首页 > 最新文献

2018 International Conference on Computer Communication and Informatics (ICCCI)最新文献

英文 中文
HOMER Based Optimization of Solar-Wind-Diesel Hybrid System for Electrification in a Rural Village 基于HOMER的农村太阳能-风能-柴油混合动力系统电气化优化
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441517
Suresh Vendoti, M. Muralidhar, R. Kiranmayi
Electrification of rural and remote areas with limited or no access to grid connection is one of the most challenging issues in developing countries like India. As a result of the recent issues regarding the global climatic change and reduce fuel costs, finding out reliable, ecological friendly renewable energy sources to satisfy the rising energy demands has become important. The government of India initiated a large number of schemes for encouragement of renewable energy for power generation and to create energy options like coal, oil etc. Keeping these initiatives in mind, the present study is focused on optimization of hybrid (solar-wind-diesel) renewable energy systems in rural remote village Indiganatha in Chamarajanagar District of Karnataka State, India. The objective of the study is to minimize the total net present cost of generation and cost of energy using HOMER pro software. Sensitivity analysis is also carried out that helps to assess the effect of uncertainty or changes within the variables and finding the most optimal solution for hybrid energy system.
在像印度这样的发展中国家,农村和偏远地区的电气化有限或没有电网连接是最具挑战性的问题之一。由于最近全球气候变化和降低燃料成本的问题,寻找可靠的、生态友好的可再生能源来满足不断增长的能源需求变得非常重要。印度政府发起了大量鼓励可再生能源发电的计划,并创造了煤炭、石油等能源选择。考虑到这些举措,目前的研究重点是在印度卡纳塔克邦查玛拉贾纳加尔区偏远农村的Indiganatha村优化混合(太阳能-风能-柴油)可再生能源系统。本研究的目的是使用HOMER pro软件使发电和能源成本的总净当前成本最小化。灵敏度分析有助于评估不确定性或变量内部变化的影响,找到混合能源系统的最优解。
{"title":"HOMER Based Optimization of Solar-Wind-Diesel Hybrid System for Electrification in a Rural Village","authors":"Suresh Vendoti, M. Muralidhar, R. Kiranmayi","doi":"10.1109/ICCCI.2018.8441517","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441517","url":null,"abstract":"Electrification of rural and remote areas with limited or no access to grid connection is one of the most challenging issues in developing countries like India. As a result of the recent issues regarding the global climatic change and reduce fuel costs, finding out reliable, ecological friendly renewable energy sources to satisfy the rising energy demands has become important. The government of India initiated a large number of schemes for encouragement of renewable energy for power generation and to create energy options like coal, oil etc. Keeping these initiatives in mind, the present study is focused on optimization of hybrid (solar-wind-diesel) renewable energy systems in rural remote village Indiganatha in Chamarajanagar District of Karnataka State, India. The objective of the study is to minimize the total net present cost of generation and cost of energy using HOMER pro software. Sensitivity analysis is also carried out that helps to assess the effect of uncertainty or changes within the variables and finding the most optimal solution for hybrid energy system.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123525668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Capacity and SNR Analysis of a Millimeter Wave Cellular Network with Phased Antenna Array 相控阵毫米波蜂窝网络容量及信噪比分析
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441248
G. Aruna, Sabyasachi Bhattacharyya
Channel capacity of a Millimeter(MM) wave cellular network employing phased antenna array (uniform linear antenna array) and the array output signal to noise ratio is analyzed. Millimeter wave as the name indicates working on a very high frequency band 28, 38, and 72 GHz bands results in antenna size in millimeter. Therefore the antennas are integrated on chip and they are also steerable to achieve very high capacity. In millimeter wave directional antennas are used with beam steering to achieve high data rate and high capacity. The data rate increases 40 times more than the off chip or external antennas. In this paper channel capacity is analyzed for a uniform linear array and a planar array antenna structure with beamforming and beamsteering.
