首页 > 最新文献

2017 IEEE 7th International Advance Computing Conference (IACC)最新文献

英文 中文
Hadoop Approach to Cluster Based Cache Oblivious Peano Curves 基于集群的缓存无关Peano曲线的Hadoop方法
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0037
Gurpinder Kaur, Sachin Bagga, K. Mann
Hadoop is one of the most popular technologies used in the big data landscape for evaluating the data through Hadoop Distributed File System and Map-Reduce. Problems which are larger in size are becoming tough to handle by a single system these days because the execution time for such problems will be very high in such platform. Instead of processing the tasks in a sequential approach, when the processing is done in parallel through the MapReduce method, then results with better efficiency can be expected. In the present method, firstly the Map task decomposes the input into the intermediate keys and then the intermediate keys are sent to the reduce function for processing of data. The algorithm used for performing matrix multiplication is cache oblivious in nature, for better utilization of the memory hierarchy. Processing with the cache oblivious approach increases the re-usability power of the elements and thus decreases the overall execution time. The proposed work for matrix multiplication shall be fault tolerant in nature as there is a replication of data at three places on three different data nodes.
Hadoop是大数据领域中最流行的技术之一,通过Hadoop分布式文件系统和Map-Reduce来评估数据。现在单个系统很难处理规模较大的问题,因为在这样的平台上,这类问题的执行时间会非常高。当通过MapReduce方法并行处理任务时,可以期望得到效率更高的结果,而不是以顺序方法处理任务。在该方法中,Map任务首先将输入分解为中间键,然后将中间键发送给reduce函数进行数据处理。用于执行矩阵乘法的算法本质上是缓存无关的,以便更好地利用内存层次结构。使用缓参无关方法进行处理可以提高元素的可重用性,从而减少总体执行时间。由于在三个不同的数据节点上的三个地方存在数据复制,因此建议的矩阵乘法工作本质上应该是容错的。
{"title":"Hadoop Approach to Cluster Based Cache Oblivious Peano Curves","authors":"Gurpinder Kaur, Sachin Bagga, K. Mann","doi":"10.1109/IACC.2017.0037","DOIUrl":"https://doi.org/10.1109/IACC.2017.0037","url":null,"abstract":"Hadoop is one of the most popular technologies used in the big data landscape for evaluating the data through Hadoop Distributed File System and Map-Reduce. Problems which are larger in size are becoming tough to handle by a single system these days because the execution time for such problems will be very high in such platform. Instead of processing the tasks in a sequential approach, when the processing is done in parallel through the MapReduce method, then results with better efficiency can be expected. In the present method, firstly the Map task decomposes the input into the intermediate keys and then the intermediate keys are sent to the reduce function for processing of data. The algorithm used for performing matrix multiplication is cache oblivious in nature, for better utilization of the memory hierarchy. Processing with the cache oblivious approach increases the re-usability power of the elements and thus decreases the overall execution time. The proposed work for matrix multiplication shall be fault tolerant in nature as there is a replication of data at three places on three different data nodes.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":" 51","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Optimal Neural Network Classifier for Cervical Pap Smear Data 子宫颈涂片数据的神经网络分类器
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0036
K. Hemalatha, K. U. Rani
Neural Networks are one of the widely used Soft Computing Techniques. Neural Networks are adaptive and learn from past examples. Neural Networks are used successfully in extensive range of applications related to different areas particularly in Medical Domain. Neural Networks mimic human brain to solve problems concern to non-linear and complex data such as clinical samples. Cervical Cancer is a silent cancer which does not disclose any pain and symptoms. But it becomes dangerous silently with in a long period of 10-15 years. Hence early diagnosis is an essential action to prevent it in early stages. In this study most commonly used Neural Networks such as Multi Layer Perceptron (MLP), Probabilistic Neural Network (PNN), Radial Basic Function (RBF) and Linear Vector Quantization (LVQ) networks are used. Dimensionally reduced Cervical Pap smear Dataset using Fuzzy Edge Detection method is considered for classification. The Four Neural Networks are compared and the best suitable network to classify the dataset is evaluated.
