首页 > 最新文献

2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)最新文献

英文 中文
Sorted Round Robin Algorithm 排序轮循算法
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862609
R. Srujana, Y. Mohana Roopa, M. Datta Sai Krishna Mohan
Process scheduling is an important and necessary task of a Multiprogramming operating system where the process manager handles the selection and removal of processes based on a strategy. One such strategy is the Round Robin algorithm. where each process is given a time quantum for its execution. Our algorithm is a combined product of the shortest job first (SJF) algorithm and Round Robin (RR) algorithm. It retains the advantage provided by these algorithms that may have an impact on the overall performance of the CPU and hence, is used to overcome the drawbacks in the RR algorithm by developing the strategies in use. Also, a detailed analysis is performed to compare the proposed algorithm and the existing algorithm in terms of performance and output.
进程调度是多道程序操作系统的一项重要且必要的任务,在多道程序操作系统中,进程管理器根据策略处理进程的选择和删除。其中一种策略就是轮询算法。每个进程都有一个执行的时间量。该算法是最短作业优先(SJF)算法和轮循(RR)算法的结合产物。它保留了这些算法提供的可能对CPU的整体性能产生影响的优势,因此,通过开发正在使用的策略来克服RR算法中的缺点。此外,本文还从性能和输出两方面对所提算法和现有算法进行了详细的分析比较。
{"title":"Sorted Round Robin Algorithm","authors":"R. Srujana, Y. Mohana Roopa, M. Datta Sai Krishna Mohan","doi":"10.1109/ICOEI.2019.8862609","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862609","url":null,"abstract":"Process scheduling is an important and necessary task of a Multiprogramming operating system where the process manager handles the selection and removal of processes based on a strategy. One such strategy is the Round Robin algorithm. where each process is given a time quantum for its execution. Our algorithm is a combined product of the shortest job first (SJF) algorithm and Round Robin (RR) algorithm. It retains the advantage provided by these algorithms that may have an impact on the overall performance of the CPU and hence, is used to overcome the drawbacks in the RR algorithm by developing the strategies in use. Also, a detailed analysis is performed to compare the proposed algorithm and the existing algorithm in terms of performance and output.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impacts of PCA on Face Recognition System 主成分分析对人脸识别系统的影响
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862624
S. Bai, D. Latha
Face recognition is one of the important applications in the field of security and surveillance. Even though many methodologies are existing for feature extraction and classification, we are in need of dynamic features and classifiers to overcome the emerging challenges in the field of FRS. On analyzing the work of various researchers, PCA feature extractor is found to be more dynamic than other existing techniques. In this paper, the unique performance of PCA with novel methodologies are overviewed and its merits are highlighted.
人脸识别是安防监控领域的重要应用之一。尽管已有许多特征提取和分类方法,但我们需要动态特征和分类器来克服FRS领域的新挑战。通过分析各种研究人员的工作,发现PCA特征提取器比其他现有技术更具动态性。本文综述了基于新方法的主成分分析的独特性能,并强调了其优点。
{"title":"Impacts of PCA on Face Recognition System","authors":"S. Bai, D. Latha","doi":"10.1109/ICOEI.2019.8862624","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862624","url":null,"abstract":"Face recognition is one of the important applications in the field of security and surveillance. Even though many methodologies are existing for feature extraction and classification, we are in need of dynamic features and classifiers to overcome the emerging challenges in the field of FRS. On analyzing the work of various researchers, PCA feature extractor is found to be more dynamic than other existing techniques. In this paper, the unique performance of PCA with novel methodologies are overviewed and its merits are highlighted.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Approach for Clickbait Detection 标题党检测的新方法
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862781
Sarjak Chawda, Aditi Patil, Abhishek Singh, Ashwini M. Save
Clickbait refers to sensational headlines that often exaggerate facts, usually to entice readers to click on them. Many researchers have proposed different techniques involving various Machine Learning algorithms such as Support Vector Machine (SVM), Decision Tree, Random Forest, and Deep Learning techniques such as Recurrent Neural Network (RNN), Long Short Term Memory (LSTM) and Convolutional Neural Network (CNN). Although there have been previous attempts by many researchers on detection of Clickbait titles, very few have taken into consideration the context of the title. Context plays a vital role in capturing the semantics of the text. Misclassification of Clickbait titles can be avoided using context. The Recurrent Convolutional Neural Network (RCNN) considers the context for text classification. In this system, clickbait classification is done using RCNN model, and later enhanced with LSTM and Gated Recurrent Unit (GRU) to capture long term dependencies and provide better accuracy than the previous state-of-the-art techniques.
