首页 > 最新文献

2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)最新文献

英文 中文
PSO based robust power system stabilizer design using mixed sensitivity based H output-feedback control in LMI approach 基于混合灵敏度H输出反馈控制的PSO鲁棒电力系统稳定器设计
Swapan Santra, S. Paul
Power system stabilizer (PSS) is extensively used to enhance the angular stability by providing damping to the generator's oscillation. An electric torque is enforced in the rotor shaft in phase with the speed variation to provide this damping. In this paper a PSO based Robust Power System Stabilizer (RPSS) design has been proposed depending upon mixed sensitivity based H output feedback control in linear matrix inequality (LMI) framework. In this approach, PSO based norm minimization technique is applied for weighting function and controller parameter selection. In controller parameter selection, H∞/H2 multi objective control has been proposed. The efficacy of the RPSS, designed through approach has been investigated by simulation of a single machine associated with infinite bus scheme for various loading conditions employing MATLAB.
电力系统稳定器(PSS)被广泛用于通过对发电机的振荡提供阻尼来提高系统的角稳定性。在与速度变化相一致的转子轴上施加电转矩以提供这种阻尼。在线性矩阵不等式(LMI)框架下,基于混合灵敏度的H输出反馈控制,提出了一种基于粒子群算法的鲁棒电力系统稳定器(RPSS)设计。该方法将基于粒子群的范数最小化技术应用于权重函数和控制器参数的选择。在控制器参数选择方面,提出了H∞/H2多目标控制。通过MATLAB仿真,研究了该方法设计的RPSS在不同负载条件下与无限总线方案相关联的单机仿真效果。
{"title":"PSO based robust power system stabilizer design using mixed sensitivity based H output-feedback control in LMI approach","authors":"Swapan Santra, S. Paul","doi":"10.1109/ICRCICN.2017.8234520","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234520","url":null,"abstract":"Power system stabilizer (PSS) is extensively used to enhance the angular stability by providing damping to the generator's oscillation. An electric torque is enforced in the rotor shaft in phase with the speed variation to provide this damping. In this paper a PSO based Robust Power System Stabilizer (RPSS) design has been proposed depending upon mixed sensitivity based H output feedback control in linear matrix inequality (LMI) framework. In this approach, PSO based norm minimization technique is applied for weighting function and controller parameter selection. In controller parameter selection, H∞/H2 multi objective control has been proposed. The efficacy of the RPSS, designed through approach has been investigated by simulation of a single machine associated with infinite bus scheme for various loading conditions employing MATLAB.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A machine learning approach to predict volatile substance abuse for drug risk analysis 预测挥发性物质滥用的机器学习方法,用于药物风险分析
Priyanka Nath, Sumran Kilam, A. Swetapadma
In this work a machine learning approach is proposed for prediction of volatile substance abuse. Machine learning technique used in this work is artificial neural networks (ANN). Two ANN modules are designed, ANN-D to predict whether a person is using VSA or not and ANN-C to predict the time of use. Input features used are age, gender, country, ethnicity, education, neuroticism, openness to experience, extraversion, agreeableness, conscientiousness, impulsiveness, sensation seeking etc. Input features are given to the ANN-Dmodule to predict if volatile substance abuse (VSA) has been done by the person or not. ANN-C module predicts the use of VSA in terms of time such as day, week, month, year, decade, beforea decade, etc. The accuracy of the ANN-D module is found to be 81% and ANN-C module is 71.9%. Hence the proposed method can be used for drug analysis to some extent.