神经网络是应用广泛的软计算技术之一。神经网络是自适应的,可以从过去的例子中学习。神经网络成功地应用于不同领域的广泛应用,特别是在医学领域。神经网络模拟人类大脑来解决涉及非线性和复杂数据(如临床样本)的问题。子宫颈癌是一种无声的癌症,没有任何疼痛和症状。但在10-15年的漫长时间里,它会悄无声息地变得危险。因此,早期诊断是早期预防的必要措施。在本研究中使用了最常用的神经网络,如多层感知器(MLP)、概率神经网络(PNN)、径向基本函数(RBF)和线性向量量化(LVQ)网络。采用模糊边缘检测方法对子宫颈涂片数据集进行降维分类。对四种神经网络进行了比较,评价了最适合对数据集进行分类的神经网络。
{"title":"An Optimal Neural Network Classifier for Cervical Pap Smear Data","authors":"K. Hemalatha, K. U. Rani","doi":"10.1109/IACC.2017.0036","DOIUrl":"https://doi.org/10.1109/IACC.2017.0036","url":null,"abstract":"Neural Networks are one of the widely used Soft Computing Techniques. Neural Networks are adaptive and learn from past examples. Neural Networks are used successfully in extensive range of applications related to different areas particularly in Medical Domain. Neural Networks mimic human brain to solve problems concern to non-linear and complex data such as clinical samples. Cervical Cancer is a silent cancer which does not disclose any pain and symptoms. But it becomes dangerous silently with in a long period of 10-15 years. Hence early diagnosis is an essential action to prevent it in early stages. In this study most commonly used Neural Networks such as Multi Layer Perceptron (MLP), Probabilistic Neural Network (PNN), Radial Basic Function (RBF) and Linear Vector Quantization (LVQ) networks are used. Dimensionally reduced Cervical Pap smear Dataset using Fuzzy Edge Detection method is considered for classification. The Four Neural Networks are compared and the best suitable network to classify the dataset is evaluated.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122125594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation 基于动态网络的信息交换可视化:以火灾紧急搜救行动为例
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0068
Vimala Nunavath, A. Prinz
To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this paper, we provide a concept of a time varying data analysis and present findings from a fire emergency serious game.
为了开展应急活动,来自不同应急组织的复杂应急响应网络共同努力,救援受影响的人并减轻财产损失。然而,在搜救行动中,为了提高工作效率,应急响应人员必须完全依赖异构数据源生成的数据。从这些丰富的数据中,救援队伍相互分享隐藏在丰富数据中的所需信息,以做出决策,获得态势感知,并分配任务。此外,理解和分析共享信息是一项复杂且极具挑战性的任务。因此,在本文中,我们提出了时变数据分析的概念,并从火灾应急严重博弈中提出了研究结果。
{"title":"Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation","authors":"Vimala Nunavath, A. Prinz","doi":"10.1109/IACC.2017.0068","DOIUrl":"https://doi.org/10.1109/IACC.2017.0068","url":null,"abstract":"To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this paper, we provide a concept of a time varying data analysis and present findings from a fire emergency serious game.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122198362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Leakage in 32-Bit Adders in 45 nm Technology 45纳米技术中32位加法器的泄漏分析
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0092
M. Ahmad, K. Manjunathachari, K. Lalkishore
In this paper 32 bit adders are designed usingexisting full adders and proposed adders. Average leakage andaverage power consumed in all 32 full adders is small comparedto all existing, proposed 15 transistor based 32 bit adder andproposed 13 transistor based 32 bit adder.
