首页 > 最新文献

2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Smart Traffic light control in the junction using Raspberry PI 智能交通灯控制在路口使用树莓派
Jayashri Hosur, R. Rashmi, M. Dakshayini
In the current traffic system, there is a wastage of power consumption during non-peak hour as current traffic signal shows green light even though there is no vehicles on the road and also in some cases user has to wait for the signal to become green even though there is no vehicles on other roads of the junction which causes the irritation for the driver. In the proposed system, we are considering some threshold distance when the sensor finds any object within this distance using IOT technologies and when other roads are empty then it will switch on the green light otherwise it will switch off the light. This proposed system is helpful for the users during the non-peak hours and also saves the power during non-peak hours as in India most of the vehicles will be there during peak hours so there is lot of power wastage happens because of the current signal system.
在目前的交通系统中,在非高峰时段,即使道路上没有车辆,交通信号仍然显示绿灯,并且在某些情况下,即使路口的其他道路上没有车辆,用户也必须等待信号变为绿灯,这对驾驶员造成了刺激。在提议的系统中,我们正在考虑一些阈值距离,当传感器使用物联网技术在这个距离内发现任何物体时,当其他道路是空的时,它将打开绿灯,否则它将关闭灯。这个提议的系统在非高峰时间对用户有帮助,也节省了非高峰时间的电力,因为在印度,大多数车辆都会在高峰时间在那里,所以由于目前的信号系统,会发生大量的电力浪费。
{"title":"Smart Traffic light control in the junction using Raspberry PI","authors":"Jayashri Hosur, R. Rashmi, M. Dakshayini","doi":"10.1109/ICCMC.2019.8819695","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819695","url":null,"abstract":"In the current traffic system, there is a wastage of power consumption during non-peak hour as current traffic signal shows green light even though there is no vehicles on the road and also in some cases user has to wait for the signal to become green even though there is no vehicles on other roads of the junction which causes the irritation for the driver. In the proposed system, we are considering some threshold distance when the sensor finds any object within this distance using IOT technologies and when other roads are empty then it will switch on the green light otherwise it will switch off the light. This proposed system is helpful for the users during the non-peak hours and also saves the power during non-peak hours as in India most of the vehicles will be there during peak hours so there is lot of power wastage happens because of the current signal system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134383304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of the Attitude of Social Network Analysis using R3 Tool 利用R3工具分析社会网络分析的态度
K. Ramesh, M. Anto Bennet, Arathy T Mari, V. Kavia, S. Preetha, G. Nivedha
Web based life are impacting people inclinations by forming their demeanours and behaviours. Social media have developed more consideration nowadays. Public and Private assessment about a wide assortment of subjects are communicated and spread persistently by means of various social media. Instagram is one of the web-based life that is picking up notoriety and legitimate marketing. Instagram rules the computerized showcasing space, followed intently by Facebook. Sentiment examination identifies with the issue of mining the feelings from online accessible information and classifying the notion communicated by a specific substance into at most three present categories: positive, negative and neutral. This Paper focus on Instagram presentations, explore the feelings of Instagram life and make positive things a reality. First, a subjective to tests related to human feelings. Individuals have diverse sorts of emotions. we compute just the four kind of feelings like Happy, Sad, Anger, Fear, Surprise, Beauty and Excitement. To arrange posts reflecting Instagrammers feelings through multilevel order calculations is actualized. N Linear Support Vector Machine Learning calculations are utilized. The performance of this calculation is analysed for accuracy, reliability, validation and measurement of F1. Calculations of vector modelling machines are more accurate than the Naïve Bayes algorithm.
