首页 > 最新文献

2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)最新文献

英文 中文
Generation of Pseudo Random Sequences based on Chaotic Cubic Map and Cyclic Elliptic Curves over GF (28) for Cryptographic Applications 基于GF(28)上混沌三次映射和循环椭圆曲线的伪随机序列的生成
S. Sheela, S. Sathyanarayana
Cyclic elliptic curves (CEC) and chaotic sequences are used for cryptographic application from many decades. In this paper, authors propose a hybrid model to generate pseudo random key sequences for symmetric ciphers. Hybrid model is developed using CEC points over GF (28) and a one-dimensional cubic map. In the proposed system first, binary chaotic sequence and CEC points are given to AES SBOX to get two random sequences separately. Byte wise parity is computed for both the sequences. Based on the parity the sequences are either left or right circular shifted by a byte and two sequences are combined using the XOR operation to get the random binary sequence. The randomness of the generated sequences is analysed using various randomness test suites like NIST SP 800-22 Rev.1a and Correlation. It has been observed that all the sequences pass the randomness tests. These sequences are used to encrypt an image using additive stream cipher algorithm. The security analysis of the cipher image is conducted. The results obtained for the proposed system indicates that it is secure against cryptographic attacks.
循环椭圆曲线(CEC)和混沌序列在密码学中的应用已有几十年的历史。本文提出了一种用于对称密码生成伪随机密钥序列的混合模型。利用GF(28)上的CEC点和一维立方图建立混合模型。该系统首先将二进制混沌序列和CEC点分别赋给AES SBOX,得到两个随机序列。为两个序列计算逐字节奇偶校验。基于奇偶性,序列向左或向右移动一个字节,并使用异或操作将两个序列组合以获得随机二进制序列。使用各种随机测试套件(如NIST SP 800-22 Rev.1a和Correlation)分析生成序列的随机性。我们观察到所有的序列都通过了随机性检验。这些序列用于使用加性流密码算法加密图像。对密码图像进行了安全性分析。实验结果表明,该系统对密码攻击是安全的。
{"title":"Generation of Pseudo Random Sequences based on Chaotic Cubic Map and Cyclic Elliptic Curves over GF (28) for Cryptographic Applications","authors":"S. Sheela, S. Sathyanarayana","doi":"10.1109/MPCIT51588.2020.9350495","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350495","url":null,"abstract":"Cyclic elliptic curves (CEC) and chaotic sequences are used for cryptographic application from many decades. In this paper, authors propose a hybrid model to generate pseudo random key sequences for symmetric ciphers. Hybrid model is developed using CEC points over GF (28) and a one-dimensional cubic map. In the proposed system first, binary chaotic sequence and CEC points are given to AES SBOX to get two random sequences separately. Byte wise parity is computed for both the sequences. Based on the parity the sequences are either left or right circular shifted by a byte and two sequences are combined using the XOR operation to get the random binary sequence. The randomness of the generated sequences is analysed using various randomness test suites like NIST SP 800-22 Rev.1a and Correlation. It has been observed that all the sequences pass the randomness tests. These sequences are used to encrypt an image using additive stream cipher algorithm. The security analysis of the cipher image is conducted. The results obtained for the proposed system indicates that it is secure against cryptographic attacks.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Management Using Elliptic Curve Diffie Hellman Curve 25519 利用椭圆曲线Diffie Hellman曲线进行密钥管理
R. Naik, S. Sathyanarayana, T. Sowmya
Key management shows an important role in the information transmissions. This paper analyzes the more improved and cost-effective key management scheme with respect to transmission overhead, computation cost. A key management policy is effectually employed for the purpose of generating a distinctive convention key for ample members to promise the security of their prospect communications, and this agreement can be allied in cloud computing for the purpose of assisting protected and skilled data distribution. The Key exchange protocols provides the two or more members to decide on a shared secret key and later be able to used for encrypting a long message. The complexity of Discrete Logarithm Problem (DLP) as basic problem considered in Diffie-Hellman Key Exchange Protocol. The Elliptic curve Diffie-Helman (ECDH) is considered as an expansion to the standard Diffie-Hellman. The ECDH function is ideal for a wide range of cryptographic functions. Key management based on ECDH provides much security on key meanwhile having more amount of storage cost and execution time involving in this. The ECDH Curve 25519 makes much faster in execution and lesser storage cost due its structure which uses much higher prime group of the order 2252.
