首页 > 最新文献

2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)最新文献

英文 中文
Face recognition using ensemble support vector machine 基于集成支持向量机的人脸识别
A. Dey, S. Chowdhury, Manas Ghosh
In Face recognition, a combination of neural network (NN), known as an ensemble of neural network, often outperforms individual ones. This paper is aiming to present a support vector machines (SVM)-ensemble-based efficient face recognition system. The training samples are randomly chosen by means of bootstrap technique to train the different SVM independently. These SVM's are combined together to generate the ensemble SVM. The proposed method then makes a collective decision by aggregating them. It may be noted that, the performance of the practical SVM is far from the theoretical SVM as the implementations are based on approximated algorithms. The performance of the real SVM can be uplifted by using the proposed ensemble SVM with bagging (bootstrap aggregating). Finally, the proposed method takes the collective decision by aggregating the training samples. The proposed method is validated on AT&T, FERET face databases to show its supremacy over the single SVM-based methods.
在人脸识别中,神经网络(NN)的组合,即神经网络的集合,通常优于单个神经网络。本文旨在提出一种基于支持向量机集成的高效人脸识别系统。采用自举法随机选取训练样本,对不同的支持向量机进行独立训练。将这些支持向量机组合在一起生成集成支持向量机。然后,所提出的方法通过聚合它们来做出集体决策。值得注意的是,实际支持向量机的性能与理论支持向量机相差甚远,因为实现是基于近似算法的。采用带bagging (bootstrap aggregating)的集成支持向量机可以提高实际支持向量机的性能。最后,对训练样本进行集合决策。在AT&T, FERET人脸数据库上进行了验证,证明了该方法优于基于支持向量机的单一方法。
{"title":"Face recognition using ensemble support vector machine","authors":"A. Dey, S. Chowdhury, Manas Ghosh","doi":"10.1109/ICRCICN.2017.8234479","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234479","url":null,"abstract":"In Face recognition, a combination of neural network (NN), known as an ensemble of neural network, often outperforms individual ones. This paper is aiming to present a support vector machines (SVM)-ensemble-based efficient face recognition system. The training samples are randomly chosen by means of bootstrap technique to train the different SVM independently. These SVM's are combined together to generate the ensemble SVM. The proposed method then makes a collective decision by aggregating them. It may be noted that, the performance of the practical SVM is far from the theoretical SVM as the implementations are based on approximated algorithms. The performance of the real SVM can be uplifted by using the proposed ensemble SVM with bagging (bootstrap aggregating). Finally, the proposed method takes the collective decision by aggregating the training samples. The proposed method is validated on AT&T, FERET face databases to show its supremacy over the single SVM-based methods.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128898743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security risk assessment in online social networking: A detailed survey 在线社交网络的安全风险评估:一项详细调查
Piyali De, Sandip Dey
Millions of users harvest their personal information (photo, video, status) on different online social networks (OSNs). Hence, these rich repositories of sensitive information attract the eyes of adversary to launch variety of cyber attacks on OSN. Here we have identified all crucial threats on social network that may lead to severe risks. In this paper, we have formalized possible social network risks into two types depending upon the origin of risk. Risks are presented here along with impact factor and control measures to mitigate the outcome of the security threats. The relationship between risks and basic security properties has been presented in tabular format. Finally we provide three case studies on identity theft.