网络生活通过塑造人们的举止和行为来影响人们的倾向。如今,社交媒体已经有了更多的考虑。关于各种科目的公共和私人评估通过各种社交媒体持续传播和传播。Instagram是一种网络生活,它正在获得名声和合法的营销。Instagram统治着电脑化的展示空间,紧随其后的是Facebook。情感检查认同从在线可访问信息中挖掘情感的问题,并将特定物质传达的概念分为最多三种类别:积极,消极和中性。本文以Instagram的呈现为重点,探索Instagram生活的感受,让积极的事情成为现实。首先,主观地去测试与人的感情有关的东西。每个人都有各种各样的情绪。我们只计算四种感觉:快乐、悲伤、愤怒、恐惧、惊讶、美丽和兴奋。通过多层次的顺序计算,实现了对反映instagram用户感受的帖子的排列。使用N个线性支持向量机器学习计算。对计算结果进行了准确性、可靠性、验证性和测量性分析。向量建模机的计算比Naïve贝叶斯算法更准确。
{"title":"Analysis of the Attitude of Social Network Analysis using R3 Tool","authors":"K. Ramesh, M. Anto Bennet, Arathy T Mari, V. Kavia, S. Preetha, G. Nivedha","doi":"10.1109/ICCMC.2019.8819774","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819774","url":null,"abstract":"Web based life are impacting people inclinations by forming their demeanours and behaviours. Social media have developed more consideration nowadays. Public and Private assessment about a wide assortment of subjects are communicated and spread persistently by means of various social media. Instagram is one of the web-based life that is picking up notoriety and legitimate marketing. Instagram rules the computerized showcasing space, followed intently by Facebook. Sentiment examination identifies with the issue of mining the feelings from online accessible information and classifying the notion communicated by a specific substance into at most three present categories: positive, negative and neutral. This Paper focus on Instagram presentations, explore the feelings of Instagram life and make positive things a reality. First, a subjective to tests related to human feelings. Individuals have diverse sorts of emotions. we compute just the four kind of feelings like Happy, Sad, Anger, Fear, Surprise, Beauty and Excitement. To arrange posts reflecting Instagrammers feelings through multilevel order calculations is actualized. N Linear Support Vector Machine Learning calculations are utilized. The performance of this calculation is analysed for accuracy, reliability, validation and measurement of F1. Calculations of vector modelling machines are more accurate than the Naïve Bayes algorithm.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132822218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fog Computing: A New Era of Cloud Computing 雾计算:云计算的新时代
S. Delfín, N.P Sivasanker., N. Raj, A. Anand
In cloud computing, the word cloud (additionally stated as "the cloud") is utilized as an allegory for "the Internet," so the state cloud computing signifies "a sort of Internet based computing". It can likewise be characterized as a gathering of PCs and servers that are associated together over the Internet to structure a system. In spite of the fact that cloud computing offers a few influences, however it has some drawback as well, that amid load balancing of information in cloud server faces issues of system blockage, less transfer speed usage, adaptation to non-critical failure and security and so on. This is the place where the idea of "Fog Computing" comes to play. It effectively exchanges delicate information without deferring to the dispersed gadgets. Fog is like the cloud where the distinction lies in the way that has found more near end clients to process and offer reaction to the customer in a less amount of time. Fog Computing, additionally named as "fogging", is a disseminated framework in which a keen gadget deals with certain application procedures or services at the outskirt of the system, in any case, others are still overseen in the cloud. It is, basically, a focal layer between the cloud and the equipment to empower the increasingly productive information handling, investigation and capacity, which is accomplished by lessening the measure of information that should be transported to the cloud.