标题党指的是经常夸大事实的耸人听闻的标题,通常是为了吸引读者点击。许多研究人员提出了不同的技术,涉及各种机器学习算法,如支持向量机(SVM)、决策树、随机森林,以及深度学习技术,如循环神经网络(RNN)、长短期记忆(LSTM)和卷积神经网络(CNN)。虽然之前有很多研究人员尝试检测标题党,但很少有人考虑到标题的上下文。语境在把握文本语义方面起着至关重要的作用。使用上下文可以避免标题党标题的错误分类。递归卷积神经网络(RCNN)考虑文本分类的上下文。在这个系统中,标题党分类使用RCNN模型完成,随后使用LSTM和门控循环单元(GRU)进行增强,以捕获长期依赖关系,并提供比以前最先进的技术更好的准确性。
{"title":"A Novel Approach for Clickbait Detection","authors":"Sarjak Chawda, Aditi Patil, Abhishek Singh, Ashwini M. Save","doi":"10.1109/ICOEI.2019.8862781","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862781","url":null,"abstract":"Clickbait refers to sensational headlines that often exaggerate facts, usually to entice readers to click on them. Many researchers have proposed different techniques involving various Machine Learning algorithms such as Support Vector Machine (SVM), Decision Tree, Random Forest, and Deep Learning techniques such as Recurrent Neural Network (RNN), Long Short Term Memory (LSTM) and Convolutional Neural Network (CNN). Although there have been previous attempts by many researchers on detection of Clickbait titles, very few have taken into consideration the context of the title. Context plays a vital role in capturing the semantics of the text. Misclassification of Clickbait titles can be avoided using context. The Recurrent Convolutional Neural Network (RCNN) considers the context for text classification. In this system, clickbait classification is done using RCNN model, and later enhanced with LSTM and Gated Recurrent Unit (GRU) to capture long term dependencies and provide better accuracy than the previous state-of-the-art techniques.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127229145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Development Of A Scalable Coding For The Encryption Of Images Using Block Truncation Code 基于块截断码的可扩展图像加密编码的发展
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862525
P.Jeya Bright, G. Vishnuvarthanan
In today's technology, especially in Lossy Compression image reconstruction which is identical to the original image transmitted is highly unattainable, protection of digital data between buyer and seller especially from intruders and hackers which requires encryption and also to save space and increase speedy transmission which requires image compression has arisen as an important factor of research. This paper proposes a most efficient way of encrypting, compressing and recovering the original image at the receiver side with high PSNR value. The input image is encrypted by using the pseudo random number and compressed using Block Truncation Coding(BTC). The images are transmitted more securely using pseudo random number, which acts as a secret key and it is shared between sender and receiver. The original gray level pixel value is compressed using Block Truncation Coding(BTC). The encrypted image is obtained by adding compressed BTC pixel value with pseudo random number value and then transmitted. At the receiver side, the decryption process is done to recover the compressed pixel value and original image is reconstructed using BTC.
