Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987928
K. Thamaraiselvi, S. Rinesh, L. Ramaparvathy, K. V
Due to the lack of security and safety measures, the crime rate on child abuse has been increased at an unprecedented rate in India. Our propose model will enhance the security and safety especially for girl children in India. In this connection smart band which comprises multiple sensors and programmable hardware. Smart band which communicates with smart phone through wireless communication. The application of a smart band has been developed and installed to smart phone with required quantities & smart band generates signal is send out to smart phone. Track the exact location with help of GPS and the automatic S MS service is done by GSM and screaming alarm which are already preprogrammed, whenever we receive emergency signal, smart phone which will automatically send “help me & save me, I am in danger situation” message along with location send to nearest police station/patrol/control room and also send the message to prime contacts which you saved and also send alert sms to who are all using this application in nearest circumstance. And the smart band will generate electric shocks up to 12 V, and then get started screaming alarm asking help.
{"title":"Internet of Things (IOT) based smart band to ensure the security for women","authors":"K. Thamaraiselvi, S. Rinesh, L. Ramaparvathy, K. V","doi":"10.1109/ICSSIT46314.2019.8987928","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987928","url":null,"abstract":"Due to the lack of security and safety measures, the crime rate on child abuse has been increased at an unprecedented rate in India. Our propose model will enhance the security and safety especially for girl children in India. In this connection smart band which comprises multiple sensors and programmable hardware. Smart band which communicates with smart phone through wireless communication. The application of a smart band has been developed and installed to smart phone with required quantities & smart band generates signal is send out to smart phone. Track the exact location with help of GPS and the automatic S MS service is done by GSM and screaming alarm which are already preprogrammed, whenever we receive emergency signal, smart phone which will automatically send “help me & save me, I am in danger situation” message along with location send to nearest police station/patrol/control room and also send the message to prime contacts which you saved and also send alert sms to who are all using this application in nearest circumstance. And the smart band will generate electric shocks up to 12 V, and then get started screaming alarm asking help.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are various methods in practice to analyze deception by the law enforcing departments. Analyzing handwritten document is still considered to be one of the reliable methods of detecting deception. Handwritten documents are usual and reliable source of communication even in today's scenario. The handwritten text is considered to reflect human's body mind coordination. Researchers state that human behaviour can be analyzed by studying a person's handwriting. The paper consists of studies and implementation of online Handwritten Behaviour Analysis in proxmox-server virtualization Environment. C# language was used to implement the Behaviour Analysis part and python is used to validate the classification accuracy on the collected data. We have extended the previous work to client server mode to highlight the part of online Behaviour analysis to identify the uniqueness in characteristics of any person to differentiate deceptive and true statements. This paper will report the development and deployment of an online virtual server based handwriting behaviour analysis system using SVM based supervised Machine learning algorithm for classification.
{"title":"Handwriting Behaviour Analysis for deception detection using SVM Classifier in virtualized Environment","authors":"Sangam Kumar Chaturvedi, Abhisek Hazra, Asok Bandyopadhyay","doi":"10.1109/ICSSIT46314.2019.8987816","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987816","url":null,"abstract":"There are various methods in practice to analyze deception by the law enforcing departments. Analyzing handwritten document is still considered to be one of the reliable methods of detecting deception. Handwritten documents are usual and reliable source of communication even in today's scenario. The handwritten text is considered to reflect human's body mind coordination. Researchers state that human behaviour can be analyzed by studying a person's handwriting. The paper consists of studies and implementation of online Handwritten Behaviour Analysis in proxmox-server virtualization Environment. C# language was used to implement the Behaviour Analysis part and python is used to validate the classification accuracy on the collected data. We have extended the previous work to client server mode to highlight the part of online Behaviour analysis to identify the uniqueness in characteristics of any person to differentiate deceptive and true statements. This paper will report the development and deployment of an online virtual server based handwriting behaviour analysis system using SVM based supervised Machine learning algorithm for classification.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128828974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987759
B. Kaur, Nikita, H. Sadawarti, Jimmy Singla
The prediction of the kidney diseases is essential to eliminate it on time, so that the life of patient may be saved. The early-stage detection of such diseases is helpful for increasing the life span of suffering patient. In addition, it also decreases the cost of treatment. It is better to build an accurate expert system, which helps to diagnose these diseases before leading to worse conditions. Therefore, many lives can be saved by using these intelligent systems. This review paper compares the performance parameters retrieved from various methods used in various existing studies to diagnose renal disorders or chronic kidney diseases. It provides the comprehensive review of medical expert systems and presents the best methods used to recognize chronic kidney disease (CKD).
