首页 > 最新文献

2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)最新文献

英文 中文
Data Prefetching for Heterogeneous Hadoop Cluster 异构Hadoop集群的数据预取
D. Vinutha, G. Raju
Hadoop is an open source implementation of MapReduce. Performance of Hadoop is affected by the overhead of communication during the transmission of large datasets to the computing node. In a heterogeneous cluster if a map task wants to process the data, which is not present in the local disk then the data transmission overhead occurs. To overcome this issue, Data Prefetching for Heterogeneous Hadoop cluster for resource optimization is proposed. data prefetching is used to fetch the input data in advance from the remote node to a particular computing node. Hence transmission of data occurs in parallel with data processing and the job execution time is reduced. Different MapReduce jobs are used to conduct the experiment. The results demonstrate that the time taken to transmit the data is reduced. The job execution time is reduced by 15% for the input data size greater than or equal to 2GB and performance improvement of 25% is obtained for 64MB block size.
Hadoop是MapReduce的开源实现。在向计算节点传输大型数据集的过程中,通信开销会影响Hadoop的性能。在异构集群中,如果map任务想要处理本地磁盘中不存在的数据,则会产生数据传输开销。为了解决这一问题,提出了异构Hadoop集群数据预取的方法。数据预取是将输入的数据从远程节点提前提取到特定的计算节点。因此,数据传输与数据处理并行进行,减少了作业的执行时间。使用不同的MapReduce作业进行实验。结果表明,传输数据所花费的时间减少了。当输入数据大小大于或等于2GB时,作业执行时间减少15%,当块大小为64MB时,性能提高25%。
{"title":"Data Prefetching for Heterogeneous Hadoop Cluster","authors":"D. Vinutha, G. Raju","doi":"10.1109/ICACCS.2019.8728373","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728373","url":null,"abstract":"Hadoop is an open source implementation of MapReduce. Performance of Hadoop is affected by the overhead of communication during the transmission of large datasets to the computing node. In a heterogeneous cluster if a map task wants to process the data, which is not present in the local disk then the data transmission overhead occurs. To overcome this issue, Data Prefetching for Heterogeneous Hadoop cluster for resource optimization is proposed. data prefetching is used to fetch the input data in advance from the remote node to a particular computing node. Hence transmission of data occurs in parallel with data processing and the job execution time is reduced. Different MapReduce jobs are used to conduct the experiment. The results demonstrate that the time taken to transmit the data is reduced. The job execution time is reduced by 15% for the input data size greater than or equal to 2GB and performance improvement of 25% is obtained for 64MB block size.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fingertip Based Estimation Of Heart Rate Using Photoplethysmography 基于指尖的光电容积脉搏图估计心率
Yamuna Aarthi, B. Karthikeyan, N. Raj, M. Ganesan
Photoplethysmograph (PPG) is low cost, portable and simple optical technique used to monitor cardiovascular related parameters such as heart rate, blood pressure, cardiac output, oxygen saturation of blood, respiratory rate and many such parameters. In recent times, PPG has gained popularity due to its ease of measuring from the user’s fingertips and its wearable nature. The measurements are taken preferably on the fingertips of the skin surface which has maximum nerve endings. In this paper, the PPG signal is obtained from the human subjects with the data acquisition system using Arduino board and Maxim Integrated sensor. Then signal processing is performed for removing baseline wander, motion artifacts and filtering of the signal for peak detection using the algorithm developed in MATLAB. The heart rate is calculated for 5 subjects using the maxim sensor kept on the finger tip. The capnobase database of various subjects of different ages is obtained for estimation of Heart Rate Variability and Signal to Noise Ratio. The peak detection algorithm shows maximum accuracy which is validated with capnobase labels.
