首页 > 最新文献

2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)最新文献

英文 中文
Advanced Determination of object location using IPS 使用IPS进行目标位置的高级确定
B. Sathish, Ganesan P, A. Ranganayakulu, D. S, S. Jagan Mohan Rao
In this manuscript the projected method overcome the drawback created by this current GPS, the alternate system of finding a human position. An alternating technique be term as IPS technique. Present GPS structure provide us the essential direct of people’s spot, although its most important problem is more difficult while the individual depart inside or if he enter consign which have an extremely deprived signal connectivity.
在这个手稿中,投影方法克服了当前GPS(寻找人类位置的替代系统)所造成的缺点。一种交替的技术被称为IPS技术。目前的GPS结构为我们提供了人们位置的基本指引,但其最主要的问题是当个人离开室内或进入信号连通性极差的寄主时更为困难。
{"title":"Advanced Determination of object location using IPS","authors":"B. Sathish, Ganesan P, A. Ranganayakulu, D. S, S. Jagan Mohan Rao","doi":"10.1109/ICACCS.2019.8728314","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728314","url":null,"abstract":"In this manuscript the projected method overcome the drawback created by this current GPS, the alternate system of finding a human position. An alternating technique be term as IPS technique. Present GPS structure provide us the essential direct of people’s spot, although its most important problem is more difficult while the individual depart inside or if he enter consign which have an extremely deprived signal connectivity.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel 2-Element Array of Perturbed Circular Patch for 5G Application 一种用于5G应用的新型2元微扰圆形贴片阵列
Rabindra Kumar Mishra, Ribhu Abhusan Panda, Udit Narayan Mohapatro, D. Mishra
This paper provides an idea about the design of the modified circular patch, leading to the biconcave lens structure. Two elements of these patches have been taken to provide a novel array of patch for the 5G communication. The minimum distance between both the arc of the biconcave patch has been taken same as that of the wavelength that is determined by the design frequency. Rotman lens equations have been taken into account for the accurate design of the biconcave patch. FR4-epoxy dielectric material has been used for substrate. HFSS (High Frequency Structure simulator) has been used for the simulation of the proposed structure. The S-Parameter, VSWR, Gain, Directivity, etc. are determined from the simulation results.
本文提出了一种改进的圆形贴片的设计思路,从而形成双凹透镜结构。这些补丁的两个元素被用来为5G通信提供一种新的补丁阵列。双凹面贴片的两个圆弧之间的最小距离与由设计频率确定的波长的最小距离相同。为了精确地设计双凹面贴片,考虑了罗特曼透镜方程。采用fr4 -环氧介电材料作为衬底。HFSS(高频结构模拟器)已被用于模拟所提出的结构。根据仿真结果确定了s参数、驻波比、增益、指向性等参数。
{"title":"A Novel 2-Element Array of Perturbed Circular Patch for 5G Application","authors":"Rabindra Kumar Mishra, Ribhu Abhusan Panda, Udit Narayan Mohapatro, D. Mishra","doi":"10.1109/ICACCS.2019.8728464","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728464","url":null,"abstract":"This paper provides an idea about the design of the modified circular patch, leading to the biconcave lens structure. Two elements of these patches have been taken to provide a novel array of patch for the 5G communication. The minimum distance between both the arc of the biconcave patch has been taken same as that of the wavelength that is determined by the design frequency. Rotman lens equations have been taken into account for the accurate design of the biconcave patch. FR4-epoxy dielectric material has been used for substrate. HFSS (High Frequency Structure simulator) has been used for the simulation of the proposed structure. The S-Parameter, VSWR, Gain, Directivity, etc. are determined from the simulation results.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128347197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characterization of Facial Expression using Deep Neural Networks 用深度神经网络表征面部表情
N. Sharma, Charvi Jain
Deep learning plays a significant role in the advancement of computer vision by improving the speed and accuracy to the assigned tasks. It is opening opportunities for improvement and enhancement of processes and to initiate the human-driven tasks in an automated manner. On the basis of this growth, deep-learning algorithms are finding applications in the field CNN and RNN. The key advantage of Deep Learning algorithm is that manually extraction of features from the image is not required. The network extracts the features while training. The only input required is to provide the image to the network. The CNN’s and RNN’s have given state-of-the art results on numerous classification tasks. The Deep learning algorithm are designed for feature detection / extraction, classification and recognition of the object. The key advantage of a CNN is to remove or reduce the reliance on physics-based models, other processing methods by enabling complete learning directly from the input images of the object. The CNN and RNN together has given effective results in the area of face recognition, object recognition, scene understanding and facial expression recognition.
