首页 > 最新文献

2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)最新文献

英文 中文
Analysis of EOT characteristics of OLED using integrating sphere 利用积分球分析OLED的EOT特性
V. Shanmugapriya, P. Manoharan
This paper analyze the Electrical, Optical and Thermal (EOT) characteristics of Organic Light Emitting Diode (OLED) using integrating sphere. From the data obtained, critical optical characteristics to be measured for OLED panel panels and suitable measurement methods and conditions for testing OLED panels are discussed. The 2π geometry of the integrating sphere has been employed for testing the OLED. A standardized testing procedure for OLED is developed.
本文利用积分球分析了有机发光二极管(OLED)的电学、光学和热学特性。根据所获得的数据,讨论了OLED面板需要测量的关键光学特性以及测试OLED面板的合适测量方法和条件。利用积分球的2π几何形状对OLED进行了测试。开发了OLED的标准化测试程序。
{"title":"Analysis of EOT characteristics of OLED using integrating sphere","authors":"V. Shanmugapriya, P. Manoharan","doi":"10.1109/ICONSTEM.2016.7560969","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560969","url":null,"abstract":"This paper analyze the Electrical, Optical and Thermal (EOT) characteristics of Organic Light Emitting Diode (OLED) using integrating sphere. From the data obtained, critical optical characteristics to be measured for OLED panel panels and suitable measurement methods and conditions for testing OLED panels are discussed. The 2π geometry of the integrating sphere has been employed for testing the OLED. A standardized testing procedure for OLED is developed.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127503301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent transport system using integrated GPS optimized reader 智能交通系统采用集成GPS优化读卡器
A. Kamaraj, K. Radha, M. Priyanka, M. Punitha
The development of a semi-autonomous intimation system to parents about the presence of their child in school or college campus is the objective of this Project. If a student bunked his/her class or abducted from school or college, their parents might know that after 6pm only. Here we proposed a new solution to send quick intimation to their parents about the presence of students through school or college bus at 9.30am. By this we can track the children and save them early if any mischief is happening. For this we are using an RFID reader, GPS tracker and GSM module along with an Arduino mega 2560 and its software. RFID readers can read the RFID tags of the students. GSM system is used to send their presence to their parents through SMS. To achieve this, a passive or active tracking device with GPS is used. Passive devices store GPS location, speed and time. Once the vehicle returns to a predestined point, the device is removed and the data downloaded to a computer for evaluation. By this we can get arrival and departure locations of the students. Active devices also collect the same information, but usually transmit the data in near-real-time via cellular or satellite networks to a computer or data center for evaluation. It is used to track the location of a vehicle from organizing itself. This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet.
这个项目的目标是开发一个半自主的提示系统,让父母知道他们的孩子在学校或大学校园里。如果一个学生逃课或者从学校或大学被拐走,他们的父母可能只有在下午6点以后才知道。在这里,我们提出了一个新的解决方案,即在上午9点半通过学校或大学巴士向学生的父母发送关于学生存在的快速通知。这样,我们就可以跟踪孩子们,如果有任何恶作剧发生,我们就可以早点救他们。为此,我们使用RFID读取器,GPS跟踪器和GSM模块以及Arduino mega 2560及其软件。RFID阅读器可以读取学生的RFID标签。GSM系统是用来把他们的存在通过短信发送给他们的父母。为了实现这一点,使用了带有GPS的被动或主动跟踪设备。无源设备存储GPS位置、速度和时间。一旦车辆返回到预定地点,该装置就会被移除,并将数据下载到计算机中进行评估。通过这个我们可以得到学生到达和离开的地点。有源设备也收集相同的信息,但通常通过蜂窝或卫星网络将数据近实时地传输到计算机或数据中心进行评估。它用于从组织自身开始跟踪车辆的位置。这个电子文档是一个“活的”模板,它已经在样式表中定义了论文的组成部分[标题,正文,标题等]。