密钥管理在信息传输中发挥着重要作用。本文从传输开销、计算成本等方面分析了一种改进的、性价比较高的密钥管理方案。密钥管理策略有效地用于为大量成员生成独特的约定密钥,以保证其未来通信的安全性,并且该协议可以与云计算结合起来,以协助受保护和熟练的数据分发。密钥交换协议提供两个或多个成员来决定共享密钥,并在以后能够用于加密长消息。离散对数问题(DLP)是Diffie-Hellman密钥交换协议中考虑的基本问题。椭圆曲线Diffie-Hellman (ECDH)被认为是标准Diffie-Hellman的扩展。ECDH函数是各种加密函数的理想选择。基于ECDH的密钥管理在提高密钥安全性的同时,也增加了存储成本和执行时间。ECDH曲线25519的执行速度更快,存储成本更低,因为它的结构使用了更高的素数组2252。
{"title":"Key Management Using Elliptic Curve Diffie Hellman Curve 25519","authors":"R. Naik, S. Sathyanarayana, T. Sowmya","doi":"10.1109/MPCIT51588.2020.9350454","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350454","url":null,"abstract":"Key management shows an important role in the information transmissions. This paper analyzes the more improved and cost-effective key management scheme with respect to transmission overhead, computation cost. A key management policy is effectually employed for the purpose of generating a distinctive convention key for ample members to promise the security of their prospect communications, and this agreement can be allied in cloud computing for the purpose of assisting protected and skilled data distribution. The Key exchange protocols provides the two or more members to decide on a shared secret key and later be able to used for encrypting a long message. The complexity of Discrete Logarithm Problem (DLP) as basic problem considered in Diffie-Hellman Key Exchange Protocol. The Elliptic curve Diffie-Helman (ECDH) is considered as an expansion to the standard Diffie-Hellman. The ECDH function is ideal for a wide range of cryptographic functions. Key management based on ECDH provides much security on key meanwhile having more amount of storage cost and execution time involving in this. The ECDH Curve 25519 makes much faster in execution and lesser storage cost due its structure which uses much higher prime group of the order 2252.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analyzing Big Data Originated from Data Communication Networks using K-Means Algorithm to Understand the Nature of Incoming Malicious Connections 利用K-Means算法分析数据通信网络产生的大数据,了解传入恶意连接的性质
L. B. Shyamasundar, V. A. Kumar, Jhansi Rani Prathuri
An environment is developed with a distributed Apache SPARK, deployed on Hadoop cluster for timely inference and classification of security incidents. Analysis of 85GB of network-packet dataset collected over four months is done (provided by CSIR-4PI, Govt. of India). K-means machine learning algorithm is used to analyze the network traffic based on various fields. By building and evaluating models, optimum number of clusters was determined. Clustering results are evaluated by calculating the clustering score using Within-Set Sum-of-Squared-Errors(WSSSE), entropy, Silhotte, Davies-Bouldin-Index and Dunn-Index. Several plots are visualized to understand the clustering analysis results and understand the nature of incoming malicious connections.