数以百万计的用户在不同的在线社交网络(osn)上收集他们的个人信息(照片、视频、状态)。因此,这些丰富的敏感信息库吸引了对手的目光,对OSN发动各种网络攻击。在这里,我们已经确定了社交网络上可能导致严重风险的所有关键威胁。在本文中,我们根据风险的来源将可能的社会网络风险形式化为两种类型。这里介绍了风险以及影响因素和控制措施,以减轻安全威胁的后果。风险与基本安全属性之间的关系以表格形式表示。最后,我们提供了三个关于身份盗窃的案例研究。
{"title":"Security risk assessment in online social networking: A detailed survey","authors":"Piyali De, Sandip Dey","doi":"10.1109/ICRCICN.2017.8234523","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234523","url":null,"abstract":"Millions of users harvest their personal information (photo, video, status) on different online social networks (OSNs). Hence, these rich repositories of sensitive information attract the eyes of adversary to launch variety of cyber attacks on OSN. Here we have identified all crucial threats on social network that may lead to severe risks. In this paper, we have formalized possible social network risks into two types depending upon the origin of risk. Risks are presented here along with impact factor and control measures to mitigate the outcome of the security threats. The relationship between risks and basic security properties has been presented in tabular format. Finally we provide three case studies on identity theft.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115080217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach for secured image encryption scheme using user defined operator based steganographic technique with pixels repositioning schemes 一种基于用户自定义算子的隐写技术和像素重定位的安全图像加密方案
Ramkrishna Das, S. Dutta
Steganography is the practice of concealing information of one object within other non secret object. We replace least significant bits from enveloped image with the bits of original image at the time of LSB based image steganography. This approach is not as secured as retrieving the least significant bits from the enveloped image will provide all the information of original image. So in the proposed system, we rearrange all the pixels of the original and the enveloped image using prime and non-prime positions of the pixels. Again we reposition all the pixels using one of the user defined pixel repositioning algorithms (PRONE (positional reverse odd normal even), PRENO (positional reverse even normal odd), CRENO (continuous reverse even normal odd), CRONE (continuous reverse odd normal even)) chosen by the user for original and enveloped image separately. Lastly we perform user defined BWMAS operation (Bitwise Masking & Alternate Sequence) between the bits of original image and the least significant bits of the enveloped image. As all the pixels of both enveloped and original images are repositioned, so the pixels from original image are chosen actually in non sequential manner and the pixels, taken from enveloped image for BWMAS operation are also in non sequential manner. Only the proper sequences of the encrypted pixels defined by the user defined algorithms are being able to retrieve the information of the original image. We introduce Bitwise Masking & Alternate Sequence operation for the first time in state of XOR operation. Thus an attempt is made to increase the security of the image encryption system.
隐写术是将一个对象的信息隐藏在另一个非秘密对象中。在基于LSB的图像隐写时,我们将包络图像中的最低有效位替换为原始图像的位。这种方法的安全性不如从包络图像中提取最不有效位就能提供原始图像的全部信息。因此,在提出的系统中,我们使用像素的素数和非素数位置重新排列原始图像和包络图像的所有像素。再次,我们使用用户定义的像素重定位算法之一(PRONE(位置反向奇数法向偶),PRENO(位置反向偶数法向偶),CRENO(连续反向偶数法向偶),CRONE(连续反向奇数法向偶))分别为原始和包络图像重新定位所有像素。最后,我们在原始图像的位和包络图像的最低有效位之间执行用户定义的BWMAS操作(逐位遮蔽和交替序列)。由于包络图像和原始图像的所有像素都被重新定位,因此从原始图像中选择的像素实际上是非顺序的,从包络图像中提取的用于BWMAS操作的像素也是非顺序的。只有由用户定义的算法定义的加密像素的适当序列能够检索原始图像的信息。我们首次在异或操作的状态下引入了位掩码和交替序列操作。从而对提高图像加密系统的安全性进行了尝试。
{"title":"An approach for secured image encryption scheme using user defined operator based steganographic technique with pixels repositioning schemes","authors":"Ramkrishna Das, S. Dutta","doi":"10.1109/ICRCICN.2017.8234526","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234526","url":null,"abstract":"Steganography is the practice of concealing information of one object within other non secret object. We replace least significant bits from enveloped image with the bits of original image at the time of LSB based image steganography. This approach is not as secured as retrieving the least significant bits from the enveloped image will provide all the information of original image. So in the proposed system, we rearrange all the pixels of the original and the enveloped image using prime and non-prime positions of the pixels. Again we reposition all the pixels using one of the user defined pixel repositioning algorithms (PRONE (positional reverse odd normal even), PRENO (positional reverse even normal odd), CRENO (continuous reverse even normal odd), CRONE (continuous reverse