深度学习通过提高对指定任务的速度和准确性,在计算机视觉的进步中发挥着重要作用。它为改进和增强流程以及以自动化的方式启动人工驱动的任务提供了机会。在这种增长的基础上,深度学习算法在CNN和RNN领域得到了应用。深度学习算法的主要优点是不需要手动从图像中提取特征。网络在训练时提取特征。唯一需要的输入是将图像提供给网络。CNN和RNN在许多分类任务上给出了最先进的结果。深度学习算法是为目标的特征检测/提取、分类和识别设计的。CNN的主要优势是通过直接从对象的输入图像中完成学习,消除或减少了对基于物理模型的依赖,其他处理方法。CNN和RNN的结合在人脸识别、物体识别、场景理解和面部表情识别等方面都取得了很好的效果。
{"title":"Characterization of Facial Expression using Deep Neural Networks","authors":"N. Sharma, Charvi Jain","doi":"10.1109/ICACCS.2019.8728386","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728386","url":null,"abstract":"Deep learning plays a significant role in the advancement of computer vision by improving the speed and accuracy to the assigned tasks. It is opening opportunities for improvement and enhancement of processes and to initiate the human-driven tasks in an automated manner. On the basis of this growth, deep-learning algorithms are finding applications in the field CNN and RNN. The key advantage of Deep Learning algorithm is that manually extraction of features from the image is not required. The network extracts the features while training. The only input required is to provide the image to the network. The CNN’s and RNN’s have given state-of-the art results on numerous classification tasks. The Deep learning algorithm are designed for feature detection / extraction, classification and recognition of the object. The key advantage of a CNN is to remove or reduce the reliance on physics-based models, other processing methods by enabling complete learning directly from the input images of the object. The CNN and RNN together has given effective results in the area of face recognition, object recognition, scene understanding and facial expression recognition.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124576065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Text Mining Techniques 文本挖掘技术综述
Sayali Sunil Tandel, A. Jamadar, Siddharth Dudugu
As there is fast growth in digital data collection techniques it has made way for large amount of data. Greater than 85% of present day data is comprised of unsaturated and unstructured data. Determining the definite patterns and trends to examine a textual data is biggest issue in text mining The various domains associated together in data mining are text mining, web mining, graph mining, and sequencing mining. The selection of proper and correct technique of text mining enhances the hustle and by lowering the period and struggle done to mine important information. Here, we talk about text data mining, various techniques of text data mining and also application of text data mining. Text data mining is used for obtaining stimulating and fascinating designs from the unsaturated texts which are derived from various sources. It changes words, phrases and sentences of an unstructured information into mathematical value linking with the saturated information in the database and analyses it with traditional data mining techniques. Information extraction, information retrieval, summarization, categorization and clustering are the different techniques of text mining.