使用分布式Apache SPARK开发环境,部署在Hadoop集群上,对安全事件进行及时推断和分类。对四个月收集的85GB网络数据包数据集进行了分析(由印度政府的CSIR-4PI提供)。使用K-means机器学习算法对基于各个领域的网络流量进行分析。通过模型的建立和评价,确定了最优聚类数量。通过使用集内误差平方和(WSSSE)、熵、Silhotte、Davies-Bouldin-Index和Dunn-Index计算聚类得分来评估聚类结果。为了理解聚类分析结果和了解传入的恶意连接的性质,可视化了几个图。
{"title":"Analyzing Big Data Originated from Data Communication Networks using K-Means Algorithm to Understand the Nature of Incoming Malicious Connections","authors":"L. B. Shyamasundar, V. A. Kumar, Jhansi Rani Prathuri","doi":"10.1109/MPCIT51588.2020.9350510","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350510","url":null,"abstract":"An environment is developed with a distributed Apache SPARK, deployed on Hadoop cluster for timely inference and classification of security incidents. Analysis of 85GB of network-packet dataset collected over four months is done (provided by CSIR-4PI, Govt. of India). K-means machine learning algorithm is used to analyze the network traffic based on various fields. By building and evaluating models, optimum number of clusters was determined. Clustering results are evaluated by calculating the clustering score using Within-Set Sum-of-Squared-Errors(WSSSE), entropy, Silhotte, Davies-Bouldin-Index and Dunn-Index. Several plots are visualized to understand the clustering analysis results and understand the nature of incoming malicious connections.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Maximum Efficiency Point Tracking in Wireless Power Transfer Systems using Pulse Density Modulation 脉冲密度调制无线电力传输系统中最大效率点跟踪的仿真
Urmila Mathure, R. Ramkrishna
This paper presents a method of control known as maximum efficiency point tracking (MEPT). This method of control is used for wireless power transfer (WPT) systems to provide maximum value of efficiency against load variations and coupling with achieving power demands of the system. In traditional MEPT systems, on both transmitting and receiving sides dc/dc converters are used in order to achieve maximum efficiency and for the regulation of output voltage. But this arrangement increases the complexity of network with increasing power loss. Some implementations lead to new problems like hard switching, large dc voltage ripples and low average efficiency. An implementation of MEPT based on pulse density modulation is explained in this paper which removes all the drawbacks in existing implementation. A PDM circuit is used in both transmitting and receiving side to achieve maximum efficiency. A simulation circuit is built in matlab in this paper to get maximum efficiency. By varying load resistances and pulse densities in the matlab Simulink circuit an efficiency and output voltage is checked By comparing the results of existing MEPT implementation with this simulation circuit of WPT using PDM it achieved efficiency upto 83% for various load resistances and pulse densities.
本文提出一种称为最大效率点跟踪(MEPT)的控制方法。这种控制方法用于无线电力传输(WPT)系统,以提供最大的效率值,以应对负载变化和耦合,实现系统的功率需求。在传统的MEPT系统中,为了实现最大的效率和调节输出电压,在发射端和接收端都使用dc/dc转换器。但这种安排增加了网络的复杂性,同时也增加了功率损耗。一些实现带来了硬开关、大直流电压波动和低平均效率等新问题。本文介绍了一种基于脉冲密度调制的MEPT实现方法,该方法消除了现有实现方法中的所有缺陷。发射端和接收端均采用PDM电路,以达到最高效率。为了达到最大的效率,本文在matlab中搭建了仿真电路。通过在matlab Simulink电路中改变负载电阻和脉冲密度,检查了效率和输出电压。通过将现有的MEPT实现结果与使用PDM的WPT仿真电路进行比较,在不同负载电阻和脉冲密度下,效率高达83%。
{"title":"Simulation of Maximum Efficiency Point Tracking in Wireless Power Transfer Systems using Pulse Density Modulation","authors":"Urmila Mathure, R. Ramkrishna","doi":"10.1109/MPCIT51588.2020.9350475","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350475","url":null,"abstract":"This paper presents a method of control known as maximum efficiency point tracking (MEPT). This method of control is used for wireless power transfer (WPT) systems to provide maximum value of efficiency against load variations and coupling with achieving power demands of the system. In traditional MEPT systems, on both transmitting and receiving sides dc/dc converters are used in order to achieve maximum efficiency and for the regulation of output voltage. But this arrangement increases the complexity of network with increasing power loss. Some implementations lead to new problems like hard switching, large dc voltage ripples and low average efficiency. An implementation of MEPT based on pulse density modulation is explained in this paper which removes all the drawbacks in existing implementation. A PDM circuit is used in both transmitting and receiving side to achieve maximum efficiency. A simulation circuit is built in matlab in this paper to get maximum efficiency. By varying load resistances and pulse densities in the matlab Simulink circuit an efficiency and output voltage is checked By comparing the results of existing MEPT implementation with this simulation circuit of WPT using PDM it achieved efficiency upto 83% for various load resistances and pulse densities.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Microscopic Blood Smear RBC Classification using PCA and SVM based Machine Learning 基于PCA和SVM的显微血液涂片红细胞分类
