首页 > 最新文献

2019 International Conference on Communication and Electronics Systems (ICCES)最新文献

英文 中文
Internet of Things (IoT) enabled Sustainable Home Automation along with Security using Solar Energy 物联网(IoT)利用太阳能实现可持续家庭自动化和安全
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002526
S. Amit, A. S. Koshy, S. Samprita, Shwetali Joshi, N. Ranjitha
Home automation is a very important part of “The Internet of Things” popularly called as IoT. IoT provides a solution for seamless control over all the appliances at home. Home automation exists since many decades for controlling basic equipments of home like the lights and simple appliances. Present Technology expects the world to be interconnected with a touch of flngerprints or simple voice commands. The aim of it is to design and construct a home automation system which will switch on or off any household devices that are connected to it, using microcontroller, mobile or Alexa with the help of Wi-Fi. It is socially relevant and its implementation is cost effective. In our project controlling of appliances or equipment is through Alexa or mobile. We have also included an important aspect that is home security by making provisions for door (open and close), movement, fire and gas leak detection. The controllers used here are Node MCU and Arduino mini for automation and security respectively. We are using solar panels as the source of power for the equipments. It has a charging unit and a smart power management unit.
家庭自动化是“物联网”的重要组成部分,通常被称为IoT。物联网为无缝控制家中所有电器提供了解决方案。家庭自动化已经存在了几十年,用于控制家庭的基本设备,如灯和简单的电器。现代科技期望世界通过触摸指纹或简单的语音命令连接起来。它的目的是设计和构建一个家庭自动化系统,该系统将在Wi-Fi的帮助下使用微控制器,手机或Alexa打开或关闭任何连接到它的家用设备。它具有社会相关性,其实施具有成本效益。在我们的项目中,电器或设备的控制是通过Alexa或手机。我们还包括了一个重要的方面,即家庭安全,通过提供门(打开和关闭),运动,火灾和气体泄漏检测。这里使用的控制器是Node MCU和Arduino mini,分别用于自动化和安全。我们正在使用太阳能电池板作为设备的电源。它有一个充电单元和一个智能电源管理单元。
{"title":"Internet of Things (IoT) enabled Sustainable Home Automation along with Security using Solar Energy","authors":"S. Amit, A. S. Koshy, S. Samprita, Shwetali Joshi, N. Ranjitha","doi":"10.1109/ICCES45898.2019.9002526","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002526","url":null,"abstract":"Home automation is a very important part of “The Internet of Things” popularly called as IoT. IoT provides a solution for seamless control over all the appliances at home. Home automation exists since many decades for controlling basic equipments of home like the lights and simple appliances. Present Technology expects the world to be interconnected with a touch of flngerprints or simple voice commands. The aim of it is to design and construct a home automation system which will switch on or off any household devices that are connected to it, using microcontroller, mobile or Alexa with the help of Wi-Fi. It is socially relevant and its implementation is cost effective. In our project controlling of appliances or equipment is through Alexa or mobile. We have also included an important aspect that is home security by making provisions for door (open and close), movement, fire and gas leak detection. The controllers used here are Node MCU and Arduino mini for automation and security respectively. We are using solar panels as the source of power for the equipments. It has a charging unit and a smart power management unit.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114981936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Hybrid Approach to Improve Full Coverage in Wireless Sensor Networks: Full Coverage Improving Hybrid Approach 一种改进无线传感器网络全覆盖的混合方法:全覆盖改进混合方法
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002146
A. K. Sohal, A. Sharma, Neetu Sood
In this paper, we propose a hybrid approach for wireless sensor networks which can reduce the total energy consumption of network operation therefore improving network lifetime along with complete coverage of remote monitoring field. The proposed method named as Hybrid Weight based Coverage Enhancing Protocol (H-WCEP) helps to select appropriate cluster heads and their respective cluster members by using weighted sum method and subsequent routing path by genetic algorithm. The network lifetime and coverage lifetime are computed by implementing this approach to achieve continuously monitoring of remote monitoring areas. The results of H-WCEP outperform as compared to other existing protocols. The network lifetime and full coverage lifetime of H-WCEP increase by 48 percentage and 42 percentage approximately respectively.