在云计算中,“云”一词(也被称为“云”)被用作“互联网”的隐喻,因此云计算的状态意味着“一种基于互联网的计算”。它同样可以被描述为通过Internet连接在一起以构建系统的pc机和服务器的集合。尽管云计算提供了一些影响,但它也有一些缺点,在云服务器上进行信息负载均衡时面临系统阻塞、传输速度占用少、适应非关键故障和安全性等问题。这就是“雾计算”思想发挥作用的地方。它有效地交换敏感的信息,而不受分散设备的影响。雾就像云,它的区别在于它找到了更多的近端客户来处理,并在更短的时间内为客户提供反应。雾计算,也被称为“雾化”,是一个分散的框架,在这个框架中,一个敏锐的小工具处理系统外围的某些应用程序或服务,在任何情况下,其他应用程序或服务仍然在云中受到监督。基本上,它是云和设备之间的一个焦点层,用于增强日益高效的信息处理、调查和能力,这是通过减少应该传输到云的信息度量来实现的。
{"title":"Fog Computing: A New Era of Cloud Computing","authors":"S. Delfín, N.P Sivasanker., N. Raj, A. Anand","doi":"10.1109/ICCMC.2019.8819633","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819633","url":null,"abstract":"In cloud computing, the word cloud (additionally stated as \"the cloud\") is utilized as an allegory for \"the Internet,\" so the state cloud computing signifies \"a sort of Internet based computing\". It can likewise be characterized as a gathering of PCs and servers that are associated together over the Internet to structure a system. In spite of the fact that cloud computing offers a few influences, however it has some drawback as well, that amid load balancing of information in cloud server faces issues of system blockage, less transfer speed usage, adaptation to non-critical failure and security and so on. This is the place where the idea of \"Fog Computing\" comes to play. It effectively exchanges delicate information without deferring to the dispersed gadgets. Fog is like the cloud where the distinction lies in the way that has found more near end clients to process and offer reaction to the customer in a less amount of time. Fog Computing, additionally named as \"fogging\", is a disseminated framework in which a keen gadget deals with certain application procedures or services at the outskirt of the system, in any case, others are still overseen in the cloud. It is, basically, a focal layer between the cloud and the equipment to empower the increasingly productive information handling, investigation and capacity, which is accomplished by lessening the measure of information that should be transported to the cloud.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132892923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Comprehensive Survey on Different Attacks on SDN and Approaches to Mitigate 针对SDN的各种攻击及缓解方法综述
Mrityunjaya D Hatagundi, H. V. Kumaraswamy
As the technologies leaning towards digitalization, there has been extensive scope for researches in the field of Software Defined Networking. The architectural framework makes the life of network administrators easy by decoupling the data plane and the control plane. This architecture exploits easy configuration of network, thus providing programmable terminal for development of applications related to security, management and logging while the centralized controller gives much more control over entire network. This type of network is at risk due to attacks by the intruders with an intention to slow down or shut down the entire network. One such kind of attacks is DoS attack. DoS attack involves flooding of fake packet flows from a single source into the original packet flow. DDoS is a type of DoS attack where multiple compromised systems, which are often infected with malicious programs, are used to target a single system. Hence to achieve security in distributed environment, it is important to reduce the effect of such attacks. In this paper an approach of mitigating Distributed DoS has been discussed. Approach first detects DDoS using Entropy Detection attack and then uses Bandwidth Prediction method to mitigate it. Entropy is basically used for measuring randomness in the system and there are two essential components to DDoS detection using entropy; window size and threshold.
随着技术向数字化的趋势发展,软件定义网络的研究已经有了广阔的空间。通过将数据平面和控制平面解耦,体系结构框架简化了网络管理员的工作。该体系结构利用了网络的简单配置,从而为开发与安全、管理和日志相关的应用程序提供了可编程终端,而集中控制器则提供了对整个网络的更多控制。这种类型的网络处于危险之中,因为入侵者的攻击意图是减慢或关闭整个网络。其中一种攻击是DoS攻击。DoS攻击是指将来自单一源的假数据包流大量注入到原始数据包流中。DDoS是DoS攻击的一种,它使用多个被感染的系统(通常被恶意程序感染)来攻击单个系统。因此,为了在分布式环境中实现安全,减少此类攻击的影响是非常重要的。本文讨论了一种减轻分布式DoS攻击的方法。该方法首先利用熵检测方法检测DDoS攻击,然后利用带宽预测方法对攻击进行缓解。熵基本上用于测量系统中的随机性,使用熵进行DDoS检测有两个基本组成部分;窗口大小和阈值。
{"title":"A Comprehensive Survey on Different Attacks on SDN and Approaches to Mitigate","authors":"Mrityunjaya D Hatagundi, H. V. Kumaraswamy","doi":"10.1109/ICCMC.2019.8819717","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819717","url":null,"abstract":"As the technologies leaning towards digitalization, there has been extensive scope for researches in the field of Software Defined Networking. The architectural framework makes the life of network administrators easy by decoupling the data plane and the control plane. This architecture exploits easy configuration of network, thus providing programmable terminal for development of applications related to security, management and logging while the centralized controller gives much more control over entire network. This type of network is at risk due to attacks by the intruders with an intention to slow down or shut down the entire network. One such kind of attacks is DoS attack. DoS attack involves flooding of fake packet flows from a single source into the original packet flow. DDoS is a type of DoS attack where multiple compromised systems, which are often infected with malicious programs, are used to target a single system. Hence to achieve security in distributed environment, it is important to reduce the effect of such attacks. In this paper an approach of mitigating Distributed DoS has been discussed. Approach first detects DDoS using Entropy Detection attack and then uses Bandwidth Prediction method to mitigate it. Entropy is basically used for measuring randomness in the system and there are two essential components to DDoS detection using entropy; window size and threshold.