首页 > 最新文献

2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)最新文献

英文 中文
An IoT based Framework for Smart City Services 基于物联网的智慧城市服务框架
P. Sadhukhan
Smart city is an emerging concept that aims to improve the quality of city life, to enhance the efficiency of urban operations and services as well as to create a sustainable economic growth of the city. Internet-of-Things (IoT) and big data have emerged as key enabling technologies for smart city services infrastructure. A major issue in the design of smart city services is the provision of Internet connectivity anywhere within the cities through some suitable network infrastructure. Although the use cases for various smart city services and business models for delivering smart city services have been proposed in the literature over the past few years, none of them attempts to address the problem of dealing with heterogeneous technologies required for collecting and processing data to offer such services. Thus, this paper proposes a suitable framework for smart city services based on IoT to address the above-mentioned issues.
智慧城市是一个新兴的概念,旨在提高城市生活质量,提高城市运营和服务的效率,并创造一个可持续的城市经济增长。物联网(IoT)和大数据已成为智慧城市服务基础设施的关键使能技术。智慧城市服务设计中的一个主要问题是通过一些合适的网络基础设施在城市内的任何地方提供互联网连接。尽管在过去几年中,文献中已经提出了各种智慧城市服务的用例和提供智慧城市服务的商业模式,但它们都没有试图解决处理收集和处理数据以提供此类服务所需的异构技术的问题。因此,本文提出了一个适合基于物联网的智慧城市服务框架来解决上述问题。
{"title":"An IoT based Framework for Smart City Services","authors":"P. Sadhukhan","doi":"10.1109/IC3IOT.2018.8668103","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668103","url":null,"abstract":"Smart city is an emerging concept that aims to improve the quality of city life, to enhance the efficiency of urban operations and services as well as to create a sustainable economic growth of the city. Internet-of-Things (IoT) and big data have emerged as key enabling technologies for smart city services infrastructure. A major issue in the design of smart city services is the provision of Internet connectivity anywhere within the cities through some suitable network infrastructure. Although the use cases for various smart city services and business models for delivering smart city services have been proposed in the literature over the past few years, none of them attempts to address the problem of dealing with heterogeneous technologies required for collecting and processing data to offer such services. Thus, this paper proposes a suitable framework for smart city services based on IoT to address the above-mentioned issues.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127817757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Biometric Authentication to ensure security in ePassports 生物识别认证,确保电子护照的安全
N. Ramya, U. Sandhya, L. Gayathri
Biometric passports are widely being employed in most of the countries to certify that the passport and its holder are genuine and to eliminate fraudulent activities like border crossing, passport cloning, fake passports etc. Biometric passports, also called ePassports contain a RFID (Radio Frequency Identification) chip embedded in the passport which carries certain biometric information, along with the information available in the data page of the passport. Currently used ePassports use PKI (Public Key Infrastructure) to authenticate the information stored in the chip. But the protection mechanisms used in this authentication method has some shortcomings like Skimming, Eavesdropping, Clandestine scanning etc. The proposed model will overcome the above issues by authenticating the traveler by their fingerprint (biometric information) and securing the tag information through an irrevocable hash function.