odd normal even)) chosen by the user for original and enveloped image separately. Lastly we perform user defined BWMAS operation (Bitwise Masking & Alternate Sequence) between the bits of original image and the least significant bits of the enveloped image. As all the pixels of both enveloped and original images are repositioned, so the pixels from original image are chosen actually in non sequential manner and the pixels, taken from enveloped image for BWMAS operation are also in non sequential manner. Only the proper sequences of the encrypted pixels defined by the user defined algorithms are being able to retrieve the information of the original image. We introduce Bitwise Masking & Alternate Sequence operation for the first time in state of XOR operation. Thus an attempt is made to increase the security of the image encryption system.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125225259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-organized criticality, causality and correlation of probability of recurrence between daily mean temperature and dew point across India 印度各地日平均温度和露点之间的自组织临界性、因果关系和复发概率的相关性
Rajdeep Ray, Payel Majumder, M. H. Khondekar, K. Ghosh, A. Bhattacharjee
The temperature and dew point records of seven weather stations, located in India have been scrutinized under the self-organized criticality regime. The data models an almost ideal scaling behaviour as of the type of t/fα noise; with α≈1. This scaling behaviour strongly suggests the presence of self-organized criticality (SOC) behind both the signals. To draw more insight into the detailed dynamics and to strengthen the explanation of such behaviour, causal relationship exploiting singularity spectrum analysis (SSA), multivariate singularity spectrum analysis (MSSA) and Correlation of Probability of Recurrence (CPR) based on recurrence plot have been studied in between the two signals for all the stations. The results reveal sufficient causal relationship and high correlation of probability of recurrence for strong support behind such critical dynamical systems.
在自组织临界状态下,对位于印度的7个气象站的温度和露点记录进行了审查。数据模型在t/fα噪声类型下具有几乎理想的标度行为;与α≈1。这种缩放行为强烈表明,这两个信号背后都存在自组织临界性(SOC)。为了进一步深入了解这一现象的具体动态并加强对这一现象的解释,本文利用奇异谱分析(SSA)、多元奇异谱分析(MSSA)和基于递归图的复现概率相关(CPR)对所有台站两个信号之间的因果关系进行了研究。结果表明,这些临界动力系统具有充分的因果关系和高度的重现概率相关性,为其提供了强有力的支持。
{"title":"Self-organized criticality, causality and correlation of probability of recurrence between daily mean temperature and dew point across India","authors":"Rajdeep Ray, Payel Majumder, M. H. Khondekar, K. Ghosh, A. Bhattacharjee","doi":"10.1109/ICRCICN.2017.8234488","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234488","url":null,"abstract":"The temperature and dew point records of seven weather stations, located in India have been scrutinized under the self-organized criticality regime. The data models an almost ideal scaling behaviour as of the type of t/fα noise; with α≈1. This scaling behaviour strongly suggests the presence of self-organized criticality (SOC) behind both the signals. To draw more insight into the detailed dynamics and to strengthen the explanation of such behaviour, causal relationship exploiting singularity spectrum analysis (SSA), multivariate singularity spectrum analysis (MSSA) and Correlation of Probability of Recurrence (CPR) based on recurrence plot have been studied in between the two signals for all the stations. The results reveal sufficient causal relationship and high correlation of probability of recurrence for strong support behind such critical dynamical systems.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132082083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mutual auditing framework for service level security auditing in cloud 云服务级安全审计的相互审计框架
Soumitra Sasmal, Indrajit Pan
Cloud computing technology is gaining rapid growth in popularity. Mostly it is web based service and some private modules are built on intranet or virtual private network. Network security is a major concern for both cloud users and hosts of data centers. In addition to this, clients are also concerned about the infrastructure and service quality offered by cloud service providers. Cloud service providers equally need to monitor clients' activities and applications running in the client terminals. This paper presents a mutual auditing framework in client-server mode. This interactive framework will keep track of different service modules from both end and will establish a mutual agreement of trust. Proposed framework has been tested on CloudSim and Xen hypervisor under different scale, scope and complexity. Experimental results show effectiveness and efficacy of the framework.