Photoplethysmograph (PPG)是一种低成本、便携、简单的光学技术,用于监测心血管相关参数,如心率、血压、心输出量、血氧饱和度、呼吸频率等。近年来,PPG因其易于从用户的指尖测量和可穿戴性而受到欢迎。最好在具有最大神经末梢的皮肤表面的指尖上进行测量。在本文中,利用Arduino板和Maxim集成传感器的数据采集系统获取人体受试者的PPG信号。然后利用MATLAB开发的算法对信号进行处理,去除基线漂移、运动伪影,滤波信号进行峰值检测。使用放置在指尖的最大心率传感器计算5名受试者的心率。获得不同年龄受试者的capnobase数据库,用于估计心率变异性和信噪比。峰检测算法显示出最高的准确性,并与capnobase标签进行了验证。
{"title":"Fingertip Based Estimation Of Heart Rate Using Photoplethysmography","authors":"Yamuna Aarthi, B. Karthikeyan, N. Raj, M. Ganesan","doi":"10.1109/ICACCS.2019.8728432","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728432","url":null,"abstract":"Photoplethysmograph (PPG) is low cost, portable and simple optical technique used to monitor cardiovascular related parameters such as heart rate, blood pressure, cardiac output, oxygen saturation of blood, respiratory rate and many such parameters. In recent times, PPG has gained popularity due to its ease of measuring from the user’s fingertips and its wearable nature. The measurements are taken preferably on the fingertips of the skin surface which has maximum nerve endings. In this paper, the PPG signal is obtained from the human subjects with the data acquisition system using Arduino board and Maxim Integrated sensor. Then signal processing is performed for removing baseline wander, motion artifacts and filtering of the signal for peak detection using the algorithm developed in MATLAB. The heart rate is calculated for 5 subjects using the maxim sensor kept on the finger tip. The capnobase database of various subjects of different ages is obtained for estimation of Heart Rate Variability and Signal to Noise Ratio. The peak detection algorithm shows maximum accuracy which is validated with capnobase labels.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blood Transfusion System Using Data Mining Techniques and GRA 基于数据挖掘技术和GRA的输血系统
Kanishk Agarwal, M. Gupta, Khushboo Gupta, Arshad Khan, M. Nallakaruppan
We are suggesting a blood transfusion system based on various data mining algorithms. We have applied and compared various algorithms such as Decision tree, Random forest and logistic regression, before and after applying GRA. The algorithm with most efficiency will be used to develop a system for predicting the nature of a blood donor, based on past data of donation. The prediction will be useful at various blood donation camps for contacting the donors, in case of a requirement.
我们建议建立一个基于各种数据挖掘算法的输血系统。我们应用并比较了各种算法,如决策树,随机森林和逻辑回归,前后应用GRA。最有效的算法将用于开发以过去的献血数据为基础的预测献血者性质的系统。在需要的情况下,这个预测将对各个献血营地联系献血者很有用。
{"title":"Blood Transfusion System Using Data Mining Techniques and GRA","authors":"Kanishk Agarwal, M. Gupta, Khushboo Gupta, Arshad Khan, M. Nallakaruppan","doi":"10.1109/ICACCS.2019.8728401","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728401","url":null,"abstract":"We are suggesting a blood transfusion system based on various data mining algorithms. We have applied and compared various algorithms such as Decision tree, Random forest and logistic regression, before and after applying GRA. The algorithm with most efficiency will be used to develop a system for predicting the nature of a blood donor, based on past data of donation. The prediction will be useful at various blood donation camps for contacting the donors, in case of a requirement.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
3D Visualization and Localization of Radiation Source in External Radiotherapy Using Inverse linear Boltzmann Transport Equation 利用逆线性玻尔兹曼输运方程实现外置放疗中辐射源的三维可视化与定位
Akash Awasthi, A. Vamsi, Vibhuti Duggal, P. Deepalakshmi, S. Rao
The location of the source in case of radiotherapy is an important aspect because it directly affects the target medium. There are mainly two types of radio therapies namely external radiotherapy and brachytherapy. For our study, we are considering the external radiotherapy in which the source is located at some distance from the target body. Source produces the radiation which may be photon beam or electron radiation. In this study, we are assuming photons which do not interact with each other but interacts with materials particles unless and until magnetic field is present. This radiation destroys the tumorous tissues present in the target body. But during this process, lot of care should be taken so that the healthy tissue should not get damaged. In Radiotherapy Source Localization System (RSLS), dose distribution on the patient’s body is known and it needs to calculate the distance between each point of the target and source. So, hereby, we are proposing an algorithm for CPU/GPU to calculate correct position of the source using inverse Linear Boltzmann Transport Equation (LBTE). It can also be used as a radiation protection programme for removal of unwanted resources.
