Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000169
S. Krishnendu, P. Lakshmi, L. Nitha
In India, the crime rate is increasing each day. In the current situation, recent technological influence, effects of social media and modern approaches help the offenders to achieve their crimes. Both analysis and prediction of crime is a systematized method that classifies and examines the crime patterns. There exist various clustering algorithms for crime analysis and pattern prediction but they do not reveal all the requirements. Among these, K means algorithm provides a better way for predicting the results. The proposed research work mainly focused on predicting the region with higher crime rates and age groups with more or less criminal tendencies. We propose an optimized K means algorithm to lower the time complexity and improve efficiency in the result.
{"title":"Crime Analysis and Prediction using Optimized K-Means Algorithm","authors":"S. Krishnendu, P. Lakshmi, L. Nitha","doi":"10.1109/ICCMC48092.2020.ICCMC-000169","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000169","url":null,"abstract":"In India, the crime rate is increasing each day. In the current situation, recent technological influence, effects of social media and modern approaches help the offenders to achieve their crimes. Both analysis and prediction of crime is a systematized method that classifies and examines the crime patterns. There exist various clustering algorithms for crime analysis and pattern prediction but they do not reveal all the requirements. Among these, K means algorithm provides a better way for predicting the results. The proposed research work mainly focused on predicting the region with higher crime rates and age groups with more or less criminal tendencies. We propose an optimized K means algorithm to lower the time complexity and improve efficiency in the result.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000150
Shilpa Sridhar, Latha, Arpita Thakre
Dual mode Orthogonal Frequency Division Multiplexing with Index Modulation (DM-OFDM-IM) is a modified version of the orthogonal frequency division multiplexing with index modulation (OFDM-IM). In DMOFDM-IM, sub-carriers in each sub-block are divided into two groups. These two groups are modulated with two different signal constellations, chosen from available standard constellations, for example PSK or QAM. All the subcarriers are used to transmit data, while index bit is used to select the constellation. Therefore, in this system there is an improvement in the spectral efficiency which is always greater than OFDM-IM. In this paper we suggest a new signal constellation design to be used for DM-OFDM-IM that gives reduced bit error rate (BER) compared to conventional DMOFDM-IM system. We also discuss about the rationale between our design here.
{"title":"Constellation Design for Dual-Mode OFDM-IM","authors":"Shilpa Sridhar, Latha, Arpita Thakre","doi":"10.1109/ICCMC48092.2020.ICCMC-000150","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000150","url":null,"abstract":"Dual mode Orthogonal Frequency Division Multiplexing with Index Modulation (DM-OFDM-IM) is a modified version of the orthogonal frequency division multiplexing with index modulation (OFDM-IM). In DMOFDM-IM, sub-carriers in each sub-block are divided into two groups. These two groups are modulated with two different signal constellations, chosen from available standard constellations, for example PSK or QAM. All the subcarriers are used to transmit data, while index bit is used to select the constellation. Therefore, in this system there is an improvement in the spectral efficiency which is always greater than OFDM-IM. In this paper we suggest a new signal constellation design to be used for DM-OFDM-IM that gives reduced bit error rate (BER) compared to conventional DMOFDM-IM system. We also discuss about the rationale between our design here.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124927070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00056
M. Vasuki, S. Revathy
Cluster ensemble approaches are combining different clustering results into single partitions. To enhance the quality of single partitions, this paper examines a comparative study of different methods with advantage and drawbacks. Performing spectral ensemble cluster (SEC) via weighted k-means are not efficient to handle incomplete basic partitions and big data problems. To overcome the problems in SEC, Greedy k-means consensus clustering is combined with SEC. By solving the above challenges, named spectral greedy k-means consensus clustering (SGKCC) is proposed. The proposed SGKCC efficient to handle incomplete basic partitions in big data which enhance the quality of single partition. Extensive evaluation NMI and RI used to calculate the performance efficiency compared with existing approach proving the result of proposed algorithm.
{"title":"Efficient Handling of Incomplete basic Partitions by Spectral Greedy K-Means Consensus Clustering","authors":"M. Vasuki, S. Revathy","doi":"10.1109/ICCMC48092.2020.ICCMC-00056","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00056","url":null,"abstract":"Cluster ensemble approaches are combining different clustering results into single partitions. To enhance the quality of single partitions, this paper examines a comparative study of different methods with advantage and drawbacks. Performing spectral ensemble cluster (SEC) via weighted k-means are not efficient to handle incomplete basic partitions and big data problems. To overcome the problems in SEC, Greedy k-means consensus clustering is combined with SEC. By solving the above challenges, named spectral greedy k-means consensus clustering (SGKCC) is proposed. The proposed SGKCC efficient to handle incomplete basic partitions in big data which enhance the quality of single partition. Extensive evaluation NMI and RI used to calculate the performance efficiency compared with existing approach proving the result of proposed algorithm.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121457584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00014
A. Mathew
The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.