随着数字数据收集技术的快速发展,它为大量数据让路。目前超过85%的数据是由不饱和和非结构化数据组成的。确定确定的模式和趋势来检查文本数据是文本挖掘中最大的问题。数据挖掘中相关的各个领域有文本挖掘、web挖掘、图挖掘和序列挖掘。选择合适、正确的文本挖掘技术,可以降低重要信息挖掘的周期和工作量,提高挖掘效率。本文主要讨论了文本数据挖掘、文本数据挖掘的各种技术以及文本数据挖掘的应用。文本数据挖掘用于从各种来源的不饱和文本中获得令人兴奋和吸引人的设计。它将非结构化信息中的词、短语、句子等转化为与数据库中饱和信息相关联的数学值,并用传统的数据挖掘技术对其进行分析。信息抽取、信息检索、摘要、分类和聚类是文本挖掘的不同技术。
{"title":"A Survey on Text Mining Techniques","authors":"Sayali Sunil Tandel, A. Jamadar, Siddharth Dudugu","doi":"10.1109/ICACCS.2019.8728547","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728547","url":null,"abstract":"As there is fast growth in digital data collection techniques it has made way for large amount of data. Greater than 85% of present day data is comprised of unsaturated and unstructured data. Determining the definite patterns and trends to examine a textual data is biggest issue in text mining The various domains associated together in data mining are text mining, web mining, graph mining, and sequencing mining. The selection of proper and correct technique of text mining enhances the hustle and by lowering the period and struggle done to mine important information. Here, we talk about text data mining, various techniques of text data mining and also application of text data mining. Text data mining is used for obtaining stimulating and fascinating designs from the unsaturated texts which are derived from various sources. It changes words, phrases and sentences of an unstructured information into mathematical value linking with the saturated information in the database and analyses it with traditional data mining techniques. Information extraction, information retrieval, summarization, categorization and clustering are the different techniques of text mining.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124692793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trust Computation Framework based on User Behavior and Recommendation in Cloud Computing 云计算中基于用户行为和推荐的信任计算框架
T. Mujawar, L. B. Bhajantri
Cloud computing provides shared environment for different resources and services that are available for users at anytime and from anywhere. Cloud computing has gained considerable attention of users and businesses. However, security concern is one of the major hurdles for acceptance of cloud computing. In order to guarantee security of data, it is necessary to grant access of data, only to authorized users. The traditional system applies different access policies and permission while granting access to any user. The analysis of user behavior is also important aspect, which can be integrated into access control model. In this paper, the trust computation model is presented that takes user behavior into consideration while providing access to the cloud data. The recommendation for the user is also one of the important components to assess user behavior. The proposed model evaluates trustworthiness of user on basis of reputation and recommendation. With the advent in machine learning techniques, applying learning based techniques in security domain has gained lots of popularity. In the proposed method, the machine learning technique (k-means clustering Algorithm) is incorporated in the trust computation process and the users are classified according their trust values.
云计算为用户随时随地可用的不同资源和服务提供共享环境。云计算已经引起了用户和企业的广泛关注。然而,安全问题是接受云计算的主要障碍之一。为了保证数据的安全性,有必要将数据的访问权限授予授权用户。传统的系统在授予任何用户访问权限时,采用不同的访问策略和权限。用户行为分析也是一个重要方面,可以将其集成到访问控制模型中。本文在提供对云数据的访问时,提出了考虑用户行为的信任计算模型。对用户的推荐也是评估用户行为的重要组成部分之一。该模型基于信誉和推荐对用户的可信度进行评估。随着机器学习技术的出现,基于学习的技术在安全领域的应用得到了广泛的应用。该方法将机器学习技术(k-means聚类算法)引入到信任计算过程中,并根据用户的信任值对用户进行分类。
{"title":"Trust Computation Framework based on User Behavior and Recommendation in Cloud Computing","authors":"T. Mujawar, L. B. Bhajantri","doi":"10.1109/ICACCS.2019.8728484","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728484","url":null,"abstract":"Cloud computing provides shared environment for different resources and services that are available for users at anytime and from anywhere. Cloud computing has gained considerable attention of users and businesses. However, security concern is one of the major hurdles for acceptance of cloud computing. In order to guarantee security of data, it is necessary to grant access of data, only to authorized users. The traditional system applies different access policies and permission while granting access to any user. The analysis of user behavior is also important aspect, which can be integrated into access control model. In this paper, the trust computation model is presented that takes user behavior into consideration while providing access to the cloud data. The recommendation for the user is also one of the important components to assess user behavior. The proposed model evaluates trustworthiness of user on basis of reputation and recommendation. With the advent in machine learning techniques, applying learning based techniques in security domain has gained lots of popularity. In the proposed method, the machine learning technique (k-means clustering Algorithm) is incorporated in the trust computation process and the users are classified according their trust values.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127049400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach towards Iris Segmentation and Authentication using Local Chan-Vese Method 一种基于局部Chan-Vese方法的虹膜分割与认证新方法