本文利用现有的全加法器和拟制加法器设计了32位加法器。与所有现有的基于15晶体管的32位加法器和基于13晶体管的32位加法器相比,所有32个全加法器的平均泄漏和平均功耗都很小。
{"title":"Analysis of Leakage in 32-Bit Adders in 45 nm Technology","authors":"M. Ahmad, K. Manjunathachari, K. Lalkishore","doi":"10.1109/IACC.2017.0092","DOIUrl":"https://doi.org/10.1109/IACC.2017.0092","url":null,"abstract":"In this paper 32 bit adders are designed usingexisting full adders and proposed adders. Average leakage andaverage power consumed in all 32 full adders is small comparedto all existing, proposed 15 transistor based 32 bit adder andproposed 13 transistor based 32 bit adder.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Reversible RIE Based Watermarking Scheme 一种基于RIE的可逆水印方案
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0188
V. M. Sekhar, C. Kumar, K.Venkateswara Rao, N. S. Rao, M. Gopichand
Today people are more interconnected with Internet ever before. Internet not only brought advantages, it also brings security threats, cyberattacks, phishing, etc. To mitigate cybercrimes governments are enforcing cyberlaws. In this process authentication of digital objects are essential. To provide authentication many watermarking schemes are proposed. Among edge based watermarking schemes special category because of low distortion while watermarking. However, present edge based watermarking scheme are suffering from smoothing effect and also reversibility is an uncertain parameter. In this paper we are proposing a Reference Image and Edge (RIE) based watermarking scheme to overcome smoothing effect problem in existing edge based watermarking schemes. RIE watermarking scheme also consider cover content information while embedding watermark pattern. Compared to existing edge based data hiding schemes proposed RIE watermark scheme improves visual perception with more or less same embedding capacity.
今天,人们与互联网的联系比以往任何时候都更加紧密。互联网不仅带来了优势,也带来了安全威胁,网络攻击,网络钓鱼等。为了减轻网络犯罪,政府正在执行网络法律。在这个过程中,数字对象的认证是必不可少的。为了提供认证,提出了许多水印方案。在基于边缘的水印方案中,基于边缘的水印方案因其在水印过程中的低失真而成为一类特殊的方案。但是目前基于边缘的水印方案存在平滑效应和可逆性不确定的问题。本文提出了一种基于参考图像和边缘(RIE)的水印方案,以克服现有基于边缘的水印方案中存在的平滑效果问题。RIE水印方案在嵌入水印模式的同时也考虑了覆盖内容信息。与现有的基于边缘的数据隐藏方案相比,提出的RIE水印方案在嵌入容量基本相同的情况下提高了视觉感知能力。
{"title":"A Reversible RIE Based Watermarking Scheme","authors":"V. M. Sekhar, C. Kumar, K.Venkateswara Rao, N. S. Rao, M. Gopichand","doi":"10.1109/IACC.2017.0188","DOIUrl":"https://doi.org/10.1109/IACC.2017.0188","url":null,"abstract":"Today people are more interconnected with Internet ever before. Internet not only brought advantages, it also brings security threats, cyberattacks, phishing, etc. To mitigate cybercrimes governments are enforcing cyberlaws. In this process authentication of digital objects are essential. To provide authentication many watermarking schemes are proposed. Among edge based watermarking schemes special category because of low distortion while watermarking. However, present edge based watermarking scheme are suffering from smoothing effect and also reversibility is an uncertain parameter. In this paper we are proposing a Reference Image and Edge (RIE) based watermarking scheme to overcome smoothing effect problem in existing edge based watermarking schemes. RIE watermarking scheme also consider cover content information while embedding watermark pattern. Compared to existing edge based data hiding schemes proposed RIE watermark scheme improves visual perception with more or less same embedding capacity.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of System Level Computational Platform for IP-BTS Telecom Application IP-BTS电信应用系统级计算平台的开发
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0099
M. Prasad, D. Reddy
IP-BTS (Internet Protocol Based Base Transceiver Station) is a small computing hardware module designed for integration into an industry standard tower PC housing which provides a complete GSM Access Point. It is used to optimize cost of transmission line for high density multi-band base stations. This paper describes the detailed procedure to develop system level boot loader software (universal boot loader-u-boot) for IP-BTS which is a customized hardware with PowerPC based processor board running on RTLinux operating system. This paper also discusses the brief presentation of the customized hardware platform at system level and the boot loader software development procedure for embedded telecom application IP-BTS. Designing suitable boot software at system or boot level is a complex and challenging task which is included in development of an embedded system for telecom applications. The boot loader connects application software through customized hardware and Real-Time Operating System (RTOS). It is not only responsible for initialization of the processor board and other module of IP-BTS software also upgrades operating system images and IP-BTS software versions. The early initialization code is always developed in the processor's native assembly language. In this paper we presented detailed procedure to transplant boot loader (u-boot) on Power PC based customized board and tested successfully with results.