生物识别护照在大多数国家被广泛使用,以证明护照及其持有人是真实的,并消除欺诈活动,如过境、护照克隆、假护照等。生物识别护照,也称为电子护照,在护照中嵌入RFID(无线射频识别)芯片,该芯片携带某些生物识别信息,以及护照数据页上提供的信息。目前使用的电子护照使用PKI(公钥基础设施)来验证存储在芯片中的信息。但该认证方法所采用的保护机制存在略读、窃听、秘密扫描等缺点。该模型将通过旅行者的指纹(生物特征信息)进行身份验证,并通过不可撤销的哈希函数保护标签信息,从而克服上述问题。
{"title":"Biometric Authentication to ensure security in ePassports","authors":"N. Ramya, U. Sandhya, L. Gayathri","doi":"10.1109/IC3IOT.2018.8668170","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668170","url":null,"abstract":"Biometric passports are widely being employed in most of the countries to certify that the passport and its holder are genuine and to eliminate fraudulent activities like border crossing, passport cloning, fake passports etc. Biometric passports, also called ePassports contain a RFID (Radio Frequency Identification) chip embedded in the passport which carries certain biometric information, along with the information available in the data page of the passport. Currently used ePassports use PKI (Public Key Infrastructure) to authenticate the information stored in the chip. But the protection mechanisms used in this authentication method has some shortcomings like Skimming, Eavesdropping, Clandestine scanning etc. The proposed model will overcome the above issues by authenticating the traveler by their fingerprint (biometric information) and securing the tag information through an irrevocable hash function.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mapping Artificial Intelligence and Education 测绘人工智能和教育
P. Kavitha, B. Krishna Moorthy, P. Sudharshan, T. Aarthi
Education plays a predominant role in today’s modern technological world. It opens various doors for achieving better prospects in life and also promotes career growth. The various pedagogical methods used in the field of teaching produces a new quality that favors the task of generating, transmitting and sharing knowledge among students. The capability to facilitate learning and improving performance using appropriate technological processes, would enhance the educational qualities. Artificial Intelligence is one such emergent technology that could be leveraged to create learning tools which are more flexible and efficient. This paper is an attempt to characterize the integration of education and artificial intelligence to streamline the learning process through adaptive learning technique with the help of Bayesian student model, based on clustering methods and interaction traces. Hence the system proposed would help to improvise the user by identifying their strengths and weaknesses.
教育在当今的现代技术世界中起着主导作用。它为实现更好的生活前景打开了各种大门,也促进了职业发展。在教学领域中使用的各种教学方法产生了一种新的品质,有利于在学生之间产生、传递和分享知识的任务。利用适当的技术程序促进学习和提高成绩的能力将提高教育质量。人工智能就是这样一种新兴技术,可以用来创造更灵活、更高效的学习工具。本文试图描述教育与人工智能的融合,在贝叶斯学生模型的帮助下,基于聚类方法和交互痕迹,通过自适应学习技术简化学习过程。因此,所提议的系统将通过确定用户的长处和短处来帮助他们即兴发挥。
{"title":"Mapping Artificial Intelligence and Education","authors":"P. Kavitha, B. Krishna Moorthy, P. Sudharshan, T. Aarthi","doi":"10.1109/IC3IOT.2018.8668123","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668123","url":null,"abstract":"Education plays a predominant role in today’s modern technological world. It opens various doors for achieving better prospects in life and also promotes career growth. The various pedagogical methods used in the field of teaching produces a new quality that favors the task of generating, transmitting and sharing knowledge among students. The capability to facilitate learning and improving performance using appropriate technological processes, would enhance the educational qualities. Artificial Intelligence is one such emergent technology that could be leveraged to create learning tools which are more flexible and efficient. This paper is an attempt to characterize the integration of education and artificial intelligence to streamline the learning process through adaptive learning technique with the help of Bayesian student model, based on clustering methods and interaction traces. Hence the system proposed would help to improvise the user by identifying their strengths and weaknesses.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Energy Utilization Control with Remote Network Access 具有远程网络访问的高效能源利用控制
Dakshit Chalagulla, Jeevanigi Jayateertha, Charishma Reddy Kudimi, P. Manitha, M. Sujith
In the past two decades there is a drastic improvement in the technology. The most common word is IOT (Internet of Things) which leads to improvement of Home automation. Switching ON the appliances at home and forgetting to turn them OFF leads to an increase in the daily power consumption. This paper presents the controlling of home appliances on the basis of pre-specified time which is defined from the user’s device; Arduino Ethernet shield, real-time clock, sensors and MOSFET keeping the internet as the medium of communication. This enables the user to monitor the energy usage and assists in minimizing the energy wastage. This prototype is designed for a low cost such that it satisfies the need of different classes of people by notifying them about their consumption by the means of an alert message. The message is sent when power consumption exceeds the limit set by the user making it more user-friendly. An additional task performed by the system is to isolate the load during the fault condition.