在这项工作中,提出了一种用于预测挥发性物质滥用的机器学习方法。在这项工作中使用的机器学习技术是人工神经网络(ANN)。设计了两个人工神经网络模块,ANN- d用于预测一个人是否在使用VSA, ANN- c用于预测使用时间。输入特征包括年龄、性别、国家、种族、教育程度、神经质、经验开放性、外向性、宜人性、尽责性、冲动性、寻求感觉等。输入特征被赋予ANN-Dmodule来预测是否有挥发性物质滥用(VSA)行为。ANN-C模块预测VSA的使用时间,如日、周、月、年、十年、十年前等。ANN-D模块的精度为81%,ANN-C模块的精度为71.9%。因此,该方法在一定程度上可用于药物分析。
{"title":"A machine learning approach to predict volatile substance abuse for drug risk analysis","authors":"Priyanka Nath, Sumran Kilam, A. Swetapadma","doi":"10.1109/ICRCICN.2017.8234516","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234516","url":null,"abstract":"In this work a machine learning approach is proposed for prediction of volatile substance abuse. Machine learning technique used in this work is artificial neural networks (ANN). Two ANN modules are designed, ANN-D to predict whether a person is using VSA or not and ANN-C to predict the time of use. Input features used are age, gender, country, ethnicity, education, neuroticism, openness to experience, extraversion, agreeableness, conscientiousness, impulsiveness, sensation seeking etc. Input features are given to the ANN-Dmodule to predict if volatile substance abuse (VSA) has been done by the person or not. ANN-C module predicts the use of VSA in terms of time such as day, week, month, year, decade, beforea decade, etc. The accuracy of the ANN-D module is found to be 81% and ANN-C module is 71.9%. Hence the proposed method can be used for drug analysis to some extent.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Time-sensitive data collection with path-constrained mobile sink in WSN 无线传感器网络中具有路径约束的移动汇聚时敏数据采集
Dr. Naween Kumar, D. Dash
Recently, several studies have considered the use of mobile sink (MS) for data gathering in wireless sensor networks. As, it can enhance lifetime of the sensor network by distributing load among the sensors. In some delay-critical applications, a mobile sink is allowed to move along a predefined path. However, due to the predefined path and relatively slower speed of mobile sink, data gathering from sensors may delayed. Thus, time-sensitive data collection in a constrained path environment using mobile sink has increased attention in the research community. Our proposed paper focuses on finding a sub-path on a given path in the network such that the mobile sink can collect maximum data from the network within given time. We refer it as maximum data gathering by optimal sub-path finding problem (MDGOSP). We develop a deterministic algorithm to solve it. Furthermore, performance of the proposed algorithm is validated through simulation experiments using MATLAB.
近年来,一些研究已经考虑在无线传感器网络中使用移动接收器(MS)进行数据采集。通过在传感器之间分配负载,可以提高传感器网络的使用寿命。在一些延迟关键型应用程序中,允许移动接收器沿着预定义的路径移动。然而,由于预定义的路径和相对较慢的移动sink速度,从传感器收集数据可能会延迟。因此,利用移动汇在受限路径环境下的时间敏感数据收集越来越受到研究界的关注。我们提出的论文的重点是在网络的给定路径上找到一个子路径,使移动接收器可以在给定的时间内从网络中收集到最大的数据。我们将其称为最优子路径查找问题(MDGOSP)的最大数据收集。我们开发了一种确定性算法来解决它。最后,通过MATLAB仿真实验验证了算法的性能。
{"title":"Time-sensitive data collection with path-constrained mobile sink in WSN","authors":"Dr. Naween Kumar, D. Dash","doi":"10.1109/ICRCICN.2017.8234491","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234491","url":null,"abstract":"Recently, several studies have considered the use of mobile sink (MS) for data gathering in wireless sensor networks. As, it can enhance lifetime of the sensor network by distributing load among the sensors. In some delay-critical applications, a mobile sink is allowed to move along a predefined path. However, due to the predefined path and relatively slower speed of mobile sink, data gathering from sensors may delayed. Thus, time-sensitive data collection in a constrained path environment using mobile sink has increased attention in the research community. Our proposed paper focuses on finding a sub-path on a given path in the network such that the mobile sink can collect maximum data from the network within given time. We refer it as maximum data gathering by optimal sub-path finding problem (MDGOSP). We develop a deterministic algorithm to solve it. Furthermore, performance of the proposed algorithm is validated through simulation experiments using MATLAB.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126001874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-area interconnected automatic generation control with IPFC and TDOFPID controller 多区域互联自动生成控制,采用IPFC和TDOFPID控制器
D. Mishra, T. Panigrahi, A. Mohanty, P. Ray
Present work introduces a most popular evolution based algorithm and applied in two degree of freedom proportional integral Derivative (TDOFPID) Controller based multi area power system. Differential Evolution (DE) optimization technique is applied here to tune the TDOFPID gains. In each area of system consists of Automatic generation control with addition of non-linarites. In this model time delay, Generation rate constraints (GRC) and reheat turbine is added to make non-linearity. At first attempt simulation is being done in two area with DE optimistion technique. Next attempt a series connected Flexible Alternating Current Transmission (FACT) device such as Interline Power Flow Control (IPFC) is included into the system and simulated. DE is also used to get the optimum value of TDOFPID controller having Integral time absolute error (ITAE) has been the objective function. At last robustness analysis is done with varying parameter and different loading conditions. It is seen that, TDOFPID with IPFC gives better response compared to others.
