Division Multiplexing with Index Modulation (DM-OFDM-IM) is a modified version of the orthogonal frequency division multiplexing with index modulation (OFDM-IM). In DMOFDM-IM, sub-carriers in each sub-block are divided into two groups. These two groups are modulated with two different signal constellations, chosen from available standard constellations, for example PSK or QAM. All the subcarriers are used to transmit data, while index bit is used to select the constellation. Therefore, in this system there is an improvement in the spectral efficiency which is always greater than OFDM-IM. In this paper we suggest a new signal constellation design to be used for DM-OFDM-IM that gives reduced bit error rate (BER) compared to conventional DMOFDM-IM system. We also discuss about the rationale between our design here.
双模指数调制正交频分复用(DM-OFDM-IM)是指数调制正交频分复用(OFDM-IM)的改进版本。在DMOFDM-IM中,每个子块中的子载波被分成两组。这两个组用两个不同的信号星座调制,从可用的标准星座中选择,例如PSK或QAM。所有子载波用于传输数据,索引位用于选择星座。因此,在该系统中,频谱效率的提高总是大于OFDM-IM。本文提出了一种新的用于DM-OFDM-IM的信号星座设计,与传统的DMOFDM-IM系统相比,它具有更低的误码率(BER)。我们还在这里讨论了我们设计之间的基本原理。
{"title":"Constellation Design for Dual-Mode OFDM-IM","authors":"Shilpa Sridhar, Latha, Arpita Thakre","doi":"10.1109/ICCMC48092.2020.ICCMC-000150","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000150","url":null,"abstract":"Dual mode Orthogonal Frequency Division Multiplexing with Index Modulation (DM-OFDM-IM) is a modified version of the orthogonal frequency division multiplexing with index modulation (OFDM-IM). In DMOFDM-IM, sub-carriers in each sub-block are divided into two groups. These two groups are modulated with two different signal constellations, chosen from available standard constellations, for example PSK or QAM. All the subcarriers are used to transmit data, while index bit is used to select the constellation. Therefore, in this system there is an improvement in the spectral efficiency which is always greater than OFDM-IM. In this paper we suggest a new signal constellation design to be used for DM-OFDM-IM that gives reduced bit error rate (BER) compared to conventional DMOFDM-IM system. We also discuss about the rationale between our design here.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Handling of Incomplete basic Partitions by Spectral Greedy K-Means Consensus Clustering 基于谱贪婪k均值一致聚类的不完全基本分区的高效处理
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00056
M. Vasuki, S. Revathy
Cluster ensemble approaches are combining different clustering results into single partitions. To enhance the quality of single partitions, this paper examines a comparative study of different methods with advantage and drawbacks. Performing spectral ensemble cluster (SEC) via weighted k-means are not efficient to handle incomplete basic partitions and big data problems. To overcome the problems in SEC, Greedy k-means consensus clustering is combined with SEC. By solving the above challenges, named spectral greedy k-means consensus clustering (SGKCC) is proposed. The proposed SGKCC efficient to handle incomplete basic partitions in big data which enhance the quality of single partition. Extensive evaluation NMI and RI used to calculate the performance efficiency compared with existing approach proving the result of proposed algorithm.
聚类集成方法将不同的聚类结果组合成单个分区。为了提高单隔板的质量,本文对不同方法的优缺点进行了比较研究。基于加权k均值的谱集合聚类(SEC)在处理不完全基本分区和大数据问题时效率不高。为了克服SEC存在的问题,将贪婪k-means共识聚类与SEC相结合,提出了频谱贪婪k-means共识聚类(SGKCC)。提出的SGKCC有效地处理了大数据中不完整的基本分区,提高了单个分区的质量。采用广泛的评价NMI和RI来计算性能效率,并与现有方法进行比较,验证了所提算法的结果。
{"title":"Efficient Handling of Incomplete basic Partitions by Spectral Greedy K-Means Consensus Clustering","authors":"M. Vasuki, S. Revathy","doi":"10.1109/ICCMC48092.2020.ICCMC-00056","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00056","url":null,"abstract":"Cluster ensemble approaches are combining different clustering results into single partitions. To enhance the quality of single partitions, this paper examines a comparative study of different methods with advantage and drawbacks. Performing spectral ensemble cluster (SEC) via weighted k-means are not efficient to handle incomplete basic partitions and big data problems. To overcome the problems in SEC, Greedy k-means consensus clustering is combined with SEC. By solving the above challenges, named spectral greedy k-means consensus clustering (SGKCC) is proposed. The proposed SGKCC efficient to handle incomplete basic partitions in big data which enhance the quality of single partition. Extensive evaluation NMI and RI used to calculate the performance efficiency compared with existing approach proving the result of proposed algorithm.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121457584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Slicing in 5G and the Security Concerns 5G中的网络切片和安全问题
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00014
A. Mathew
The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.