在当今的技术条件下,特别是在有损压缩的情况下,要想在传输过程中再现与原始图像完全相同的图像是非常不可能实现的,因此保护买卖双方之间的数字数据,特别是防止入侵者和黑客入侵,这就需要进行加密,同时为了节省空间和提高传输速度,这就需要对图像进行压缩。本文提出了一种在接收端对高信噪比的原始图像进行加密、压缩和恢复的最有效方法。输入图像使用伪随机数加密,使用块截断编码(BTC)进行压缩。使用伪随机数作为密钥,在发送方和接收方之间共享,使图像传输更加安全。原始灰度像素值使用块截断编码(BTC)进行压缩。将压缩后的BTC像素值与伪随机数值相加得到加密图像,然后传输。在接收端进行解密处理,恢复压缩后的像素值,并利用BTC重构原始图像。
{"title":"Development Of A Scalable Coding For The Encryption Of Images Using Block Truncation Code","authors":"P.Jeya Bright, G. Vishnuvarthanan","doi":"10.1109/ICOEI.2019.8862525","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862525","url":null,"abstract":"In today's technology, especially in Lossy Compression image reconstruction which is identical to the original image transmitted is highly unattainable, protection of digital data between buyer and seller especially from intruders and hackers which requires encryption and also to save space and increase speedy transmission which requires image compression has arisen as an important factor of research. This paper proposes a most efficient way of encrypting, compressing and recovering the original image at the receiver side with high PSNR value. The input image is encrypted by using the pseudo random number and compressed using Block Truncation Coding(BTC). The images are transmitted more securely using pseudo random number, which acts as a secret key and it is shared between sender and receiver. The original gray level pixel value is compressed using Block Truncation Coding(BTC). The encrypted image is obtained by adding compressed BTC pixel value with pseudo random number value and then transmitted. At the receiver side, the decryption process is done to recover the compressed pixel value and original image is reconstructed using BTC.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Advancement of Firefighting Robot using Direction Control Model 基于方向控制模型的消防机器人设计与改进
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862516
S. Teja, L. Sujihelen
A robot is an automatic machine which perform based on the human behavior with flexible set of movements. This robotic application is always helpful in the field of medicine, rehabilitation, industries and even for rescues operations. Hence designing an improved automatic machine for firefighting is quite challenging. In this paper we have proposed to design and develop a firefighting robot using direction control model. This direction control model has three stages are Obstacle identification, Temperature Spark, and Gas sensors detection-based models. This DC model have improved the control and performs effectively by removing the obstacle on the way to alternative position utilizing a robotic arm to make the path clear.
机器人是一种基于人的行为进行灵活动作的自动机器。这种机器人应用在医学、康复、工业甚至救援行动领域都很有帮助。因此,设计一种改进的自动灭火机是一项相当具有挑战性的工作。本文提出了一种基于方向控制模型的消防机器人的设计与研制。该方向控制模型分为障碍物识别、温度火花和气体传感器检测三个阶段。该直流电模型通过利用机械臂清除路径上的障碍物,有效地改善了控制效果。
{"title":"Design and Advancement of Firefighting Robot using Direction Control Model","authors":"S. Teja, L. Sujihelen","doi":"10.1109/ICOEI.2019.8862516","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862516","url":null,"abstract":"A robot is an automatic machine which perform based on the human behavior with flexible set of movements. This robotic application is always helpful in the field of medicine, rehabilitation, industries and even for rescues operations. Hence designing an improved automatic machine for firefighting is quite challenging. In this paper we have proposed to design and develop a firefighting robot using direction control model. This direction control model has three stages are Obstacle identification, Temperature Spark, and Gas sensors detection-based models. This DC model have improved the control and performs effectively by removing the obstacle on the way to alternative position utilizing a robotic arm to make the path clear.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123081627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Area Efficient VLSI Architecture for Reversible Radix-2 FFT Algorithm using Folding Technique and Reversible Gate 基于折叠技术和可逆门的可逆基数-2 FFT算法的面积高效VLSI结构
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862628
Veenal Lalwani, Soheb Munir
FFT is normally utilized in computerized flag preparing algorithms. 4G correspondence and different remote framework based correspondence are directly hotly debated issues of innovative work in the remote correspondence and organizing field. FFT is a calculation that speeds up the count of DFT. In the main stage, low multifaceted nature Radix-2 Multi-way Delay Commutator (R2MDC) FFT recurrence change method is created through Exceptionally Large Scale Integration System structure condition. Low power utilization, less zone and rapid are the VLSI primary parameters. Customary R2MDC FFT structure has more equipment multifaceted nature because of its escalated computational components. Two strategies are utilized to plan radix-2 FFT calculation. In firest strategy is plan radix-2 FFT with the help of reversible Peres gate and TR gate. Second method is design radix-2 FFT with the help of reversible DKG Gate. The all structure are usage vertex-4 gadget family Xilinx programming and looked at past calculation.