本文介绍了一种最流行的基于进化的算法,并将其应用于基于二自由度比例积分微分(TDOFPID)控制器的多区域电力系统。本文采用差分进化(DE)优化技术对TDOFPID增益进行调优。在系统的每个区域都包含了非线性的自动生成控制。在模型时滞中,加入了发电速率约束(GRC)和再热轮机,使模型非线性化。首先利用DE优化技术对两个区域进行了模拟。下一步尝试将串联的柔性交流传输(FACT)设备(如线间功率流控制(IPFC))纳入系统并进行仿真。以积分时间绝对误差(ITAE)为目标函数,利用微分方程求出TDOFPID控制器的最优值。最后进行了变参数和不同加载条件下的鲁棒性分析。可以看出,与IPFC相比,TDOFPID具有更好的响应。
{"title":"Multi-area interconnected automatic generation control with IPFC and TDOFPID controller","authors":"D. Mishra, T. Panigrahi, A. Mohanty, P. Ray","doi":"10.1109/ICRCICN.2017.8234521","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234521","url":null,"abstract":"Present work introduces a most popular evolution based algorithm and applied in two degree of freedom proportional integral Derivative (TDOFPID) Controller based multi area power system. Differential Evolution (DE) optimization technique is applied here to tune the TDOFPID gains. In each area of system consists of Automatic generation control with addition of non-linarites. In this model time delay, Generation rate constraints (GRC) and reheat turbine is added to make non-linearity. At first attempt simulation is being done in two area with DE optimistion technique. Next attempt a series connected Flexible Alternating Current Transmission (FACT) device such as Interline Power Flow Control (IPFC) is included into the system and simulated. DE is also used to get the optimum value of TDOFPID controller having Integral time absolute error (ITAE) has been the objective function. At last robustness analysis is done with varying parameter and different loading conditions. It is seen that, TDOFPID with IPFC gives better response compared to others.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127404896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel method for underwater image segmentation based on M-band wavelet transform and human psychovisual phenomenon(HVS) 基于m波段小波变换和人心理视觉现象的水下图像分割新方法
S. Dhar, Hiranmoy Roy, M. Majumder, Chitrita Biswas, Anindita Sarkar
Underwater image segmentation becomes a difficult and challenging task due to various perturbations present in the water. In this paper we propose a novel method for underwater image segmentation based on M-band wavelet transform and human psychovisual phenomenon(HVS). The M-band wavelet transform captures the texture of the underwater image by decomposing the image into sub bands with different scales and orientations. The proper sub bands for segmentation are selected depending on the HVS. The HVS imitates the original visual technique of a human being and it is used to divide each sub band into Weber, De-Vries Rose and Saturation regions. A sub band is selected for segmentation depending on those three regions. The performance of the proposed method is found to be superior than that of the stare-of-the-art methods for underwater image segmentation on standard data set.