IP-BTS(基于互联网协议的基站收发器站)是一个小型的计算硬件模块,设计用于集成到工业标准的塔式PC外壳中,提供完整的GSM接入点。用于高密度多频段基站的传输线成本优化。IP-BTS是一种基于PowerPC处理器板、运行在RTLinux操作系统上的定制硬件,本文详细介绍了为IP-BTS开发系统级引导加载软件(universal boot loader-u-boot)的过程。本文还简要介绍了嵌入式电信应用IP-BTS的系统级定制硬件平台和引导加载程序软件的开发过程。在电信应用嵌入式系统的开发中,在系统或引导级设计合适的引导软件是一项复杂而具有挑战性的任务。引导加载程序通过定制硬件和实时操作系统(RTOS)连接应用软件。它不仅负责IP-BTS软件的处理器板和其他模块的初始化,还负责操作系统映像和IP-BTS软件版本的升级。早期初始化代码总是用处理器的本机汇编语言开发的。本文详细介绍了在基于Power PC的定制板上移植引导加载程序(u-boot)的过程,并进行了成功的测试。
{"title":"Development of System Level Computational Platform for IP-BTS Telecom Application","authors":"M. Prasad, D. Reddy","doi":"10.1109/IACC.2017.0099","DOIUrl":"https://doi.org/10.1109/IACC.2017.0099","url":null,"abstract":"IP-BTS (Internet Protocol Based Base Transceiver Station) is a small computing hardware module designed for integration into an industry standard tower PC housing which provides a complete GSM Access Point. It is used to optimize cost of transmission line for high density multi-band base stations. This paper describes the detailed procedure to develop system level boot loader software (universal boot loader-u-boot) for IP-BTS which is a customized hardware with PowerPC based processor board running on RTLinux operating system. This paper also discusses the brief presentation of the customized hardware platform at system level and the boot loader software development procedure for embedded telecom application IP-BTS. Designing suitable boot software at system or boot level is a complex and challenging task which is included in development of an embedded system for telecom applications. The boot loader connects application software through customized hardware and Real-Time Operating System (RTOS). It is not only responsible for initialization of the processor board and other module of IP-BTS software also upgrades operating system images and IP-BTS software versions. The early initialization code is always developed in the processor's native assembly language. In this paper we presented detailed procedure to transplant boot loader (u-boot) on Power PC based customized board and tested successfully with results.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence to Impart Surveillance, Tracking, & Actuation on Suspicious Activities 对可疑活动进行监视、跟踪和驱动的人工智能
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0016
Surajit Bhattacherjee, G. Somashekhar
Along with the fast growing economy of a developing country as far as India is concerned, there has been reported an emerging number of crime and criminal offences. In many of the cases the suspects are quite freely escaped because of the insufficient testimonials and lack of communication links in time. As an instance, suppose a bank robbery takes place and right then no one is able to press the emergency buzzer or to dial up to nearest police station. Eventually, when the nearest police station is informed about the fact, the gang is beyond the reach leaving no clue behind. Same is observed in many cases as rash driving and hit and run, eve teasing and molestation of women at less crowded streets, pick pocketing and blackmailing at Automatic Teller Machines at roadside and many more. Where there is a crime involved, there has to be a quality surveillance and expert actuation to stand against all these activities with minimum human intervention. Our goal is to design an intelligent device that can continuously keep an eye on any activity happening around it and on administrator's request it can track any suspect, be it an object or a human being, with minimum power consumption and least human efforts. As an actuator it sends a signal to the nearest traffic control or police station intimating the state of crime along with its location and also tells about which direction it is heading to. In view of a real-time establishment of the concept, the flying device is designed to be a robot that looks and flies like a Bird, the processor is chosen to be ARDUINO UNO, the image processing is made by mat-lab tool and the communication link between the administrator and the device is via RFID system and between device and the police control is achieved by GPS/GSM technology.
