首页 > 最新文献

2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)最新文献

英文 中文
Internet of Things (IOT) based smart band to ensure the security for women 基于物联网(IOT)的智能手环,确保女性安全
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987928
K. Thamaraiselvi, S. Rinesh, L. Ramaparvathy, K. V
Due to the lack of security and safety measures, the crime rate on child abuse has been increased at an unprecedented rate in India. Our propose model will enhance the security and safety especially for girl children in India. In this connection smart band which comprises multiple sensors and programmable hardware. Smart band which communicates with smart phone through wireless communication. The application of a smart band has been developed and installed to smart phone with required quantities & smart band generates signal is send out to smart phone. Track the exact location with help of GPS and the automatic S MS service is done by GSM and screaming alarm which are already preprogrammed, whenever we receive emergency signal, smart phone which will automatically send “help me & save me, I am in danger situation” message along with location send to nearest police station/patrol/control room and also send the message to prime contacts which you saved and also send alert sms to who are all using this application in nearest circumstance. And the smart band will generate electric shocks up to 12 V, and then get started screaming alarm asking help.
由于缺乏安全措施,虐待儿童的犯罪率在印度以前所未有的速度上升。我们提出的模式将加强安全保障,特别是对印度的女童。在这种连接中,智能带由多个传感器和可编程硬件组成。智能带,通过无线通信与智能手机通信。开发了一种智能频段的应用程序,并按要求安装到智能手机上,智能频段产生的信号发送到智能手机上。跟踪GPS的帮助下确切位置和自动年代女士服务是通过GSM和尖叫报警已经预编的,每当我们收到紧急信号,智能手机将自动发送“帮我&救我,我在危险情况下“消息连同位置发送到最近的警察局/巡逻控制室并发送消息'接触,你还保存并发送提醒短信在最近的情况下都是使用这个应用程序。智能手环会产生高达12v的电击,然后开始尖叫报警寻求帮助。
{"title":"Internet of Things (IOT) based smart band to ensure the security for women","authors":"K. Thamaraiselvi, S. Rinesh, L. Ramaparvathy, K. V","doi":"10.1109/ICSSIT46314.2019.8987928","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987928","url":null,"abstract":"Due to the lack of security and safety measures, the crime rate on child abuse has been increased at an unprecedented rate in India. Our propose model will enhance the security and safety especially for girl children in India. In this connection smart band which comprises multiple sensors and programmable hardware. Smart band which communicates with smart phone through wireless communication. The application of a smart band has been developed and installed to smart phone with required quantities & smart band generates signal is send out to smart phone. Track the exact location with help of GPS and the automatic S MS service is done by GSM and screaming alarm which are already preprogrammed, whenever we receive emergency signal, smart phone which will automatically send “help me & save me, I am in danger situation” message along with location send to nearest police station/patrol/control room and also send the message to prime contacts which you saved and also send alert sms to who are all using this application in nearest circumstance. And the smart band will generate electric shocks up to 12 V, and then get started screaming alarm asking help.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Handwriting Behaviour Analysis for deception detection using SVM Classifier in virtualized Environment 虚拟环境下基于SVM分类器的欺骗检测笔迹行为分析
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987816
Sangam Kumar Chaturvedi, Abhisek Hazra, Asok Bandyopadhyay
There are various methods in practice to analyze deception by the law enforcing departments. Analyzing handwritten document is still considered to be one of the reliable methods of detecting deception. Handwritten documents are usual and reliable source of communication even in today's scenario. The handwritten text is considered to reflect human's body mind coordination. Researchers state that human behaviour can be analyzed by studying a person's handwriting. The paper consists of studies and implementation of online Handwritten Behaviour Analysis in proxmox-server virtualization Environment. C# language was used to implement the Behaviour Analysis part and python is used to validate the classification accuracy on the collected data. We have extended the previous work to client server mode to highlight the part of online Behaviour analysis to identify the uniqueness in characteristics of any person to differentiate deceptive and true statements. This paper will report the development and deployment of an online virtual server based handwriting behaviour analysis system using SVM based supervised Machine learning algorithm for classification.