第五代移动通信(5G)目前正在推出,服务提供商正在其网络中采用它。5G可以连接多个设备并通过互联网进行通信,从而使其能够支持物联网(IoT)。其支持多种设备的技术之一是网络切片技术,该技术有助于管理由不同用户设备组成的逻辑网络。本研究的目的是探索网络切片技术,并调查其给5G带来的安全问题。本研究采用定性研究方法——系统评价法来收集和分析数据。该综述包括对从Google Scholar、IEEE和Cochrane图书馆获得的各种文献来源的分析。数据分析过程本质上是主题性的,重点关注安全挑战、解决方案和网络切片的优点。文献研究结果表明,网络切片存在两大挑战,即安全性和5G无线接入网络(RAN)的实现以适应切片。应对这些挑战的潜在解决方案包括通过切片、加密、身份验证和手动将切片分配给不同设备来实现网络隔离。从本研究中得出的主要结论是,网络切片适用于5G,并且解决方案在最大限度地降低其对网络构成的安全风险方面仍然有效。
{"title":"Network Slicing in 5G and the Security Concerns","authors":"A. Mathew","doi":"10.1109/ICCMC48092.2020.ICCMC-00014","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00014","url":null,"abstract":"The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Detection of Rice Leaf Diseases Using Image Processing 利用图像处理技术检测水稻叶片病害
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00080
Minu Eliz Pothen, Dr. Maya L Pai
Diseases infected on plant leaves particularly in rice leaves are one of the significant issues faced by the farmers. As a result, it is extremely hard to deliver the quantity of food needed for the growing human population. Rice diseases have caused production and economic losses in the agricultural sector. It will like-wise influence the earnings of farmers who rely upon agriculture and nowadays farmers commit suicide because of misfortune experienced in agriculture. Detection of definite disease infected on plants will assist to plan various disease control procedures. Proposed method describes different strategies utilized for rice leaf disease classification purpose. Bacterial leaf blight, Leaf smut and Brown spot diseased images are segmented using Otsu’s method. From the segmented area. various features are separated utilizing “Local Binary Patterns (LBP)” and “Histogram of Oriented Gradients (HOG)”. Then the features are classified with the assistance of Support Vector Machine (SVM) and accomplished 94.6% with polynomial Kernel SVM and HOG.