就印度而言,随着发展中国家经济的快速增长,据报道,犯罪和刑事犯罪的数量正在增加。在许多案件中,由于证言不足和缺乏及时的通讯联系,嫌疑人得以相当自由地逃脱。例如,假设发生了一起银行抢劫案,此时没有人能够按紧急蜂鸣器或拨打最近的警察局。最终,当最近的警察局得知事实后,这伙人已经无法触及,没有留下任何线索。在许多情况下,鲁莽驾驶和肇事逃逸,甚至在不那么拥挤的街道上戏弄和骚扰妇女,在路边的自动柜员机上扒窃和勒索,等等,都是同样的情况。在涉及犯罪的地方,必须有一个高质量的监控和专家驱动,以最少的人为干预来对抗所有这些活动。我们的目标是设计一种智能设备,它可以持续关注周围发生的任何活动,并根据管理员的要求,它可以跟踪任何嫌疑人,无论是物体还是人,以最小的功耗和最少的人力。作为一个执行器,它会向最近的交通控制中心或警察局发送信号,告诉他们犯罪的状态,以及它的位置,还会告诉他们它要去哪个方向。从概念的实时性出发,将飞行装置设计成外形和飞行都像鸟的机器人,处理器选用ARDUINO UNO,图像处理采用matlab -lab工具,管理员与设备之间通过RFID系统通信,设备与警察控制之间通过GPS/GSM技术实现通信。
{"title":"Artificial Intelligence to Impart Surveillance, Tracking, & Actuation on Suspicious Activities","authors":"Surajit Bhattacherjee, G. Somashekhar","doi":"10.1109/IACC.2017.0016","DOIUrl":"https://doi.org/10.1109/IACC.2017.0016","url":null,"abstract":"Along with the fast growing economy of a developing country as far as India is concerned, there has been reported an emerging number of crime and criminal offences. In many of the cases the suspects are quite freely escaped because of the insufficient testimonials and lack of communication links in time. As an instance, suppose a bank robbery takes place and right then no one is able to press the emergency buzzer or to dial up to nearest police station. Eventually, when the nearest police station is informed about the fact, the gang is beyond the reach leaving no clue behind. Same is observed in many cases as rash driving and hit and run, eve teasing and molestation of women at less crowded streets, pick pocketing and blackmailing at Automatic Teller Machines at roadside and many more. Where there is a crime involved, there has to be a quality surveillance and expert actuation to stand against all these activities with minimum human intervention. Our goal is to design an intelligent device that can continuously keep an eye on any activity happening around it and on administrator's request it can track any suspect, be it an object or a human being, with minimum power consumption and least human efforts. As an actuator it sends a signal to the nearest traffic control or police station intimating the state of crime along with its location and also tells about which direction it is heading to. In view of a real-time establishment of the concept, the flying device is designed to be a robot that looks and flies like a Bird, the processor is chosen to be ARDUINO UNO, the image processing is made by mat-lab tool and the communication link between the administrator and the device is via RFID system and between device and the police control is achieved by GPS/GSM technology.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123503452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Chip-Based Key Distribution Technique for Security Enhancement in Hierarchical Wireless Sensors Networks 基于芯片的分层无线传感器网络安全增强密钥分发技术
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0079
Naveen Kumar K, M. Nene
Realization of an application using Wireless Sensor Networks (WSNs) using Sensor Nodes (SNs) brings in profound advantage of ad-hoc and flexible network deployment. Implementation of these networks face immense challenges due to short wireless range; along with limited power, storage & computational capabilities of SNs. Also, due to the tiny physical attributes of the SNs in WSNs, they are prone to physical attacks. In the context of WSNs, the physical attacks may range from destroying, lifting, replacing and adding new SNs. The work in this paper addresses the threats induced due to physical attacks and, further proposes a methodology to mitigate it. The methodology incorporates the use of newly proposed secured and efficient key distribution technique based on the additional commodity hardware Trusted Platform Module (TPM). Further, the paper demonstrates the merits of the proposed methodology. With some additional economical cost for the hardware, the proposed technique can fulfill the security requirement of WSNs, like confidentiality, integrity, authenticity, resilience to attack, key connectivity and data freshness