S. Pattar
Iris segmentation has been an especially interesting research area from the last decade due to the increased security conditions for the sophisticated personal identification ideas based on biometrics. The rich distinctive and stable textural information of the iris models make iris a biometric modality for identifying each person correctly and reliably. Most recent iris segmentation techniques show the high segmentation accuracies in cooperative environments. However, the iris image segmentation remains a difficult topic. In this frame work, we proposed an innovative model as an improvement of Chan-Vese technique by incorporating B spline approach to perform iris segmentation. Proposed scheme has added enhanced segmentation for non-ideal iris images in visible light. The GLCM (Gray Level Co-occurrence Matrix) and LBP (Local Binary Pattern) are employed for feature extraction. This scheme is able to perform all the associated treating in 1-dimension as the B-spline task is divisible and is built as the result of n-1) , 1- D, B-splines. This presents superior control compared to other methods. Experimental results displays that the proposed iris segmentation technique considerably minimizes the required time to segment the iris without affecting the segmentation precision. The main benefits of this algorithm are: First, it can deal with the accurate recognition of smoothobjects. Second one is, it can powerfully handle the noisy images. Therefore, thereal boundaries are conserved and correctly distinguished. Additionally the comparison outcomes with related iris segmentation methods show the superiority of the proposed work in terms of segmentation accuracy and recognition performance. The NICE. I iris image database is used to compute the performance of the proposed technique.
由于基于生物识别技术的复杂个人身份识别思想的安全性提高,虹膜分割在过去十年中一直是一个特别有趣的研究领域。虹膜模型丰富、独特、稳定的纹理信息使虹膜成为正确、可靠地识别每个人的生物识别方式。最近的虹膜分割技术在协作环境下显示出较高的分割精度。然而,虹膜图像分割一直是一个难点。在此框架下,我们提出了一种创新的模型,作为Chan-Vese技术的改进,结合B样条方法进行虹膜分割。该方案增加了对可见光下非理想虹膜图像的增强分割。采用灰度共生矩阵(GLCM)和局部二值模式(LBP)进行特征提取。由于b样条任务是可分的,因此该方案能够在1维中执行所有相关处理,并且是根据n-1), 1- D, b样条的结果构建的。与其他方法相比,这提供了更好的控制。实验结果表明,本文提出的虹膜分割方法在不影响分割精度的前提下,大大减少了虹膜分割所需的时间。该算法的主要优点是:首先,它可以处理光滑物体的准确识别。其次,它可以有效地处理噪声图像。因此,实际边界是守恒的,并且是正确区分的。此外,与相关虹膜分割方法的比较结果表明,本文方法在分割精度和识别性能方面具有优越性。的好。利用虹膜图像数据库计算了该方法的性能。
{"title":"A Novel Approach towards Iris Segmentation and Authentication using Local Chan-Vese Method","authors":"S. Pattar","doi":"10.1109/ICACCS.2019.8728441","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728441","url":null,"abstract":"Iris segmentation has been an especially interesting research area from the last decade due to the increased security conditions for the sophisticated personal identification ideas based on biometrics. The rich distinctive and stable textural information of the iris models make iris a biometric modality for identifying each person correctly and reliably. Most recent iris segmentation techniques show the high segmentation accuracies in cooperative environments. However, the iris image segmentation remains a difficult topic. In this frame work, we proposed an innovative model as an improvement of Chan-Vese technique by incorporating B spline approach to perform iris segmentation. Proposed scheme has added enhanced segmentation for non-ideal iris images in visible light. The GLCM (Gray Level Co-occurrence Matrix) and LBP (Local Binary Pattern) are employed for feature extraction. This scheme is able to perform all the associated treating in 1-dimension as the B-spline task is divisible and is built as the result of n-1) , 1- D, B-splines. This presents superior control compared to other methods. Experimental results displays that the proposed iris segmentation technique considerably minimizes the required time to segment the iris without affecting the segmentation precision. The main benefits of this algorithm are: First, it can deal with the accurate recognition of smoothobjects. Second one is, it can powerfully handle the noisy images. Therefore, thereal boundaries are conserved and correctly distinguished. Additionally the comparison outcomes with related iris segmentation methods show the superiority of the proposed work in terms of segmentation accuracy and recognition performance. The NICE. I iris image database is used to compute the performance of the proposed technique.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mutated Salp Swarm Algorithm for Optimization of Support Vector Machine Parameters 支持向量机参数优化的突变Salp群算法