分析了采用相控阵(均匀线性天线阵)的毫米波蜂窝网络的信道容量及其输出信噪比。顾名思义,毫米波工作在非常高的频段28,38和72ghz频段,导致天线尺寸以毫米为单位。因此,天线集成在芯片上,它们也可操纵,以实现非常高的容量。在毫米波中,定向天线采用波束导向来实现高数据速率和高容量。数据传输速率是芯片外或外接天线的40倍。本文分析了具有波束形成和波束导向的均匀线阵和平面阵天线结构的信道容量。
{"title":"Capacity and SNR Analysis of a Millimeter Wave Cellular Network with Phased Antenna Array","authors":"G. Aruna, Sabyasachi Bhattacharyya","doi":"10.1109/ICCCI.2018.8441248","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441248","url":null,"abstract":"Channel capacity of a Millimeter(MM) wave cellular network employing phased antenna array (uniform linear antenna array) and the array output signal to noise ratio is analyzed. Millimeter wave as the name indicates working on a very high frequency band 28, 38, and 72 GHz bands results in antenna size in millimeter. Therefore the antennas are integrated on chip and they are also steerable to achieve very high capacity. In millimeter wave directional antennas are used with beam steering to achieve high data rate and high capacity. The data rate increases 40 times more than the off chip or external antennas. In this paper channel capacity is analyzed for a uniform linear array and a planar array antenna structure with beamforming and beamsteering.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129697518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mitigating Physical Layer Attack in Cognitive Radio - A New Approach 减轻认知无线电中的物理层攻击——一种新方法
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441214
J. Avila, S. Prem, R. Sneha, K. Thenmozhi
With the improvement in technology and with the increase in the use of wireless devices there is deficiency of radio spectrum. Cognitive radio is considered as the solution for this problem. Cognitive radio is capable to detect which communication channels are in use and which are free, and immediately move into free channels while avoiding the used ones. This increases the usage of radio frequency spectrum. Any wireless system is prone to attack. Likewise, the main two attacks in the physical layer of cognitive radio are Primary User Emulation Attack (PUEA) and replay attack. This paper focusses on mitigating these two attacks with the aid of authentication tag and distance calculation. Mitigation of these attacks results in error free transmission which in turn fallouts in efficient dynamic spectrum access.
随着技术的进步和无线设备使用的增加,无线电频谱出现了不足。认知无线电被认为是解决这一问题的方法。认知无线电能够检测到哪些通信频道正在使用,哪些是空闲的,并立即进入空闲频道,同时避开已使用的频道。这增加了无线电频谱的使用。任何无线系统都容易受到攻击。同样,认知无线电物理层的两种主要攻击是主用户仿真攻击(Primary User Emulation Attack, PUEA)和重放攻击。本文的重点是通过认证标签和距离计算来减轻这两种攻击。减轻这些攻击导致无差错传输,进而影响有效的动态频谱访问。
{"title":"Mitigating Physical Layer Attack in Cognitive Radio - A New Approach","authors":"J. Avila, S. Prem, R. Sneha, K. Thenmozhi","doi":"10.1109/ICCCI.2018.8441214","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441214","url":null,"abstract":"With the improvement in technology and with the increase in the use of wireless devices there is deficiency of radio spectrum. Cognitive radio is considered as the solution for this problem. Cognitive radio is capable to detect which communication channels are in use and which are free, and immediately move into free channels while avoiding the used ones. This increases the usage of radio frequency spectrum. Any wireless system is prone to attack. Likewise, the main two attacks in the physical layer of cognitive radio are Primary User Emulation Attack (PUEA) and replay attack. This paper focusses on mitigating these two attacks with the aid of authentication tag and distance calculation. Mitigation of these attacks results in error free transmission which in turn fallouts in efficient dynamic spectrum access.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Cloud Enabled E-Waste Management System 智能云电子废物管理系统
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441476
P. Jayarajan, S. Thenmozhi, R. Maheswar, S. Malathy, Udaiyakumar Ramamoorthy
Electronic waste (E-waste) comprises waste electronics/electrical goods that are useless. This includes computers, servers, monitors, and so on. E-waste contains toxic substances, such as lead and cadmium in circuit boards, lead oxide and cadmium in monitor (CRTs), mercury in switches which are highly hazardous. In this paper, we propose a monitoring system for e-waste dump yards through smart phones. This is an initiative to do things for the wide scope e-waste management. We use the morphological operations in image processing to determine the area covered by e-wastes, which can be monitored by the end user through the dedicated android application.