在实践中,执法部门对欺诈行为的分析方法多种多样。分析手写文件仍被认为是检测欺骗的可靠方法之一。即使在今天的情况下,手写文档也是常见且可靠的通信来源。手写文字被认为是人的身心协调的体现。研究人员表示,可以通过研究一个人的笔迹来分析人类的行为。本文主要研究了proxmox-server虚拟化环境下在线手写行为分析的研究与实现。使用c#语言实现行为分析部分,并使用python验证对收集数据的分类准确性。我们将之前的工作扩展到客户端服务器模式,以突出在线行为分析的部分,以识别任何人特征的独特性,以区分虚假和真实的陈述。本文将报告一个基于在线虚拟服务器的手写行为分析系统的开发和部署,该系统使用基于支持向量机的监督机器学习算法进行分类。
{"title":"Handwriting Behaviour Analysis for deception detection using SVM Classifier in virtualized Environment","authors":"Sangam Kumar Chaturvedi, Abhisek Hazra, Asok Bandyopadhyay","doi":"10.1109/ICSSIT46314.2019.8987816","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987816","url":null,"abstract":"There are various methods in practice to analyze deception by the law enforcing departments. Analyzing handwritten document is still considered to be one of the reliable methods of detecting deception. Handwritten documents are usual and reliable source of communication even in today's scenario. The handwritten text is considered to reflect human's body mind coordination. Researchers state that human behaviour can be analyzed by studying a person's handwriting. The paper consists of studies and implementation of online Handwritten Behaviour Analysis in proxmox-server virtualization Environment. C# language was used to implement the Behaviour Analysis part and python is used to validate the classification accuracy on the collected data. We have extended the previous work to client server mode to highlight the part of online Behaviour analysis to identify the uniqueness in characteristics of any person to differentiate deceptive and true statements. This paper will report the development and deployment of an online virtual server based handwriting behaviour analysis system using SVM based supervised Machine learning algorithm for classification.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128828974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review of Medical Expert Systems for Diagnosis of Chronic Kidney Diseases 慢性肾脏疾病诊断医学专家系统综述
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987759
B. Kaur, Nikita, H. Sadawarti, Jimmy Singla
The prediction of the kidney diseases is essential to eliminate it on time, so that the life of patient may be saved. The early-stage detection of such diseases is helpful for increasing the life span of suffering patient. In addition, it also decreases the cost of treatment. It is better to build an accurate expert system, which helps to diagnose these diseases before leading to worse conditions. Therefore, many lives can be saved by using these intelligent systems. This review paper compares the performance parameters retrieved from various methods used in various existing studies to diagnose renal disorders or chronic kidney diseases. It provides the comprehensive review of medical expert systems and presents the best methods used to recognize chronic kidney disease (CKD).