在放射治疗中,辐射源的位置是一个重要的方面,因为它直接影响到靶介质。放射治疗主要有两种,即外放射治疗和近距离放射治疗。在我们的研究中,我们考虑的是源距离靶体有一定距离的外置放疗。光源产生的辐射可能是光子束或电子辐射。在这项研究中,我们假设光子不相互作用,但与材料粒子相互作用,除非磁场存在。这种辐射会破坏目标体内的肿瘤组织。但是在这个过程中,要非常小心,这样健康的组织才不会受到损害。在放疗源定位系统(RSLS)中,剂量在患者体内的分布是已知的,需要计算靶点与辐射源各点之间的距离。因此,在此,我们提出了一种CPU/GPU使用逆线性玻尔兹曼输运方程(LBTE)计算源正确位置的算法。它还可以作为一种辐射防护程序,用于清除不需要的资源。
{"title":"3D Visualization and Localization of Radiation Source in External Radiotherapy Using Inverse linear Boltzmann Transport Equation","authors":"Akash Awasthi, A. Vamsi, Vibhuti Duggal, P. Deepalakshmi, S. Rao","doi":"10.1109/ICACCS.2019.8728488","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728488","url":null,"abstract":"The location of the source in case of radiotherapy is an important aspect because it directly affects the target medium. There are mainly two types of radio therapies namely external radiotherapy and brachytherapy. For our study, we are considering the external radiotherapy in which the source is located at some distance from the target body. Source produces the radiation which may be photon beam or electron radiation. In this study, we are assuming photons which do not interact with each other but interacts with materials particles unless and until magnetic field is present. This radiation destroys the tumorous tissues present in the target body. But during this process, lot of care should be taken so that the healthy tissue should not get damaged. In Radiotherapy Source Localization System (RSLS), dose distribution on the patient’s body is known and it needs to calculate the distance between each point of the target and source. So, hereby, we are proposing an algorithm for CPU/GPU to calculate correct position of the source using inverse Linear Boltzmann Transport Equation (LBTE). It can also be used as a radiation protection programme for removal of unwanted resources.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132071001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Shopping Basket Technobask 自动购物篮技术篮子
D. Thote, Sailee Parsewar, Arushi Welekar, Naved Sheikh, Rachita Dhakate, Rukhsar Sheikh
After shopping products in supermarkets, at the time of billing, we have to wait in long queues for quite a long time, which is very hectic and tiresome task, hence we have thought of creating a shopping basket that eases the problem mentioned above and hence increases the efficiency of management in supermarkets. Now-a-days, electronics and commerce goes hand in hand, hence, this product will help in increasing the efficient use of time and assets of company as well as consumers. A modern, futuristic product is the one that is the good in comforting, convenient and efficient in everyday life. Basic idea that made us think of making this product is to ease the shopping experience, and make it even relaxing rather than thinking of waiting in long queues and have a headache. The main goal is to provide a technology oriented, easily possible and useful system for efficient shopping for a person.
在超市购物后,在结账的时候,我们要排很长时间的队,这是一项非常忙碌和厌倦的任务,因此我们想到了创造一个购物篮来缓解上述问题,从而提高超市的管理效率。如今,电子和商业齐头并进,因此,该产品将有助于提高公司和消费者的时间和资产的有效利用。现代的、未来的产品是指在日常生活中舒适、方便、高效的产品。让我们想到做这个产品的基本想法是让购物体验更轻松,让它甚至放松,而不是想到排长队等待和头痛。主要目标是为人们提供一个以技术为导向,易于实现和有用的高效购物系统。
{"title":"Automatic Shopping Basket Technobask","authors":"D. Thote, Sailee Parsewar, Arushi Welekar, Naved Sheikh, Rachita Dhakate, Rukhsar Sheikh","doi":"10.1109/ICACCS.2019.8728309","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728309","url":null,"abstract":"After shopping products in supermarkets, at the time of billing, we have to wait in long queues for quite a long time, which is very hectic and tiresome task, hence we have thought of creating a shopping basket that eases the problem mentioned above and hence increases the efficiency of management in supermarkets. Now-a-days, electronics and commerce goes hand in hand, hence, this product will help in increasing the efficient use of time and assets of company as well as consumers. A modern, futuristic product is the one that is the good in comforting, convenient and efficient in everyday life. Basic idea that made us think of making this product is to ease the shopping experience, and make it even relaxing rather than thinking of waiting in long queues and have a headache. The main goal is to provide a technology oriented, easily possible and useful system for efficient shopping for a person.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advanced Design of Wireless Communication Network for Building Monitoring 楼宇监控无线通信网络的先进设计
B. Sathish, P. Ganesan, L. Bharathi, V. Suryanarayana, A. Ranganayakulu
A wireless sensor system be projected to examine construction headed for appraise shaking smash up, the sensor preterit exploit routine built-up capacitive micro electro mechanical structure strain and 3D acceleration feeler and a low power state formally claim precise microcircuit designed for exciting battery life span up and about to 12 years. The strain sensors escalate at the base of the structure to subsist the arrangement unite plastic midpoint opening of the construction while an earthquake happens. They live sporadically or on stipulate preliminary the base station. The accelerometers square measure mounted at each floor of the formation to live the unstable response of the building throughout associate degree earthquake.