植物叶片特别是水稻叶片的病害是农民面临的重要问题之一。因此,为不断增长的人口提供所需的食物数量是极其困难的。水稻病害给农业部门造成了生产和经济损失。它同样会影响依赖农业的农民的收入,现在农民因为农业的不幸而自杀。对植物感染的明确疾病的检测将有助于制定各种疾病控制程序。提出的方法描述了用于水稻叶病分类的不同策略。采用Otsu方法对细菌性叶枯病、黑穗病和褐斑病图像进行分割。从分割的区域。利用“局部二值模式(LBP)”和“定向梯度直方图(HOG)”分离各种特征。然后在支持向量机(SVM)的辅助下对特征进行分类,多项式核支持向量机和HOG的分类准确率为94.6%。
{"title":"Detection of Rice Leaf Diseases Using Image Processing","authors":"Minu Eliz Pothen, Dr. Maya L Pai","doi":"10.1109/ICCMC48092.2020.ICCMC-00080","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00080","url":null,"abstract":"Diseases infected on plant leaves particularly in rice leaves are one of the significant issues faced by the farmers. As a result, it is extremely hard to deliver the quantity of food needed for the growing human population. Rice diseases have caused production and economic losses in the agricultural sector. It will like-wise influence the earnings of farmers who rely upon agriculture and nowadays farmers commit suicide because of misfortune experienced in agriculture. Detection of definite disease infected on plants will assist to plan various disease control procedures. Proposed method describes different strategies utilized for rice leaf disease classification purpose. Bacterial leaf blight, Leaf smut and Brown spot diseased images are segmented using Otsu’s method. From the segmented area. various features are separated utilizing “Local Binary Patterns (LBP)” and “Histogram of Oriented Gradients (HOG)”. Then the features are classified with the assistance of Support Vector Machine (SVM) and accomplished 94.6% with polynomial Kernel SVM and HOG.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Simulation Study of Cascade H-bridge Multilevel Inverter 7-Level Inverter by SHE Technique 级联h桥多电平逆变器的SHE技术仿真研究
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000124
P. Bute, S. K. Mittal
In this Paper, fuzzy logic approach is implemented as a switching technique. The traditional logic gate design is eliminated by using the proposed technique. There is a pulse generator which is designed by fuzzy logic acts as a pulse generator and a look-up table also. An input is based on a modulation index, well controlled membership functions used and the related fuzzy logic controller’s rules can be used to produce pulses directly without using any extra block. The mentioned technique is being implemented by using the cascaded multilevel H-Bridge inverter with symmetric operation using pulse width modulation with selective harmonic elimination technique (SHE-PWM). MFs are designed as per the calculated firing angles for various modulation index.
本文将模糊逻辑方法作为一种切换技术来实现。该技术消除了传统的逻辑门设计。采用模糊逻辑设计的脉冲发生器作为脉冲发生器,并提供了一个查询表。输入基于调制指标,使用控制良好的隶属函数和相关的模糊逻辑控制器规则可以直接产生脉冲,而无需使用任何额外的块。上述技术是通过使用对称操作的级联多电平h桥逆变器实现的,该逆变器使用脉冲宽度调制和选择性谐波消除技术(SHE-PWM)。根据计算得到的不同调制指数下的发射角,设计了MFs。
{"title":"Simulation Study of Cascade H-bridge Multilevel Inverter 7-Level Inverter by SHE Technique","authors":"P. Bute, S. K. Mittal","doi":"10.1109/ICCMC48092.2020.ICCMC-000124","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000124","url":null,"abstract":"In this Paper, fuzzy logic approach is implemented as a switching technique. The traditional logic gate design is eliminated by using the proposed technique. There is a pulse generator which is designed by fuzzy logic acts as a pulse generator and a look-up table also. An input is based on a modulation index, well controlled membership functions used and the related fuzzy logic controller’s rules can be used to produce pulses directly without using any extra block. The mentioned technique is being implemented by using the cascaded multilevel H-Bridge inverter with symmetric operation using pulse width modulation with selective harmonic elimination technique (SHE-PWM). MFs are designed as per the calculated firing angles for various modulation index.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Survey on Video-based Evidence Analysis and Digital Forensic 基于视频的证据分析与数字取证研究综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00024
R. Mante, Reshma Khan
In the past couple of decades, the most emerging domain across the globe is Information Technology [IT]. It has made a significant contribution in cracking the criminal case and preparing the strong cases in the court of justice. IT technologies have become a vital tool for examination and gathering of the digital evidences. As crime rate is increasing day-by-day, in order to reduce the occurrence of crime and bring the culprit of the crime to justice, the computer forensics plays an indispensable role. With the recent technological developments, it has become more powerful and portable. Large amount of data has created stored and accessed everyday. Many technologically advanced devices are acting as repositories for the collected personal information. Such devices remain portable and accessible with a single click or even to the voice command. To have such large-scale information is important to get the conviction for the culprits but at the same time, investigating agencies has to maintain the privacy of the recovered data to make it admissible in the court. This gives rise to the security mechanism for such data. Collection, analysis, investigation and reporting of the digital data come under forensic science, which is a part of digital forensics domain. In this paper, we have presented a review on the existing researches available in the field of video forensic analysis.