{"title":"Network Slicing in 5G and the Security Concerns","authors":"A. Mathew","doi":"10.1109/ICCMC48092.2020.ICCMC-00014","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00014","url":null,"abstract":"The fifth-generation (5G) of mobile communications is currently being rolled out, with service providers adopting it in their networks. 5G enables the connection of multiple devices and their communication over the Internet, giving it the capability to support the Internet of Things (IoT). One of the technologies behind its support of multiple and diverse devices is the network slicing technology which helps in managing the logical networks comprising of different user equipment. The objective of the present study is to explore the network slicing technology and investigate the security concerns that it introduces to 5G. The study adopts the systematic review, which is a qualitative methodology, for gathering and analyzing data. The review comprises of the analysis of various literature sources obtained from Google Scholar, IEEE, and the Cochrane Library. The data analysis process is thematic in nature, focusing on security challenges, their solutions, and the merits of network slicing. The literature findings indicate that network slicing has two major challenges, namely security and the implementation of 5G radio access network (RAN) to accommodate slicing. The potential solutions to these challenges include network isolation through slicing, cryptography, authentication, and manual slice allocation to different devices. The principle conclusions derived from the proposed study are that the network slicing is suitable for 5G and the solutions remain effective in minimizing the security risks it poses to the network.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00080
Minu Eliz Pothen, Dr. Maya L Pai
Diseases infected on plant leaves particularly in rice leaves are one of the significant issues faced by the farmers. As a result, it is extremely hard to deliver the quantity of food needed for the growing human population. Rice diseases have caused production and economic losses in the agricultural sector. It will like-wise influence the earnings of farmers who rely upon agriculture and nowadays farmers commit suicide because of misfortune experienced in agriculture. Detection of definite disease infected on plants will assist to plan various disease control procedures. Proposed method describes different strategies utilized for rice leaf disease classification purpose. Bacterial leaf blight, Leaf smut and Brown spot diseased images are segmented using Otsu’s method. From the segmented area. various features are separated utilizing “Local Binary Patterns (LBP)” and “Histogram of Oriented Gradients (HOG)”. Then the features are classified with the assistance of Support Vector Machine (SVM) and accomplished 94.6% with polynomial Kernel SVM and HOG.
{"title":"Detection of Rice Leaf Diseases Using Image Processing","authors":"Minu Eliz Pothen, Dr. Maya L Pai","doi":"10.1109/ICCMC48092.2020.ICCMC-00080","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00080","url":null,"abstract":"Diseases infected on plant leaves particularly in rice leaves are one of the significant issues faced by the farmers. As a result, it is extremely hard to deliver the quantity of food needed for the growing human population. Rice diseases have caused production and economic losses in the agricultural sector. It will like-wise influence the earnings of farmers who rely upon agriculture and nowadays farmers commit suicide because of misfortune experienced in agriculture. Detection of definite disease infected on plants will assist to plan various disease control procedures. Proposed method describes different strategies utilized for rice leaf disease classification purpose. Bacterial leaf blight, Leaf smut and Brown spot diseased images are segmented using Otsu’s method. From the segmented area. various features are separated utilizing “Local Binary Patterns (LBP)” and “Histogram of Oriented Gradients (HOG)”. Then the features are classified with the assistance of Support Vector Machine (SVM) and accomplished 94.6% with polynomial Kernel SVM and HOG.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000124
P. Bute, S. K. Mittal
In this Paper, fuzzy logic approach is implemented as a switching technique. The traditional logic gate design is eliminated by using the proposed technique. There is a pulse generator which is designed by fuzzy logic acts as a pulse generator and a look-up table also. An input is based on a modulation index, well controlled membership functions used and the related fuzzy logic controller’s rules can be used to produce pulses directly without using any extra block. The mentioned technique is being implemented by using the cascaded multilevel H-Bridge inverter with symmetric operation using pulse width modulation with selective harmonic elimination technique (SHE-PWM). MFs are designed as per the calculated firing angles for various modulation index.