设计了一种无线传感器系统,用于检测建筑物的震动粉碎评估,该传感器采用常规的内置电容式微电子机械结构应变和三维加速度传感器,并在低功耗状态下正式声称设计了精确的微电路,使电池寿命达到12年左右。当地震发生时,应变传感器在结构的底部升级,以维持结构的塑料中点开口的布置。他们零星地居住或在预定的基站上。加速度计安装在建筑物的每一层,测量建筑物在二级地震期间的不稳定反应。
{"title":"Advanced Design of Wireless Communication Network for Building Monitoring","authors":"B. Sathish, P. Ganesan, L. Bharathi, V. Suryanarayana, A. Ranganayakulu","doi":"10.1109/ICACCS.2019.8728421","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728421","url":null,"abstract":"A wireless sensor system be projected to examine construction headed for appraise shaking smash up, the sensor preterit exploit routine built-up capacitive micro electro mechanical structure strain and 3D acceleration feeler and a low power state formally claim precise microcircuit designed for exciting battery life span up and about to 12 years. The strain sensors escalate at the base of the structure to subsist the arrangement unite plastic midpoint opening of the construction while an earthquake happens. They live sporadically or on stipulate preliminary the base station. The accelerometers square measure mounted at each floor of the formation to live the unstable response of the building throughout associate degree earthquake.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rumor proliferation and detection in Social Media: A Review 社交媒体中的谣言扩散与检测:综述
Junaid Ali Reshi, R. Ali
With the intrusion of social media into personal, social and political space of today’s world, the iniquities associated with it have also found a place to thrive. One such malevolent act is the spread of rumors through social networks. This survey analyses the various domains where social media finds its relevance and has a considerable impact. It also explores various studies done on the nature of rumors, the characteristics of rumors and the studies identifying the important features for the social media-based rumors. Further, the latest developments in the field of rumor detection through the approaches of Machine learning and Deep learning have also been discussed.
随着社交媒体侵入当今世界的个人、社会和政治空间,与之相关的不公正现象也找到了滋生的温床。其中一种恶意行为就是通过社交网络传播谣言。这项调查分析了社交媒体发现其相关性并产生相当大影响的各个领域。它还探讨了关于谣言的性质、谣言的特征以及确定基于社交媒体的谣言的重要特征的各种研究。此外,还讨论了通过机器学习和深度学习方法在谣言检测领域的最新进展。
{"title":"Rumor proliferation and detection in Social Media: A Review","authors":"Junaid Ali Reshi, R. Ali","doi":"10.1109/ICACCS.2019.8728321","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728321","url":null,"abstract":"With the intrusion of social media into personal, social and political space of today’s world, the iniquities associated with it have also found a place to thrive. One such malevolent act is the spread of rumors through social networks. This survey analyses the various domains where social media finds its relevance and has a considerable impact. It also explores various studies done on the nature of rumors, the characteristics of rumors and the studies identifying the important features for the social media-based rumors. Further, the latest developments in the field of rumor detection through the approaches of Machine learning and Deep learning have also been discussed.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Web Surfing in Anonymity Status 匿名上网
Vishnu Vardhanaan.S, S. M., A. J
Due to conflicting objective of the stake holders, the privacy of the user in the Internet is difficult to achieve. There are some laws in privacy which are implemented by several national governments. The data usage of Internet is still gathered by ISP’s, even with data breaches risks. Data breaches are very harmful since it affects several well-developed organizations and its impact is more on future. In this, Users availing anonymous services such as Tor who were stooping the users with P2P network are rare to identify. However, there are also negative sides of Tor that its legitimate user are viewed suspiciously by the law governing authorities due to use of services by criminals in negative aspects. This paper delivers, A protocol with internet access is introduced to compromise the conflicting stake holders’ objectives for user anonymity. The protocol in the paper allows the analysis of web data usage only by the interested parties (i.e. ISP) and the criminal abuses are greatly reduced and also supports the law enforcement by providing flexibility. The methods and approach used in our projected protocol were: (i) Onion Routing Protocol, which is used for disguising web user’s identity, (ii) An Authentic Computation, which creates a common communication between ISP and User keeping those information’s private. (iii) Digital Certification of Licenses, which ensures that the anonymous status is provided for users only by the authorised web content providers and spoofing of service providers for licensing to provide anonymous status can’t be done.