本文提出了一种用于无线传感器网络的混合方法,该方法可以降低网络运行的总能耗,从而提高网络寿命,同时完全覆盖远程监控领域。提出的基于混合权重的覆盖增强协议(H-WCEP)采用加权和方法选择合适的簇头及其各自的簇成员,后续路由路径采用遗传算法。通过实现该方法计算网络生存期和覆盖生存期,实现对远程监控区域的连续监控。与其他现有协议相比,H-WCEP的结果优于其他协议。H-WCEP的网络寿命和全覆盖寿命分别提高了约48%和42%。
{"title":"A Hybrid Approach to Improve Full Coverage in Wireless Sensor Networks: Full Coverage Improving Hybrid Approach","authors":"A. K. Sohal, A. Sharma, Neetu Sood","doi":"10.1109/ICCES45898.2019.9002146","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002146","url":null,"abstract":"In this paper, we propose a hybrid approach for wireless sensor networks which can reduce the total energy consumption of network operation therefore improving network lifetime along with complete coverage of remote monitoring field. The proposed method named as Hybrid Weight based Coverage Enhancing Protocol (H-WCEP) helps to select appropriate cluster heads and their respective cluster members by using weighted sum method and subsequent routing path by genetic algorithm. The network lifetime and coverage lifetime are computed by implementing this approach to achieve continuously monitoring of remote monitoring areas. The results of H-WCEP outperform as compared to other existing protocols. The network lifetime and full coverage lifetime of H-WCEP increase by 48 percentage and 42 percentage approximately respectively.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fusion Methods & Applications – A Survey 融合方法与应用-综述
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002396
F. Francis, Maya Mohan
Data fusion is the process in which integration of multiple data sources produce more consistent, efficient, and useful information than that provided by any of the individual data source. The fusion methods can be broadly classified with the help of class information. The fusion methods such as serial feature fusion, parallel feature fusion and canonical correlation analysis (CCA) does not contain any class information. That is, they are unsupervised fusion methods. The methods such as cluster CCA, Generalized Multiview Analysis, Linear Discriminant Analysis, Multiview Discriminant Analysis, Discriminative Multiple CCA, Locality Preserving CCA (LPCCA), BGLPCCA, MGLPCCA contain class information. Applications of each fusion methods are also taken into consideration.
数据融合是这样一个过程:多个数据源的集成产生比任何单个数据源提供的信息更一致、更高效、更有用的信息。融合方法可以借助类信息进行广义分类。串行特征融合、并行特征融合和典型相关分析(CCA)等融合方法不包含任何类信息。也就是说,它们是无监督的融合方法。聚类CCA、广义多视图分析、线性判别分析、多视图判别分析、判别多重CCA、局部保持CCA (LPCCA)、BGLPCCA、MGLPCCA等方法包含了类信息。并对每种融合方法的应用进行了分析。
{"title":"Fusion Methods & Applications – A Survey","authors":"F. Francis, Maya Mohan","doi":"10.1109/ICCES45898.2019.9002396","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002396","url":null,"abstract":"Data fusion is the process in which integration of multiple data sources produce more consistent, efficient, and useful information than that provided by any of the individual data source. The fusion methods can be broadly classified with the help of class information. The fusion methods such as serial feature fusion, parallel feature fusion and canonical correlation analysis (CCA) does not contain any class information. That is, they are unsupervised fusion methods. The methods such as cluster CCA, Generalized Multiview Analysis, Linear Discriminant Analysis, Multiview Discriminant Analysis, Discriminative Multiple CCA, Locality Preserving CCA (LPCCA), BGLPCCA, MGLPCCA contain class information. Applications of each fusion methods are also taken into consideration.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"65 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120888764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient Session Initiation Protocol authentication scheme for VoIP Communications 安全高效的VoIP通信会话发起协议认证方案
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002125
B. Gupta, Varun Prajapati
Session Initiation Protocol (SIP) is widely used in Voice-over-IP (VoIP) communication to initiate communication between user and server. SIP authentication mechanism was found insecure against various attacks because of its inherent open text architecture. We analyzed different models for SIP authentication and noted their vulnerability against various attacks. Major identified weakness was lack of mutual authentication in various schemes. In this paper, we provide a new authentication model for SIP communication for secure communication establishment. We use AVISPA tool for formal security evaluation of our model. We then prove how our model can resist against various known attacks and provide mutual authentication. Our model is relatively more efficient as we use symmetric key cryptography with ECC instead of asymmetric key cryptography.