对肾脏疾病进行预测是及时排除肾脏疾病,挽救患者生命的关键。早期发现这些疾病有助于延长患者的寿命。此外,它还降低了治疗费用。最好是建立一个准确的专家系统,这有助于在导致更糟的情况之前诊断这些疾病。因此,使用这些智能系统可以挽救许多生命。这篇综述比较了从各种现有研究中用于诊断肾脏疾病或慢性肾脏疾病的各种方法中检索到的性能参数。它提供了医学专家系统的全面审查,并提出了用于识别慢性肾脏疾病(CKD)的最佳方法。
{"title":"A Comprehensive Review of Medical Expert Systems for Diagnosis of Chronic Kidney Diseases","authors":"B. Kaur, Nikita, H. Sadawarti, Jimmy Singla","doi":"10.1109/ICSSIT46314.2019.8987759","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987759","url":null,"abstract":"The prediction of the kidney diseases is essential to eliminate it on time, so that the life of patient may be saved. The early-stage detection of such diseases is helpful for increasing the life span of suffering patient. In addition, it also decreases the cost of treatment. It is better to build an accurate expert system, which helps to diagnose these diseases before leading to worse conditions. Therefore, many lives can be saved by using these intelligent systems. This review paper compares the performance parameters retrieved from various methods used in various existing studies to diagnose renal disorders or chronic kidney diseases. It provides the comprehensive review of medical expert systems and presents the best methods used to recognize chronic kidney disease (CKD).","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121063417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Drone Detection Mechanism using Radiocommunication Technology and Internet Protocol Address 利用无线电通信技术和互联网协议地址的无人机探测机制
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987972
Vivank Sharma, Mani Kumari
Unmanned Aerial Vehicles (UAVs) are among the real significant advances that have various significant and advantageous applications. But recently the threats imposed by Unmanned Aerial Vehicles (UAVs), especially small drones, have increased to a greater extent. Unmanned Aerial Vehicles(UAVs) are being misused nowadays for various illegal activities including terrorism and smuggling. Recently, there have been situations where they enter private or confined property. To kill such exercises, a framework has been structured which can distinguish and detect the nearness of obscure little aerial targets, for example, Unmanned Aerial Vehicles (UAVs), specifically small drones. The system is based on the concept of Radio Communication(RC) technology and Internet Protocol(IP) address. This framework is devised such that it detects Internet Protocol(IP) addresses in certain range and using the detected Internet Protocol(IP) addresses and presence or absence of radio waves, detects the presence of Unmanned Aerial Vehicles(UAVs). This system is capable of detecting the presence of unknown Unmanned Aerial Vehicles(UAVs) in certain range. This paper reports on the prototype of the same.
无人驾驶飞行器(uav)是具有各种重要和有利应用的真正重大进步之一。但近年来,无人机(uav),特别是小型无人机带来的威胁在更大程度上有所增加。无人驾驶飞行器(uav)现在被滥用于各种非法活动,包括恐怖主义和走私。最近,出现了他们进入私人或封闭财产的情况。为了阻止这种演习,已经建立了一个框架,可以区分和探测模糊的小型空中目标的附近,例如无人驾驶飞行器(uav),特别是小型无人机。该系统基于无线电通信(RC)技术和互联网协议(IP)地址的概念。该框架的设计使其能够检测一定范围内的互联网协议(IP)地址,并使用检测到的互联网协议(IP)地址和无线电波的存在或不存在来检测无人驾驶飞行器(uav)的存在。该系统能够探测一定范围内未知无人机的存在。本文报道了该系统的原型。
{"title":"Drone Detection Mechanism using Radiocommunication Technology and Internet Protocol Address","authors":"Vivank Sharma, Mani Kumari","doi":"10.1109/ICSSIT46314.2019.8987972","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987972","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are among the real significant advances that have various significant and advantageous applications. But recently the threats imposed by Unmanned Aerial Vehicles (UAVs), especially small drones, have increased to a greater extent. Unmanned Aerial Vehicles(UAVs) are being misused nowadays for various illegal activities including terrorism and smuggling. Recently, there have been situations where they enter private or confined property. To kill such exercises, a framework has been structured which can distinguish and detect the nearness of obscure little aerial targets, for example, Unmanned Aerial Vehicles (UAVs), specifically small drones. The system is based on the concept of Radio Communication(RC) technology and Internet Protocol(IP) address. This framework is devised such that it detects Internet Protocol(IP) addresses in certain range and using the detected Internet Protocol(IP) addresses and presence or absence of radio waves, detects the presence of Unmanned Aerial Vehicles(UAVs). This system is capable of detecting the presence of unknown Unmanned Aerial Vehicles(UAVs) in certain range. This paper reports on the prototype of the same.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115610876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-Time Methodology for Improving Cyber Security in Internet of Things Using Edge Computing During Attack Threats 在攻击威胁中使用边缘计算提高物联网网络安全的实时方法
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987779
T. Ahanger, U. Tariq, Muneer Nusir
Internet of things is buzzing everywhere due to its applications in defense, military, schools, hospitals, homes, end users. Due to this its vast applications and services, a huge addition using context aware devices has been seen in development of some sectors of applications and services. This set of devices generate huge amount of data that needs quick and technically precise security mechanism to protect all the generated data along with associated services. Complex event processing is an evolving trend that analyses contiguous streams of data using real time analysis. In this research article, a system to detect distributed intrusion attacks is developed and the quality of fulfilment is evaluated using Raspberry Pi. The experimental study shows that the proposed mechanism can be used in IoT devices with least computation process and the used CEP is technically feasible resolution to enhance the performance of intrusion detection systems in detecting distributed intrusion attacks IoT environment.