{"title":"A Comprehensive Review of Medical Expert Systems for Diagnosis of Chronic Kidney Diseases","authors":"B. Kaur, Nikita, H. Sadawarti, Jimmy Singla","doi":"10.1109/ICSSIT46314.2019.8987759","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987759","url":null,"abstract":"The prediction of the kidney diseases is essential to eliminate it on time, so that the life of patient may be saved. The early-stage detection of such diseases is helpful for increasing the life span of suffering patient. In addition, it also decreases the cost of treatment. It is better to build an accurate expert system, which helps to diagnose these diseases before leading to worse conditions. Therefore, many lives can be saved by using these intelligent systems. This review paper compares the performance parameters retrieved from various methods used in various existing studies to diagnose renal disorders or chronic kidney diseases. It provides the comprehensive review of medical expert systems and presents the best methods used to recognize chronic kidney disease (CKD).","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121063417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987972
Vivank Sharma, Mani Kumari
Unmanned Aerial Vehicles (UAVs) are among the real significant advances that have various significant and advantageous applications. But recently the threats imposed by Unmanned Aerial Vehicles (UAVs), especially small drones, have increased to a greater extent. Unmanned Aerial Vehicles(UAVs) are being misused nowadays for various illegal activities including terrorism and smuggling. Recently, there have been situations where they enter private or confined property. To kill such exercises, a framework has been structured which can distinguish and detect the nearness of obscure little aerial targets, for example, Unmanned Aerial Vehicles (UAVs), specifically small drones. The system is based on the concept of Radio Communication(RC) technology and Internet Protocol(IP) address. This framework is devised such that it detects Internet Protocol(IP) addresses in certain range and using the detected Internet Protocol(IP) addresses and presence or absence of radio waves, detects the presence of Unmanned Aerial Vehicles(UAVs). This system is capable of detecting the presence of unknown Unmanned Aerial Vehicles(UAVs) in certain range. This paper reports on the prototype of the same.
{"title":"Drone Detection Mechanism using Radiocommunication Technology and Internet Protocol Address","authors":"Vivank Sharma, Mani Kumari","doi":"10.1109/ICSSIT46314.2019.8987972","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987972","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are among the real significant advances that have various significant and advantageous applications. But recently the threats imposed by Unmanned Aerial Vehicles (UAVs), especially small drones, have increased to a greater extent. Unmanned Aerial Vehicles(UAVs) are being misused nowadays for various illegal activities including terrorism and smuggling. Recently, there have been situations where they enter private or confined property. To kill such exercises, a framework has been structured which can distinguish and detect the nearness of obscure little aerial targets, for example, Unmanned Aerial Vehicles (UAVs), specifically small drones. The system is based on the concept of Radio Communication(RC) technology and Internet Protocol(IP) address. This framework is devised such that it detects Internet Protocol(IP) addresses in certain range and using the detected Internet Protocol(IP) addresses and presence or absence of radio waves, detects the presence of Unmanned Aerial Vehicles(UAVs). This system is capable of detecting the presence of unknown Unmanned Aerial Vehicles(UAVs) in certain range. This paper reports on the prototype of the same.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115610876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987779
T. Ahanger, U. Tariq, Muneer Nusir
Internet of things is buzzing everywhere due to its applications in defense, military, schools, hospitals, homes, end users. Due to this its vast applications and services, a huge addition using context aware devices has been seen in development of some sectors of applications and services. This set of devices generate huge amount of data that needs quick and technically precise security mechanism to protect all the generated data along with associated services. Complex event processing is an evolving trend that analyses contiguous streams of data using real time analysis. In this research article, a system to detect distributed intrusion attacks is developed and the quality of fulfilment is evaluated using Raspberry Pi. The experimental study shows that the proposed mechanism can be used in IoT devices with least computation process and the used CEP is technically feasible resolution to enhance the performance of intrusion detection systems in detecting distributed intrusion attacks IoT environment.