FFT通常用于计算机标记准备算法。4G通信与基于不同远程框架的通信是远程通信与组织领域创新工作的直接热点问题。FFT是一种加速DFT计数的计算方法。在主要阶段,通过超大规模集成系统的结构条件,创建了低多面性基数-2多路延迟换向器(R2MDC) FFT递推变换方法。低功耗、小区域和快速是VLSI的主要参数。传统的R2MDC FFT结构由于其计算组件的升级,具有更多的设备多面性。采用两种策略来规划基数-2 FFT计算。第一种策略是利用可逆的Peres栅极和TR栅极规划基数-2 FFT。第二种方法是利用可逆DKG栅极设计基数-2 FFT。所有的结构都是使用Xilinx的顶点-4小部件家族编程和查看过去的计算。
{"title":"Area Efficient VLSI Architecture for Reversible Radix-2 FFT Algorithm using Folding Technique and Reversible Gate","authors":"Veenal Lalwani, Soheb Munir","doi":"10.1109/ICOEI.2019.8862628","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862628","url":null,"abstract":"FFT is normally utilized in computerized flag preparing algorithms. 4G correspondence and different remote framework based correspondence are directly hotly debated issues of innovative work in the remote correspondence and organizing field. FFT is a calculation that speeds up the count of DFT. In the main stage, low multifaceted nature Radix-2 Multi-way Delay Commutator (R2MDC) FFT recurrence change method is created through Exceptionally Large Scale Integration System structure condition. Low power utilization, less zone and rapid are the VLSI primary parameters. Customary R2MDC FFT structure has more equipment multifaceted nature because of its escalated computational components. Two strategies are utilized to plan radix-2 FFT calculation. In firest strategy is plan radix-2 FFT with the help of reversible Peres gate and TR gate. Second method is design radix-2 FFT with the help of reversible DKG Gate. The all structure are usage vertex-4 gadget family Xilinx programming and looked at past calculation.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114140740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Mirror using Raspberry Pi as a Security and Vigilance System 智能镜子使用树莓派作为安全和警戒系统
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862537
Raju A. Nadaf, Vasudha M. Bonal
The present generation devices are built with smart capabilities. The intelligence is embedded in them to act wise in deployed environment. Mirrors are basically used in home for the purpose of grooming up or getting ready for the day. The same mirrors can be made to behave Smart to provide Security and Vigilance in deployed environment. Smart mirror is a system that not only works as a normal mirror but also provides Security against intrusion inside the home. The proposed system is designed using Raspberry Pi, Camera, Raspberry Pi compatible touch screen and microphone as hardware components and Python for programming. The proposed system can accept 3 modes of input commands namely Voice, Touch and Mobile commands. The Smart mirror can be used as a security system against the Intrusion in home. The Yolo Technique with OpenCV for object detection is used for detection of Intrusion of Human. The Yolo (You Only Look Once) is a Machine Learning concept for the detection of objects. The Yolo is an optimized technique as it looks image only once as compared to other image processing techniques, hence work faster. The Video is converted to frames and the frames are given as input to the Raspberry Pi. The Python programming is used along-with the Yolo technique with OpenCV to detect objects. As soon as the intrusion is confirmed, the administrator of the Smart Mirror will be sent an alert E-mail along-with the photo of an intruder and the details are stored in the storage device. The voice and Touch screen commands can be used whenever an administrator/owner is in front of the mirror. The mobile based controls can be used when the administrator/owner of the mirror is away from the mirror. The basic theme of the proposed model is that, to make use of household devices for providing security.