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Credit Card Fraud Prediction And Detection using Artificial Neural Network And Self-Organizing Maps 基于人工神经网络和自组织映射的信用卡欺诈预测与检测
E. Saraswathi, Prateek P. Kulkarni, Momin Nawaf Khalil, Shishir Chandra Nigam
The credit card business has increased speedily over the last two decades. Corporations and establishments are moving towards various online services, which aims to permit their customers with high potency and accessibility. The evolution is a huge step towards potency, accessibility and profitableness of view. Nevertheless, it additionally has some downsides. These smart services are recently prone to significant security related vulnerabilities. Developing business through card depends on the fact that neither the card nor the user needs to be present at the point of transaction. Thus, it is impossible for merchandiser to check weather the cardholder is real or not. Companies’ loss in recent times are majorly due to the credit card fraud and the fraudsters who ceaselessly obtain new ways to commit the unlawful activities. As we know that Artificial Neural Network has the ability to work as a human brain when trained properly. We have also implemented SOM for accuracy purpose. In this paper, we discuss about the performance of the network and their accuracy.
在过去的二十年里,信用卡业务增长迅速。公司和机构正在转向各种在线服务,其目的是让他们的客户具有高效力和可访问性。这一演变是朝着视野的效力、可及性和可盈利性迈出的一大步。然而,它也有一些缺点。这些智能服务最近容易出现重大的安全相关漏洞。通过卡开展业务取决于这样一个事实,即卡和用户都不需要出现在交易点。因此,商家不可能检查持卡人是否真实。近年来,公司的损失主要是由于信用卡诈骗和欺诈者不断获得新的方法来进行非法活动。正如我们所知,人工神经网络在训练得当的情况下具有像人类大脑一样工作的能力。我们还实现了SOM的准确性目的。在本文中,我们讨论了网络的性能和它们的精度。
{"title":"Credit Card Fraud Prediction And Detection using Artificial Neural Network And Self-Organizing Maps","authors":"E. Saraswathi, Prateek P. Kulkarni, Momin Nawaf Khalil, Shishir Chandra Nigam","doi":"10.1109/ICCMC.2019.8819758","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819758","url":null,"abstract":"The credit card business has increased speedily over the last two decades. Corporations and establishments are moving towards various online services, which aims to permit their customers with high potency and accessibility. The evolution is a huge step towards potency, accessibility and profitableness of view. Nevertheless, it additionally has some downsides. These smart services are recently prone to significant security related vulnerabilities. Developing business through card depends on the fact that neither the card nor the user needs to be present at the point of transaction. Thus, it is impossible for merchandiser to check weather the cardholder is real or not. Companies’ loss in recent times are majorly due to the credit card fraud and the fraudsters who ceaselessly obtain new ways to commit the unlawful activities. As we know that Artificial Neural Network has the ability to work as a human brain when trained properly. We have also implemented SOM for accuracy purpose. In this paper, we discuss about the performance of the network and their accuracy.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124539668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Source ACO algorithm for energy-aware cloudlet-based mobile cloud computing architecture 基于能量感知云的移动云计算架构动态源蚁群算法
A. Kushal, P. Raj, Prajapati Naitik, Prajapati Tapan, T. Anjali
Nowadays, industries demand Mobile Cloud Computing (MCC) implementation to enable the user to attain the benefits of cloud computing in an energy efficient way. However, MCC architecture requires mobile computing devices of users to establish a stable wireless connection. The mobile devices in transit may lose connection and continuously try to establish a connection with the cloud. As a result, mobile devices may lose the connection and waste a lot of energy. In the present work to address this issue, dynamic source Ant Colony Optimization algorithm is deployed along with the cloudlet based MCC architecture. The proposed solution considers a real-time scenario where there is a large number of mobile devices and cloudlets in the area. In such a real-time scenario, the proposed solution provides a connection with less energy consumption and high performance. To apply the proposed solution a simulator has been developed. In the present paper, the developed simulator has also been introduced.