由于水中存在各种扰动,水下图像分割成为一项困难而具有挑战性的任务。本文提出了一种基于m波段小波变换和人的视觉心理现象的水下图像分割方法。m波段小波变换通过将水下图像分解成不同尺度和方向的子带来捕获水下图像的纹理。根据HVS选择合适的子带进行分割。HVS模仿人类的原始视觉技术,将每个子波段划分为韦伯区、德弗里斯玫瑰区和饱和区。根据这三个区域选择子带进行分割。结果表明,该方法在标准数据集上的分割性能优于现有的最优方法。
{"title":"A novel method for underwater image segmentation based on M-band wavelet transform and human psychovisual phenomenon(HVS)","authors":"S. Dhar, Hiranmoy Roy, M. Majumder, Chitrita Biswas, Anindita Sarkar","doi":"10.1109/ICRCICN.2017.8234475","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234475","url":null,"abstract":"Underwater image segmentation becomes a difficult and challenging task due to various perturbations present in the water. In this paper we propose a novel method for underwater image segmentation based on M-band wavelet transform and human psychovisual phenomenon(HVS). The M-band wavelet transform captures the texture of the underwater image by decomposing the image into sub bands with different scales and orientations. The proper sub bands for segmentation are selected depending on the HVS. The HVS imitates the original visual technique of a human being and it is used to divide each sub band into Weber, De-Vries Rose and Saturation regions. A sub band is selected for segmentation depending on those three regions. The performance of the proposed method is found to be superior than that of the stare-of-the-art methods for underwater image segmentation on standard data set.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125221311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A machine vision based approach towards identification of adulterant in turmeric powder 基于机器视觉的姜黄粉掺假物鉴别方法研究
D. Mandal, Arpitam Chatterjee, B. Tudu
Turmeric quality mainly depends on Curcumin which not only imparts yellow color of turmeric but also the principal Curcuminod of turmeric. Chemicals with yellow colors e.g. Metanil yellow are often mixed to turmeric powder for achieving the attractive yellow color without much change in taste. Consumption of adulterant can cause health hazards. The detection of unwanted mixing of adulterant with food is vital but difficult to achieve manually. The paper presents a machine vision based approach for detection of adulterant with turmeric powder. The frequency domain analysis of color projection features along with principal component analysis is being performed in this paper for identification between adulterant mixed and unmixed verities of turmeric powder samples. Here a class separability measure is used to find the separation index to validate the class separation objectively. The experimental results show that the presented method may be considered as a potential tool.
姜黄的品质主要取决于姜黄素,它不仅赋予了姜黄黄的颜色,而且是姜黄中的主要姜黄素。含有黄色的化学物质,如甲乙基黄,经常与姜黄粉混合,以获得吸引人的黄色,而味道又没有太大变化。食用掺假食品会对健康造成危害。食品中掺假物的检测至关重要,但人工难以实现。本文提出了一种基于机器视觉的姜黄粉掺假物检测方法。本文采用彩色投影特征频域分析和主成分分析相结合的方法对姜黄粉样品中掺假和未掺假成分进行了鉴别。本文采用类可分离性度量来寻找类分离指标,以客观地验证类分离。实验结果表明,该方法是一种很有潜力的工具。
{"title":"A machine vision based approach towards identification of adulterant in turmeric powder","authors":"D. Mandal, Arpitam Chatterjee, B. Tudu","doi":"10.1109/ICRCICN.2017.8234472","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234472","url":null,"abstract":"Turmeric quality mainly depends on Curcumin which not only imparts yellow color of turmeric but also the principal Curcuminod of turmeric. Chemicals with yellow colors e.g. Metanil yellow are often mixed to turmeric powder for achieving the attractive yellow color without much change in taste. Consumption of adulterant can cause health hazards. The detection of unwanted mixing of adulterant with food is vital but difficult to achieve manually. The paper presents a machine vision based approach for detection of adulterant with turmeric powder. The frequency domain analysis of color projection features along with principal component analysis is being performed in this paper for identification between adulterant mixed and unmixed verities of turmeric powder samples. Here a class separability measure is used to find the separation index to validate the class separation objectively. The experimental results show that the presented method may be considered as a potential tool.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biomarker detection on Pancreatic cancer dataset using entropy based spectral clustering 基于熵谱聚类的胰腺癌数据集生物标志物检测
Purbanka Pahari, Piyali Basak, Anasua Sarkar
Pancreatic ductal adenocarcinoma (PDAC) is one of most aggressive malignancy. The identification of Biomarker for PDAC is an ongoing challenge. The high dimensional PDAC gene expression dataset in Gene Expression Omnibus(GEO) database, is analyzed in this work. To select those genes which are relevant as well as with least redundancy among them, we use successive approaches like Filter methods and Normalization phase. In this work, after pre-processing of the data, we have used three types of spectral clustering methods, Unnormalized, Ng-Jordan and proposed entropy based Shi-Malik spectral clustering algorithms to find important genetic and biological information. There we have applied new Shannon's Entropy based distance measure to identify the clusters on Pancreatic dataset. Some Biomarkers are identified through KEGG Pathway analysis. The Biological analysis and functional correlation of genes based on Gene Ontology(GO) terms show that the proposed method is helpful for the selection of Biomarkers.