在过去的几十年里,全球最新兴的领域是信息技术(IT)。它在破获刑事案件和准备法庭上强有力的案件方面作出了重大贡献。信息技术已成为审查和收集数字证据的重要工具。随着犯罪率的日益上升,为了减少犯罪的发生,将罪犯绳之以法,计算机取证发挥着不可或缺的作用。随着最近技术的发展,它变得更加强大和便携。每天都有大量的数据产生、存储和访问。许多技术先进的设备充当了收集的个人信息的存储库。这样的设备仍然是便携的,只需点击一下,甚至通过语音命令就可以访问。拥有如此大规模的信息对于罪犯的定罪至关重要,但与此同时,调查机构必须保持恢复数据的隐私,使其在法庭上成为可接受的证据。这就产生了此类数据的安全机制。数字数据的收集、分析、调查和报告属于法医学,是数字取证领域的一部分。本文对视频取证分析领域的现有研究进行了综述。
{"title":"A Survey on Video-based Evidence Analysis and Digital Forensic","authors":"R. Mante, Reshma Khan","doi":"10.1109/ICCMC48092.2020.ICCMC-00024","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00024","url":null,"abstract":"In the past couple of decades, the most emerging domain across the globe is Information Technology [IT]. It has made a significant contribution in cracking the criminal case and preparing the strong cases in the court of justice. IT technologies have become a vital tool for examination and gathering of the digital evidences. As crime rate is increasing day-by-day, in order to reduce the occurrence of crime and bring the culprit of the crime to justice, the computer forensics plays an indispensable role. With the recent technological developments, it has become more powerful and portable. Large amount of data has created stored and accessed everyday. Many technologically advanced devices are acting as repositories for the collected personal information. Such devices remain portable and accessible with a single click or even to the voice command. To have such large-scale information is important to get the conviction for the culprits but at the same time, investigating agencies has to maintain the privacy of the recovered data to make it admissible in the court. This gives rise to the security mechanism for such data. Collection, analysis, investigation and reporting of the digital data come under forensic science, which is a part of digital forensics domain. In this paper, we have presented a review on the existing researches available in the field of video forensic analysis.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127276437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of IoT Based Smart Industrial System for Controlling and Monitoring 基于物联网的智能工业控制与监控系统研究综述
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00012
Prajakta Karemore, P. Jagtap
In recent years, Industrial Control [IC] is emerging as a fundamental aspect to gather all the pertinent data, insights and information identified with different mechanical procedures, engines, machines, and gadgets utilized in industrial premises. This focuses on delivering controlled access, better efficiency and great aftereffects of the modern items being manufactured. In this new period of innovative research improvements in remote control and monitoring by means of correspondence methods, for example, ZigBee, RF, Infrared, systems have been generally utilized in industries. In any case, these remote correspondence strategies are commonly confined to basic applications on account of their moderate correspondence paces, separations, and information security. The recently proposed framework is evolving as the fundamental need of the industry for monitoring, control, security and wellbeing of various exercises. The monitoring framework incorporates sensors like fire sensor, smoke sensor, ultrasonic sensor, moisture and temperature sensor, current and voltage with Wi-Fi module for control operations. With the benefits of unusual exercises, reasonable activities will be activated. This framework can likewise be controlled by using remote server with application in PC/Laptop. This undertaking additionally incorporates facial recognition by utilizing an open CV to perceive the essence of the approved individual of the industry to sign in / log out and the subtleties will be put away in the database sheet or refreshed to cloud. On the off chance that, any invalid section or attempt to the break-in, immediately an alarm email will be sent to the particular approved authority/individual/group.