在过去的二十年里,这项技术有了巨大的进步。最常见的词是IOT(物联网),它导致家庭自动化的改进。把家里的电器打开而忘了关,会导致每天的耗电量增加。提出了一种基于用户设备定义的预置时间对家电进行控制的方法;Arduino以太网屏蔽,实时时钟,传感器和MOSFET保持互联网作为通信媒介。这使用户能够监控能源使用情况,并有助于最大限度地减少能源浪费。这个原型是为低成本而设计的,这样它就可以满足不同阶层的人的需求,通过警报消息的方式通知他们他们的消费情况。当功耗超过用户设置的限制时发送消息,更加方便用户使用。系统执行的另一项任务是在故障状态下隔离负载。
{"title":"Efficient Energy Utilization Control with Remote Network Access","authors":"Dakshit Chalagulla, Jeevanigi Jayateertha, Charishma Reddy Kudimi, P. Manitha, M. Sujith","doi":"10.1109/IC3IOT.2018.8668150","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668150","url":null,"abstract":"In the past two decades there is a drastic improvement in the technology. The most common word is IOT (Internet of Things) which leads to improvement of Home automation. Switching ON the appliances at home and forgetting to turn them OFF leads to an increase in the daily power consumption. This paper presents the controlling of home appliances on the basis of pre-specified time which is defined from the user’s device; Arduino Ethernet shield, real-time clock, sensors and MOSFET keeping the internet as the medium of communication. This enables the user to monitor the energy usage and assists in minimizing the energy wastage. This prototype is designed for a low cost such that it satisfies the need of different classes of people by notifying them about their consumption by the means of an alert message. The message is sent when power consumption exceeds the limit set by the user making it more user-friendly. An additional task performed by the system is to isolate the load during the fault condition.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance of IoT protocols under constrained network, a Use Case based approach 受限网络下物联网协议的性能,基于用例的方法
S. Sreeraj, G. Santhosh Kumar
An extensive collection of communication protocols were developed to support efficient communication of IoT devices. IoT applications are intended to run with constrained resources. Since IoT systems need wireless connectivity, and the devices often are remote, they have to manage with connections which are likely unreliable, irregular and inferior bandwidth to access the network. A quantitative assessment of IoT protocols in such situations remains unexplored. The objective of the present work is to assess the performance of IoT messaging protocols under restricted wireless access network based on Use Cases published by oneM2M specifications.
开发了广泛的通信协议集合,以支持物联网设备的有效通信。物联网应用程序旨在使用有限的资源运行。由于物联网系统需要无线连接,而设备通常是远程的,因此它们必须使用可能不可靠、不规则和低带宽的连接来管理访问网络。在这种情况下,物联网协议的定量评估仍未得到探索。本工作的目的是基于oneM2M规范发布的用例,评估受限无线接入网络下物联网消息协议的性能。
{"title":"Performance of IoT protocols under constrained network, a Use Case based approach","authors":"S. Sreeraj, G. Santhosh Kumar","doi":"10.1109/IC3IOT.2018.8668105","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668105","url":null,"abstract":"An extensive collection of communication protocols were developed to support efficient communication of IoT devices. IoT applications are intended to run with constrained resources. Since IoT systems need wireless connectivity, and the devices often are remote, they have to manage with connections which are likely unreliable, irregular and inferior bandwidth to access the network. A quantitative assessment of IoT protocols in such situations remains unexplored. The objective of the present work is to assess the performance of IoT messaging protocols under restricted wireless access network based on Use Cases published by oneM2M specifications.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129294427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Route Planning of a Wheeled Mobile Robot (WMR) using Enhanced Artificial Potential Field (E-APF) Method 基于增强人工势场(E-APF)方法的轮式移动机器人路径规划
Priyanka Sudhakara, V. Ganapathy, K. Sundaran
Trajectory planning is a prime method in the research on mobile robot navigation. Sampling-based algorithms can generate trajectories and reach the target avoiding obstacles. In this proposed work, an Enhanced Artificial Potential Field (E-APF) generates the trajectories for navigation of mobile robots and simultaneously guarantees the effectiveness and continuity of the trajectory. Aiming at the problem that the classical APF cannot adapt to the complex trajectory planning and fall as prey into the local optimal solution, this E-APF method is proposed for Wheeled Mobile Robot (WMR) route planning. In this research work, this method does not consider the influence of traditional attraction and repulsive force. The repulsive