如今,行业需要移动云计算(MCC)的实现,以使用户能够以节能的方式获得云计算的好处。然而,MCC架构要求用户的移动计算设备建立稳定的无线连接。移动设备在传输过程中可能会失去连接,并不断尝试与云建立连接。因此,移动设备可能会失去连接并浪费大量能源。在目前的工作中,为了解决这个问题,动态源蚁群优化算法与基于云的MCC架构一起部署。提出的解决方案考虑了一个实时场景,该场景中有大量的移动设备和云。在这种实时场景中,所提出的解决方案提供了一种能耗更低、性能更高的连接。为了应用所提出的解决方案,开发了一个模拟器。本文还介绍了所开发的仿真器。
{"title":"Dynamic Source ACO algorithm for energy-aware cloudlet-based mobile cloud computing architecture","authors":"A. Kushal, P. Raj, Prajapati Naitik, Prajapati Tapan, T. Anjali","doi":"10.1109/ICCMC.2019.8819838","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819838","url":null,"abstract":"Nowadays, industries demand Mobile Cloud Computing (MCC) implementation to enable the user to attain the benefits of cloud computing in an energy efficient way. However, MCC architecture requires mobile computing devices of users to establish a stable wireless connection. The mobile devices in transit may lose connection and continuously try to establish a connection with the cloud. As a result, mobile devices may lose the connection and waste a lot of energy. In the present work to address this issue, dynamic source Ant Colony Optimization algorithm is deployed along with the cloudlet based MCC architecture. The proposed solution considers a real-time scenario where there is a large number of mobile devices and cloudlets in the area. In such a real-time scenario, the proposed solution provides a connection with less energy consumption and high performance. To apply the proposed solution a simulator has been developed. In the present paper, the developed simulator has also been introduced.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of Applying N-Gram Based Naïve Bayes Classifier for Hierarchical Classification 基于N-Gram的Naïve贝叶斯分类器分层分类性能评价
J. Shah
Text classification is a process of allocating one or more class label to a text document. If the text classification problem has too many categories, and there are certain categories with less number of training documents, text classification task becomes difficult. Recall will be less for categories with less number of training documents. To handle text classification problem with too many categories and to take into consideration parent-child/sibling relationships between categories in user profile and document profile for content-based filtering, hierarchical classification is better approach. The main issue with hierarchical classification is error propagation. The error that occurs at early level in hierarchy will carry forward to all the levels below it. So, misclassification at early level in hierarchy needs to be reduced. Term ambiguity may be one of the reasons for classification error. Naïve Bayes classification method is mostly used in text classification problem as it takes less time for training and testing. Naïve Bayes model considers that terms are not dependent on each other for a given class. For data where terms are dependent on each other, performance of naïve Bayes is degraded. In this paper, word-level n-gram based Multinomial Naïve Bayes classification method is combined with hierarchical classification to reduce misclassification that occur at early level in hierarchy & improve content-based filtering. Proposed algorithm also suggests a way to reduce execution time requirements for calculating probabilities of terms for n-gram naïve bayes model.