云计算技术正在迅速普及。它主要是基于web的服务,一些专用模块建立在内部网或虚拟专用网上。网络安全是云用户和数据中心主机关心的主要问题。除此之外,客户还关注云服务提供商提供的基础设施和服务质量。云服务提供商同样需要监控客户端的活动和运行在客户端终端上的应用程序。本文提出了一个客户端-服务器模式下的相互审计框架。这个交互框架将跟踪来自两端的不同服务模块,并将建立相互信任的协议。本文提出的框架已经在CloudSim和Xen hypervisor上进行了不同规模、范围和复杂度的测试。实验结果表明了该框架的有效性。
{"title":"Mutual auditing framework for service level security auditing in cloud","authors":"Soumitra Sasmal, Indrajit Pan","doi":"10.1109/ICRCICN.2017.8234524","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234524","url":null,"abstract":"Cloud computing technology is gaining rapid growth in popularity. Mostly it is web based service and some private modules are built on intranet or virtual private network. Network security is a major concern for both cloud users and hosts of data centers. In addition to this, clients are also concerned about the infrastructure and service quality offered by cloud service providers. Cloud service providers equally need to monitor clients' activities and applications running in the client terminals. This paper presents a mutual auditing framework in client-server mode. This interactive framework will keep track of different service modules from both end and will establish a mutual agreement of trust. Proposed framework has been tested on CloudSim and Xen hypervisor under different scale, scope and complexity. Experimental results show effectiveness and efficacy of the framework.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133247129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Relation recognition among named entities from a crime corpus using a web-based semantic similarity measurement 使用基于web的语义相似度度量来识别犯罪语料库中命名实体之间的关系
Priyanka Das, A. Das
The present work proposes an unsupervised approach for recognising relations between named entities from a large corpora based on crime in Indian states and union territories. Initially, named entities have been identified from the extracted crime corpus and certain pair of entities have been chosen that facilitates the crime analysis. Then the entity pairs with their intermediate context words have been represented as a shallow parse tree for relation instance. From the parse trees, only the head words (in each entity pair) reflecting the main meaning of the phrases has been considered for measuring a semantic similarity using a web search engine that retrieves the page count of those particular words and their conjunctives. The derived page count is used for measuring the Simpson Coefficient between the pairs and based on this similarity score, an agglomerative hierarchical clustering technique has been applied that makes several clusters of entity pairs of same relationship. The resultant clusters also have been characterised with the most frequent head word present in the group. This proposed method shows a simple similarity measure technique for relation extraction from crime data providing better accuracy than other existing methods.
目前的工作提出了一种无监督的方法,用于识别基于印度各州和联邦领土犯罪的大型语料库中指定实体之间的关系。首先,从提取的犯罪语料库中识别出命名实体,并选择特定的实体对以方便犯罪分析。然后将实体对及其中间上下文词表示为关系实例的浅解析树。从解析树中,只考虑反映短语主要含义的头词(在每个实体对中),以便使用检索这些特定词及其连词的页面计数的web搜索引擎测量语义相似性。导出的页面计数用于测量对之间的辛普森系数,并基于此相似性得分,应用了一种凝聚分层聚类技术,使具有相同关系的实体对组成多个聚类。由此产生的集群也具有在组中出现的最频繁的头部词的特征。该方法提供了一种简单的相似性度量技术,可用于犯罪数据的关联提取,比现有方法具有更高的准确性。
{"title":"Relation recognition among named entities from a crime corpus using a web-based semantic similarity measurement","authors":"Priyanka Das, A. Das","doi":"10.1109/ICRCICN.2017.8234525","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234525","url":null,"abstract":"The present work proposes an unsupervised approach for recognising relations between named entities from a large corpora based on crime in Indian states and union territories. Initially, named entities have been identified from the extracted crime corpus and certain pair of entities have been chosen that facilitates the crime analysis. Then the entity pairs with their intermediate context words have been represented as a shallow parse tree for relation instance. From the parse trees, only the head words (in each entity pair) reflecting the main meaning of the phrases has been considered for measuring a semantic similarity using a web search engine that retrieves the page count of those particular words and their conjunctives. The derived page count is used for measuring the Simpson Coefficient between the pairs and based on this similarity score, an agglomerative hierarchical clustering technique has been applied that makes several clusters of entity pairs of same relationship. The resultant clusters also have been characterised with the most frequent head word present in the group. This proposed method shows a simple similarity measure technique for relation extraction from crime data providing better accuracy than other existing methods.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125932783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monitoring negative opinion about vaccines from tweets analysis 从推文分析中监测对疫苗的负面意见