电子废物(电子废物)包括无用的废弃电子产品/电器产品。这包括计算机、服务器、监视器等等。电子垃圾含有有毒物质,如电路板中的铅和镉,显示器(crt)中的氧化铅和镉,开关中的汞,这些都是非常危险的。本文提出了一种基于智能手机的电子垃圾堆放场监控系统。这是一项为大范围的电子垃圾管理而主动做的事情。我们使用图像处理中的形态学运算来确定电子垃圾覆盖的区域,最终用户可以通过专用的android应用程序对其进行监控。
{"title":"Smart Cloud Enabled E-Waste Management System","authors":"P. Jayarajan, S. Thenmozhi, R. Maheswar, S. Malathy, Udaiyakumar Ramamoorthy","doi":"10.1109/ICCCI.2018.8441476","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441476","url":null,"abstract":"Electronic waste (E-waste) comprises waste electronics/electrical goods that are useless. This includes computers, servers, monitors, and so on. E-waste contains toxic substances, such as lead and cadmium in circuit boards, lead oxide and cadmium in monitor (CRTs), mercury in switches which are highly hazardous. In this paper, we propose a monitoring system for e-waste dump yards through smart phones. This is an initiative to do things for the wide scope e-waste management. We use the morphological operations in image processing to determine the area covered by e-wastes, which can be monitored by the end user through the dedicated android application.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132881472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of Conscious Alert System from EEG data using LabView 利用LabView分析基于脑电数据的有意识警报系统
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441260
C. Babu, R. H. Kumar, P. Sampath, P. Bhuvaneshwari, M. Dharanya
The major causes of road accidents are driver drowsiness and driver inattention. There is a need for a system that can alert the driver on time, whenever he is drowsy or inattentive. This paper presents an analysis of Conscious Alert System (CAS) to find out classification in alert or non-alert system using Electroencephalogram (EEG) data. Monitoring and analyzing driver behavior are needed for safe driving. In this work, we aim to develop a system that can detect alert system based on the False Negative and False Positive using LabVIEW.
道路交通事故的主要原因是司机嗜睡和注意力不集中。我们需要一种系统,能够在司机昏昏欲睡或注意力不集中时及时提醒他。本文通过对有意识警报系统(CAS)的分析,利用脑电图(EEG)数据,找出警报和非警报系统的分类。安全驾驶需要对驾驶员行为进行监控和分析。在本工作中,我们的目标是利用LabVIEW开发一个基于假阴性和假阳性的警报检测系统。
{"title":"Analysis of Conscious Alert System from EEG data using LabView","authors":"C. Babu, R. H. Kumar, P. Sampath, P. Bhuvaneshwari, M. Dharanya","doi":"10.1109/ICCCI.2018.8441260","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441260","url":null,"abstract":"The major causes of road accidents are driver drowsiness and driver inattention. There is a need for a system that can alert the driver on time, whenever he is drowsy or inattentive. This paper presents an analysis of Conscious Alert System (CAS) to find out classification in alert or non-alert system using Electroencephalogram (EEG) data. Monitoring and analyzing driver behavior are needed for safe driving. In this work, we aim to develop a system that can detect alert system based on the False Negative and False Positive using LabVIEW.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133770597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain for Student Data Privacy and Consent 学生数据隐私和同意的区块链
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441445
Shlok Gilda, Maanav Mehrotra
Current methods for obtaining data consent from legal guardians are limited to paper forms and human data entry. While this classic method of granting consent is familiar to the parties involved, it involves little accountability or ongoing access oversight. Parents are asked to sign multiple permission forms, but are not given an efficient manner by which they can differentiate between fields for consent nor keep track of usage. Blockchain technology represents a promising approach for developing ‘smart contracts', digital promises to be executed without reliance upon a legal intermediary. Utilizing Hyperledger Fabric and Hyperledger Composer, we propose a framework of nested authorization, allowing a public school data administrator the ability to grant authorization rights to a third party afterschool intervention program and their volunteers, who meet with parents and obtain consent for data access rights relying on smart contracts. These data consent signatures allow researchers the ability to design targeted inventions, meeting the needs of the community.