{"title":"Real-Time Methodology for Improving Cyber Security in Internet of Things Using Edge Computing During Attack Threats","authors":"T. Ahanger, U. Tariq, Muneer Nusir","doi":"10.1109/ICSSIT46314.2019.8987779","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987779","url":null,"abstract":"Internet of things is buzzing everywhere due to its applications in defense, military, schools, hospitals, homes, end users. Due to this its vast applications and services, a huge addition using context aware devices has been seen in development of some sectors of applications and services. This set of devices generate huge amount of data that needs quick and technically precise security mechanism to protect all the generated data along with associated services. Complex event processing is an evolving trend that analyses contiguous streams of data using real time analysis. In this research article, a system to detect distributed intrusion attacks is developed and the quality of fulfilment is evaluated using Raspberry Pi. The experimental study shows that the proposed mechanism can be used in IoT devices with least computation process and the used CEP is technically feasible resolution to enhance the performance of intrusion detection systems in detecting distributed intrusion attacks IoT environment.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987961
Jinu Celine, S. A
As the technology developed in its peak, human beings highly dependable on its applications. Closed-Circuit Television (CCTV) is one of such technological invention of human which assures the security of the firms and offices in a great extent. Even though CCTV systems are highly useful for the observational purposes, it also possess some requirements. In a circumstantial such as a robbery happened inside a bank the forensic analysis can be done through the footage from the CCTV systems itself. The parameters which influences the identification process are lot such as the camera quality, distance measurements from object to camera, the angle of the camera etc. Here two phases are including in the facial recognition technique. In the first phase we collect different faces of subjects to form the database. In the second phase we extract target face from the CCTV evidence footage and it undergoes image enhancement process to create a good quality output images for the comparison process with the database images.
{"title":"Face Recognition in CCTV Systems","authors":"Jinu Celine, S. A","doi":"10.1109/ICSSIT46314.2019.8987961","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987961","url":null,"abstract":"As the technology developed in its peak, human beings highly dependable on its applications. Closed-Circuit Television (CCTV) is one of such technological invention of human which assures the security of the firms and offices in a great extent. Even though CCTV systems are highly useful for the observational purposes, it also possess some requirements. In a circumstantial such as a robbery happened inside a bank the forensic analysis can be done through the footage from the CCTV systems itself. The parameters which influences the identification process are lot such as the camera quality, distance measurements from object to camera, the angle of the camera etc. Here two phases are including in the facial recognition technique. In the first phase we collect different faces of subjects to form the database. In the second phase we extract target face from the CCTV evidence footage and it undergoes image enhancement process to create a good quality output images for the comparison process with the database images.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987916
S. Shifani, M. Premi
Strain is a proportion of the measure of stretch or pressure onward a component. Strain estimation is a fundamental factor of components analyzing. There are countless strain estimation systems: particularly electrical obstruction strain check, extrensometer, geometric Moire strategy also optical strain estimation technique among others. Encompassed by the various procedures for strain estimation, digital image correlation (DIC) has been demonstrated to be truly adaptable, powerful and simple to utilize. The target of this research is to build up an improved sub image algorithm based correlation method that figures the strain in a stacked structural part. This can be accomplished by utilizing digital image correlation techniques systems which matches the relocation of the irregular spots design in the reference with the twisted pictures. The new proposed calculation was coded into MATLAB program using the MATLAB's picture handling tool compartment. Tensile test tested worth and with conventional algorithm. And furthermore, our proposed strategy demonstrated that is given the better accuracy and execution time is diminished. All in all, the two dimentional proposed calculation had been effectively created