Eleonora D'Andrea, P. Ducange, F. Marcelloni
In this paper, we present an approach to monitor the Italian public opinion from tweets analysis, with reference to the vaccination topic. This topic has recently become controversial, due to the disinformation about the alleged connection between autism and vaccines. Further, the Italian Ministry of Health has noticed a drop in vaccination rates, enhancing the risk of reemergence of eradicated diseases. Thus, a system to monitor the negative public opinion about vaccines could become very important for decision making. The proposed approach i) fetches vaccine-related tweets, ii) applies a text elaboration on the tweets, and iii) performs a binary classification aimed at discriminating negative opinions tweets (i.e., not in favor of vaccination) from the rest of tweets. By employing the Simple Logistic classifier, we achieved a 75.5% average accuracy. Finally, we monitor the trend over time of public opinion about vaccination decision making in a free, real-time and quick fashion.
在本文中,我们提出了一种方法来监测意大利公众舆论从推特分析,参考疫苗接种的话题。由于有关自闭症和疫苗之间所谓联系的虚假信息,这个话题最近变得有争议。此外,意大利卫生部注意到疫苗接种率有所下降,这增加了已根除疾病重新出现的风险。因此,监测公众对疫苗的负面意见的系统可能对决策非常重要。所提出的方法i)获取与疫苗相关的推文,ii)对推文进行文本细化,以及iii)执行二元分类,旨在区分负面意见推文(即不赞成接种疫苗)与其他推文。通过使用简单逻辑分类器,我们达到了75.5%的平均准确率。最后,我们以免费、实时、快速的方式监测疫苗接种决策的公众舆论趋势。
{"title":"Monitoring negative opinion about vaccines from tweets analysis","authors":"Eleonora D'Andrea, P. Ducange, F. Marcelloni","doi":"10.1109/ICRCICN.2017.8234504","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234504","url":null,"abstract":"In this paper, we present an approach to monitor the Italian public opinion from tweets analysis, with reference to the vaccination topic. This topic has recently become controversial, due to the disinformation about the alleged connection between autism and vaccines. Further, the Italian Ministry of Health has noticed a drop in vaccination rates, enhancing the risk of reemergence of eradicated diseases. Thus, a system to monitor the negative public opinion about vaccines could become very important for decision making. The proposed approach i) fetches vaccine-related tweets, ii) applies a text elaboration on the tweets, and iii) performs a binary classification aimed at discriminating negative opinions tweets (i.e., not in favor of vaccination) from the rest of tweets. By employing the Simple Logistic classifier, we achieved a 75.5% average accuracy. Finally, we monitor the trend over time of public opinion about vaccination decision making in a free, real-time and quick fashion.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed location detection algorithms using IoT for commercial aviation 商用航空使用物联网的分布式位置检测算法
A. Chatterjee, Hugo Flores, S. Sen, Khondker S. Hasan, Ashish Mani
Detecting precise location of aircraft during the entire flight duration is a challenge in the domain of commercial aviation. Using radar and other available technology, flights operating entirely over land can be tracked easily. However, with long haul intercontinental flights, where majority of the flight path is over water bodies and out of range of radar, detecting the location of aircraft at all times is a challenge. In recent times, there have been disasters in commercial aviation, where an aircraft has gone missing. This has a huge social and financial impact on the specific airline and commercial aviation in general. Therefore, in this paper we study the problem of location detection for commercial aircraft and methods to improve location detection over any terrain the flight path traverses. We propose techniques based on the Internet-of-things (IoT) model for aircraft, where the aircraft can communicate with each other within a certain range. We introduce distributed algorithms to detect location using such methods that work effectively when the aircraft is outside the range of radar and on an oceanic route. Our results show that using the proposed methods, the precise location of all aircraft, including those intercontinental flights, can be tracked to a higher degree. Techniques to minimize the communication overhead introduced due to the proposed methods are also provided.