目前获得法定监护人数据同意的方法仅限于纸质表格和人工数据输入。虽然这种授予同意的经典方法对相关各方来说很熟悉,但它几乎不涉及问责制或持续的访问监督。家长被要求签署多份许可表格,但没有一个有效的方法让他们区分哪些字段需要同意,也没有跟踪使用情况。区块链技术代表了一种开发“智能合约”的有前途的方法,即在不依赖法律中介的情况下执行数字承诺。利用Hyperledger Fabric和Hyperledger Composer,我们提出了一个嵌套授权框架,允许公立学校数据管理员能够向第三方课后干预计划及其志愿者授予授权权,这些志愿者与家长会面并获得基于智能合约的数据访问权同意。这些数据同意签名使研究人员能够设计有针对性的发明,满足社区的需求。
{"title":"Blockchain for Student Data Privacy and Consent","authors":"Shlok Gilda, Maanav Mehrotra","doi":"10.1109/ICCCI.2018.8441445","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441445","url":null,"abstract":"Current methods for obtaining data consent from legal guardians are limited to paper forms and human data entry. While this classic method of granting consent is familiar to the parties involved, it involves little accountability or ongoing access oversight. Parents are asked to sign multiple permission forms, but are not given an efficient manner by which they can differentiate between fields for consent nor keep track of usage. Blockchain technology represents a promising approach for developing ‘smart contracts', digital promises to be executed without reliance upon a legal intermediary. Utilizing Hyperledger Fabric and Hyperledger Composer, we propose a framework of nested authorization, allowing a public school data administrator the ability to grant authorization rights to a third party afterschool intervention program and their volunteers, who meet with parents and obtain consent for data access rights relying on smart contracts. These data consent signatures allow researchers the ability to design targeted inventions, meeting the needs of the community.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131175474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Quantification of Serum Protein using 2D Electrophoresis Image 利用二维电泳图像定量测定血清蛋白
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441249
Shanmuga Sundari Natesan, Perumalraja Rengaraju
Serum Protein Electrophoresis is a widely used test to identify the presence of various Serum proteins such us, Albumin, Alpha, Beta and Gamma. In electrophoresis testing, charged protein molecules are moved in an electric field according to their size and weight. When a unique gel component is added with serum as a color die that generates an image on a glass plate. This electrophoresis image is used to quantify as well as analyze the various proteins using image processing technique. We propose an image processing framework to detect the various protein bands and length, also quantification of each band. The software was fully developed in MATLAB, which consists of three stages. In the first pre-processing stage, un-sharpening filter is used to enhance the frequency components of image. Next, Multidimensional filter is used in second stage for edge correction. Savitzky-Golay filter is used in third stage to smooth out the noisy signal. Finally, quantification of each protein band is done by manually. Obtained total protein and albumin of various Serum samples are compared with traditional test results, where they are very closer or the same.