由于利益相关者的目标冲突,使得互联网用户的隐私难以实现。在隐私方面有一些法律是由几个国家的政府实施的。互联网的数据使用仍然是由互联网服务提供商收集的,即使存在数据泄露的风险。数据泄露是非常有害的,因为它影响到几个发达的组织,它的影响更大的是未来。因此,利用Tor等匿名服务利用P2P网络欺骗用户的用户很难被识别。然而,Tor也有消极的一面,由于犯罪分子在消极方面使用服务,其合法用户被法律管理当局怀疑。本文提出了一种具有互联网访问的协议,以折衷利益相关者对用户匿名的冲突目标。本文中的协议只允许利益相关方(即ISP)分析网络数据的使用情况,大大减少了犯罪滥用,并通过提供灵活性来支持执法。在我们的计划协议中使用的方法和方法是:(i)洋葱路由协议,用于伪装网络用户的身份;(ii)一个真实的计算,它在ISP和用户之间创建一个公共通信,保持这些信息的私密性。(iii)许可的数字认证,确保匿名状态仅由授权的web内容提供商向用户提供,不能欺骗服务提供商获得提供匿名状态的许可。
{"title":"Web Surfing in Anonymity Status","authors":"Vishnu Vardhanaan.S, S. M., A. J","doi":"10.1109/ICACCS.2019.8728323","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728323","url":null,"abstract":"Due to conflicting objective of the stake holders, the privacy of the user in the Internet is difficult to achieve. There are some laws in privacy which are implemented by several national governments. The data usage of Internet is still gathered by ISP’s, even with data breaches risks. Data breaches are very harmful since it affects several well-developed organizations and its impact is more on future. In this, Users availing anonymous services such as Tor who were stooping the users with P2P network are rare to identify. However, there are also negative sides of Tor that its legitimate user are viewed suspiciously by the law governing authorities due to use of services by criminals in negative aspects. This paper delivers, A protocol with internet access is introduced to compromise the conflicting stake holders’ objectives for user anonymity. The protocol in the paper allows the analysis of web data usage only by the interested parties (i.e. ISP) and the criminal abuses are greatly reduced and also supports the law enforcement by providing flexibility. The methods and approach used in our projected protocol were: (i) Onion Routing Protocol, which is used for disguising web user’s identity, (ii) An Authentic Computation, which creates a common communication between ISP and User keeping those information’s private. (iii) Digital Certification of Licenses, which ensures that the anonymous status is provided for users only by the authorised web content providers and spoofing of service providers for licensing to provide anonymous status can’t be done.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116149211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition based Surveillance System Using FaceNet and MTCNN on Jetson TX2 Jetson TX2上基于FaceNet和MTCNN的人脸识别监控系统
E. Jose, Greeshma M., M. T. P., S. M. H.
Surveillance systems, in spite of the recent advances, still poses many challenges, especially in the field of patrolling or tracking of subjects through CCTV footage or any other portable drone mechanisms. Real time monitoring of public places for possible suspects are still made through manual observations in many places. The manual labour involved and the human errors that can occur makes the system less efficient. Many research attempts were made for designing foolproof systems and still going on, understanding the importance of the problem. This paper presents the implementation of an intelligent multicamera Face Recognition based surveillance system using FaceNet and MTCNN algorithm on Jetson TX2. The proposed portable system tracks the subject or the suspect with the camera ID/location together with the timestamp and logs his presence in the database, using multiple camera installation.