R. Rajalaxmi, E. Vidhya
Support Vector Machine (SVM) is typically a supervised learning algorithm that carefully examines input and identifies distinct patterns. The function of SVM classifier relies on adjusting or controlling of kernel and penalty parameter values. Nature Inspired Algorithm helps to solve the natural problems and has been attracting considerable attention due to their better performance. Salp Swarm Algorithm (SSA) is a Nature Inspired Algorithm (NIA) which is used to control the finest SVM parameters value. To improve exploration capability of SSA, mutation method is developed to find the optimal value for kernel parameter and penalty parameter. The preliminary result indicates Mutated SSA with SVM increases classification accuracy than simple SSA with SVM.
支持向量机(SVM)是一种典型的监督学习算法,它仔细检查输入并识别不同的模式。支持向量机分类器的功能依赖于核参数和惩罚参数值的调节或控制。自然启发算法有助于解决自然问题,并因其较好的性能而受到广泛关注。Salp Swarm Algorithm (SSA)是一种自然启发算法(NIA),用于控制支持向量机参数的最优值。为了提高SSA的搜索能力,提出了一种寻找核参数和惩罚参数最优值的变异方法。初步结果表明,基于支持向量机的突变SSA比基于支持向量机的简单SSA分类精度更高。
{"title":"A Mutated Salp Swarm Algorithm for Optimization of Support Vector Machine Parameters","authors":"R. Rajalaxmi, E. Vidhya","doi":"10.1109/ICACCS.2019.8728416","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728416","url":null,"abstract":"Support Vector Machine (SVM) is typically a supervised learning algorithm that carefully examines input and identifies distinct patterns. The function of SVM classifier relies on adjusting or controlling of kernel and penalty parameter values. Nature Inspired Algorithm helps to solve the natural problems and has been attracting considerable attention due to their better performance. Salp Swarm Algorithm (SSA) is a Nature Inspired Algorithm (NIA) which is used to control the finest SVM parameters value. To improve exploration capability of SSA, mutation method is developed to find the optimal value for kernel parameter and penalty parameter. The preliminary result indicates Mutated SSA with SVM increases classification accuracy than simple SSA with SVM.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130585739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Study On Zigbee Body Controlling System Zigbee本体控制系统的研究
T. Tamilselvan, Rekha Marimuthu
Security and health care became more complicated now-a-days. IOT, AI and remote monitoring system stared to growing with huge impact in medical field. Let us consider "OUR SHADOW BE OUR DOCTOR ". A wireless system for monitoring, Storing and processing of patient health data. ZigBee Body controlling (ZBC) begins with getting data from various device either inserted in human body or gadgets externally connected to human parts. Next level involves the processing of data. The processing takes place continuously from the time when device and login begins. Then three modules will be taken place. First module is default module; it keeps on running throughout the life span. In case any of the devices connected stopped working it starts warning alert the patient, emergency contact and data canter. This module is capable of initiating the ZigBee to send a SOS message. Second module involve the alerting the patient in starting stage of any malfunction. For example, Temperature of his living area goes beyond the temperature level prescribed by consulting doctor, Patient will be getting a mobile alert shows that "Temperature increasing, Certain degrees high reduce now". This saves the patient from danger. Third module is emergency module; this module gets executed during critical situation. Let us consider, it’s a sudden heart attack, patient is unable to take remedy. At that time ZigBee start sending message to trust person of patient, nearby hospital Consulting doctor and ambulance near to patient. Location can be tracked with the help of RFID, VPS and GPS. Ambulance drivers once accepted the notification via message; he will automatically get an online Google map showing the patient location and the nearby hospital location. Once ambulance stared moving, condition of the patient get processed along with old data about the patient stored in cloud. The processed data will be forwarded to the nearby hospital. Nearby hospital doctor or hospital get a temporary access to patient cloud data, doctor will be able to add his treatment report and also able to view the data which are assigned in private visibility by patient personal doctor.