血清蛋白电泳是一种广泛使用的检测方法,用于鉴定各种血清蛋白的存在,如白蛋白、α、β和γ。在电泳测试中,带电的蛋白质分子根据其大小和重量在电场中移动。当一种独特的凝胶成分加入血清作为彩色模,在玻璃板上产生图像。该电泳图像用于定量和分析各种蛋白质使用图像处理技术。我们提出了一种图像处理框架来检测各种蛋白质条带和长度,并对每个条带进行量化。整个软件的开发是在MATLAB环境下完成的,共分三个阶段。在第一预处理阶段,采用非锐化滤波器增强图像的频率分量。其次,在第二阶段使用多维滤波器进行边缘校正。第三级采用Savitzky-Golay滤波器平滑噪声信号。最后,人工对每个蛋白带进行定量分析。将所得的各种血清样品的总蛋白和白蛋白与传统的检测结果进行比较,两者非常接近或相同。
{"title":"Quantification of Serum Protein using 2D Electrophoresis Image","authors":"Shanmuga Sundari Natesan, Perumalraja Rengaraju","doi":"10.1109/ICCCI.2018.8441249","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441249","url":null,"abstract":"Serum Protein Electrophoresis is a widely used test to identify the presence of various Serum proteins such us, Albumin, Alpha, Beta and Gamma. In electrophoresis testing, charged protein molecules are moved in an electric field according to their size and weight. When a unique gel component is added with serum as a color die that generates an image on a glass plate. This electrophoresis image is used to quantify as well as analyze the various proteins using image processing technique. We propose an image processing framework to detect the various protein bands and length, also quantification of each band. The software was fully developed in MATLAB, which consists of three stages. In the first pre-processing stage, un-sharpening filter is used to enhance the frequency components of image. Next, Multidimensional filter is used in second stage for edge correction. Savitzky-Golay filter is used in third stage to smooth out the noisy signal. Finally, quantification of each protein band is done by manually. Obtained total protein and albumin of various Serum samples are compared with traditional test results, where they are very closer or the same.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Accelerated Wi-Fi Bot controlled via Node MCU 物联网加速Wi-Fi Bot通过Node MCU控制
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441215
Sweta V Parvati, K. Thenmozhi, P. Praveenkumar, S. Sathish, Rengarajan Amirtharajan
Internet of Things (IOT) is the next industrial revolution which is used to automate simple tasks and reduce man power. A Wi-fi Bot is designed using node Microcontroller Unit (MCU). Data in the form of string will be transferred through Internet protocol (IP) address. Arduino Integrated Development Environment (IDE) is used to program the node MCU. Five devices can access control this node MCU at the same time. Message Authentication Code Identity (MAC ID) of the connected devices is displayed in the display device. This device can be used to control the vacuum cleaner, carry goods in airports and patients can access their wheel chair without aids.
物联网(IOT)是下一次工业革命,用于自动化简单任务并减少人力。采用节点微控制器(MCU)设计了一个Wi-fi机器人。字符串形式的数据将通过互联网协议(IP)地址传输。采用Arduino集成开发环境(IDE)对节点MCU进行编程。五个设备可以同时访问该节点MCU。在显示设备中显示所连接设备的MAC ID (Message Authentication Code Identity)。这个装置可以用来控制吸尘器,在机场搬运货物,病人可以在没有辅助的情况下使用轮椅。
{"title":"IoT Accelerated Wi-Fi Bot controlled via Node MCU","authors":"Sweta V Parvati, K. Thenmozhi, P. Praveenkumar, S. Sathish, Rengarajan Amirtharajan","doi":"10.1109/ICCCI.2018.8441215","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441215","url":null,"abstract":"Internet of Things (IOT) is the next industrial revolution which is used to automate simple tasks and reduce man power. A Wi-fi Bot is designed using node Microcontroller Unit (MCU). Data in the form of string will be transferred through Internet protocol (IP) address. Arduino Integrated Development Environment (IDE) is used to program the node MCU. Five devices can access control this node MCU at the same time. Message Authentication Code Identity (MAC ID) of the connected devices is displayed in the display device. This device can be used to control the vacuum cleaner, carry goods in airports and patients can access their wheel chair without aids.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Pyramid-based Image Interpolation 基于金字塔的图像插值
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441313
R. Sujee, S. Padmavathi
A technique for better reconstruction of a distorted region in an image using Pyramid-based image interpolation is presented in this paper. The central idea is to construct the image pyramid, so that the apex of the pyramid has a minimized distorted region. The reconstruction of the original image starts from the apex of the pyramid. Each time, the pixels in the distorted region are recovered using bilinear interpolation technique. Since the distorted pixels in the image at the apex of the pyramid have maximal undistorted neighbors, the accuracy of reconstruction is enhanced. Thus the bottom-up approach proposed by this paper results in improved image reconstruction when compared to top-down technique due to the above mentioned higher availability of un distorted pixels in the neighborhood of a distorted pixel.