在整个飞行过程中精确探测飞机的位置是商用航空领域的一个挑战。利用雷达和其他可用的技术,完全在陆地上运行的航班可以很容易地被跟踪。然而,对于长途洲际航班来说,大部分飞行路径都在水体上空,并且不在雷达范围内,因此始终检测飞机的位置是一项挑战。近年来,商业航空发生了多起空难,一架飞机失踪。这对特定的航空公司和一般的商业航空产生了巨大的社会和财务影响。因此,本文研究了商用飞机的位置检测问题,以及改进飞行路径经过任何地形的位置检测方法。我们提出了基于飞机物联网(IoT)模型的技术,飞机可以在一定范围内相互通信。我们引入分布式算法来检测位置,当飞机在雷达范围之外和在海洋航线上时,这种方法有效地工作。我们的研究结果表明,使用所提出的方法,可以在更高程度上跟踪所有飞机的精确位置,包括洲际航班。还提供了最小化由于所建议的方法而引入的通信开销的技术。
{"title":"Distributed location detection algorithms using IoT for commercial aviation","authors":"A. Chatterjee, Hugo Flores, S. Sen, Khondker S. Hasan, Ashish Mani","doi":"10.1109/ICRCICN.2017.8234493","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234493","url":null,"abstract":"Detecting precise location of aircraft during the entire flight duration is a challenge in the domain of commercial aviation. Using radar and other available technology, flights operating entirely over land can be tracked easily. However, with long haul intercontinental flights, where majority of the flight path is over water bodies and out of range of radar, detecting the location of aircraft at all times is a challenge. In recent times, there have been disasters in commercial aviation, where an aircraft has gone missing. This has a huge social and financial impact on the specific airline and commercial aviation in general. Therefore, in this paper we study the problem of location detection for commercial aircraft and methods to improve location detection over any terrain the flight path traverses. We propose techniques based on the Internet-of-things (IoT) model for aircraft, where the aircraft can communicate with each other within a certain range. We introduce distributed algorithms to detect location using such methods that work effectively when the aircraft is outside the range of radar and on an oceanic route. Our results show that using the proposed methods, the precise location of all aircraft, including those intercontinental flights, can be tracked to a higher degree. Techniques to minimize the communication overhead introduced due to the proposed methods are also provided.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129703395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design of hybrid (CSA-CSkA) adder for improvement of propagation delay 改进传输延迟的混合(CSA-CSkA)加法器设计
Sujan Sarkar, Jishan Mehedi
Adders are the main components in digital designs not only in additions but also in filter designing, multiplexing, and division. The circuit performance depends on the design of base adder. The demand of high-performance VLSI (very large scale integration) systems is increasingly rapidly for used in small and portable devices. The speed of operation is depends on the delay of the basic adder and it is a very important parameter for high performance. There are so many research works have been so far done on the adder to reduce the delay of it. This paper have done comparative study of various parallel adders and proposed a hybrid adder circuit to improve the delay. Carry Save Adder (CSA) and Carry Skip Adder (CSkA) have been incorporated to improve propagation delay. The result shows the effectiveness for propagation delay improvement.