这一代设备具有智能功能。智能嵌入其中,以便在部署环境中明智地行动。镜子在家里基本上是用来梳妆打扮或为一天做准备的。同样的镜像可以使行为智能,以提供部署环境中的安全性和警惕性。智能镜子是一种不仅具有普通镜子的功能,还可以防止家庭内部入侵的安全系统。本系统采用树莓派、摄像头、兼容树莓派的触摸屏和麦克风作为硬件部件,使用Python编程。该系统可接受语音、触摸和移动三种输入命令模式。智能镜子可以作为家庭防盗系统。利用Yolo技术和OpenCV进行对象检测,实现了对人类入侵行为的检测。Yolo (You Only Look Once)是一个用于检测物体的机器学习概念。Yolo是一种优化的技术,因为与其他图像处理技术相比,它只看一次图像,因此工作速度更快。视频被转换成帧,帧作为输入给树莓派。Python编程与Yolo技术以及OpenCV一起用于检测对象。一旦确认入侵,智能镜像的管理员就会收到一封警告电子邮件以及入侵者的照片,详细信息将存储在存储设备中。只要管理员/所有者在镜子前,就可以使用语音和触摸屏命令。当镜像的管理员/所有者离开镜像时,可以使用基于移动设备的控件。所建议的模式的基本主题是,利用家用设备提供安全。
{"title":"Smart Mirror using Raspberry Pi as a Security and Vigilance System","authors":"Raju A. Nadaf, Vasudha M. Bonal","doi":"10.1109/ICOEI.2019.8862537","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862537","url":null,"abstract":"The present generation devices are built with smart capabilities. The intelligence is embedded in them to act wise in deployed environment. Mirrors are basically used in home for the purpose of grooming up or getting ready for the day. The same mirrors can be made to behave Smart to provide Security and Vigilance in deployed environment. Smart mirror is a system that not only works as a normal mirror but also provides Security against intrusion inside the home. The proposed system is designed using Raspberry Pi, Camera, Raspberry Pi compatible touch screen and microphone as hardware components and Python for programming. The proposed system can accept 3 modes of input commands namely Voice, Touch and Mobile commands. The Smart mirror can be used as a security system against the Intrusion in home. The Yolo Technique with OpenCV for object detection is used for detection of Intrusion of Human. The Yolo (You Only Look Once) is a Machine Learning concept for the detection of objects. The Yolo is an optimized technique as it looks image only once as compared to other image processing techniques, hence work faster. The Video is converted to frames and the frames are given as input to the Raspberry Pi. The Python programming is used along-with the Yolo technique with OpenCV to detect objects. As soon as the intrusion is confirmed, the administrator of the Smart Mirror will be sent an alert E-mail along-with the photo of an intruder and the details are stored in the storage device. The voice and Touch screen commands can be used whenever an administrator/owner is in front of the mirror. The mobile based controls can be used when the administrator/owner of the mirror is away from the mirror. The basic theme of the proposed model is that, to make use of household devices for providing security.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114230375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Object Tracking Algorithm Based on Motion-Tuned Continuous Wavelet Transform 一种基于运动调谐连续小波变换的目标跟踪算法
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862614
S. Sajikumar, A. Anilkumar
A continuous wavelet transform (CWT) based object tracking algoithm is proposed. Spatio-temporal motion-tuned wavelet is used to extract motion parameters like velocity, orientation, position and scale. CWT is used to define three energy densities which are used as estimators. Sequential optimization of parameters are done in a frame-by-frame manner which allows the algorithm to track moving objects. The problem of setting initial scale parameter is improved by a new functional relation between radius of the target and velocity using a third degree polynomial constructed from 2D-Chebyshev polynomials. Experimental results show that the new functional relation gives reasonable initial scale parameter without any analysis of huge amount of previous data and the revised algorithm tracks the object in a better way.