potential is built by repulsive function for discretizing outline of an arbitrarily shaped obstacle with points. This describes the workspace of the wheeled mobile robot more precisely. The reliability is proved for most of the cases by discussing the convergence of this proposed technique. Finally, an efficient obstacles avoidance based action has been performed in the chosen navigable trajectory. Trajectories that have been generated using the proposed E-APF satisfy constraints approach of the direction on both the starting and goal points. Consequently, the trajectories that are generated by the Wheeled Mobile Robot (WMR) are geometrically and dynamically feasible. Simulation results performed confirms the viability of the proposed E-APF algorithm that it can be effectively utilized in trajectory planning of wheeled mobile robots and can be applied in real-time scenarios.
轨迹规划是移动机器人导航研究的主要方法之一。基于采样的算法可以生成轨迹并避开障碍物到达目标。在本研究中,利用一种增强人工势场(Enhanced Artificial Potential Field, E-APF)生成移动机器人导航的轨迹,同时保证轨迹的有效性和连续性。针对经典APF算法无法适应复杂轨迹规划,容易陷入局部最优解的问题,提出了一种用于轮式移动机器人(WMR)路径规划的E-APF算法。在本研究工作中,该方法没有考虑传统引力和排斥力的影响。利用斥力函数对任意形状有点障碍物的轮廓进行离散,建立了斥力势。这更准确地描述了轮式移动机器人的工作空间。通过讨论该方法的收敛性,在大多数情况下证明了该方法的可靠性。最后,在选定的可导航轨迹上执行有效的避障动作。利用所提出的E-APF生成的轨迹在起始点和目标点上都满足方向约束方法。因此,轮式移动机器人生成的轨迹在几何上和动力学上都是可行的。仿真结果证实了所提出的E-APF算法的可行性,该算法可以有效地用于轮式移动机器人的轨迹规划,并可应用于实时场景。
{"title":"Route Planning of a Wheeled Mobile Robot (WMR) using Enhanced Artificial Potential Field (E-APF) Method","authors":"Priyanka Sudhakara, V. Ganapathy, K. Sundaran","doi":"10.1109/IC3IOT.2018.8668182","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668182","url":null,"abstract":"Trajectory planning is a prime method in the research on mobile robot navigation. Sampling-based algorithms can generate trajectories and reach the target avoiding obstacles. In this proposed work, an Enhanced Artificial Potential Field (E-APF) generates the trajectories for navigation of mobile robots and simultaneously guarantees the effectiveness and continuity of the trajectory. Aiming at the problem that the classical APF cannot adapt to the complex trajectory planning and fall as prey into the local optimal solution, this E-APF method is proposed for Wheeled Mobile Robot (WMR) route planning. In this research work, this method does not consider the influence of traditional attraction and repulsive force. The repulsive potential is built by repulsive function for discretizing outline of an arbitrarily shaped obstacle with points. This describes the workspace of the wheeled mobile robot more precisely. The reliability is proved for most of the cases by discussing the convergence of this proposed technique. Finally, an efficient obstacles avoidance based action has been performed in the chosen navigable trajectory. Trajectories that have been generated using the proposed E-APF satisfy constraints approach of the direction on both the starting and goal points. Consequently, the trajectories that are generated by the Wheeled Mobile Robot (WMR) are geometrically and dynamically feasible. Simulation results performed confirms the viability of the proposed E-APF algorithm that it can be effectively utilized in trajectory planning of wheeled mobile robots and can be applied in real-time scenarios.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Survey Of Multimodal Biometric Using Ear And Finger Knuckle Image 基于耳指关节图像的多模态生物识别研究综述
B. Rajalakshmi, S. Sumathi
Todays world threats to personal data is imminent so identity of a person is important. With the increased battle against cybercrimes, person identification has given rise to biometric authentication system. Human identification has been subjected to intensive research due to their application in all aspects of security surveillance. Biometric is a mechanism to recognize a person by physical or behavioral traits such as face, fingerprint, signature, iris, palmprint, hand geometry, ear, finger knuckle print. To overcome the limitation of Uni Biometric by Multimodal Biometric has been developed. This paper provides an overview of Ear and Finger Knuckle Biometric recognition with different fusion technique to authenticate a person. The Ear and Finger Knuckle biometric are recently developing technique which are non-invasive method of Person identification. The Ear Biometric are unique since it is stable from birth. The image pattern from Finger Knuckle bending is highly unique and rich in texture patterns. It shows that the performance of different Biometric system varies according to application.