胰导管腺癌(Pancreatic ductal adencarcinoma, PDAC)是最具侵袭性的恶性肿瘤之一。PDAC生物标志物的鉴定是一个持续的挑战。本文对GEO数据库中的高维PDAC基因表达数据集进行了分析。为了选择那些相关且冗余最少的基因,我们使用了滤波方法和归一化阶段等连续方法。在对数据进行预处理后,我们使用了三种谱聚类方法,即Unnormalized、Ng-Jordan和基于熵的Shi-Malik谱聚类算法来寻找重要的遗传和生物信息。在那里,我们应用了新的基于香农熵的距离度量来识别胰腺数据集上的聚类。一些生物标志物是通过KEGG Pathway分析确定的。基于基因本体(Gene Ontology, GO)术语的生物学分析和基因功能关联表明,该方法有助于生物标记物的选择。
{"title":"Biomarker detection on Pancreatic cancer dataset using entropy based spectral clustering","authors":"Purbanka Pahari, Piyali Basak, Anasua Sarkar","doi":"10.1109/ICRCICN.2017.8234508","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234508","url":null,"abstract":"Pancreatic ductal adenocarcinoma (PDAC) is one of most aggressive malignancy. The identification of Biomarker for PDAC is an ongoing challenge. The high dimensional PDAC gene expression dataset in Gene Expression Omnibus(GEO) database, is analyzed in this work. To select those genes which are relevant as well as with least redundancy among them, we use successive approaches like Filter methods and Normalization phase. In this work, after pre-processing of the data, we have used three types of spectral clustering methods, Unnormalized, Ng-Jordan and proposed entropy based Shi-Malik spectral clustering algorithms to find important genetic and biological information. There we have applied new Shannon's Entropy based distance measure to identify the clusters on Pancreatic dataset. Some Biomarkers are identified through KEGG Pathway analysis. The Biological analysis and functional correlation of genes based on Gene Ontology(GO) terms show that the proposed method is helpful for the selection of Biomarkers.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Chaotic cipher based spatial domain steganography with strong resistance against statistical attacks 基于混沌密码的空域隐写,具有较强的抗统计攻击能力
Tamojit Saha, Sandeepan Sengupta, Tanmoy Dasgupta
Steganography is a form of secret communication in which a secret message (text, image) is hidden inside a carrier message (text, image). While in cryptography, the goal is to make everything unreadable to the ones who do not know the password, in steganography, on the other hand, the goal is to camouflage a message inside an apparently innocent carrier. In other words, while cryptography conceals the message itself, steganography conceals the existence of the message. Since, this form of communication potentially attracts unsavoury people to secretly hide messages in plain sight, there have been many efforts on different fronts to detect the possibility of the existence of steganography in images and other multimedia objects. Most of such algorithms use different statistical analysis based attacks for detecting potential cases of steganography. In light of this, the present methodology demonstrates the development of a set of algorithms designed to implement a spatial domain steganography technique that is capable of withstanding such attacks. The merits of the present methodology has also been assessed quantitatively.