如今,安全和医疗保健变得更加复杂了。物联网、人工智能和远程监控系统开始发展,对医疗领域产生了巨大影响。让我们考虑一下“影子就是医生”。用于监测、存储和处理病人健康数据的无线系统。ZigBee身体控制(ZBC)首先从插入人体或外部连接到人体部位的各种设备获取数据。下一个层次涉及数据处理。处理从设备和登录开始时开始连续进行。然后将进行三个模块。第一个模块是默认模块;它在整个生命周期中不断运行。如果连接的任何设备停止工作,它会开始警告,提醒患者,紧急联系人和数据中心。该模块能够启动ZigBee发送SOS消息。第二个模块包括在启动阶段提醒患者任何故障。例如,患者居住区域的温度超过了咨询医生规定的温度水平,患者将收到一个移动警报,显示“温度升高,现在有一定程度的高温降低”。这使病人免于危险。第三模块是应急模块;该模块在紧急情况下执行。让我们考虑一下,这是一次突发心脏病,病人是无法采取补救措施的。当时ZigBee开始向信任病人的人、附近的医院咨询医生和病人附近的救护车发送信息。位置可以通过RFID、VPS和GPS进行跟踪。救护车司机曾通过短信接受通知;他就会自动获得一张在线谷歌地图,上面显示了病人的位置和附近医院的位置。一旦救护车开始移动,病人的情况就会随着储存在云端的病人的旧数据一起得到处理。处理后的数据将被转发到附近的医院。附近的医院医生或医院可以临时访问患者云数据,医生将能够添加他的治疗报告,也能够查看由患者私人医生分配的私人可见数据。
{"title":"A Study On Zigbee Body Controlling System","authors":"T. Tamilselvan, Rekha Marimuthu","doi":"10.1109/ICACCS.2019.8728374","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728374","url":null,"abstract":"Security and health care became more complicated now-a-days. IOT, AI and remote monitoring system stared to growing with huge impact in medical field. Let us consider \"OUR SHADOW BE OUR DOCTOR \". A wireless system for monitoring, Storing and processing of patient health data. ZigBee Body controlling (ZBC) begins with getting data from various device either inserted in human body or gadgets externally connected to human parts. Next level involves the processing of data. The processing takes place continuously from the time when device and login begins. Then three modules will be taken place. First module is default module; it keeps on running throughout the life span. In case any of the devices connected stopped working it starts warning alert the patient, emergency contact and data canter. This module is capable of initiating the ZigBee to send a SOS message. Second module involve the alerting the patient in starting stage of any malfunction. For example, Temperature of his living area goes beyond the temperature level prescribed by consulting doctor, Patient will be getting a mobile alert shows that \"Temperature increasing, Certain degrees high reduce now\". This saves the patient from danger. Third module is emergency module; this module gets executed during critical situation. Let us consider, it’s a sudden heart attack, patient is unable to take remedy. At that time ZigBee start sending message to trust person of patient, nearby hospital Consulting doctor and ambulance near to patient. Location can be tracked with the help of RFID, VPS and GPS. Ambulance drivers once accepted the notification via message; he will automatically get an online Google map showing the patient location and the nearby hospital location. Once ambulance stared moving, condition of the patient get processed along with old data about the patient stored in cloud. The processed data will be forwarded to the nearby hospital. Nearby hospital doctor or hospital get a temporary access to patient cloud data, doctor will be able to add his treatment report and also able to view the data which are assigned in private visibility by patient personal doctor.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114355594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficient magnetic materials for Electrical Machines 电机用节能磁性材料
Md Mojibur Rahaman, K. Sandhu
The Magnetic material is the fundamental player in the structural parts of the core of machines. Selection of suitable material for Electrical machine is one of the primary design considerations which has a significant impact on the power density and efficiency of the machine. This paper presents a different kind of soft magnetic materials, which might be used for manufacturing of magnetic cores of energy-efficient electrical machines. The characteristics of these materials are compared and the comparison is made through the performance of machines for the magnetic circuit. With the help of MATLAB coding, the performance of the materials is compared as Induction Machine as well as Transformer operation separately.