文本分类是为文本文档分配一个或多个类标签的过程。如果文本分类问题的类别过多,并且某些类别的训练文档数量较少,则文本分类任务变得困难。对于培训文档数量较少的类别,召回率会更低。为了处理类别过多的文本分类问题,并考虑用户概要和文档概要中类别之间的父子/兄弟关系进行基于内容的过滤,分层分类是较好的方法。分层分类的主要问题是错误传播。在层次结构的早期级别发生的错误将延续到它下面的所有级别。因此,需要减少在层次结构早期的错误分类。术语歧义可能是导致分类错误的原因之一。Naïve贝叶斯分类方法主要用于文本分类问题,因为它需要较少的训练和测试时间。Naïve贝叶斯模型认为对于给定的类,项之间是不依赖的。对于项相互依赖的数据,naïve贝叶斯算法的性能会下降。本文将基于词级n图的多项式Naïve贝叶斯分类方法与层次分类相结合,减少了层次早期出现的误分类,改进了基于内容的过滤。该算法还提出了一种减少n-gram模型中计算项概率的执行时间的方法naïve bayes模型。
{"title":"Performance Evaluation of Applying N-Gram Based Naïve Bayes Classifier for Hierarchical Classification","authors":"J. Shah","doi":"10.1109/ICCMC.2019.8819751","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819751","url":null,"abstract":"Text classification is a process of allocating one or more class label to a text document. If the text classification problem has too many categories, and there are certain categories with less number of training documents, text classification task becomes difficult. Recall will be less for categories with less number of training documents. To handle text classification problem with too many categories and to take into consideration parent-child/sibling relationships between categories in user profile and document profile for content-based filtering, hierarchical classification is better approach. The main issue with hierarchical classification is error propagation. The error that occurs at early level in hierarchy will carry forward to all the levels below it. So, misclassification at early level in hierarchy needs to be reduced. Term ambiguity may be one of the reasons for classification error. Naïve Bayes classification method is mostly used in text classification problem as it takes less time for training and testing. Naïve Bayes model considers that terms are not dependent on each other for a given class. For data where terms are dependent on each other, performance of naïve Bayes is degraded. In this paper, word-level n-gram based Multinomial Naïve Bayes classification method is combined with hierarchical classification to reduce misclassification that occur at early level in hierarchy & improve content-based filtering. Proposed algorithm also suggests a way to reduce execution time requirements for calculating probabilities of terms for n-gram naïve bayes model.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129378201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and wireless sensor Network Analysis of Water Quality Monitoring System for Aquaculture 水产养殖水质监测系统的设计与无线传感器网络分析
Zeenat Shareef, S. Reddy
Aquaculture is one of the important activities in the coastal regions of India. The livelihood of thousands of farmers depends on the yield generated through aquaculture activities. Water quality is an important factor that affects the growth and development of marine creatures. Any deterioration in water quality endangers these species and affects the yield. Therefore, there is a need to monitor the water quality at regular intervals and provide alerts to the aquaculture farmers so that they can take preventive actions in time. This paper presents design and development of water quality monitoring system for aquaculture farms of western Godavari region. It also presents network analysis performed between the base station and the sensor node in order to cover the aquaculture farm with sensor nodes in an efficient manner.