Prashanth Kannadaguli
The therapeutic analysis f microscopic blood smear begins with recognizing blood cells f various categories as well as estimating cell count in blood sample. The distinctive blood cell grading and counting furnish priceless knowledge to the pathologist about sundry infections. This exercise can be easily concluded if the shapes f blood cells are pinpointed first and using the shapes, we classify the blood cells. In this research work we build and test an automatic microscopic blood smear red blood cell (RBC) classification by using Principal Component Analysis (PCA) and Support Vector Machine (SVM) based machine learning. We train and test the statistical data models based n probabilistic pattern recognition to classify the blood smear RBC into Normal Cells, Echinocytes, Elliptocytes and Sickle cells. The H-minimum Transform (HmT) and Watershed Transform (WT) are used in pre-processing f images to increase the accuracy if segmentation shape extraction f the blood cells. Then the Bag f Features (BoF) created considering the 500 strongest features f each type f blood cell after K-Means clustering. Training takes place through Image Category Classifier (ICC) whose performance measured by using Mean Average Precision (mAP) justifies that SVM based classifiers provide audacious results.
显微血液涂片的治疗分析首先要识别血液样本中各种类型的血细胞以及估计细胞计数。独特的血细胞分级和计数为病理学家提供了关于各种感染的宝贵知识。如果首先确定血细胞的形状,并使用形状对血细胞进行分类,那么这个练习可以很容易地得出结论。在本研究中,我们基于主成分分析(PCA)和支持向量机(SVM)的机器学习,建立并测试了显微血液涂片红细胞(RBC)的自动分类。我们训练并测试了基于n概率模式识别的统计数据模型,将血涂片红细胞分为正常细胞、棘细胞、椭圆细胞和镰状细胞。采用h -最小变换(HmT)和分水岭变换(WT)对图像进行预处理,提高血细胞分割形状提取的精度。然后在K-Means聚类后,考虑每种血型的500个最强特征,创建Bag f Features (BoF)。通过图像分类器(ICC)进行训练,其性能通过使用平均精度(mAP)来衡量,证明基于SVM的分类器提供了大胆的结果。
{"title":"Microscopic Blood Smear RBC Classification using PCA and SVM based Machine Learning","authors":"Prashanth Kannadaguli","doi":"10.1109/MPCIT51588.2020.9350389","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350389","url":null,"abstract":"The therapeutic analysis f microscopic blood smear begins with recognizing blood cells f various categories as well as estimating cell count in blood sample. The distinctive blood cell grading and counting furnish priceless knowledge to the pathologist about sundry infections. This exercise can be easily concluded if the shapes f blood cells are pinpointed first and using the shapes, we classify the blood cells. In this research work we build and test an automatic microscopic blood smear red blood cell (RBC) classification by using Principal Component Analysis (PCA) and Support Vector Machine (SVM) based machine learning. We train and test the statistical data models based n probabilistic pattern recognition to classify the blood smear RBC into Normal Cells, Echinocytes, Elliptocytes and Sickle cells. The H-minimum Transform (HmT) and Watershed Transform (WT) are used in pre-processing f images to increase the accuracy if segmentation shape extraction f the blood cells. Then the Bag f Features (BoF) created considering the 500 strongest features f each type f blood cell after K-Means clustering. Training takes place through Image Category Classifier (ICC) whose performance measured by using Mean Average Precision (mAP) justifies that SVM based classifiers provide audacious results.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124008964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Parking System (S-Park) – A Novel Application to Provide Real-Time Parking Solution 智能停车系统(S-Park)——一种提供实时停车解决方案的新应用
Abhijeet Anand, Abhinav Kumar, A. Rao, Anupam Ankesh, Ankur Raj
Due to daily acceleration in the quantity of vehicles out and about, traffic issues will undoubtedly exist. The current transportation framework and vehicle parking space are unable to meet with the quantity of vehicles. Looking for a parking space in central city zones, particularly during top hours, is very strenuous for drivers. To avoid such a situation the project, Smart Parking System (S-Park) is envisioned. In this project, a real time system is developed and implemented, that allows the drivers to successfully locate and restrain the unoccupied parking areas remotely through website and Android App. The system developed, also allows the driver to navigate to their respective parking spot using Google maps. The driver needs to first register himself to avail the facility. The details of driver and vehicle are stored in database. This helps in tracking the in-out time and other details of every individual driver. S-Park provides hassle free operations in and around parking location. It also helps in attenuating the traffic congestion at a very rich scale.