{"title":"Intelligent transport system using integrated GPS optimized reader","authors":"A. Kamaraj, K. Radha, M. Priyanka, M. Punitha","doi":"10.1109/ICONSTEM.2016.7560972","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560972","url":null,"abstract":"The development of a semi-autonomous intimation system to parents about the presence of their child in school or college campus is the objective of this Project. If a student bunked his/her class or abducted from school or college, their parents might know that after 6pm only. Here we proposed a new solution to send quick intimation to their parents about the presence of students through school or college bus at 9.30am. By this we can track the children and save them early if any mischief is happening. For this we are using an RFID reader, GPS tracker and GSM module along with an Arduino mega 2560 and its software. RFID readers can read the RFID tags of the students. GSM system is used to send their presence to their parents through SMS. To achieve this, a passive or active tracking device with GPS is used. Passive devices store GPS location, speed and time. Once the vehicle returns to a predestined point, the device is removed and the data downloaded to a computer for evaluation. By this we can get arrival and departure locations of the students. Active devices also collect the same information, but usually transmit the data in near-real-time via cellular or satellite networks to a computer or data center for evaluation. It is used to track the location of a vehicle from organizing itself. This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Implementation of fuzzy logic in shunt active power filter for renewable power generation system 模糊逻辑在可再生发电系统并联有源滤波器中的实现
J. F. Roseline, N. Sahoo, Ayush Abhinav
Shunt active power filter (SAPF) is a modern methodology for the power compensation. The primary focus of this paper is to eliminate the total harmonics distortions (THD) from the power system buses by implementing fuzzy logic control technique in the controller. This is compared with predictive control technique in the PID type controller with Non linear loads (RL, DC motor and Induction Motor). Introducing renewable power generations systems (Wind energy, solar energy) as external power supply for power compensation redefine the modern power transmission systems. Using of three leg voltage source inverter(VSI) as power converter posses less harmonics at load side compare to other converters. The voltage regulations and power quality in the bus bars is improved only after power compensations.
并联有源电力滤波器(SAPF)是一种现代的电力补偿方法。本文的研究重点是通过在控制器中引入模糊逻辑控制技术来消除电力系统母线的总谐波失真。这与非线性负载(RL、直流电动机和感应电动机)下PID型控制器的预测控制技术进行了比较。引入可再生能源发电系统(风能、太阳能)作为外部电源进行电力补偿,重新定义了现代输电系统。采用三支路电压源逆变器(VSI)作为功率变换器,与其他变换器相比,负载侧谐波较小。只有进行功率补偿,母线内的电压规律和电能质量才能得到改善。
{"title":"Implementation of fuzzy logic in shunt active power filter for renewable power generation system","authors":"J. F. Roseline, N. Sahoo, Ayush Abhinav","doi":"10.1109/ICONSTEM.2016.7560862","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560862","url":null,"abstract":"Shunt active power filter (SAPF) is a modern methodology for the power compensation. The primary focus of this paper is to eliminate the total harmonics distortions (THD) from the power system buses by implementing fuzzy logic control technique in the controller. This is compared with predictive control technique in the PID type controller with Non linear loads (RL, DC motor and Induction Motor). Introducing renewable power generations systems (Wind energy, solar energy) as external power supply for power compensation redefine the modern power transmission systems. Using of three leg voltage source inverter(VSI) as power converter posses less harmonics at load side compare to other converters. The voltage regulations and power quality in the bus bars is improved only after power compensations.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129602650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dominator coloring of Quadrilateral Snake, Triangle Snake graph and Barbell graph 四边形蛇形图、三角形蛇形图和杠铃形图的支配子着色
T. Manjula, R. Rajeswari
A graph G is said to have a dominator coloring if it has a proper coloring in which every vertex of the graph dominates all vertices of atleast one color class. The dominator chromatic number Xd (G) is the least number of colors required for a dominator coloring of G. The dominator chromatic number for Quadrilateral Snake graph, Triangle Snake graph and Barbell graph are derived and also the relationship between chromatic number, domination number and dominator chromatic number of these graphs are shown in this paper.