利用传感器节点(SNs)实现无线传感器网络(WSNs)应用,具有自组织和灵活的网络部署优势。由于无线范围短,这些网络的实施面临巨大挑战;以及SNs有限的功率、存储和计算能力。同时,由于WSNs中SNs的物理属性很小,容易受到物理攻击。在无线传感器网络环境下,物理攻击可能包括破坏、解除、替换和添加新的无线传感器网络。本文的工作解决了由于物理攻击引起的威胁,并进一步提出了一种减轻威胁的方法。该方法结合了新提出的基于附加商品硬件可信平台模块(TPM)的安全高效密钥分发技术。此外,本文还论证了所提出方法的优点。该方法可以满足无线传感器网络在保密性、完整性、真实性、抗攻击能力、密钥连通性和数据新鲜度等方面的安全要求,但需要额外的硬件成本
{"title":"Chip-Based Key Distribution Technique for Security Enhancement in Hierarchical Wireless Sensors Networks","authors":"Naveen Kumar K, M. Nene","doi":"10.1109/IACC.2017.0079","DOIUrl":"https://doi.org/10.1109/IACC.2017.0079","url":null,"abstract":"Realization of an application using Wireless Sensor Networks (WSNs) using Sensor Nodes (SNs) brings in profound advantage of ad-hoc and flexible network deployment. Implementation of these networks face immense challenges due to short wireless range; along with limited power, storage & computational capabilities of SNs. Also, due to the tiny physical attributes of the SNs in WSNs, they are prone to physical attacks. In the context of WSNs, the physical attacks may range from destroying, lifting, replacing and adding new SNs. The work in this paper addresses the threats induced due to physical attacks and, further proposes a methodology to mitigate it. The methodology incorporates the use of newly proposed secured and efficient key distribution technique based on the additional commodity hardware Trusted Platform Module (TPM). Further, the paper demonstrates the merits of the proposed methodology. With some additional economical cost for the hardware, the proposed technique can fulfill the security requirement of WSNs, like confidentiality, integrity, authenticity, resilience to attack, key connectivity and data freshness","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Video Skimming for Lecture Video Sequences Using Histogram Based Low Level Features 使用基于直方图的低水平特征对讲座视频序列进行视频浏览
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0143
B. Subudhi, T. Veerakumar, Deepak Yadav, Amol P. Suryavanshi, S. N. Disha
In this article, we create a capsule of a lecture video using visual quality techniques which is a abstract of the lecture video. We first perform temporal segmentation to divide the video into number of shots. The activities of a lecture video can be divided into three categories: slide show, talking head, writing hand. We have developed a different and new approach for determining the quality of non-content and content frames crucial in the lecture video. Different features of the frame histogram are exploited to derive a quality factor for the detected frames. Hence we are able to extract high quality frames with high information content as well as few non content frames (talking head frames) for video clip selection. Finally in recreation of media to produce the capsule of the video, we select a video segments around these selected non content and content frames. Using this technique we are able to obtain a preview of the video which can be viewed in lesser time, hence it is beneficial to the viewers.