当今世界对个人数据的威胁迫在眉睫,因此一个人的身份很重要。随着与网络犯罪的斗争日益激烈,个人身份识别催生了生物识别认证系统。人的身份识别由于在安防监控的各个方面的应用而受到广泛的研究。生物识别是一种通过面部、指纹、签名、虹膜、掌纹、手部几何形状、耳朵、指关节指纹等身体或行为特征来识别一个人的机制。为了克服单一生物识别技术的局限性,多模态生物识别技术应运而生。本文综述了采用不同融合技术的耳指关节生物特征识别技术。耳部和指关节生物识别技术是近年来发展起来的一种非侵入性的人体识别技术。耳朵的生物特征是独一无二的,因为它从出生起就很稳定。指节弯曲的图像图案非常独特,纹理图案丰富。研究表明,不同的生物识别系统在不同的应用场合下,其性能是不同的。
{"title":"Survey Of Multimodal Biometric Using Ear And Finger Knuckle Image","authors":"B. Rajalakshmi, S. Sumathi","doi":"10.1109/ic3iot.2018.8668109","DOIUrl":"https://doi.org/10.1109/ic3iot.2018.8668109","url":null,"abstract":"Todays world threats to personal data is imminent so identity of a person is important. With the increased battle against cybercrimes, person identification has given rise to biometric authentication system. Human identification has been subjected to intensive research due to their application in all aspects of security surveillance. Biometric is a mechanism to recognize a person by physical or behavioral traits such as face, fingerprint, signature, iris, palmprint, hand geometry, ear, finger knuckle print. To overcome the limitation of Uni Biometric by Multimodal Biometric has been developed. This paper provides an overview of Ear and Finger Knuckle Biometric recognition with different fusion technique to authenticate a person. The Ear and Finger Knuckle biometric are recently developing technique which are non-invasive method of Person identification. The Ear Biometric are unique since it is stable from birth. The image pattern from Finger Knuckle bending is highly unique and rich in texture patterns. It shows that the performance of different Biometric system varies according to application.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124266612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart Sentimental Agent Analysis through Live Streaming Data 通过实时流数据分析智能情感代理
Pratham Sharma, T. Choudhury, A. Sabitha, G. Raj
The new branch of science which aims on getting the computers process data and become more learned without the use of explicit programming is termed as Machine Learning. The most premier task of Natural Language processing (NLP) is Sentiment analysis or opinion mining. The need for Sentimental Analysis has gained much popularity over the recent years. Through the paper, we target to deal with the problem of Review System, an utmost important part of any organizational CRM.. Data inflow in this project is through the twitter API supplying live stream of tweets.. Finally we would set a stage to provide insights into our future work on sentiment analysis and using this Smart Agent Analysis on existing CRM in order to improve their existing Feedback structure. Answers to these questions are provided by statistical analysis on keyword.