如果图G具有适当的着色,其中图G的每个顶点都优于至少一个颜色类的所有顶点,则称图G具有支配着色。本文导出了四边形蛇形图、三角形蛇形图和杠铃形图的支配色数,并给出了这些图的色数、支配数和支配色数之间的关系。
{"title":"Dominator coloring of Quadrilateral Snake, Triangle Snake graph and Barbell graph","authors":"T. Manjula, R. Rajeswari","doi":"10.1109/ICONSTEM.2016.7560934","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560934","url":null,"abstract":"A graph G is said to have a dominator coloring if it has a proper coloring in which every vertex of the graph dominates all vertices of atleast one color class. The dominator chromatic number Xd (G) is the least number of colors required for a dominator coloring of G. The dominator chromatic number for Quadrilateral Snake graph, Triangle Snake graph and Barbell graph are derived and also the relationship between chromatic number, domination number and dominator chromatic number of these graphs are shown in this paper.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134111249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An assessment and methodology for fraud detection in online social network 在线社交网络欺诈检测的评估与方法
Dr. M. Nandhini, Bikram Bikash Das
Online Social Network provides a simple and easier way to connect with our friends and relatives to share daily activities and event of our day to day life. Most of us cannot live without social network. But just like other online activity, even social networks are having lot of security threats to its users. Most of Research on Social Network reveals that Social Network are the primary sources for getting confidential information of the victim so that they can do numerous fraudulent activities like cyber bullying, money laundering, spreading fake or false messages to create panic situation in public or to fool other user. They already have set their target on social networking website to do their fraudulent activities. Fraudsters are always trying to find any loopholes in the existing system so that they can get access to the system to launch various social engineering attack and scam activities. The security and privacy on these networks has been increasing as the amount of personal information posted by millions of users in their profile is made public. A social networking site allows millions of users to communicate online and large amount of information has been posted daily. So in every few seconds a large amount of data has been generated around the world. This necessitates the adaptation of new methodology to provide security of online data. Social network users are not aware of the various security threats and the associated risks exist in these networks. This paper presents an assessment of classification different social network and different attacks present on those social networks and methodology has been proposed which help the online users to be safe from numerous fraudulent and malicious activities on the web.
在线社交网络提供了一种简单方便的方式与我们的朋友和亲戚联系,分享我们日常生活中的日常活动和事件。我们大多数人都离不开社交网络。但就像其他在线活动一样,即使是社交网络也面临着许多安全威胁。大多数关于社交网络的研究表明,社交网络是获取受害者机密信息的主要来源,因此他们可以进行许多欺诈活动,如网络欺凌,洗钱,传播虚假或虚假信息,以在公共场合制造恐慌或欺骗其他用户。他们已经在社交网站上设定了他们的目标来进行欺诈活动。欺诈者总是试图找到现有系统的任何漏洞,以便他们可以进入系统进行各种社会工程攻击和诈骗活动。随着数百万用户在个人资料中发布的个人信息被公开,这些网络的安全性和隐私性也在不断提高。社交网站允许数百万用户在线交流,每天都有大量的信息发布。每隔几秒钟,世界各地就会产生大量的数据。这就需要采用新的方法来提供在线数据的安全性。社交网络用户没有意识到这些网络中存在的各种安全威胁和相关风险。本文对不同社交网络的分类和社交网络上存在的不同攻击进行了评估,并提出了一种方法,帮助在线用户免受网络上众多欺诈和恶意活动的侵害。
{"title":"An assessment and methodology for fraud detection in online social network","authors":"Dr. M. Nandhini, Bikram Bikash Das","doi":"10.1109/ICONSTEM.2016.7560932","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560932","url":null,"abstract":"Online Social Network provides a simple and easier way to connect with our friends and relatives to share daily activities and event of our day to day life. Most of us cannot live without social network. But just like other online activity, even social networks are having lot of security threats to its users. Most of Research on Social Network reveals that Social Network are the primary sources for getting confidential information of the victim so that they can do numerous fraudulent activities like cyber bullying, money laundering, spreading fake or false messages to