提出了一种基于连续小波变换(CWT)的目标跟踪算法。时空运动调谐小波用于提取速度、方向、位置和尺度等运动参数。用CWT定义三个能量密度作为估计量。以逐帧的方式对参数进行顺序优化,使算法能够跟踪运动物体。利用二维切比雪夫多项式构造的三次多项式,建立了目标半径与速度的函数关系,改进了初始尺度参数的设置问题。实验结果表明,新的函数关系给出了合理的初始尺度参数,无需分析大量的先前数据,改进后的算法能更好地跟踪目标。
{"title":"An Object Tracking Algorithm Based on Motion-Tuned Continuous Wavelet Transform","authors":"S. Sajikumar, A. Anilkumar","doi":"10.1109/ICOEI.2019.8862614","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862614","url":null,"abstract":"A continuous wavelet transform (CWT) based object tracking algoithm is proposed. Spatio-temporal motion-tuned wavelet is used to extract motion parameters like velocity, orientation, position and scale. CWT is used to define three energy densities which are used as estimators. Sequential optimization of parameters are done in a frame-by-frame manner which allows the algorithm to track moving objects. The problem of setting initial scale parameter is improved by a new functional relation between radius of the target and velocity using a third degree polynomial constructed from 2D-Chebyshev polynomials. Experimental results show that the new functional relation gives reasonable initial scale parameter without any analysis of huge amount of previous data and the revised algorithm tracks the object in a better way.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121048184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Disaster Management and Prevention using Reinforcement Learning in IoT Environment 在物联网环境中使用强化学习的智能灾害管理和预防
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862602
Yogesh S Lonkar, Abhinav Bhagat, Sd Aasif Sd Manjur
At starting of the Internet of Things (IoT), it is passing around a world, in which diverse kinds of different objects are there connected to the Internet. It contains the use of smart phones, sensors, cameras, and other devices to make over the actions of people and things into data and link it to the Internet. With its capability to model the real world in digital form and accomplish scrutiny and replication in cyberspace, the IoT is able to reveal new value at an unparalleled rate and deliver it as response to the real world. This is set to convey main changes that will lengthen to the structure of industry in addition to the infrastructure of society itself. Therefore although the occurrence of the IoT contributes rise to new value, it besides means the occurrence of new threats. The proposed work covenant with disaster management as well as prevention to manufacturing industry using IoT. System first investigates the threat scenario during general execution of work, and finds the critical situations. The system processes learning approach for identifying such critical situations and execute the output appliances. System utilized multiple input along with output sensor for experiment. The Q-Learning approach has used for updating the policy which can provide the best result with high accuracy.