物联网由于其在国防、军事、学校、医院、家庭和终端用户中的应用而无处不在。由于其庞大的应用程序和服务,在应用程序和服务的某些部门的开发中已经看到了使用上下文感知设备的巨大增加。这组设备产生大量的数据,需要快速和技术上精确的安全机制来保护所有生成的数据以及相关的服务。复杂事件处理是一种不断发展的趋势,它使用实时分析分析连续的数据流。在本文中,我们开发了一个分布式入侵攻击检测系统,并利用树莓派对系统的实现质量进行了评估。实验研究表明,该机制能够以最少的计算量应用于物联网设备,所采用的CEP是提高入侵检测系统在物联网环境下检测分布式入侵攻击性能的技术上可行的解决方案。
{"title":"Real-Time Methodology for Improving Cyber Security in Internet of Things Using Edge Computing During Attack Threats","authors":"T. Ahanger, U. Tariq, Muneer Nusir","doi":"10.1109/ICSSIT46314.2019.8987779","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987779","url":null,"abstract":"Internet of things is buzzing everywhere due to its applications in defense, military, schools, hospitals, homes, end users. Due to this its vast applications and services, a huge addition using context aware devices has been seen in development of some sectors of applications and services. This set of devices generate huge amount of data that needs quick and technically precise security mechanism to protect all the generated data along with associated services. Complex event processing is an evolving trend that analyses contiguous streams of data using real time analysis. In this research article, a system to detect distributed intrusion attacks is developed and the quality of fulfilment is evaluated using Raspberry Pi. The experimental study shows that the proposed mechanism can be used in IoT devices with least computation process and the used CEP is technically feasible resolution to enhance the performance of intrusion detection systems in detecting distributed intrusion attacks IoT environment.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Face Recognition in CCTV Systems 人脸识别在闭路电视系统
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987961
Jinu Celine, S. A
As the technology developed in its peak, human beings highly dependable on its applications. Closed-Circuit Television (CCTV) is one of such technological invention of human which assures the security of the firms and offices in a great extent. Even though CCTV systems are highly useful for the observational purposes, it also possess some requirements. In a circumstantial such as a robbery happened inside a bank the forensic analysis can be done through the footage from the CCTV systems itself. The parameters which influences the identification process are lot such as the camera quality, distance measurements from object to camera, the angle of the camera etc. Here two phases are including in the facial recognition technique. In the first phase we collect different faces of subjects to form the database. In the second phase we extract target face from the CCTV evidence footage and it undergoes image enhancement process to create a good quality output images for the comparison process with the database images.