{"title":"Simulation Study of Cascade H-bridge Multilevel Inverter 7-Level Inverter by SHE Technique","authors":"P. Bute, S. K. Mittal","doi":"10.1109/ICCMC48092.2020.ICCMC-000124","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000124","url":null,"abstract":"In this Paper, fuzzy logic approach is implemented as a switching technique. The traditional logic gate design is eliminated by using the proposed technique. There is a pulse generator which is designed by fuzzy logic acts as a pulse generator and a look-up table also. An input is based on a modulation index, well controlled membership functions used and the related fuzzy logic controller’s rules can be used to produce pulses directly without using any extra block. The mentioned technique is being implemented by using the cascaded multilevel H-Bridge inverter with symmetric operation using pulse width modulation with selective harmonic elimination technique (SHE-PWM). MFs are designed as per the calculated firing angles for various modulation index.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00024
R. Mante, Reshma Khan
In the past couple of decades, the most emerging domain across the globe is Information Technology [IT]. It has made a significant contribution in cracking the criminal case and preparing the strong cases in the court of justice. IT technologies have become a vital tool for examination and gathering of the digital evidences. As crime rate is increasing day-by-day, in order to reduce the occurrence of crime and bring the culprit of the crime to justice, the computer forensics plays an indispensable role. With the recent technological developments, it has become more powerful and portable. Large amount of data has created stored and accessed everyday. Many technologically advanced devices are acting as repositories for the collected personal information. Such devices remain portable and accessible with a single click or even to the voice command. To have such large-scale information is important to get the conviction for the culprits but at the same time, investigating agencies has to maintain the privacy of the recovered data to make it admissible in the court. This gives rise to the security mechanism for such data. Collection, analysis, investigation and reporting of the digital data come under forensic science, which is a part of digital forensics domain. In this paper, we have presented a review on the existing researches available in the field of video forensic analysis.
{"title":"A Survey on Video-based Evidence Analysis and Digital Forensic","authors":"R. Mante, Reshma Khan","doi":"10.1109/ICCMC48092.2020.ICCMC-00024","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00024","url":null,"abstract":"In the past couple of decades, the most emerging domain across the globe is Information Technology [IT]. It has made a significant contribution in cracking the criminal case and preparing the strong cases in the court of justice. IT technologies have become a vital tool for examination and gathering of the digital evidences. As crime rate is increasing day-by-day, in order to reduce the occurrence of crime and bring the culprit of the crime to justice, the computer forensics plays an indispensable role. With the recent technological developments, it has become more powerful and portable. Large amount of data has created stored and accessed everyday. Many technologically advanced devices are acting as repositories for the collected personal information. Such devices remain portable and accessible with a single click or even to the voice command. To have such large-scale information is important to get the conviction for the culprits but at the same time, investigating agencies has to maintain the privacy of the recovered data to make it admissible in the court. This gives rise to the security mechanism for such data. Collection, analysis, investigation and reporting of the digital data come under forensic science, which is a part of digital forensics domain. In this paper, we have presented a review on the existing researches available in the field of video forensic analysis.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127276437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-00012
Prajakta Karemore, P. Jagtap
In recent years, Industrial Control [IC] is emerging as a fundamental aspect to gather all the pertinent data, insights and information identified with different mechanical procedures, engines, machines, and gadgets utilized in industrial premises. This focuses on delivering controlled access, better efficiency and great aftereffects of the modern items being manufactured. In this new period of innovative research improvements in remote control and monitoring by means of correspondence methods, for example, ZigBee, RF, Infrared, systems have been generally utilized in industries. In any case, these remote correspondence strategies are commonly confined to basic applications on account of their moderate correspondence paces, separations, and information security. The recently proposed framework is evolving as the fundamental need of the industry for monitoring, control, security and wellbeing of various exercises. The monitoring framework incorporates sensors like fire sensor, smoke sensor, ultrasonic sensor, moisture and temperature sensor, current and voltage with Wi-Fi module for control operations. With the benefits of unusual exercises, reasonable activities will be activated. This framework can likewise be controlled by using remote server with application in PC/Laptop. This undertaking additionally incorporates facial recognition by utilizing an open CV to perceive the essence of the approved individual of the industry to sign in / log out and the subtleties will be put away in the database sheet or refreshed to cloud. On the off chance that, any invalid section or attempt to the break-in, immediately an alarm email will be sent to the particular approved authority/individual/group.