在物联网(IoT)开始的时候,它正在传递一个世界,在这个世界中,各种不同的物体都连接到互联网上。它包括使用智能手机、传感器、摄像头和其他设备,将人和物的行为转化为数据,并将其连接到互联网。凭借其以数字形式模拟现实世界并在网络空间中完成审查和复制的能力,物联网能够以无与伦比的速度揭示新价值,并将其作为对现实世界的响应。这意味着除了社会本身的基础设施之外,还将延伸到工业结构的主要变化。因此,虽然物联网的出现带来了新的价值,但同时也意味着新的威胁的出现。拟议的工作契约与灾害管理以及使用物联网的制造业的预防。系统首先对一般工作执行过程中的威胁场景进行调查,发现关键情况。系统处理学习方法以识别此类关键情况并执行输出设备。系统采用多输入输出传感器进行实验。采用Q-Learning方法对策略进行更新,可以提供高精度的最佳结果。
{"title":"Smart Disaster Management and Prevention using Reinforcement Learning in IoT Environment","authors":"Yogesh S Lonkar, Abhinav Bhagat, Sd Aasif Sd Manjur","doi":"10.1109/ICOEI.2019.8862602","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862602","url":null,"abstract":"At starting of the Internet of Things (IoT), it is passing around a world, in which diverse kinds of different objects are there connected to the Internet. It contains the use of smart phones, sensors, cameras, and other devices to make over the actions of people and things into data and link it to the Internet. With its capability to model the real world in digital form and accomplish scrutiny and replication in cyberspace, the IoT is able to reveal new value at an unparalleled rate and deliver it as response to the real world. This is set to convey main changes that will lengthen to the structure of industry in addition to the infrastructure of society itself. Therefore although the occurrence of the IoT contributes rise to new value, it besides means the occurrence of new threats. The proposed work covenant with disaster management as well as prevention to manufacturing industry using IoT. System first investigates the threat scenario during general execution of work, and finds the critical situations. The system processes learning approach for identifying such critical situations and execute the output appliances. System utilized multiple input along with output sensor for experiment. The Q-Learning approach has used for updating the policy which can provide the best result with high accuracy.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133630294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pricing model for revenue generation using Recurrent Neural Network for Cloud service provider 云服务提供商使用递归神经网络生成收益的定价模型
Pub Date : 2019-04-01 DOI: 10.1109/ICOEI.2019.8862567
Meetu Kandpal, Kalyani Patel
Success of any product may depend on the price of product. Demand of a product is one of the factors to be considered for deriving price of the product. As many IT companies have started to move towards the cloud computing and cloud resources are delivered as product over internet. There are many companies providing cloud services like salesforce.com, Amazon AWS, Microsoft azure etc. Different cloud service providers have different pricing policies to enhance the revenue and user satisfaction. The cloud providers have pricing schemes for cloud resources under fixed pricing and dynamic pricing. Some of them favor cloud providers, other cloud consumers. The paper presents a model to predict the price of cloud resource using Recurrent Neural Network(RNN) and auctioning method based on the parameters (as demand). The paper would give insight to researchers and cloud service providers to derive the policies based on the demand and other features.
任何产品的成功都可能取决于产品的价格。产品的需求是推导产品价格时要考虑的因素之一。随着许多IT公司开始转向云计算,云资源作为产品通过互联网交付。有许多公司提供云服务,如salesforce.com、亚马逊AWS、微软azure等。不同的云服务提供商有不同的定价策略,以提高收入和用户满意度。云提供商对云资源有固定定价和动态定价两种定价方案。其中一些支持云提供商,另一些支持云消费者。提出了一种基于参数(按需)的云资源价格预测模型,采用递归神经网络(RNN)和拍卖方法进行预测。本文将为研究人员和云服务提供商提供基于需求和其他特征的策略。
{"title":"Pricing model for revenue generation using Recurrent Neural Network for Cloud service provider","authors":"Meetu Kandpal, Kalyani Patel","doi":"10.1109/ICOEI.2019.8862567","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862567","url":null,"abstract":"Success of any product may depend on the price of product. Demand of a product is one of the factors to be considered for deriving price of the product. As many IT companies have started to move towards the cloud computing and cloud resources are delivered as product over internet. There are many companies providing cloud services like salesforce.com, Amazon AWS, Microsoft azure etc. Different cloud service providers have different pricing policies to enhance the revenue and user satisfaction. The cloud providers have pricing schemes for cloud resources under fixed pricing and dynamic pricing. Some of them favor cloud providers, other cloud consumers. The paper presents a model to predict the price of cloud resource using Recurrent Neural Network(RNN) and auctioning method based on the parameters (as demand). The paper would give insight to researchers and cloud service providers to derive the policies based on the demand and other features.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134533000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1