随着技术发展到顶峰,人类对其应用高度依赖。闭路电视是人类的一项技术发明,它在很大程度上保证了企业和办公场所的安全。尽管闭路电视系统在观测方面非常有用,但它也有一些要求。在像银行内发生的抢劫这样的情况下,法医分析可以通过闭路电视系统本身的录像来完成。影响识别过程的参数有很多,如相机质量、物体到相机的距离测量、相机的角度等。面部识别技术包括两个阶段。在第一阶段,我们收集受试者的不同面孔形成数据库。第二阶段从CCTV证据片段中提取目标人脸,并对其进行图像增强处理,生成高质量的输出图像,用于与数据库图像进行比对。
{"title":"Face Recognition in CCTV Systems","authors":"Jinu Celine, S. A","doi":"10.1109/ICSSIT46314.2019.8987961","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987961","url":null,"abstract":"As the technology developed in its peak, human beings highly dependable on its applications. Closed-Circuit Television (CCTV) is one of such technological invention of human which assures the security of the firms and offices in a great extent. Even though CCTV systems are highly useful for the observational purposes, it also possess some requirements. In a circumstantial such as a robbery happened inside a bank the forensic analysis can be done through the footage from the CCTV systems itself. The parameters which influences the identification process are lot such as the camera quality, distance measurements from object to camera, the angle of the camera etc. Here two phases are including in the facial recognition technique. In the first phase we collect different faces of subjects to form the database. In the second phase we extract target face from the CCTV evidence footage and it undergoes image enhancement process to create a good quality output images for the comparison process with the database images.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Non contact Two Dimensional Strain Measurement Based on Improved Sub Image Search Algorithm using Correlation Technique 基于改进的相关子图像搜索算法的非接触二维应变测量
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987916
S. Shifani, M. Premi
Strain is a proportion of the measure of stretch or pressure onward a component. Strain estimation is a fundamental factor of components analyzing. There are countless strain estimation systems: particularly electrical obstruction strain check, extrensometer, geometric Moire strategy also optical strain estimation technique among others. Encompassed by the various procedures for strain estimation, digital image correlation (DIC) has been demonstrated to be truly adaptable, powerful and simple to utilize. The target of this research is to build up an improved sub image algorithm based correlation method that figures the strain in a stacked structural part. This can be accomplished by utilizing digital image correlation techniques systems which matches the relocation of the irregular spots design in the reference with the twisted pictures. The new proposed calculation was coded into MATLAB program using the MATLAB's picture handling tool compartment. Tensile test tested worth and with conventional algorithm. And furthermore, our proposed strategy demonstrated that is given the better accuracy and execution time is diminished. All in all, the two dimentional proposed calculation had been effectively created
应变是一个部件所受拉伸或压力的比例。应变估计是部件分析的一个基本因素。应变估计系统数不胜数:特别是电阻应变检查、极值仪、几何云纹策略以及光学应变估计技术等。在应变估计的各种程序中,数字图像相关(DIC)已被证明具有真正的适应性,功能强大且易于使用。本研究的目标是建立一种改进的基于子图像算法的相关方法来计算堆叠结构部件的应变。这可以通过利用数字图像相关技术系统来实现,该系统将参考文献中不规则点的重新定位设计与扭曲图像相匹配。利用MATLAB的图像处理工具箱将新算法编码到MATLAB程序中。拉伸试验值与常规算法比较。此外,我们提出的策略表明,在给定更好的精度和减少执行时间。总而言之,所提出的二维计算已有效地建立起来
{"title":"Non contact Two Dimensional Strain Measurement Based on Improved Sub Image Search Algorithm using Correlation Technique","authors":"S. Shifani, M. Premi","doi":"10.1109/ICSSIT46314.2019.8987916","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987916","url":null,"abstract":"Strain is a proportion of the measure of stretch or pressure onward a component. Strain estimation is a fundamental factor of components analyzing. There are countless strain estimation systems: particularly electrical obstruction strain check, extrensometer, geometric Moire strategy also optical strain estimation technique among others. Encompassed by the various procedures for strain estimation, digital image correlation (DIC) has been demonstrated to be truly adaptable, powerful and simple to utilize. The target of this research is to build up an improved sub image algorithm based correlation method that figures the strain in a stacked structural part. This can be accomplished by utilizing digital image correlation techniques systems which matches the relocation of the irregular spots design in the reference with the twisted pictures. The new proposed calculation was coded into MATLAB program using the MATLAB's picture handling tool compartment. Tensile test tested worth and with conventional algorithm. And furthermore, our proposed strategy demonstrated that is given the better accuracy and execution time is diminished. All in all, the two dimentional proposed calculation had been effectively created","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent City Disaster Prevention and Mitigation System based on Visual Tracking Technology 基于视觉跟踪技术的智慧城市防灾减灾系统
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987968
Lianbing Deng, Daming Li
Intelligent city disaster prevention and mitigation system based on the visual tracking technology is designed and implemented in this paper. In the paper, the listed novelties have been proposed. (1) By predicting the hazard factors, combined with the conditions of the disaster-preventing environment and the hazard-bearing body, comprehensively assess the possible impacts of the disasters and take the corresponding preventive measures with the IoT and image analysis. (2) Provide decision support for general emergency command system, conduct daily management of the expertise, resources and plans required by the emergency command, collect disaster information and make early warning and prediction for emergency preparation with the visual analysis system. The experimental analysis gives overview judgement of the related issues.