SIP (Session Initiation Protocol)是一种广泛应用于VoIP (Voice-over-IP)通信的协议,用于发起用户与服务器之间的通信。SIP认证机制由于其固有的开放文本结构,对各种攻击都不安全。我们分析了SIP身份验证的不同模型,并指出了它们对各种攻击的脆弱性。主要的弱点是在各种方案中缺乏相互认证。本文提出了一种新的SIP通信认证模型,用于建立安全的SIP通信。我们使用AVISPA工具对我们的模型进行正式的安全评估。然后我们证明我们的模型如何能够抵抗各种已知的攻击并提供相互身份验证。我们的模型相对更高效,因为我们使用ECC对称密钥加密而不是非对称密钥加密。
{"title":"Secure and efficient Session Initiation Protocol authentication scheme for VoIP Communications","authors":"B. Gupta, Varun Prajapati","doi":"10.1109/ICCES45898.2019.9002125","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002125","url":null,"abstract":"Session Initiation Protocol (SIP) is widely used in Voice-over-IP (VoIP) communication to initiate communication between user and server. SIP authentication mechanism was found insecure against various attacks because of its inherent open text architecture. We analyzed different models for SIP authentication and noted their vulnerability against various attacks. Major identified weakness was lack of mutual authentication in various schemes. In this paper, we provide a new authentication model for SIP communication for secure communication establishment. We use AVISPA tool for formal security evaluation of our model. We then prove how our model can resist against various known attacks and provide mutual authentication. Our model is relatively more efficient as we use symmetric key cryptography with ECC instead of asymmetric key cryptography.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120959039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Immense Preference Data Forwarding (IPDF) Scheme incorporated with Constructive Time Slot Allocation in IEEE 802.15.4 for Wireless Body Area Networks IEEE 802.15.4无线体域网络中结合建设性时隙分配的巨大偏好数据转发(IPDF)方案的性能分析
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002049
S. Sindhuja Banu, K. Baskaran
A large time delay during emergency data transfer in WBAN is a challenging task since it involves transmission of time sensitive crucial information to the receiver for immediate treatment of the patient. This paper aims in providing an efficient transmission of Immense Preference Data (IPD) to the respective end user with minimal delay and energy consumption. IEEE 802.15.4 MAC superframe was altered within permitted standards and IPDF Routing Scheme was designed and implemented in which, time slots were efficiently allocated according to data type. Guaranteed Time Slots (GTS) in Contention Free Period (CFP) was allocated to IPD of the slot's possessor and the non-possessor node at t0 and t1 respectively. This provides an immediate and guaranteed transfer of data without any further delay and unnecessary waiting time for channel contention at Contention Access Period (CAP) was also reduced, so as to add to the minimization of power consumption and latency. CAP was further divided into two phases for transmitting Minor Preference Data (MPD) of possessor and non-possessor which minimizes collision of data packets that further decreases delay and power consumption of MPD. Simulations and performance analysis of IPDF scheme were carried out in NS2. Delay and power consumption minimization and PDR and throughput maximization for IPD in comparison to IEEE 802.15.4 MAC standard and PA-MAC was achieved.