create panic situation in public or to fool other user. They already have set their target on social networking website to do their fraudulent activities. Fraudsters are always trying to find any loopholes in the existing system so that they can get access to the system to launch various social engineering attack and scam activities. The security and privacy on these networks has been increasing as the amount of personal information posted by millions of users in their profile is made public. A social networking site allows millions of users to communicate online and large amount of information has been posted daily. So in every few seconds a large amount of data has been generated around the world. This necessitates the adaptation of new methodology to provide security of online data. Social network users are not aware of the various security threats and the associated risks exist in these networks. This paper presents an assessment of classification different social network and different attacks present on those social networks and methodology has been proposed which help the online users to be safe from numerous fraudulent and malicious activities on the web.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Automatic identification of traffic violations and theft avoidance 自动识别交通违规和盗窃避免
D. K. Aarthy, S. Vandanaa, M. Varshini, K. Tijitha
In recent times, violating traffic rules have become predominant on Indian roads. The heartbreaking fact is that 16 people die on road accidents every hour in India and the Global status road safety 2013 has published a report on top 10 cities with the highest number of road crash death. The following are the cities listed: Delhi, Chennai, Jaipur, Bangalore, Mumbai, Kanpur, Lucknow, Agra, Hyderabad and Pune. And in 2015 it has become worse with death rate 130,000 annually [18]. This is because people fail to obey the traffic rules since there is no enough security systems to enforce on problems like extending the speed limit, crossing the red signal. This proposal uses the RFID Technology to deal with the traffic problems. The major components of this proposal are RFID reader, a camera that is used to track and take picture of the vehicle, RFID tag, a database server which contains the details of the red signal violators and uses GSM technology to send warning message. This proposal minimizes the conflict and confusion between people and the vehicle and which will automatically reduce the number of accidents on roads. As well as this technology is used to reduce the theft and control the speed of the vehicles (i.e. rash driving).
最近,在印度的道路上,违反交通规则已经成为普遍现象。令人心碎的事实是,印度每小时有16人死于道路交通事故,2013年全球道路安全状况发布了一份关于道路交通事故死亡人数最高的十大城市的报告。以下是列出的城市:德里、金奈、斋浦尔、班加罗尔、孟买、坎普尔、勒克瑙、阿格拉、海得拉巴和浦那。并在2015年恶化,每年死亡13万人[18]。这是因为人们不遵守交通规则,因为没有足够的安全系统来执行诸如延长速度限制,越过红色信号等问题。该方案采用RFID技术来解决交通问题。该方案的主要组成部分是RFID读取器、用于跟踪和拍摄车辆的摄像头、RFID标签、包含红色信号违规者详细信息的数据库服务器,并使用GSM技术发送警告信息。这一建议最大限度地减少了人与车辆之间的冲突和混乱,这将自动减少道路上的事故数量。此外,这项技术还用于减少盗窃和控制车辆的速度(即鲁莽驾驶)。
{"title":"Automatic identification of traffic violations and theft avoidance","authors":"D. K. Aarthy, S. Vandanaa, M. Varshini, K. Tijitha","doi":"10.1109/ICONSTEM.2016.7560926","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560926","url":null,"abstract":"In recent times, violating traffic rules have become predominant on Indian roads. The heartbreaking fact is that 16 people die on road accidents every hour in India and the Global status road safety 2013 has published a report on top 10 cities with the highest number of road crash death. The following are the cities listed: Delhi, Chennai, Jaipur, Bangalore, Mumbai, Kanpur, Lucknow, Agra, Hyderabad and Pune. And in 2015 it has become worse with death rate 130,000 annually [18]. This is because people fail to obey the traffic rules since there is no enough security systems to enforce on problems like extending the speed limit, crossing the red signal. This proposal uses the RFID Technology to deal with the traffic problems. The major components of this proposal are RFID reader, a camera that is used to track and take picture of the vehicle, RFID tag, a database server which contains the details of the red signal violators and uses GSM technology to send warning message. This proposal minimizes the conflict and confusion between people and the vehicle and which will automatically reduce the number of accidents on roads. As well as this technology is used to reduce the theft and control the speed of the vehicles (i.e. rash driving).","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125407857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A survey of classification algorithms for network traffic 网络流量分类算法综述