本文设计并实现了基于视觉跟踪技术的智慧城市防灾减灾系统。在本文中,我们列出了一些新颖之处。(1)通过对灾害因素的预测,结合防灾环境和承灾体的状况,结合物联网和图像分析,综合评估灾害可能产生的影响,并采取相应的预防措施。(2)为总应急指挥系统提供决策支持,对应急指挥所需的专业知识、资源和计划进行日常管理,利用可视化分析系统收集灾害信息,对应急准备进行预警和预测。实验分析对相关问题进行了概括性判断。
{"title":"Intelligent City Disaster Prevention and Mitigation System based on Visual Tracking Technology","authors":"Lianbing Deng, Daming Li","doi":"10.1109/ICSSIT46314.2019.8987968","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987968","url":null,"abstract":"Intelligent city disaster prevention and mitigation system based on the visual tracking technology is designed and implemented in this paper. In the paper, the listed novelties have been proposed. (1) By predicting the hazard factors, combined with the conditions of the disaster-preventing environment and the hazard-bearing body, comprehensively assess the possible impacts of the disasters and take the corresponding preventive measures with the IoT and image analysis. (2) Provide decision support for general emergency command system, conduct daily management of the expertise, resources and plans required by the emergency command, collect disaster information and make early warning and prediction for emergency preparation with the visual analysis system. The experimental analysis gives overview judgement of the related issues.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A detailed survey on Bandwidth efficient cluster based routing schemes in wireless sensor networks 无线传感器网络中基于带宽高效簇的路由方案的详细研究
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987867
S. Barath, I. Harika, S. Gowtham, B. Karthik, N. Kumar, V. Madhumitha
Wireless sensor networks for military operations, ground surveillance and more are widely used. As each sensing device has batteries, the energy consumption effectiveness in the network is a real time problem which depends on the placement of each sensing device. Many of the existing procedures use gathering techniques to measure power consumption between sensing devices by collecting information. A cluster consists of several sensor nodes, one of which is a head of the cluster. The information collected by the head cluster from all other members is transmitted to the main station. The important function of the WSN protocol is to transmit this discovered information to the BS.