由于每天来往车辆数量的增加,交通问题无疑会存在。现有的交通框架和车辆停放空间无法满足车辆数量的需求。在市中心寻找停车位,尤其是在高峰时段,对司机来说是非常费力的。为了避免这种情况,该项目设想了智能停车系统(S-Park)。在这个项目中,我们开发并实现了一个实时系统,可以让司机通过网站和Android App远程定位和约束无人停车区域。开发的系统还可以让司机使用谷歌地图导航到各自的停车位。司机需要先登记自己才能使用该设施。驾驶员和车辆的详细信息存储在数据库中。这有助于跟踪每个司机的进出时间和其他细节。S-Park在停车场内及周边提供无麻烦的操作。它还有助于在很大程度上缓解交通拥堵。
{"title":"Smart Parking System (S-Park) – A Novel Application to Provide Real-Time Parking Solution","authors":"Abhijeet Anand, Abhinav Kumar, A. Rao, Anupam Ankesh, Ankur Raj","doi":"10.1109/MPCIT51588.2020.9350429","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350429","url":null,"abstract":"Due to daily acceleration in the quantity of vehicles out and about, traffic issues will undoubtedly exist. The current transportation framework and vehicle parking space are unable to meet with the quantity of vehicles. Looking for a parking space in central city zones, particularly during top hours, is very strenuous for drivers. To avoid such a situation the project, Smart Parking System (S-Park) is envisioned. In this project, a real time system is developed and implemented, that allows the drivers to successfully locate and restrain the unoccupied parking areas remotely through website and Android App. The system developed, also allows the driver to navigate to their respective parking spot using Google maps. The driver needs to first register himself to avail the facility. The details of driver and vehicle are stored in database. This helps in tracking the in-out time and other details of every individual driver. S-Park provides hassle free operations in and around parking location. It also helps in attenuating the traffic congestion at a very rich scale.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114001882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Fuzzy Logic Based Controller for Measuring the Effectiveness of Training for Placement 一种新的基于模糊逻辑的定位训练有效性测量控制器
S. S. Navalgund
It is a well-known fact that the placements are crucial in the professional life of a graduating student. The need for high quality output from the academia necessitates the students to be equipped with the requisite skill set to be industry-ready. This paper briefs about the training sessions done at SDMCET-Dharwad, for aiding the students in campus placement drives. Also, this paper deliberates a unique approach based on fuzzy logic for measuring the effectiveness of training sessions in terms of various dimensions namely program pacing, quality of content covered and interaction with students. The fuzzy controller is built using Mamdani and Sugeno style of inference engines. The design and simulations have been done using MATLAB and Simulink softwares.