隐写术是将秘密信息(文本、图像)隐藏在载体信息(文本、图像)中的一种秘密通信形式。在密码学中,目标是使不知道密码的人无法读取所有内容,而在隐写术中,另一方面,目标是将信息伪装在看似无害的载体中。换句话说,密码学隐藏了消息本身,而隐写术隐藏了消息的存在。由于这种通信形式可能会吸引令人讨厌的人偷偷地将信息隐藏在显眼的地方,因此在不同的方面已经做出了许多努力来检测图像和其他多媒体对象中存在隐写术的可能性。大多数这样的算法使用不同的基于统计分析的攻击来检测潜在的隐写。鉴于此,本方法展示了一组算法的发展,旨在实现能够承受此类攻击的空间域隐写技术。还从数量上评价了目前方法的优点。
{"title":"Chaotic cipher based spatial domain steganography with strong resistance against statistical attacks","authors":"Tamojit Saha, Sandeepan Sengupta, Tanmoy Dasgupta","doi":"10.1109/ICRCICN.2017.8234536","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234536","url":null,"abstract":"Steganography is a form of secret communication in which a secret message (text, image) is hidden inside a carrier message (text, image). While in cryptography, the goal is to make everything unreadable to the ones who do not know the password, in steganography, on the other hand, the goal is to camouflage a message inside an apparently innocent carrier. In other words, while cryptography conceals the message itself, steganography conceals the existence of the message. Since, this form of communication potentially attracts unsavoury people to secretly hide messages in plain sight, there have been many efforts on different fronts to detect the possibility of the existence of steganography in images and other multimedia objects. Most of such algorithms use different statistical analysis based attacks for detecting potential cases of steganography. In light of this, the present methodology demonstrates the development of a set of algorithms designed to implement a spatial domain steganography technique that is capable of withstanding such attacks. The merits of the present methodology has also been assessed quantitatively.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of rough set theory in accident analysis at work: A case study 粗糙集理论在工作事故分析中的应用:一个案例研究
Sobhan Sarkar, Soumyadeep Baidya, J. Maiti
Though accident data have been collected across industries, they may inherently contain uncertainty of randomness and fuzziness which in turn leads to misleading interpretation of the analysis. To handle the issue of uncertainty within accident data, the present work proposes a rough set theory (RST)-based approach to provide rule-based solution to the industry to minimize the number of accidents at work. Using RST and RST-based rule generation algorithm Learning by Example Module: Version 2 (LEM2), 279 important rules are extracted from the accident data obtained from an integrated steel industry to analyze the incident outcomes (injury, near miss and property damage). The results of the proposed methodology explore some of the important findings which are useful for the industry perspective. Therefore, the RST-based approach can be effective and efficient as well because of its potential to produce good results in the presence of uncertainty in data.
虽然事故数据是跨行业收集的,但它们可能固有地包含随机性和模糊性的不确定性,从而导致对分析的误导性解释。为了处理事故数据中的不确定性问题,本工作提出了一种基于粗糙集理论(RST)的方法,为行业提供基于规则的解决方案,以最大限度地减少工作中的事故数量。利用RST和基于RST的规则生成算法LEM2 (Learning by Example Module: Version 2),从某综合钢铁行业的事故数据中提取279条重要规则,对事故结果(伤害、险些和财产损失)进行分析。提出的方法的结果探讨了一些重要的发现,这些发现对行业的观点是有用的。因此,基于rst的方法也是有效和高效的,因为它有可能在数据存在不确定性的情况下产生良好的结果。
{"title":"Application of rough set theory in accident analysis at work: A case study","authors":"Sobhan Sarkar, Soumyadeep Baidya, J. Maiti","doi":"10.1109/ICRCICN.2017.8234514","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234514","url":null,"abstract":"Though accident data have been collected across industries, they may inherently contain uncertainty of randomness and fuzziness which in turn leads to misleading interpretation of the analysis. To handle the issue of uncertainty within accident data, the present work proposes a rough set theory (RST)-based approach to provide rule-based solution to the industry to minimize the number of accidents at work. Using RST and RST-based rule generation algorithm Learning by Example Module: Version 2 (LEM2), 279 important rules are extracted from the accident data obtained from an integrated steel industry to analyze the incident outcomes (injury, near miss and property damage). The results of the proposed methodology explore some of the important findings which are useful for the industry perspective. Therefore, the RST-based approach can be effective and efficient as well because of its potential to produce good results in the presence of uncertainty in data.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132280909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An approach for secured image encryption scheme using user defined operator based steganographic technique with pixels repositioning schemes 一种基于用户自定义算子的隐写技术和像素重定位的安全图像加密方案