磁性材料是机器核心结构部件的基本成分。选择合适的电机材料是电机设计的主要考虑因素之一,它对电机的功率密度和效率有重要的影响。本文介绍了一种可用于制造节能电机磁芯的新型软磁材料。对这些材料的特性进行了比较,并通过磁路机械的性能进行了比较。借助MATLAB编码,分别比较了材料在感应电机和变压器运行时的性能。
{"title":"Energy Efficient magnetic materials for Electrical Machines","authors":"Md Mojibur Rahaman, K. Sandhu","doi":"10.1109/ICACCS.2019.8728342","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728342","url":null,"abstract":"The Magnetic material is the fundamental player in the structural parts of the core of machines. Selection of suitable material for Electrical machine is one of the primary design considerations which has a significant impact on the power density and efficiency of the machine. This paper presents a different kind of soft magnetic materials, which might be used for manufacturing of magnetic cores of energy-efficient electrical machines. The characteristics of these materials are compared and the comparison is made through the performance of machines for the magnetic circuit. With the help of MATLAB coding, the performance of the materials is compared as Induction Machine as well as Transformer operation separately.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"103 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113990118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Systematic Erudition of Bitcoin Price Prediction using Machine Learning Techniques 基于机器学习技术的比特币价格预测系统研究
Prachi Rane, Sudhir Dhage
Bitcoin (BTC) is an internet-based world’s top-ranking cryptocurrency. Among widespread cryptocurrencies available in the market, Bitcoin is most experienced by the people due to anonymity and transparency in the system. Daily trends in the Bitcoin market has gained popularity among the spectators, investors, consumers and many more. Bitcoin price data exhibit desirable properties where some classical time series prediction methods exploit the behavior, producing poor predictions and also lack a probabilistic interpretation. This paper conducts an in-depth study on evolution of Bitcoin and also a systematic review is done on various machine learning algorithms used for predicting the prices. Comparative analysis envisions to select optimal technique to forecast prices more precisely.
比特币(BTC)是一种基于互联网的世界顶级加密货币。在市场上广泛使用的加密货币中,由于系统的匿名性和透明度,比特币最受人们的欢迎。比特币市场的每日趋势在观众、投资者、消费者和更多的人中得到了普及。比特币价格数据表现出令人满意的特性,而一些经典的时间序列预测方法利用了这种行为,产生了糟糕的预测,也缺乏概率解释。本文对比特币的演变进行了深入的研究,并对用于预测价格的各种机器学习算法进行了系统的回顾。对比分析旨在选择最优的技术来更准确地预测价格。
{"title":"Systematic Erudition of Bitcoin Price Prediction using Machine Learning Techniques","authors":"Prachi Rane, Sudhir Dhage","doi":"10.1109/ICACCS.2019.8728424","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728424","url":null,"abstract":"Bitcoin (BTC) is an internet-based world’s top-ranking cryptocurrency. Among widespread cryptocurrencies available in the market, Bitcoin is most experienced by the people due to anonymity and transparency in the system. Daily trends in the Bitcoin market has gained popularity among the spectators, investors, consumers and many more. Bitcoin price data exhibit desirable properties where some classical time series prediction methods exploit the behavior, producing poor predictions and also lack a probabilistic interpretation. This paper conducts an in-depth study on evolution of Bitcoin and also a systematic review is done on various machine learning algorithms used for predicting the prices. Comparative analysis envisions to select optimal technique to forecast prices more precisely.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1