在无线宽带网络中,紧急数据传输过程中的大时间延迟是一项具有挑战性的任务,因为它涉及将时间敏感的关键信息传输到接收器以立即治疗患者。本文旨在以最小的延迟和能量消耗,将海量偏好数据(IPD)有效地传输到各自的最终用户。在允许的标准范围内修改IEEE 802.15.4 MAC超帧,设计并实现了根据数据类型有效分配时隙的IPDF路由方案。争用空闲期(CFP)中的保证时隙(GTS)分别在t0和t1分配给该时隙的占有者和非占有者节点的IPD。这提供了即时和有保证的数据传输,而没有任何进一步的延迟,并且还减少了在争用访问周期(CAP)上通道争用的不必要等待时间,从而使功耗和延迟最小化。CAP进一步分为两个阶段,分别传输所有者和非所有者的次要偏好数据(MPD),从而最大限度地减少数据包的碰撞,从而进一步降低MPD的延迟和功耗。在NS2中对IPDF方案进行了仿真和性能分析。与IEEE 802.15.4 MAC标准和PA-MAC相比,IPD实现了延迟和功耗最小化、PDR和吞吐量最大化。
{"title":"Performance Analysis of Immense Preference Data Forwarding (IPDF) Scheme incorporated with Constructive Time Slot Allocation in IEEE 802.15.4 for Wireless Body Area Networks","authors":"S. Sindhuja Banu, K. Baskaran","doi":"10.1109/ICCES45898.2019.9002049","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002049","url":null,"abstract":"A large time delay during emergency data transfer in WBAN is a challenging task since it involves transmission of time sensitive crucial information to the receiver for immediate treatment of the patient. This paper aims in providing an efficient transmission of Immense Preference Data (IPD) to the respective end user with minimal delay and energy consumption. IEEE 802.15.4 MAC superframe was altered within permitted standards and IPDF Routing Scheme was designed and implemented in which, time slots were efficiently allocated according to data type. Guaranteed Time Slots (GTS) in Contention Free Period (CFP) was allocated to IPD of the slot's possessor and the non-possessor node at t0 and t1 respectively. This provides an immediate and guaranteed transfer of data without any further delay and unnecessary waiting time for channel contention at Contention Access Period (CAP) was also reduced, so as to add to the minimization of power consumption and latency. CAP was further divided into two phases for transmitting Minor Preference Data (MPD) of possessor and non-possessor which minimizes collision of data packets that further decreases delay and power consumption of MPD. Simulations and performance analysis of IPDF scheme were carried out in NS2. Delay and power consumption minimization and PDR and throughput maximization for IPD in comparison to IEEE 802.15.4 MAC standard and PA-MAC was achieved.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121053103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tree based node verification key management scheme for wireless sensor networks 基于树的无线传感器网络节点验证密钥管理方案
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002536
B. Srinivas, N Rukma Rekha, Y. V. Subbarao
Sensor nodes are usually geographically placed across the particular environment. Sensor nodes are limited in capacities like computation power, memory, and processing speed. They collect sensitive information and send to the central base station. A novel TNVS is proposed that identifies certain nodes as authenticator nodes that have relatively high capability in storage, computation and power compared to the regular sensor nodes. These nodes are used for verifying new nodes that are being added into the network, thereby eliminating the entry of malicious nodes into the network. The master key that is shared by all the nodes of the network is renewed periodically to avoid node capture attack. Simulation and results show that in addition to providing authentication TNVS also requires less number of keys when compared to the existing key management schemes there by reducing the burden on memory requirement of the network.
传感器节点通常在地理位置上放置在特定环境中。传感器节点在计算能力、内存和处理速度等能力方面受到限制。它们收集敏感信息并发送到中央基站。提出了一种新型的TNVS,该TNVS将某些节点识别为认证节点,与常规传感器节点相比,这些节点在存储、计算和功率方面具有相对较高的能力。这些节点用于验证正在添加到网络中的新节点,从而消除恶意节点进入网络。定期更新网络中所有节点共享的主密钥,避免节点捕获攻击。仿真和结果表明,与现有的密钥管理方案相比,TNVS除了提供身份验证外,还减少了对网络内存需求的负担,从而减少了所需的密钥数量。
{"title":"Tree based node verification key management scheme for wireless sensor networks","authors":"B. Srinivas, N Rukma Rekha, Y. V. Subbarao","doi":"10.1109/ICCES45898.2019.9002536","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002536","url":null,"abstract":"Sensor nodes are usually geographically placed across the particular environment. Sensor nodes are limited in capacities like computation power, memory, and processing speed. They collect sensitive information and send to the central base station. A novel TNVS is proposed that identifies certain nodes as authenticator nodes that have relatively high capability in storage, computation and power compared to the regular sensor nodes. These nodes are used for verifying new nodes that are being added into the network, thereby eliminating the entry of malicious nodes into the network. The master key that is shared by all the nodes of the network is renewed periodically to avoid node capture attack. Simulation and results show that in addition to providing authentication TNVS also requires less number of keys when compared to the existing key management schemes there by reducing the burden on memory requirement of the network.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of 8-bit Novel Adder Architecture Design using Traditional CMOS and m-GDI technique 基于传统CMOS和m-GDI技术的新型8位加法器结构设计的比较分析
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002573
Gautam Nayan
Addition is a standout amongst the most fundamental operations in VLSI frameworks such as microprocessors and digital signal processing systems. Therefore, the adders must render a high speed operation into existence. This paper proposes a novel implementation of 8-bit adder architecture using modified Gate Diffusion Input (m-GDI) approach. The primary blocks of adder are partial full adder, 1-bit full adder, 4-bit ripple carry adder (RCA), 4-bit carry look ahead adder (CLA). The proposed adder architecture devours 70% lesser area, 71 % lesser delay and 35% lesser power dissipation w.r.t traditional CMOS design. The proposed adder is implemented utilizing Cadence Virtuoso Tool in 180nm technology.