R. Deebalakshmi, V. Jyothi
Network traffic in the world wide is calculated to rise every year twice the times. To keep pace and profit from this increased amount of flows efficiently. And offer new services. Some efficient techniques needed. Day by day new applications are invented and they have heterogeneous nature in network environment and communication between these new devices also a critical part. improving the network performance, establish proper service policies in router, handling network security risks, management of network operations and provide Qos services to users in internet. To solve these issues classification techniques are used. In this survey different classification algorithms are discussed. K-means algorithm, classification using clustering algorithm, Classification based on Fuzzy Kernel K-means Clustering, Support vector machine algorithm, and self-learning classifier Bayesian classification, C5.0 and traffic classification using correlation information and robust network traffic algorithms are presented.
据估计,全世界的网络流量每年增长两倍。为了跟上步伐并有效地从增加的流量中获利。并提供新的服务。需要一些有效的技术。在网络环境中,新的应用程序层出不穷,它们具有异构性,而这些新设备之间的通信也是至关重要的一部分。提高网络性能,在路由器上制定适当的业务策略,处理网络安全风险,管理网络运营,为互联网用户提供Qos服务。为了解决这些问题,使用了分类技术。本文讨论了不同的分类算法。介绍了K-means算法、基于聚类的分类算法、基于模糊核K-means聚类的分类算法、支持向量机算法、自学习分类器贝叶斯分类、C5.0以及基于相关信息的流量分类和鲁棒网络流量算法。
{"title":"A survey of classification algorithms for network traffic","authors":"R. Deebalakshmi, V. Jyothi","doi":"10.1109/ICONSTEM.2016.7560941","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560941","url":null,"abstract":"Network traffic in the world wide is calculated to rise every year twice the times. To keep pace and profit from this increased amount of flows efficiently. And offer new services. Some efficient techniques needed. Day by day new applications are invented and they have heterogeneous nature in network environment and communication between these new devices also a critical part. improving the network performance, establish proper service policies in router, handling network security risks, management of network operations and provide Qos services to users in internet. To solve these issues classification techniques are used. In this survey different classification algorithms are discussed. K-means algorithm, classification using clustering algorithm, Classification based on Fuzzy Kernel K-means Clustering, Support vector machine algorithm, and self-learning classifier Bayesian classification, C5.0 and traffic classification using correlation information and robust network traffic algorithms are presented.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117184149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Key point descriptor based copy and move image forgery detection system 基于关键点描述符的复制移动图像伪造检测系统
R. Nithiya, S. Veluchamy
In recent years Image forgery plays important role in many areas like Internet, Forensic department, Passports, License, and Educational certificates etc. Several types of Image forgeries are available such as copy-move, copy-paste, cut-copy. In our work we focused on copy-move image forgery. To identify the forgery region in an image we proposed the adaptive over segmentation and key point matching algorithm. Lots of researchers already proposed algorithm for copy move forgery scheme. But still now the computational complexity is high. It can be reduced in our work by dividing image into non overlapping blocks of image region. The blocks of SIFT features are matched with neighboring block features and locate the forgery region. The experimental shows that we achieved high recall rate under different transform (DCT, SVD, FMT).