{"title":"Non contact Two Dimensional Strain Measurement Based on Improved Sub Image Search Algorithm using Correlation Technique","authors":"S. Shifani, M. Premi","doi":"10.1109/ICSSIT46314.2019.8987916","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987916","url":null,"abstract":"Strain is a proportion of the measure of stretch or pressure onward a component. Strain estimation is a fundamental factor of components analyzing. There are countless strain estimation systems: particularly electrical obstruction strain check, extrensometer, geometric Moire strategy also optical strain estimation technique among others. Encompassed by the various procedures for strain estimation, digital image correlation (DIC) has been demonstrated to be truly adaptable, powerful and simple to utilize. The target of this research is to build up an improved sub image algorithm based correlation method that figures the strain in a stacked structural part. This can be accomplished by utilizing digital image correlation techniques systems which matches the relocation of the irregular spots design in the reference with the twisted pictures. The new proposed calculation was coded into MATLAB program using the MATLAB's picture handling tool compartment. Tensile test tested worth and with conventional algorithm. And furthermore, our proposed strategy demonstrated that is given the better accuracy and execution time is diminished. All in all, the two dimentional proposed calculation had been effectively created","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987968
Lianbing Deng, Daming Li
Intelligent city disaster prevention and mitigation system based on the visual tracking technology is designed and implemented in this paper. In the paper, the listed novelties have been proposed. (1) By predicting the hazard factors, combined with the conditions of the disaster-preventing environment and the hazard-bearing body, comprehensively assess the possible impacts of the disasters and take the corresponding preventive measures with the IoT and image analysis. (2) Provide decision support for general emergency command system, conduct daily management of the expertise, resources and plans required by the emergency command, collect disaster information and make early warning and prediction for emergency preparation with the visual analysis system. The experimental analysis gives overview judgement of the related issues.
{"title":"Intelligent City Disaster Prevention and Mitigation System based on Visual Tracking Technology","authors":"Lianbing Deng, Daming Li","doi":"10.1109/ICSSIT46314.2019.8987968","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987968","url":null,"abstract":"Intelligent city disaster prevention and mitigation system based on the visual tracking technology is designed and implemented in this paper. In the paper, the listed novelties have been proposed. (1) By predicting the hazard factors, combined with the conditions of the disaster-preventing environment and the hazard-bearing body, comprehensively assess the possible impacts of the disasters and take the corresponding preventive measures with the IoT and image analysis. (2) Provide decision support for general emergency command system, conduct daily management of the expertise, resources and plans required by the emergency command, collect disaster information and make early warning and prediction for emergency preparation with the visual analysis system. The experimental analysis gives overview judgement of the related issues.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987867
S. Barath, I. Harika, S. Gowtham, B. Karthik, N. Kumar, V. Madhumitha
Wireless sensor networks for military operations, ground surveillance and more are widely used. As each sensing device has batteries, the energy consumption effectiveness in the network is a real time problem which depends on the placement of each sensing device. Many of the existing procedures use gathering techniques to measure power consumption between sensing devices by collecting information. A cluster consists of several sensor nodes, one of which is a head of the cluster. The information collected by the head cluster from all other members is transmitted to the main station. The important function of the WSN protocol is to transmit this discovered information to the BS.