加法是VLSI框架(如微处理器和数字信号处理系统)中最基本的操作之一。因此,加法器必须实现高速操作。本文提出了一种利用改进的门扩散输入(m-GDI)方法实现8位加法器结构的新方法。加法器的主要模块是部分全加法器、1位全加法器、4位纹波进位加法器(RCA)、4位进位前置加法器(CLA)。与传统CMOS设计相比,该加法器结构占地面积减少70%,延迟减少71%,功耗减少35%。该加法器采用Cadence Virtuoso工具在180nm工艺下实现。
{"title":"A Comparative Analysis of 8-bit Novel Adder Architecture Design using Traditional CMOS and m-GDI technique","authors":"Gautam Nayan","doi":"10.1109/ICCES45898.2019.9002573","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002573","url":null,"abstract":"Addition is a standout amongst the most fundamental operations in VLSI frameworks such as microprocessors and digital signal processing systems. Therefore, the adders must render a high speed operation into existence. This paper proposes a novel implementation of 8-bit adder architecture using modified Gate Diffusion Input (m-GDI) approach. The primary blocks of adder are partial full adder, 1-bit full adder, 4-bit ripple carry adder (RCA), 4-bit carry look ahead adder (CLA). The proposed adder architecture devours 70% lesser area, 71 % lesser delay and 35% lesser power dissipation w.r.t traditional CMOS design. The proposed adder is implemented utilizing Cadence Virtuoso Tool in 180nm technology.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"10136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125170267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Effective Data Normalization Strategy for Academic Datasets using Log Values 使用日志值的学术数据集的有效数据规范化策略
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002089
V. Sathya Durga, T. Jeyaprakash
Data transformation is converting input data from one form to another form. Normalization is a standard data transformation techniques which can be used to transform data. There are many types of normalization techniques, like Min-Max normalization, Cube Root normalization, etc. In this paper, we implement a two-phase normalization process. In the first phase, the data is normalized using Cube Root normalization. Next, the normalized data is still more scaled by applying the logarithmic transformation. Finally, the performance of the transformed values is evaluated against standard metrics.
数据转换是将输入数据从一种形式转换为另一种形式。规范化是一种标准的数据转换技术,可以用来对数据进行转换。有许多类型的归一化技术,如最小最大值归一化、立方根归一化等。在本文中,我们实现了一个两阶段的规范化过程。在第一阶段,使用立方根规范化对数据进行规范化。接下来,通过应用对数变换对规范化数据进行缩放。最后,根据标准度量评估转换值的性能。
{"title":"An Effective Data Normalization Strategy for Academic Datasets using Log Values","authors":"V. Sathya Durga, T. Jeyaprakash","doi":"10.1109/ICCES45898.2019.9002089","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002089","url":null,"abstract":"Data transformation is converting input data from one form to another form. Normalization is a standard data transformation techniques which can be used to transform data. There are many types of normalization techniques, like Min-Max normalization, Cube Root normalization, etc. In this paper, we implement a two-phase normalization process. In the first phase, the data is normalized using Cube Root normalization. Next, the normalized data is still more scaled by applying the logarithmic transformation. Finally, the performance of the transformed values is evaluated against standard metrics.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126099202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Microcontroller rooted collaborative functioning system in Vehicles 基于单片机的车辆协同功能系统
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002240
P. Tarun, T. Pradeep Chandra, G. Anil Kumar, Sudha Yadav
Automobile industry is growing vast throughout the world. The cost of the vehicles are also moderate. There are a large number of personal vehicles. Due to the surge, road accidents are the major problem. It is not only the duty of the person who drives, but also of the vehicle's manufacturer to ensure more preventive systems suitable for our daily routine. Automobile industry had been taking a few safety steps over the last two decades. Few more safety measures are being added to make the system more versatile. There is a large void in post-accident emergency facilities. If emergency services with definite accident location are provided in time, many lives can be hoarded. In this paper, a novel approach is proposed for this issue and adds some safety measures. Our system will not allow drunken people to drive the vehicle; A help request is sent to helpline Centre with accident location when an accident happens; Vehicle stops automatically if there is any leakage of fuel gas; Driver will be alerted if he/she is in drowsiness state and stops the vehicle if continues to drive in drowsiness state.