近年来,图像伪造在互联网、司法部门、护照、执照、学历证书等领域发挥着重要作用。几种类型的图像伪造是可用的,如复制-移动,复制-粘贴,剪切-复制。在我们的工作中,我们专注于复制-移动图像伪造。为了识别图像中的伪造区域,提出了自适应超分割和关键点匹配算法。许多研究者已经提出了复制移动伪造方案的算法。但是现在的计算复杂度仍然很高。在我们的工作中,可以通过将图像划分为图像区域的不重叠块来减少这种情况。SIFT特征块与相邻块特征进行匹配,定位伪造区域。实验表明,在不同的变换(DCT、SVD、FMT)下,我们都取得了较高的查全率。
{"title":"Key point descriptor based copy and move image forgery detection system","authors":"R. Nithiya, S. Veluchamy","doi":"10.1109/ICONSTEM.2016.7560959","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560959","url":null,"abstract":"In recent years Image forgery plays important role in many areas like Internet, Forensic department, Passports, License, and Educational certificates etc. Several types of Image forgeries are available such as copy-move, copy-paste, cut-copy. In our work we focused on copy-move image forgery. To identify the forgery region in an image we proposed the adaptive over segmentation and key point matching algorithm. Lots of researchers already proposed algorithm for copy move forgery scheme. But still now the computational complexity is high. It can be reduced in our work by dividing image into non overlapping blocks of image region. The blocks of SIFT features are matched with neighboring block features and locate the forgery region. The experimental shows that we achieved high recall rate under different transform (DCT, SVD, FMT).","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Drugs categorization based on sentence polarity analyzer for Twitter data 基于句子极性分析器的Twitter数据药物分类
Archana. S. Ha, Godfrey Winster
In the recent years, social media have emerged as major platforms for sharing information in medical field, business, education etc. Social media provides limitless opportunities for patients to share experiences with their drug usage. In current scenarios and with available new technologies, Twitter can be used effectively for gathering information rather than gathering information in traditional method. Twitter is the most popular online social networking service that enable user to share and gain knowledge. Doctors says that the medical information shared by doctors and patients on their social media is valuable and trustable. Twitter is used as a prominent Social Media to share their experience based on drugs and diseases. The Drugs Categorization based on Sentence Polarity Analyzer (DCSPA) collects the drugs and disease related tweets from Twitter. Tweet collection is done using Twitter API. The collected tweets are preprocessed and then classifying the tweets related to drugs and diseases is done using Support Vector Classification (SVM). After classification, the tweets are analyzed based on polarity of the sentence. The sentence polarity analyzer is used to categorize the drugs or disease as positive, negative or neutral feedback. The experimental results shows that the sentence polarity analyzer provides better categorization of tweets based on its polarity.