{"title":"A Review of IoT Based Smart Industrial System for Controlling and Monitoring","authors":"Prajakta Karemore, P. Jagtap","doi":"10.1109/ICCMC48092.2020.ICCMC-00012","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00012","url":null,"abstract":"In recent years, Industrial Control [IC] is emerging as a fundamental aspect to gather all the pertinent data, insights and information identified with different mechanical procedures, engines, machines, and gadgets utilized in industrial premises. This focuses on delivering controlled access, better efficiency and great aftereffects of the modern items being manufactured. In this new period of innovative research improvements in remote control and monitoring by means of correspondence methods, for example, ZigBee, RF, Infrared, systems have been generally utilized in industries. In any case, these remote correspondence strategies are commonly confined to basic applications on account of their moderate correspondence paces, separations, and information security. The recently proposed framework is evolving as the fundamental need of the industry for monitoring, control, security and wellbeing of various exercises. The monitoring framework incorporates sensors like fire sensor, smoke sensor, ultrasonic sensor, moisture and temperature sensor, current and voltage with Wi-Fi module for control operations. With the benefits of unusual exercises, reasonable activities will be activated. This framework can likewise be controlled by using remote server with application in PC/Laptop. This undertaking additionally incorporates facial recognition by utilizing an open CV to perceive the essence of the approved individual of the industry to sign in / log out and the subtleties will be put away in the database sheet or refreshed to cloud. On the off chance that, any invalid section or attempt to the break-in, immediately an alarm email will be sent to the particular approved authority/individual/group.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127261398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000183
R. Kamalraj, E. S. Madhan, K. Ghamya, V. Bhargavi
Child security in the school campus is most important in building a good society. In and around the world the children are abused and killed also in sometimes by the people those who are not in good attitude in the school campus. To track and resolve such issues an enhanced security feature system is required. Hence in this paper an enhanced version of security system for children is proposed by using ‘Wearable Sensors’. In this proposed method two wearable sensors nodes such as ‘Staff Node’ and ‘Student Node’ are paired by using ‘Bluetooth’ communication technology and Smart Watch technology is also used to communicate the Security Center or Processing Node for tracking them about their location and whether the two nodes are moved away from the classroom. If the child node is not moving for a long period then it may be notified by the center and they will inform the security officers near to the place. This proposed method may satisfy the need of school management about the staff movements with students and the behavior of students to avoid unexpected issues.
{"title":"Enhance Safety and Security System for Children in School Campus by using Wearable Sensors","authors":"R. Kamalraj, E. S. Madhan, K. Ghamya, V. Bhargavi","doi":"10.1109/ICCMC48092.2020.ICCMC-000183","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000183","url":null,"abstract":"Child security in the school campus is most important in building a good society. In and around the world the children are abused and killed also in sometimes by the people those who are not in good attitude in the school campus. To track and resolve such issues an enhanced security feature system is required. Hence in this paper an enhanced version of security system for children is proposed by using ‘Wearable Sensors’. In this proposed method two wearable sensors nodes such as ‘Staff Node’ and ‘Student Node’ are paired by using ‘Bluetooth’ communication technology and Smart Watch technology is also used to communicate the Security Center or Processing Node for tracking them about their location and whether the two nodes are moved away from the classroom. If the child node is not moving for a long period then it may be notified by the center and they will inform the security officers near to the place. This proposed method may satisfy the need of school management about the staff movements with students and the behavior of students to avoid unexpected issues.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"695 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126241554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICCMC48092.2020.ICCMC-000100
S. S. Rao, R. Shreyas, G. Maske, A. Choudhury
Iris recognition is one of the best methods in the biometric identification field because the iris has features that are not unique but also stay throughout the person’s lifetime. Iris recognition has multiple phases namely Image Acquisition, Iris Segmentation, Iris Localization, Feature Extraction and Matching. Image Acquisition is simply the capturing of the iris image at an optimal distance. Iris Segmentation is the process of obtaining all the different segments of the eye. Iris Localization is the process of finding inner and outer boundaries of the iris differentiating it from the sclera and pupil and mainly focusing on the iris alone. Feature extraction is the process of extracting the biometric template from the Iris, giving the unique data required for the next step. Matching is the process of finding the best match in the database for the extracted biometric template. The future implementation of this paper focuses only on the processes of Image Acquisition, Iris Segmentation and Iris Localization. The paper aims to optimise these processes in terms of image capture distance, computation time and memory requirement, using the Dynamic Reconfigurable Processor (DRP) technology along with suitable algorithms for segmentation and localization processes as described in sections 2.2 and 2.3 respectively.
{"title":"Survey of Iris Image Segmentation and Localization","authors":"S. S. Rao, R. Shreyas, G. Maske, A. Choudhury","doi":"10.1109/ICCMC48092.2020.ICCMC-000100","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000100","url":null,"abstract":"Iris recognition is one of the best methods in the biometric identification field because the iris has features that are not unique but also stay throughout the person’s lifetime. Iris recognition has multiple phases namely Image Acquisition, Iris Segmentation, Iris Localization, Feature Extraction and Matching. Image Acquisition is simply the capturing of the iris image at an optimal distance. Iris Segmentation is the process of obtaining all the different segments of the eye. Iris Localization is the process of finding inner and outer boundaries of the iris differentiating it from the sclera and pupil and mainly focusing on the iris alone. Feature extraction is the process of extracting the biometric template from the Iris, giving the unique data required for the next step. Matching is the process of finding the best match in the database for the extracted biometric template. The future implementation of this paper focuses only on the processes of Image Acquisition, Iris Segmentation and Iris Localization. The paper aims to optimise these processes in terms of image capture distance, computation time and memory requirement, using the Dynamic Reconfigurable Processor (DRP) technology along with suitable algorithms for segmentation and localization processes as described in sections 2.2 and 2.3 respectively.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120806530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}