监视系统,尽管最近取得了进展,但仍然面临许多挑战,特别是在巡逻或通过闭路电视镜头或任何其他便携式无人机机制跟踪对象的领域。在许多地方,仍然通过人工观察对公共场所的可能嫌疑人进行实时监控。所涉及的体力劳动和可能发生的人为错误使系统效率降低。为了设计万无一失的系统,人们进行了许多研究尝试,并在了解问题的重要性的情况下仍在继续。本文介绍了在Jetson TX2上利用FaceNet和MTCNN算法实现基于人脸识别的智能多摄像头监控系统。该便携式系统使用多个摄像机安装,通过摄像机ID/位置和时间戳跟踪对象或嫌疑人,并将其存在记录在数据库中。
{"title":"Face Recognition based Surveillance System Using FaceNet and MTCNN on Jetson TX2","authors":"E. Jose, Greeshma M., M. T. P., S. M. H.","doi":"10.1109/ICACCS.2019.8728466","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728466","url":null,"abstract":"Surveillance systems, in spite of the recent advances, still poses many challenges, especially in the field of patrolling or tracking of subjects through CCTV footage or any other portable drone mechanisms. Real time monitoring of public places for possible suspects are still made through manual observations in many places. The manual labour involved and the human errors that can occur makes the system less efficient. Many research attempts were made for designing foolproof systems and still going on, understanding the importance of the problem. This paper presents the implementation of an intelligent multicamera Face Recognition based surveillance system using FaceNet and MTCNN algorithm on Jetson TX2. The proposed portable system tracks the subject or the suspect with the camera ID/location together with the timestamp and logs his presence in the database, using multiple camera installation.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Detection of Cyberbullying Using Deep Neural Network 基于深度神经网络的网络欺凌检测
Vijay Banerjee, Jui Telavane, Pooja R. Gaikwad, P. Vartak
Innovation is developing quickly today. This headways in innovation has changed how individuals cooperate in an expansive way giving communication another dimension. But despite the fact that innovation encourages us in numerous parts of life, it accompanies different effects that influence people in a few or the other way. Cyberbullying is one of such effects. Cyberbullying is a wrongdoing in which a culprit focuses on an individual with online provocation and loathe which has antagonistic emotional, social and physical effects on the victim. So as to address such issue we proposed a novel cyberbullying detection method dependent on deep neural network. Convolution Neural Network is utilized for the better outcomes when contrasted with the current systems.
今天,创新发展迅速。这种创新的进步以一种广泛的方式改变了个人的合作方式,给沟通带来了另一个维度。但是,尽管创新在生活的许多方面鼓励着我们,但它伴随着不同的影响,以不同的方式影响着人们。网络欺凌就是其中之一。网络欺凌是一种不法行为,罪犯以在线挑衅和厌恶的方式关注个人,对受害者产生敌对的情感、社会和身体影响。为了解决这一问题,我们提出了一种新的基于深度神经网络的网络欺凌检测方法。与现有系统相比,利用卷积神经网络可以获得更好的结果。
{"title":"Detection of Cyberbullying Using Deep Neural Network","authors":"Vijay Banerjee, Jui Telavane, Pooja R. Gaikwad, P. Vartak","doi":"10.1109/ICACCS.2019.8728378","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728378","url":null,"abstract":"Innovation is developing quickly today. This headways in innovation has changed how individuals cooperate in an expansive way giving communication another dimension. But despite the fact that innovation encourages us in numerous parts of life, it accompanies different effects that influence people in a few or the other way. Cyberbullying is one of such effects. Cyberbullying is a wrongdoing in which a culprit focuses on an individual with online provocation and loathe which has antagonistic emotional, social and physical effects on the victim. So as to address such issue we proposed a novel cyberbullying detection method dependent on deep neural network. Convolution Neural Network is utilized for the better outcomes when contrasted with the current systems.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1