{"title":"A detailed survey on Bandwidth efficient cluster based routing schemes in wireless sensor networks","authors":"S. Barath, I. Harika, S. Gowtham, B. Karthik, N. Kumar, V. Madhumitha","doi":"10.1109/ICSSIT46314.2019.8987867","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987867","url":null,"abstract":"Wireless sensor networks for military operations, ground surveillance and more are widely used. As each sensing device has batteries, the energy consumption effectiveness in the network is a real time problem which depends on the placement of each sensing device. Many of the existing procedures use gathering techniques to measure power consumption between sensing devices by collecting information. A cluster consists of several sensor nodes, one of which is a head of the cluster. The information collected by the head cluster from all other members is transmitted to the main station. The important function of the WSN protocol is to transmit this discovered information to the BS.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICSSIT46314.2019.8987940
S. Mahadevi, S. Kamath
Vertex centrality is one of the procedures to evaluate complex networks, and it can disclose current patterns of networks. By evaluating their structural characteristics, it enables us to understand networks and their elements. One of the complex networks of nodes and interactions is the social network. It is increasing very greatly every day owing to the addition of fresh nodes. In such a vast network, therefore, not all nodes are equally essential, identifying influential nodes becomes a practical issue. To quantify the significance of nodes in networks, centrality measures were implemented. The multiple criteria are used to select critical nodes in the network. Various centrality measures such as Betweenness Centrality, Degree Centrality, Closeness Centrality, and some well-known centrality measures are therefore used to define vital nodes. In this article, we suggested a centrality to rank the nodes using a graph invariant called graph energy named as Graph-Energy-Ranking (GER). GER provides a better knowledge of the current network by evaluating the effect of node deletion on graph connectivity and thus enables us to better understand and maintain the network. In the current paper GER is applied on well-known social network called Kapferer mine network and results have been discussed.
顶点中心性是评估复杂网络的方法之一,它可以揭示网络的当前模式。通过评估网络的结构特征,它使我们能够理解网络及其构成要素。社会网络是节点和相互作用的复杂网络之一。由于新节点的增加,它每天都在极大地增加。因此,在如此庞大的网络中,并非所有节点都同等重要,识别有影响力的节点成为一个实际问题。为了量化网络中节点的重要性,实施了中心性度量。采用多种标准选择网络中的关键节点。因此,使用各种中心性度量,如中间中心性、度中心性、接近中心性和一些众所周知的中心性度量来定义重要节点。在本文中,我们建议使用一种称为图能量的图不变量(graph - energy - ranking, GER)来对节点进行中心性排序。GER通过评估节点删除对图连通性的影响,更好地了解当前网络,从而使我们能够更好地理解和维护网络。本文将GER应用于知名社交网络Kapferer mine网络,并对结果进行了讨论。
{"title":"Analysis of Kapferer Mine Network using Graph Energy Ranking","authors":"S. Mahadevi, S. Kamath","doi":"10.1109/ICSSIT46314.2019.8987940","DOIUrl":"https://doi.org/10.1109/ICSSIT46314.2019.8987940","url":null,"abstract":"Vertex centrality is one of the procedures to evaluate complex networks, and it can disclose current patterns of networks. By evaluating their structural characteristics, it enables us to understand networks and their elements. One of the complex networks of nodes and interactions is the social network. It is increasing very greatly every day owing to the addition of fresh nodes. In such a vast network, therefore, not all nodes are equally essential, identifying influential nodes becomes a practical issue. To quantify the significance of nodes in networks, centrality measures were implemented. The multiple criteria are used to select critical nodes in the network. Various centrality measures such as Betweenness Centrality, Degree Centrality, Closeness Centrality, and some well-known centrality measures are therefore used to define vital nodes. In this article, we suggested a centrality to rank the nodes using a graph invariant called graph energy named as Graph-Energy-Ranking (GER). GER provides a better knowledge of the current network by evaluating the effect of node deletion on graph connectivity and thus enables us to better understand and maintain the network. In the current paper GER is applied on well-known social network called Kapferer mine network and results have been discussed.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}