在这篇文章中,我们使用视觉质量技术创建了一个讲座视频的胶囊,这是一个讲座视频的抽象。我们首先进行时间分割,将视频分割成若干个镜头。讲座视频的活动可以分为三类:幻灯片、说话头、写字手。我们开发了一种不同的新方法来确定讲座视频中至关重要的非内容和内容框架的质量。利用帧直方图的不同特征为检测到的帧导出质量因子。因此,我们能够提取具有高信息量的高质量帧以及少量非内容帧(说话头帧)用于视频剪辑选择。最后在再创造媒体制作的视频胶囊中,我们围绕这些选定的非内容和内容框架选取一个视频片段。使用这种技术,我们能够获得视频的预览,可以在更短的时间内观看,因此它对观众是有益的。
{"title":"Video Skimming for Lecture Video Sequences Using Histogram Based Low Level Features","authors":"B. Subudhi, T. Veerakumar, Deepak Yadav, Amol P. Suryavanshi, S. N. Disha","doi":"10.1109/IACC.2017.0143","DOIUrl":"https://doi.org/10.1109/IACC.2017.0143","url":null,"abstract":"In this article, we create a capsule of a lecture video using visual quality techniques which is a abstract of the lecture video. We first perform temporal segmentation to divide the video into number of shots. The activities of a lecture video can be divided into three categories: slide show, talking head, writing hand. We have developed a different and new approach for determining the quality of non-content and content frames crucial in the lecture video. Different features of the frame histogram are exploited to derive a quality factor for the detected frames. Hence we are able to extract high quality frames with high information content as well as few non content frames (talking head frames) for video clip selection. Finally in recreation of media to produce the capsule of the video, we select a video segments around these selected non content and content frames. Using this technique we are able to obtain a preview of the video which can be viewed in lesser time, hence it is beneficial to the viewers.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of Intelligent Powerd Wheelchair 智能电动轮椅的研制
Pub Date : 1900-01-01 DOI: 10.1109/IACC.2017.0121
Ramachandra Kallam, Harish Sharma
Independent mobility is an important aspectof self-esteem and plays a pivotal role in ”aging in place”.The smart wheelchair is an effort to provide an independentmobility to those persons who are unable to travel freely. Asmart wheelchair is an amalgamation of a standard powerdriving modules and a collection of sensors with an interfacingsection.Input control signal may be given by means of wirelessjoystick or touchpad that can be mounted on armrest also.Thisfeature makes it useful for the disabled persons who are ableto control the joystick and touchpad, and also it can be helpfulfor the caregiver like a nurse. Ultrasonic and infrared sensorsystems are going to be integrated into this wheelchair forproviding best possible and safe movement.
独立行动能力是自尊的一个重要方面,在“原地老化”中起着关键作用。智能轮椅是为那些不能自由行走的人提供独立行动能力的一种努力。智能轮椅是标准动力驱动模块和具有接口部分的传感器集合的混合体。输入控制信号可以通过也可以安装在扶手上的无线操纵杆或触摸板来给出。这一功能使得它对能够控制操纵杆和触摸板的残疾人很有用,也可以帮助护理人员,如护士。超声波和红外传感器系统将被集成到轮椅上,以提供最好的和安全的运动。
{"title":"Development of Intelligent Powerd Wheelchair","authors":"Ramachandra Kallam, Harish Sharma","doi":"10.1109/IACC.2017.0121","DOIUrl":"https://doi.org/10.1109/IACC.2017.0121","url":null,"abstract":"Independent mobility is an important aspectof self-esteem and plays a pivotal role in ”aging in place”.The smart wheelchair is an effort to provide an independentmobility to those persons who are unable to travel freely. Asmart wheelchair is an amalgamation of a standard powerdriving modules and a collection of sensors with an interfacingsection.Input control signal may be given by means of wirelessjoystick or touchpad that can be mounted on armrest also.Thisfeature makes it useful for the disabled persons who are ableto control the joystick and touchpad, and also it can be helpfulfor the caregiver like a nurse. Ultrasonic and infrared sensorsystems are going to be integrated into this wheelchair forproviding best possible and safe movement.","PeriodicalId":248433,"journal":{"name":"2017 IEEE 7th International Advance Computing Conference (IACC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130196013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 IEEE 7th International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1