近年来,工业控制[IC]正在成为收集工业场所中使用的不同机械程序、发动机、机器和小工具所识别的所有相关数据、见解和信息的基本方面。这侧重于提供受控的访问,更好的效率和现代产品制造的巨大后遗症。在这个创新研究的新时期,通过通信方式进行远程控制和监控的改进,例如ZigBee、RF、红外等系统已在工业中得到普遍应用。在任何情况下,由于这些远程通信策略具有适度的通信速度、间隔和信息安全性,它们通常局限于基本应用程序。最近提出的框架正在演变为行业对各种演习的监测、控制、安全和福祉的基本需求。监控框架包括火灾传感器、烟雾传感器、超声波传感器、湿度和温度传感器、电流和电压等传感器,以及用于控制操作的Wi-Fi模块。有了非常规运动的好处,合理的活动就会被激活。该框架也可以在PC/笔记本电脑上使用远程服务器进行控制。这项工作还结合了面部识别,利用开放的简历来识别行业中被批准的个人的本质,以登录/注销,并将细微之处保存在数据库表中或刷新到云端。如果发现任何无效的部分或企图闯入,将立即向特定的批准机构/个人/团体发送警报电子邮件。
{"title":"A Review of IoT Based Smart Industrial System for Controlling and Monitoring","authors":"Prajakta Karemore, P. Jagtap","doi":"10.1109/ICCMC48092.2020.ICCMC-00012","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00012","url":null,"abstract":"In recent years, Industrial Control [IC] is emerging as a fundamental aspect to gather all the pertinent data, insights and information identified with different mechanical procedures, engines, machines, and gadgets utilized in industrial premises. This focuses on delivering controlled access, better efficiency and great aftereffects of the modern items being manufactured. In this new period of innovative research improvements in remote control and monitoring by means of correspondence methods, for example, ZigBee, RF, Infrared, systems have been generally utilized in industries. In any case, these remote correspondence strategies are commonly confined to basic applications on account of their moderate correspondence paces, separations, and information security. The recently proposed framework is evolving as the fundamental need of the industry for monitoring, control, security and wellbeing of various exercises. The monitoring framework incorporates sensors like fire sensor, smoke sensor, ultrasonic sensor, moisture and temperature sensor, current and voltage with Wi-Fi module for control operations. With the benefits of unusual exercises, reasonable activities will be activated. This framework can likewise be controlled by using remote server with application in PC/Laptop. This undertaking additionally incorporates facial recognition by utilizing an open CV to perceive the essence of the approved individual of the industry to sign in / log out and the subtleties will be put away in the database sheet or refreshed to cloud. On the off chance that, any invalid section or attempt to the break-in, immediately an alarm email will be sent to the particular approved authority/individual/group.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127261398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhance Safety and Security System for Children in School Campus by using Wearable Sensors 利用可穿戴式传感器增强校园儿童安全保障系统
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000183
R. Kamalraj, E. S. Madhan, K. Ghamya, V. Bhargavi
Child security in the school campus is most important in building a good society. In and around the world the children are abused and killed also in sometimes by the people those who are not in good attitude in the school campus. To track and resolve such issues an enhanced security feature system is required. Hence in this paper an enhanced version of security system for children is proposed by using ‘Wearable Sensors’. In this proposed method two wearable sensors nodes such as ‘Staff Node’ and ‘Student Node’ are paired by using ‘Bluetooth’ communication technology and Smart Watch technology is also used to communicate the Security Center or Processing Node for tracking them about their location and whether the two nodes are moved away from the classroom. If the child node is not moving for a long period then it may be notified by the center and they will inform the security officers near to the place. This proposed method may satisfy the need of school management about the staff movements with students and the behavior of students to avoid unexpected issues.