无线传感器网络广泛应用于军事行动、地面监视等领域。由于每个传感设备都有电池,因此网络中的能量消耗效率是一个实时问题,它取决于每个传感设备的位置。许多现有的程序使用收集技术通过收集信息来测量传感设备之间的功耗。一个集群由多个传感器节点组成,其中一个节点是集群的头部。由主集群从所有其他成员收集的信息被传送到主站。WSN协议的重要功能是将这些发现的信息传输到BS。
{"title":"A detailed survey on Bandwidth efficient cluster based routing schemes in wireless sensor networks","authors":"S. Barath, I. Harika, S. Gowtham, B. Karthik, N. Kumar, V. Madhumitha","doi":"10.1109/ICSSIT46314.2019.8987867","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987867","url":null,"abstract":"Wireless sensor networks for military operations, ground surveillance and more are widely used. As each sensing device has batteries, the energy consumption effectiveness in the network is a real time problem which depends on the placement of each sensing device. Many of the existing procedures use gathering techniques to measure power consumption between sensing devices by collecting information. A cluster consists of several sensor nodes, one of which is a head of the cluster. The information collected by the head cluster from all other members is transmitted to the main station. The important function of the WSN protocol is to transmit this discovered information to the BS.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Kapferer Mine Network using Graph Energy Ranking 基于图能量排序的Kapferer矿网分析
Pub Date : 2019-11-01 DOI: 10.1109/ICSSIT46314.2019.8987940
S. Mahadevi, S. Kamath
Vertex centrality is one of the procedures to evaluate complex networks, and it can disclose current patterns of networks. By evaluating their structural characteristics, it enables us to understand networks and their elements. One of the complex networks of nodes and interactions is the social network. It is increasing very greatly every day owing to the addition of fresh nodes. In such a vast network, therefore, not all nodes are equally essential, identifying influential nodes becomes a practical issue. To quantify the significance of nodes in networks, centrality measures were implemented. The multiple criteria are used to select critical nodes in the network. Various centrality measures such as Betweenness Centrality, Degree Centrality, Closeness Centrality, and some well-known centrality measures are therefore used to define vital nodes. In this article, we suggested a centrality to rank the nodes using a graph invariant called graph energy named as Graph-Energy-Ranking (GER). GER provides a better knowledge of the current network by evaluating the effect of node deletion on graph connectivity and thus enables us to better understand and maintain the network. In the current paper GER is applied on well-known social network called Kapferer mine network and results have been discussed.
顶点中心性是评估复杂网络的方法之一,它可以揭示网络的当前模式。通过评估网络的结构特征,它使我们能够理解网络及其构成要素。社会网络是节点和相互作用的复杂网络之一。由于新节点的增加,它每天都在极大地增加。因此,在如此庞大的网络中,并非所有节点都同等重要,识别有影响力的节点成为一个实际问题。为了量化网络中节点的重要性,实施了中心性度量。采用多种标准选择网络中的关键节点。因此,使用各种中心性度量,如中间中心性、度中心性、接近中心性和一些众所周知的中心性度量来定义重要节点。在本文中,我们建议使用一种称为图能量的图不变量(graph - energy - ranking, GER)来对节点进行中心性排序。GER通过评估节点删除对图连通性的影响,更好地了解当前网络,从而使我们能够更好地理解和维护网络。本文将GER应用于知名社交网络Kapferer mine网络,并对结果进行了讨论。
{"title":"Analysis of Kapferer Mine Network using Graph Energy Ranking","authors":"S. Mahadevi, S. Kamath","doi":"10.1109/ICSSIT46314.2019.8987940","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987940","url":null,"abstract":"Vertex centrality is one of the procedures to evaluate complex networks, and it can disclose current patterns of networks. By evaluating their structural characteristics, it enables us to understand networks and their elements. One of the complex networks of nodes and interactions is the social network. It is increasing very greatly every day owing to the addition of fresh nodes. In such a vast network, therefore, not all nodes are equally essential, identifying influential nodes becomes a practical issue. To quantify the significance of nodes in networks, centrality measures were implemented. The multiple criteria are used to select critical nodes in the network. Various centrality measures such as Betweenness Centrality, Degree Centrality, Closeness Centrality, and some well-known centrality measures are therefore used to define vital nodes. In this article, we suggested a centrality to rank the nodes using a graph invariant called graph energy named as Graph-Energy-Ranking (GER). GER provides a better knowledge of the current network by evaluating the effect of node deletion on graph connectivity and thus enables us to better understand and maintain the network. In the current paper GER is applied on well-known social network called Kapferer mine network and results have been discussed.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1