旨在让计算机处理数据并在不使用显式编程的情况下变得更有学问的新科学分支被称为机器学习。自然语言处理(NLP)的首要任务是情感分析或意见挖掘。近年来,对情感分析的需求越来越受欢迎。通过本文,我们的目标是解决任何组织的客户关系管理中最重要的部分——评审系统的问题。这个项目的数据流入是通过twitter API提供tweets的实时流。最后,我们将设置一个阶段,为我们未来在情感分析方面的工作提供见解,并在现有的CRM上使用这种智能代理分析,以改善他们现有的反馈结构。这些问题的答案都是通过对关键词的统计分析得出的。
{"title":"Smart Sentimental Agent Analysis through Live Streaming Data","authors":"Pratham Sharma, T. Choudhury, A. Sabitha, G. Raj","doi":"10.1109/IC3IOT.2018.8668164","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668164","url":null,"abstract":"The new branch of science which aims on getting the computers process data and become more learned without the use of explicit programming is termed as Machine Learning. The most premier task of Natural Language processing (NLP) is Sentiment analysis or opinion mining. The need for Sentimental Analysis has gained much popularity over the recent years. Through the paper, we target to deal with the problem of Review System, an utmost important part of any organizational CRM.. Data inflow in this project is through the twitter API supplying live stream of tweets.. Finally we would set a stage to provide insights into our future work on sentiment analysis and using this Smart Agent Analysis on existing CRM in order to improve their existing Feedback structure. Answers to these questions are provided by statistical analysis on keyword.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"20 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120917374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Hybrid Edge Detector Scheme and Magic Cube Based Scheme for Steganography Application 混合边缘检测方案和魔方隐写方案的性能分析
S. Patel, C. Saravanan
Steganography is a technique used for hiding the secret information inside other information which is not secret. Detection of the secret data is challenging if the data first encrypted using cryptographic algorithm before performing stego operation of the secret data into the carrier. In this research article, a performance analysis on two novel steganography techniques used for achieving high payload for the information hiding using the carrier digital image. The research articles which are used for performance analysis are “High payload steganography mechanism using hybrid edge detector” [1] published in 2010 and the other one is “A magic cube based information hiding scheme of large payload” [2] published in 2016 respectively. The schemes discussed in these papers are used for achieving high embedding payload, better quality of stego image using the LSB steganography technique which is based on statistical analysis. In the performance analysis, it is noticed that the magic cube based information hiding scheme is outperforming hybrid edge detector scheme.
隐写术是一种将秘密信息隐藏在其他非秘密信息中的技术。如果在对所述秘密数据进行隐进操作之前,首先使用加密算法对所述秘密数据进行加密,则对所述秘密数据的检测具有挑战性。本文分析了两种新型隐写技术的性能,利用载体数字图像实现高有效载荷的信息隐藏。用于性能分析的研究文章分别是2010年发表的《基于混合边缘检测器的高载荷隐写机制》[1]和2016年发表的《基于魔方的大载荷信息隐藏方案》[2]。采用基于统计分析的LSB隐写技术实现了高嵌入载荷、高质量的隐写图像。在性能分析中,发现基于魔方的信息隐藏方案优于混合边缘检测方案。
{"title":"Performance Analysis of Hybrid Edge Detector Scheme and Magic Cube Based Scheme for Steganography Application","authors":"S. Patel, C. Saravanan","doi":"10.1109/IC3IOT.2018.8668102","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668102","url":null,"abstract":"Steganography is a technique used for hiding the secret information inside other information which is not secret. Detection of the secret data is challenging if the data first encrypted using cryptographic algorithm before performing stego operation of the secret data into the carrier. In this research article, a performance analysis on two novel steganography techniques used for achieving high payload for the information hiding using the carrier digital image. The research articles which are used for performance analysis are “High payload steganography mechanism using hybrid edge detector” [1] published in 2010 and the other one is “A magic cube based information hiding scheme of large payload” [2] published in 2016 respectively. The schemes discussed in these papers are used for achieving high embedding payload, better quality of stego image using the LSB steganography technique which is based on statistical analysis. In the performance analysis, it is noticed that the magic cube based information hiding scheme is outperforming hybrid edge detector scheme.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124756843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Credit Based Multilevel Queue Scheduling in Cloud Environment 云环境下基于信用的多级队列调度