近年来,社交媒体已成为医疗、商业、教育等领域信息共享的主要平台。社交媒体为患者提供了无限的机会来分享他们的吸毒经历。在目前的情况下,利用现有的新技术,Twitter可以有效地用于收集信息,而不是用传统的方法收集信息。推特是最受欢迎的在线社交网络服务,用户可以分享和获取知识。医生们表示,医生和患者在社交媒体上分享的医疗信息是有价值的、值得信赖的。Twitter是一个重要的社交媒体,用来分享他们基于药物和疾病的经验。基于句子极性分析器的药物分类(DCSPA)从Twitter上收集与药物和疾病相关的推文。Tweet收集使用Twitter API完成。对收集到的推文进行预处理,然后利用支持向量分类(SVM)对与药物和疾病相关的推文进行分类。分类后,根据句子的极性对tweets进行分析。句子极性分析器用于将药物或疾病分类为正反馈、负反馈或中性反馈。实验结果表明,基于句子极性的句子极性分析器可以更好地对推文进行分类。
{"title":"Drugs categorization based on sentence polarity analyzer for Twitter data","authors":"Archana. S. Ha, Godfrey Winster","doi":"10.1109/ICONSTEM.2016.7560917","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560917","url":null,"abstract":"In the recent years, social media have emerged as major platforms for sharing information in medical field, business, education etc. Social media provides limitless opportunities for patients to share experiences with their drug usage. In current scenarios and with available new technologies, Twitter can be used effectively for gathering information rather than gathering information in traditional method. Twitter is the most popular online social networking service that enable user to share and gain knowledge. Doctors says that the medical information shared by doctors and patients on their social media is valuable and trustable. Twitter is used as a prominent Social Media to share their experience based on drugs and diseases. The Drugs Categorization based on Sentence Polarity Analyzer (DCSPA) collects the drugs and disease related tweets from Twitter. Tweet collection is done using Twitter API. The collected tweets are preprocessed and then classifying the tweets related to drugs and diseases is done using Support Vector Classification (SVM). After classification, the tweets are analyzed based on polarity of the sentence. The sentence polarity analyzer is used to categorize the drugs or disease as positive, negative or neutral feedback. The experimental results shows that the sentence polarity analyzer provides better categorization of tweets based on its polarity.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133455620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud robotics in industry using Raspberry Pi 云机器人工业使用树莓派
B. V. Santhosh Krishna, J. Oviya, S. Gowri, M. Varshini
Cloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centered on the benefits of converged infrastructure and shared services for robotics. Our project is a cloud robot which is used in industrial and manufacturing environment. It works on a ROS platform. Here we use Raspberry Pi controller to control the various devices attached to it. For testing this implementation, Android phone, camera, DC motor, sensors and a Raspberry pi controller have been used. The movement of the robot is provided by DC motors and the direction is controlled from an android environment using Robot Operating System (ROS). The controller and the receiver end is connected by Wi-Fi. The data input from the gas, temperature and Infra Red sensors is given to the Raspberry Pi controller. A camera is used to provide visual input of the surrounding environment to the robot. The data obtained by the sensors and camera are processed by the controller and stored in cloud.
云机器人是机器人技术的一个领域,它试图调用云技术,如云计算、云存储和其他以融合基础设施和共享服务为中心的互联网技术。我们的项目是一个用于工业和制造环境的云机器人。它在ROS平台上工作。这里我们使用树莓派控制器来控制连接到它的各种设备。为了测试这个实现,使用了Android手机,相机,直流电机,传感器和树莓派控制器。机器人的运动由直流电机提供,方向由机器人操作系统(ROS)控制。控制器与接收端通过Wi-Fi连接。来自气体、温度和红外线传感器的数据输入给树莓派控制器。摄像头用于向机器人提供周围环境的视觉输入。传感器和摄像头获取的数据由控制器处理后存储在云端。
{"title":"Cloud robotics in industry using Raspberry Pi","authors":"B. V. Santhosh Krishna, J. Oviya, S. Gowri, M. Varshini","doi":"10.1109/ICONSTEM.2016.7560952","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560952","url":null,"abstract":"Cloud robotics is a field of robotics that attempts to invoke cloud technologies such as cloud computing, cloud storage, and other Internet technologies centered on the benefits of converged infrastructure and shared services for robotics. Our project is a cloud robot which is used in industrial and manufacturing environment. It works on a ROS platform. Here we use Raspberry Pi controller to control the various devices attached to it. For testing this implementation, Android phone, camera, DC motor, sensors and a Raspberry pi controller have been used. The movement of the robot is provided by DC motors and the direction is controlled from an android environment using Robot Operating System (ROS). The controller and the receiver end is connected by Wi-Fi. The data input from the gas, temperature and Infra Red sensors is given to the Raspberry Pi controller. A camera is used to provide visual input of the surrounding environment to the robot. The data obtained by the sensors and camera are processed by the controller and stored in cloud.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132026772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1