Ramkrishna Das, S. Dutta
Steganography is the practice of concealing information of one object within other non secret object. We replace least significant bits from enveloped image with the bits of original image at the time of LSB based image steganography. This approach is not as secured as retrieving the least significant bits from the enveloped image will provide all the information of original image. So in the proposed system, we rearrange all the pixels of the original and the enveloped image using prime and non-prime positions of the pixels. Again we reposition all the pixels using one of the user defined pixel repositioning algorithms (PRONE (positional reverse odd normal even), PRENO (positional reverse even normal odd), CRENO (continuous reverse even normal odd), CRONE (continuous reverse odd normal even)) chosen by the user for original and enveloped image separately. Lastly we perform user defined BWMAS operation (Bitwise Masking & Alternate Sequence) between the bits of original image and the least significant bits of the enveloped image. As all the pixels of both enveloped and original images are repositioned, so the pixels from original image are chosen actually in non sequential manner and the pixels, taken from enveloped image for BWMAS operation are also in non sequential manner. Only the proper sequences of the encrypted pixels defined by the user defined algorithms are being able to retrieve the information of the original image. We introduce Bitwise Masking & Alternate Sequence operation for the first time in state of XOR operation. Thus an attempt is made to increase the security of the image encryption system.
隐写术是将一个对象的信息隐藏在另一个非秘密对象中。在基于LSB的图像隐写时,我们将包络图像中的最低有效位替换为原始图像的位。这种方法的安全性不如从包络图像中提取最不有效位就能提供原始图像的全部信息。因此,在提出的系统中,我们使用像素的素数和非素数位置重新排列原始图像和包络图像的所有像素。再次,我们使用用户定义的像素重定位算法之一(PRONE(位置反向奇数法向偶),PRENO(位置反向偶数法向偶),CRENO(连续反向偶数法向偶),CRONE(连续反向奇数法向偶))分别为原始和包络图像重新定位所有像素。最后,我们在原始图像的位和包络图像的最低有效位之间执行用户定义的BWMAS操作(逐位遮蔽和交替序列)。由于包络图像和原始图像的所有像素都被重新定位,因此从原始图像中选择的像素实际上是非顺序的,从包络图像中提取的用于BWMAS操作的像素也是非顺序的。只有由用户定义的算法定义的加密像素的适当序列能够检索原始图像的信息。我们首次在异或操作的状态下引入了位掩码和交替序列操作。从而对提高图像加密系统的安全性进行了尝试。
{"title":"An approach for secured image encryption scheme using user defined operator based steganographic technique with pixels repositioning schemes","authors":"Ramkrishna Das, S. Dutta","doi":"10.1109/ICRCICN.2017.8234526","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234526","url":null,"abstract":"Steganography is the practice of concealing information of one object within other non secret object. We replace least significant bits from enveloped image with the bits of original image at the time of LSB based image steganography. This approach is not as secured as retrieving the least significant bits from the enveloped image will provide all the information of original image. So in the proposed system, we rearrange all the pixels of the original and the enveloped image using prime and non-prime positions of the pixels. Again we reposition all the pixels using one of the user defined pixel repositioning algorithms (PRONE (positional reverse odd normal even), PRENO (positional reverse even normal odd), CRENO (continuous reverse even normal odd), CRONE (continuous reverse odd normal even)) chosen by the user for original and enveloped image separately. Lastly we perform user defined BWMAS operation (Bitwise Masking & Alternate Sequence) between the bits of original image and the least significant bits of the enveloped image. As all the pixels of both enveloped and original images are repositioned, so the pixels from original image are chosen actually in non sequential manner and the pixels, taken from enveloped image for BWMAS operation are also in non sequential manner. Only the proper sequences of the encrypted pixels defined by the user defined algorithms are being able to retrieve the information of the original image. We introduce Bitwise Masking & Alternate Sequence operation for the first time in state of XOR operation. Thus an attempt is made to increase the security of the image encryption system.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125225259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1