水产养殖是印度沿海地区的重要活动之一。成千上万农民的生计取决于水产养殖活动产生的产量。水质是影响海洋生物生长发育的重要因素。水质的任何恶化都会危及这些物种并影响产量。因此,有必要定期监测水质,并向养殖户提供警报,以便他们及时采取预防措施。本文介绍了戈达瓦里西部地区水产养殖场水质监测系统的设计与开发。本文还介绍了在基站和传感器节点之间进行的网络分析,以便有效地用传感器节点覆盖养殖场。
{"title":"Design and wireless sensor Network Analysis of Water Quality Monitoring System for Aquaculture","authors":"Zeenat Shareef, S. Reddy","doi":"10.1109/ICCMC.2019.8819844","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819844","url":null,"abstract":"Aquaculture is one of the important activities in the coastal regions of India. The livelihood of thousands of farmers depends on the yield generated through aquaculture activities. Water quality is an important factor that affects the growth and development of marine creatures. Any deterioration in water quality endangers these species and affects the yield. Therefore, there is a need to monitor the water quality at regular intervals and provide alerts to the aquaculture farmers so that they can take preventive actions in time. This paper presents design and development of water quality monitoring system for aquaculture farms of western Godavari region. It also presents network analysis performed between the base station and the sensor node in order to cover the aquaculture farm with sensor nodes in an efficient manner.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130119301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of Cryptographic model for End-to-End Encryption in FPGA based systems 基于FPGA的端到端加密系统的加密模型设计
R. Chatterjee, Rajdeep Chakraborty, J. Mandal
Digitization has transformed our world. The famous World Wide Web, various social networks and numerous e-commerce applications are responsible to generate huge volume of data regularly. The emerging data security mechanisms ensures a safe transmission of information through the internet. Symmetric key cryptography is one of the key techniques used for the security of large data transmission over the internet. Some popular symmetric key algorithms; TDES, IDEA, AES etc. The proposed model uses several symmetric key algorithms in cascaded manner. The model is first divided into 64 bits plaintext block and then into two sub-blocks of 32 bits. The left and right blocks go through a list of symmetric key cryptography techniques like TR, RPPT, TB and RPSPNC and bit rotation in one step. TR stands for Triangular Encryption, which is responsible to generate a triangle shape bit stream where different encryption-decryption techniques are achieved by the order of reading bit RPPT (Recursive Pared Parity Technique) a very simple space efficient encryption algorithm produces cipher text by performing logical OR of consecutive bits. Transformation of Bits (TB) uses swapping method of bits of different order for encryption and decryption process. Recursive Positional Substitution on Prime-Nonprime of Cluster (RPSPNC) methodology swaps bits based on prime/non prime bit position and generates intermediate bit stream as a cipher text. Finally merge the two halves sub-blocks to get the 64 bits cipher text. To test the feasibility of the proposed model it is compared with AES and another embedded encryption technique RPPT+TB for entropy, non-homogeneity, n-gram(4-gram) test, frequency distribution graph and FPGA based hardware test.
数字化改变了我们的世界。著名的万维网,各种社交网络和众多的电子商务应用程序负责定期产生大量的数据。新兴的数据安全机制确保了互联网上信息的安全传输。对称密钥加密是保证网络大数据传输安全的关键技术之一。一些流行的对称密钥算法;TDES, IDEA, AES等。该模型以级联的方式使用了几种对称密钥算法。该模型首先分成64位明文块,然后分成两个32位的子块。左边和右边的块在一步中通过一系列对称密钥加密技术,如TR, RPPT, TB和RPSPNC以及位旋转。TR代表三角形加密,它负责生成一个三角形的比特流,其中不同的加密-解密技术通过读取位的顺序来实现。RPPT(递归对等奇偶校验技术)是一种非常简单的空间有效的加密算法,通过执行连续位的逻辑或来产生密文。比特变换(TB)采用不同顺序的比特交换方法进行加解密过程。基于簇素数-非素数的递归位置替换(RPSPNC)方法基于素数/非素数位位置交换比特,并生成中间比特流作为密文。最后将两个半子块合并得到64位密文。为了验证该模型的可行性,将其与AES和另一种嵌入式加密技术RPPT+TB进行了熵、非同质性、n-gram(4-gram)测试、频率分布图和基于FPGA的硬件测试。
{"title":"Design of Cryptographic model for End-to-End Encryption in FPGA based systems","authors":"R. Chatterjee, Rajdeep Chakraborty, J. Mandal","doi":"10.1109/ICCMC.2019.8819761","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819761","url":null,"abstract":"Digitization has transformed our world. The famous World Wide Web, various social networks and numerous e-commerce applications are responsible to generate huge volume of data regularly. The emerging data security mechanisms ensures a safe transmission of information through the internet. Symmetric key cryptography is one of the key techniques used for the security of large data transmission over the internet. Some popular symmetric key algorithms; TDES, IDEA, AES etc. The proposed model uses several symmetric key algorithms in cascaded manner. The model is