校园儿童安全对建设良好社会至关重要。在世界各地,孩子们被虐待和杀害,有时也被那些在校园里态度不好的人杀害。为了跟踪和解决这些问题,需要一个增强的安全功能系统。因此,本文提出了一种使用“可穿戴传感器”的儿童安全系统的增强版本。在这种方法中,两个可穿戴传感器节点,如“员工节点”和“学生节点”,通过使用“蓝牙”通信技术配对,智能手表技术也用于与安全中心或处理节点通信,以跟踪它们的位置以及两个节点是否被移出教室。如果子节点长时间不移动,那么中心可能会通知它,他们将通知该地点附近的安全人员。该方法可以满足学校管理人员对学生活动和学生行为的需求,避免意外事件的发生。
{"title":"Enhance Safety and Security System for Children in School Campus by using Wearable Sensors","authors":"R. Kamalraj, E. S. Madhan, K. Ghamya, V. Bhargavi","doi":"10.1109/ICCMC48092.2020.ICCMC-000183","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000183","url":null,"abstract":"Child security in the school campus is most important in building a good society. In and around the world the children are abused and killed also in sometimes by the people those who are not in good attitude in the school campus. To track and resolve such issues an enhanced security feature system is required. Hence in this paper an enhanced version of security system for children is proposed by using ‘Wearable Sensors’. In this proposed method two wearable sensors nodes such as ‘Staff Node’ and ‘Student Node’ are paired by using ‘Bluetooth’ communication technology and Smart Watch technology is also used to communicate the Security Center or Processing Node for tracking them about their location and whether the two nodes are moved away from the classroom. If the child node is not moving for a long period then it may be notified by the center and they will inform the security officers near to the place. This proposed method may satisfy the need of school management about the staff movements with students and the behavior of students to avoid unexpected issues.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"695 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126241554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey of Iris Image Segmentation and Localization 虹膜图像分割与定位研究进展
Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000100
S. S. Rao, R. Shreyas, G. Maske, A. Choudhury
Iris recognition is one of the best methods in the biometric identification field because the iris has features that are not unique but also stay throughout the person’s lifetime. Iris recognition has multiple phases namely Image Acquisition, Iris Segmentation, Iris Localization, Feature Extraction and Matching. Image Acquisition is simply the capturing of the iris image at an optimal distance. Iris Segmentation is the process of obtaining all the different segments of the eye. Iris Localization is the process of finding inner and outer boundaries of the iris differentiating it from the sclera and pupil and mainly focusing on the iris alone. Feature extraction is the process of extracting the biometric template from the Iris, giving the unique data required for the next step. Matching is the process of finding the best match in the database for the extracted biometric template. The future implementation of this paper focuses only on the processes of Image Acquisition, Iris Segmentation and Iris Localization. The paper aims to optimise these processes in terms of image capture distance, computation time and memory requirement, using the Dynamic Reconfigurable Processor (DRP) technology along with suitable algorithms for segmentation and localization processes as described in sections 2.2 and 2.3 respectively.
虹膜识别是生物识别领域中最好的方法之一,因为虹膜的特征不是唯一的,而且会伴随人的一生。虹膜识别包括图像采集、虹膜分割、虹膜定位、特征提取和匹配等多个阶段。图像采集就是在最佳距离处捕获虹膜图像。虹膜分割是获得眼睛所有不同部分的过程。虹膜定位是寻找虹膜内外边界的过程,将其与巩膜和瞳孔区分开来,主要以虹膜为中心。特征提取是从虹膜中提取生物特征模板的过程,为下一步提供所需的唯一数据。匹配是对提取的生物特征模板在数据库中寻找最佳匹配的过程。本文的后续实现只关注图像采集、虹膜分割和虹膜定位过程。本文旨在使用动态可重构处理器(Dynamic Reconfigurable Processor, DRP)技术以及分别在2.2节和2.3节中描述的分割和定位过程的合适算法,在图像捕获距离、计算时间和内存需求方面优化这些过程。
{"title":"Survey of Iris Image Segmentation and Localization","authors":"S. S. Rao, R. Shreyas, G. Maske, A. Choudhury","doi":"10.1109/ICCMC48092.2020.ICCMC-000100","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000100","url":null,"abstract":"Iris recognition is one of the best methods in the biometric identification field because the iris has features that are not unique but also stay throughout the person’s lifetime. Iris recognition has multiple phases namely Image Acquisition, Iris Segmentation, Iris Localization, Feature Extraction and Matching. Image Acquisition is simply the capturing of the iris image at an optimal distance. Iris Segmentation is the process of obtaining all the different segments of the eye. Iris Localization is the process of finding inner and outer boundaries of the iris differentiating it from the sclera and pupil and mainly focusing on the iris alone. Feature extraction is the process of extracting the biometric template from the Iris, giving the unique data required for the next step. Matching is the process of finding the best match in the database for the extracted biometric template. The future implementation of this paper focuses only on the processes of Image Acquisition, Iris Segmentation and Iris Localization. The paper aims to optimise these processes in terms of image capture distance, computation time and memory requirement, using the Dynamic Reconfigurable Processor (DRP) technology along with suitable algorithms for segmentation and localization processes as described in sections 2.2 and 2.3 respectively.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120806530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1