众所周知,实习对毕业生的职业生涯至关重要。学术界对高质量产出的需求要求学生具备必要的技能,为行业做好准备。本文简要介绍了为帮助学生进行校园安置工作而在达瓦德市理工学院进行的培训课程。此外,本文还考虑了一种基于模糊逻辑的独特方法,从课程节奏、内容质量和与学生的互动等各个维度来衡量培训课程的有效性。模糊控制器采用Mamdani和Sugeno两种推理引擎构建。利用MATLAB和Simulink软件进行了设计和仿真。
{"title":"A Novel Fuzzy Logic Based Controller for Measuring the Effectiveness of Training for Placement","authors":"S. S. Navalgund","doi":"10.1109/MPCIT51588.2020.9350470","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350470","url":null,"abstract":"It is a well-known fact that the placements are crucial in the professional life of a graduating student. The need for high quality output from the academia necessitates the students to be equipped with the requisite skill set to be industry-ready. This paper briefs about the training sessions done at SDMCET-Dharwad, for aiding the students in campus placement drives. Also, this paper deliberates a unique approach based on fuzzy logic for measuring the effectiveness of training sessions in terms of various dimensions namely program pacing, quality of content covered and interaction with students. The fuzzy controller is built using Mamdani and Sugeno style of inference engines. The design and simulations have been done using MATLAB and Simulink softwares.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MPCIT 2020 Table of Contents MPCIT 2020目录
{"title":"MPCIT 2020 Table of Contents","authors":"","doi":"10.1109/mpcit51588.2020.9350424","DOIUrl":"https://doi.org/10.1109/mpcit51588.2020.9350424","url":null,"abstract":"","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125207921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Safety and Security Solution for Women using kNN Algorithm and IoT 使用kNN算法和物联网的女性智能安全和安保解决方案
B. Yaswanth, R. Darshan, H. Pavan, D. Srinivasa, B. T. V. Murthy
In the global scenario, women’s safety is a crucial problem. The security of women has become a greater challenge to many families in their daily life, hence a system is developed using rapidly growing technologies to address this problem. This paper mainly focuses on an IoT based self-security system that is comfortable, easy to use and wearable, and helps to share the user location when they feel panic and also help to find the nearest safe place. The designed system is user friendly and it can be accessed only by a specific person. The system is controlled through raspberry pi, and it has two different modes namely normal mode and security mode. In normal mode, user can register their fingerprint, and in security mode, the fingerprint sensor acts as a panic button, and when a fingerprint is detected system shares the location and captures the photo of the culprit and stores it in the cloud. The machine learning algorithm gets the user location as input and predicts the nearest safe place location.
在全球形势下,妇女的安全是一个关键问题。妇女的安全已成为许多家庭在日常生活中面临的更大挑战,因此,利用迅速发展的技术开发了一个系统来解决这一问题。本文主要研究一种基于物联网的自我安全系统,该系统舒适,易于使用,可穿戴,可以在用户感到恐慌时共享用户位置,也可以帮助用户找到最近的安全地点。所设计的系统是用户友好的,只能由特定的人访问。系统通过树莓派进行控制,有正常模式和安全模式两种模式。在正常模式下,用户可以注册他们的指纹,在安全模式下,指纹传感器作为一个紧急按钮,当检测到指纹时,系统会共享罪犯的位置,并捕获罪犯的照片并将其存储在云端。机器学习算法将用户位置作为输入,并预测最近的安全地点位置。
{"title":"Smart Safety and Security Solution for Women using kNN Algorithm and IoT","authors":"B. Yaswanth, R. Darshan, H. Pavan, D. Srinivasa, B. T. V. Murthy","doi":"10.1109/MPCIT51588.2020.9350431","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350431","url":null,"abstract":"In the global scenario, women’s safety is a crucial problem. The security of women has become a greater challenge to many families in their daily life, hence a system is developed using rapidly growing technologies to address this problem. This paper mainly focuses on an IoT based self-security system that is comfortable, easy to use and wearable, and helps to share the user location when they feel panic and also help to find the nearest safe place. The designed system is user friendly and it can be accessed only by a specific person. The system is controlled through raspberry pi, and it has two different modes namely normal mode and security mode. In normal mode, user can register their fingerprint, and in security mode, the fingerprint sensor acts as a panic button, and when a fingerprint is detected system shares the location and captures the photo of the culprit and stores it in the cloud. The machine learning algorithm gets the user location as input and predicts the nearest safe place location.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scientific Discovery and Rigor with ML 科学发现和ML的严谨性