R. Madhumathi, N. Kalaiyarasi
Cloud computing is an IT paradigm, a model for enabling access to shared huge configurable resources, which is provisioned with minimal management effort, often over the web. Users access the cloud applications through a browser or a mobile app while the software and data are stored on servers at a remote location. The benefits of using the cloud are storage, security, cost, accessibility, flexibility, maintenance, backup and recovery etc. It also provides easy access to data at any time. Cloud application providers strive to give the better service and performance as if the software programs were installed locally on end-users system. One of major issue in cloud computing is resource allocation. Resource allocation is difficult to solve, especially in case of complex task and performance computing. To satisfy the performance, mapping the tasks to processor is done, which helps in resource utilization in the process efficiently. The existing Shortest Job First (SJF) algorithm uses the CPU processing time and memory size to perform the shortest job scheduling first. The starvation in SJF exists only if processes with low burst time appears in queue before the processes with the high burst time is executed. Since this algorithm always chooses the process with low burst time, the process with the high burst time will never get the share of CPU. So, in order to avoid starvation, the proposed system combines the SJF and the Multilevel Queue (MQ) Scheduling based on credit.
云计算是一种IT范例,一种支持访问共享的巨大可配置资源的模型,通常通过web以最小的管理工作量提供这些资源。用户通过浏览器或移动应用程序访问云应用程序,而软件和数据则存储在远程服务器上。使用云的好处包括存储、安全性、成本、可访问性、灵活性、维护、备份和恢复等。它还可以随时方便地访问数据。云应用程序提供商努力提供更好的服务和性能,就好像软件程序安装在终端用户的本地系统上一样。云计算中的一个主要问题是资源分配。资源分配是一个难以解决的问题,特别是在复杂的任务和性能计算的情况下。为了满足性能要求,将任务映射到处理器,有助于有效地利用进程中的资源。现有的最短作业优先(SJF)算法利用CPU处理时间和内存大小,优先执行最短的作业调度。只有突发时间短的进程在执行突发时间长的进程之前出现在队列中,SJF才会出现饥饿现象。由于该算法总是选择突发时间低的进程,因此突发时间高的进程永远得不到CPU的份额。因此,为了避免饥饿,本文提出的系统将SJF和基于信用的多级队列调度(MQ)相结合。
{"title":"Credit Based Multilevel Queue Scheduling in Cloud Environment","authors":"R. Madhumathi, N. Kalaiyarasi","doi":"10.1109/IC3IOT.2018.8668163","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668163","url":null,"abstract":"Cloud computing is an IT paradigm, a model for enabling access to shared huge configurable resources, which is provisioned with minimal management effort, often over the web. Users access the cloud applications through a browser or a mobile app while the software and data are stored on servers at a remote location. The benefits of using the cloud are storage, security, cost, accessibility, flexibility, maintenance, backup and recovery etc. It also provides easy access to data at any time. Cloud application providers strive to give the better service and performance as if the software programs were installed locally on end-users system. One of major issue in cloud computing is resource allocation. Resource allocation is difficult to solve, especially in case of complex task and performance computing. To satisfy the performance, mapping the tasks to processor is done, which helps in resource utilization in the process efficiently. The existing Shortest Job First (SJF) algorithm uses the CPU processing time and memory size to perform the shortest job scheduling first. The starvation in SJF exists only if processes with low burst time appears in queue before the processes with the high burst time is executed. Since this algorithm always chooses the process with low burst time, the process with the high burst time will never get the share of CPU. So, in order to avoid starvation, the proposed system combines the SJF and the Multilevel Queue (MQ) Scheduling based on credit.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1