本文提出了一种基于金字塔的图像插值技术,可以更好地重建图像中的畸变区域。其核心思想是构造图像金字塔,使金字塔的顶点具有最小的畸变区域。原始图像的重建从金字塔的顶端开始。每次使用双线性插值技术恢复畸变区域的像素。由于图像中位于金字塔顶端的畸变像素具有最大的未畸变邻居,因此提高了重建的精度。因此,与自顶向下的方法相比,本文提出的自底向上方法可以改善图像重建,因为上述方法在畸变像素附近具有更高的未失真像素可用性。
{"title":"Pyramid-based Image Interpolation","authors":"R. Sujee, S. Padmavathi","doi":"10.1109/ICCCI.2018.8441313","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441313","url":null,"abstract":"A technique for better reconstruction of a distorted region in an image using Pyramid-based image interpolation is presented in this paper. The central idea is to construct the image pyramid, so that the apex of the pyramid has a minimized distorted region. The reconstruction of the original image starts from the apex of the pyramid. Each time, the pixels in the distorted region are recovered using bilinear interpolation technique. Since the distorted pixels in the image at the apex of the pyramid have maximal undistorted neighbors, the accuracy of reconstruction is enhanced. Thus the bottom-up approach proposed by this paper results in improved image reconstruction when compared to top-down technique due to the above mentioned higher availability of un distorted pixels in the neighborhood of a distorted pixel.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129545615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Analysis Technique to Detect Ransomware Threat 一种检测勒索软件威胁的分析技术
Pub Date : 1900-01-01 DOI: 10.1109/ICCCI.2018.8441502
S. Mukesh
The fast development of Wireless Network has raised a magnificent sensitivity toward security threats. As of now, security is viewed as one of the basic parameter for the acknowledgment of any remote systems administration innovation. Any hub under assault in remote system introduces a typical conduct called the pernicious conduct. In this condition, the whole operation of a system gets vexed and to avert such harmful practices, a few security resolutions have been found. Malware is a typical term that is utilized to characterize the kind of noxious programming that assumes an essential part in security dangers to the PC and Internet. This paper, expects to give a far reaching examination on Malware how digital criminal are utilized to get emancipate from huge organizations by introducing noxious codes on their servers. Having introduced the threats and their related dangers, the review then looks at a portion of the discovery and moderation arrangements accessible.
无线网络的快速发展使人们对安全威胁的敏感度大大提高。到目前为止,安全性被视为确认任何远程系统管理创新的基本参数之一。任何在远程系统中受到攻击的枢纽都会引入一种典型的行为,称为恶意行为。在这种情况下,系统的整个操作变得烦恼,为了避免这种有害的做法,已经找到了一些安全解决方案。恶意软件是一个典型的术语,它被用来描述一种有害的编程,这种编程在PC和互联网的安全危险中扮演着重要的角色。本文希望对恶意软件进行深入的研究,探讨数字犯罪分子如何利用恶意软件在大型组织的服务器上引入有害代码,从而从大型组织中解放出来。在介绍了威胁及其相关的危险之后,审查将查看可访问的发现和审核安排的一部分。
{"title":"An Analysis Technique to Detect Ransomware Threat","authors":"S. Mukesh","doi":"10.1109/ICCCI.2018.8441502","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441502","url":null,"abstract":"The fast development of Wireless Network has raised a magnificent sensitivity toward security threats. As of now, security is viewed as one of the basic parameter for the acknowledgment of any remote systems administration innovation. Any hub under assault in remote system introduces a typical conduct called the pernicious conduct. In this condition, the whole operation of a system gets vexed and to avert such harmful practices, a few security resolutions have been found. Malware is a typical term that is utilized to characterize the kind of noxious programming that assumes an essential part in security dangers to the PC and Internet. This paper, expects to give a far reaching examination on Malware how digital criminal are utilized to get emancipate from huge organizations by introducing noxious codes on their servers. Having introduced the threats and their related dangers, the review then looks at a portion of the discovery and moderation arrangements accessible.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123192254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2018 International Conference on Computer Communication and Informatics (ICCCI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1