Abdul-Gafoor Mohamed, P. Mahanta
The evolution of Data Management Scenarios augmented by scientific discovery and rigor is apparent in the industry, judging by the sheer focus on it by analysts and others over the past couple of years. Machine Learning helps immensely playing its part in simplifying enterprise data landscapes, contributing to many aspects of Data Management. We see value in focusing on the Data Discovery and Data Quality aspects in this context, as enterprises these days have complex landscapes, with the average enterprise using more than 5 Cloud storages in addition to their on-prem data sources.A greater affinity for enterprise grade Machine Learning has created a significant pull for system design. This leads platforms towards capabilities like standard APIs for scaled-database queries and integration scenarios. This paper explores the integration of Machine Learning tools and customized libraries with any Cloud Platform for enhancing the stakeholders’ experience with Analytics. As far as concepts are concerned, we propose a hypothesis for scaling an existent platform to a community-based approach, which helps enable sharing of experimental iterations, ideally translating into industry specific solutions that should stay extremely reusable. The intent is to offer a data model flexible enough to handle diverse data scenarios, evaluating confidence scores for each of these. It should enable reproducible shared experiments with consistent evaluated scores, thereby easing the integration process through automated guidance. This paper will touch upon the good practices and architectural recommendations that need to be considered for general Machine Learning applications.
从过去几年分析师和其他人对数据管理场景的关注来看,在科学发现和严谨的推动下,数据管理场景的演变在行业中是显而易见的。机器学习在简化企业数据环境方面发挥了巨大的作用,为数据管理的许多方面做出了贡献。在这种情况下,我们看到了关注数据发现和数据质量方面的价值,因为如今的企业环境复杂,除了本地数据源外,平均每家企业使用超过5个云存储。对企业级机器学习的更大亲和力为系统设计创造了重要的吸引力。这使得平台具备了一些功能,比如用于扩展数据库查询和集成场景的标准api。本文探讨了机器学习工具和定制库与任何云平台的集成,以增强利益相关者的分析体验。就概念而言,我们提出了一个假设,将现有平台扩展为基于社区的方法,这有助于实现实验迭代的共享,理想情况下,转化为应该保持高度可重用的行业特定解决方案。其目的是提供一个足够灵活的数据模型来处理各种数据场景,并评估每种场景的置信度得分。它应该使具有一致评估分数的可重复共享实验成为可能,从而通过自动化指导简化集成过程。本文将涉及一般机器学习应用程序需要考虑的良好实践和架构建议。
{"title":"Scientific Discovery and Rigor with ML","authors":"Abdul-Gafoor Mohamed, P. Mahanta","doi":"10.1109/MPCIT51588.2020.9350455","DOIUrl":"https://doi.org/10.1109/MPCIT51588.2020.9350455","url":null,"abstract":"The evolution of Data Management Scenarios augmented by scientific discovery and rigor is apparent in the industry, judging by the sheer focus on it by analysts and others over the past couple of years. Machine Learning helps immensely playing its part in simplifying enterprise data landscapes, contributing to many aspects of Data Management. We see value in focusing on the Data Discovery and Data Quality aspects in this context, as enterprises these days have complex landscapes, with the average enterprise using more than 5 Cloud storages in addition to their on-prem data sources.A greater affinity for enterprise grade Machine Learning has created a significant pull for system design. This leads platforms towards capabilities like standard APIs for scaled-database queries and integration scenarios. This paper explores the integration of Machine Learning tools and customized libraries with any Cloud Platform for enhancing the stakeholders’ experience with Analytics. As far as concepts are concerned, we propose a hypothesis for scaling an existent platform to a community-based approach, which helps enable sharing of experimental iterations, ideally translating into industry specific solutions that should stay extremely reusable. The intent is to offer a data model flexible enough to handle diverse data scenarios, evaluating confidence scores for each of these. It should enable reproducible shared experiments with consistent evaluated scores, thereby easing the integration process through automated guidance. This paper will touch upon the good practices and architectural recommendations that need to be considered for general Machine Learning applications.","PeriodicalId":136514,"journal":{"name":"2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116100424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1