first divided into 64 bits plaintext block and then into two sub-blocks of 32 bits. The left and right blocks go through a list of symmetric key cryptography techniques like TR, RPPT, TB and RPSPNC and bit rotation in one step. TR stands for Triangular Encryption, which is responsible to generate a triangle shape bit stream where different encryption-decryption techniques are achieved by the order of reading bit RPPT (Recursive Pared Parity Technique) a very simple space efficient encryption algorithm produces cipher text by performing logical OR of consecutive bits. Transformation of Bits (TB) uses swapping method of bits of different order for encryption and decryption process. Recursive Positional Substitution on Prime-Nonprime of Cluster (RPSPNC) methodology swaps bits based on prime/non prime bit position and generates intermediate bit stream as a cipher text. Finally merge the two halves sub-blocks to get the 64 bits cipher text. To test the feasibility of the proposed model it is compared with AES and another embedded encryption technique RPPT+TB for entropy, non-homogeneity, n-gram(4-gram) test, frequency distribution graph and FPGA based hardware test.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131080607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Proposed Methodology for Multi-Temporal Image Change Detection by Using Image Stitching Through Pixel Block Localization 一种基于像素块定位的图像拼接多时相图像变化检测方法
Sujata D. More, Meenakshi S. Arya
In alteration discovery analysis, image misalignment still remains a pesky issue, although such discovery would be is entirely determined by the accuracy of image registration. If the procedure of alteration detection is done on images that are not aligned properly, problems may accrue in the form of missed or wrong alterations. This, in turn, would have an adverse effect on the correctness of actual change detection. This paper's aim is to propose a methodology about the recognition of change technique that is expected to curtail the influence exerted by improper alignment of images. And to effect this, the method of detecting alternations or changes based on pixel is being advanced, as this suggested method would deal with errors arising out of mis-registration effectively. The technique proposed here involves image stitching by combining two or more images of the same scene as a single larger image. Block matching technique is a way of locating matching blocks in a sequence of image for the purpose of image estimation. To spot the alteration in image, the use of image differencing is being advocated. It is anticipated that the suggested experimental steps would yield a top rate of accuracy.
在改变发现分析中,图像不对准仍然是一个棘手的问题,尽管这种发现完全取决于图像配准的准确性。如果对未正确对齐的图像进行更改检测,则可能会以遗漏或错误更改的形式产生问题。这反过来又会对实际变更检测的正确性产生不利影响。本文的目的是提出一种关于识别变化技术的方法,该方法有望减少图像不正确对齐所产生的影响。为了实现这一目标,基于像素检测变化或变化的方法被提出,因为这种方法可以有效地处理由于错误配准而产生的错误。这里提出的技术涉及图像拼接,通过将同一场景的两个或多个图像合并为单个较大的图像。块匹配技术是一种在图像序列中定位匹配块以进行图像估计的方法。为了发现图像的变化,人们提倡使用图像差分法。预计所建议的实验步骤将产生最高的准确率。
{"title":"A Proposed Methodology for Multi-Temporal Image Change Detection by Using Image Stitching Through Pixel Block Localization","authors":"Sujata D. More, Meenakshi S. Arya","doi":"10.1109/ICCMC.2019.8819664","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819664","url":null,"abstract":"In alteration discovery analysis, image misalignment still remains a pesky issue, although such discovery would be is entirely determined by the accuracy of image registration. If the procedure of alteration detection is done on images that are not aligned properly, problems may accrue in the form of missed or wrong alterations. This, in turn, would have an adverse effect on the correctness of actual change detection. This paper's aim is to propose a methodology about the recognition of change technique that is expected to curtail the influence exerted by improper alignment of images. And to effect this, the method of detecting alternations or changes based on pixel is being advanced, as this suggested method would deal with errors arising out of mis-registration effectively. The technique proposed here involves image stitching by combining two or more images of the same scene as a single larger image. Block matching technique is a way of locating matching blocks in a sequence of image for the purpose of image estimation. To spot the alteration in image, the use of image differencing is being advocated. It is anticipated that the suggested experimental steps would yield a top rate of accuracy.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132405852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1