加法器是数字设计的主要组成部分,不仅在加法设计中,而且在滤波器设计、多路复用和除法设计中都是如此。电路的性能取决于基极加法器的设计。高性能VLSI(超大规模集成电路)系统在小型和便携式设备中的应用需求日益增长。运算速度取决于基本加法器的延迟,它是实现高性能的一个重要参数。为了减少加法器的延迟,人们做了大量的研究工作。本文对各种并行加法器进行了比较研究,提出了一种混合加法器电路来改善延迟。采用进位保存加法器(CSA)和进位跳加法器(CSkA)来改善传输延迟。结果表明,该方法对改进传输延迟是有效的。
{"title":"Design of hybrid (CSA-CSkA) adder for improvement of propagation delay","authors":"Sujan Sarkar, Jishan Mehedi","doi":"10.1109/ICRCICN.2017.8234530","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234530","url":null,"abstract":"Adders are the main components in digital designs not only in additions but also in filter designing, multiplexing, and division. The circuit performance depends on the design of base adder. The demand of high-performance VLSI (very large scale integration) systems is increasingly rapidly for used in small and portable devices. The speed of operation is depends on the delay of the basic adder and it is a very important parameter for high performance. There are so many research works have been so far done on the adder to reduce the delay of it. This paper have done comparative study of various parallel adders and proposed a hybrid adder circuit to improve the delay. Carry Save Adder (CSA) and Carry Skip Adder (CSkA) have been incorporated to improve propagation delay. The result shows the effectiveness for propagation delay improvement.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116968769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance analysis of FIR and IIR filters for ECG signal denoising based on SNR 基于信噪比的心电信号去噪FIR和IIR滤波器的性能分析
Nilotpal Das, M. Chakraborty
Filtering of ECG signal is an essential step in ECG signal processing and analysis. Since ECG is a low amplitude biosignal, it is easily corrupted by external noises, and by the presence of other biosignals. The aim of filtering is to remove unwanted noise while preserving important characteristics of the signal. Various filtering techniques are available thus choosing the right filter for ECG denoising is a problem. This study aims to solve that problem by quantifying and comparing performance of various FIR and IIR filters, based on their SNR values, in both diagnostic and monitoring mode. For this purpose, ECG signals are collected from MIT-BIH Physionet Database. This study identifies the order at which filters perform best, thus order optimization for each filter design has been done. Readers will be able to understand the variation of filter performance with filter order and choose the best filter for ECG signal denoising.
心电信号滤波是心电信号处理和分析的重要环节。由于心电信号是一种低幅度的生物信号,它很容易被外界噪声和其他生物信号的存在所破坏。滤波的目的是去除不需要的噪声,同时保留信号的重要特性。由于滤波技术多种多样,因此选择合适的滤波器进行心电去噪是一个问题。本研究旨在通过量化和比较各种FIR和IIR滤波器在诊断和监测模式下的性能,基于它们的信噪比值来解决这个问题。为此,从MIT-BIH Physionet数据库中收集心电信号。本研究确定了滤波器表现最佳的顺序,从而对每个滤波器设计进行了顺序优化。读者将能够了解滤波器性能随滤波器阶数的变化,从而选择最佳的心电信号去噪滤波器。
{"title":"Performance analysis of FIR and IIR filters for ECG signal denoising based on SNR","authors":"Nilotpal Das, M. Chakraborty","doi":"10.1109/ICRCICN.2017.8234487","DOIUrl":"https://doi.org/10.1109/ICRCICN.2017.8234487","url":null,"abstract":"Filtering of ECG signal is an essential step in ECG signal processing and analysis. Since ECG is a low amplitude biosignal, it is easily corrupted by external noises, and by the presence of other biosignals. The aim of filtering is to remove unwanted noise while preserving important characteristics of the signal. Various filtering techniques are available thus choosing the right filter for ECG denoising is a problem. This study aims to solve that problem by quantifying and comparing performance of various FIR and IIR filters, based on their SNR values, in both diagnostic and monitoring mode. For this purpose, ECG signals are collected from MIT-BIH Physionet Database. This study identifies the order at which filters perform best, thus order optimization for each filter design has been done. Readers will be able to understand the variation of filter performance with filter order and choose the best filter for ECG signal denoising.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129446375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1