汽车工业在世界范围内日益壮大。车辆的成本也适中。有大量的私人车辆。由于人口激增,交通事故成为主要问题。这不仅是驾驶者的责任,也是车辆制造商的责任,以确保更多的预防系统适合我们的日常生活。在过去的二十年里,汽车工业一直在采取一些安全措施。为了使系统更加通用,还增加了一些安全措施。事故后应急设施存在很大空白。如果及时提供明确事故地点的应急服务,可以挽救许多生命。本文针对这一问题提出了一种新颖的方法,并增加了一些安全措施。我们的系统不允许醉酒的人驾驶车辆;当意外发生时,向附有意外地点的求助热线中心发出求助请求;燃油气体泄漏时,车辆自动停车;如果驾驶员处于睡意状态,系统会提醒驾驶员,如果在睡意状态下继续驾驶,则会停车。
{"title":"Microcontroller rooted collaborative functioning system in Vehicles","authors":"P. Tarun, T. Pradeep Chandra, G. Anil Kumar, Sudha Yadav","doi":"10.1109/ICCES45898.2019.9002240","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002240","url":null,"abstract":"Automobile industry is growing vast throughout the world. The cost of the vehicles are also moderate. There are a large number of personal vehicles. Due to the surge, road accidents are the major problem. It is not only the duty of the person who drives, but also of the vehicle's manufacturer to ensure more preventive systems suitable for our daily routine. Automobile industry had been taking a few safety steps over the last two decades. Few more safety measures are being added to make the system more versatile. There is a large void in post-accident emergency facilities. If emergency services with definite accident location are provided in time, many lives can be hoarded. In this paper, a novel approach is proposed for this issue and adds some safety measures. Our system will not allow drunken people to drive the vehicle; A help request is sent to helpline Centre with accident location when an accident happens; Vehicle stops automatically if there is any leakage of fuel gas; Driver will be alerted if he/she is in drowsiness state and stops the vehicle if continues to drive in drowsiness state.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116110047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Controllability Intelligence of Lightning Protection System due to 110kV Transmission line 110kV输电线路防雷系统的可控性智能
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002106
M. Ibrahim, Lin Li, Ping Wang
A lightning protection system (LPS) of an urban 110 kV substation is designed and analysed according to NFPA 780 and IEC 62305–3 standards. The analysis of the LPS is based on the value of risk assessment. The total area of the plant is described by one soil layer with uniform resistivity. This study aims to improve the understanding of unexpected attitude of the grounding grid system under lightning strike currents by explaining the basic notion of the lightning protection level. The program is integrated with the CDEGS software, which provides effective geometrical modeling with object and result visualization. Furthermore, module and automated fast Fourier fransform is implemented in this study to simulate electromagnetic fields in the period and frequency scope. These current values are compared to the desired protection levels within the standards. The study results show that for the improved protection of the system against lightning, the total power grid must be considered as a source of improvement for studying shielding influence and the protection levels provided inside this substation.
根据NFPA 780和IEC 62305-3标准,对城市110千伏变电站的防雷系统进行了设计和分析。对LPS的分析是基于风险评估的价值。植物的总面积是用一个具有均匀电阻率的土层来描述的。本研究旨在透过解释防雷等级的基本概念,增进对雷击电流作用下接地网系统意外姿态的了解。该程序与CDEGS软件集成,提供了有效的几何建模与对象和结果可视化。在此基础上,采用模块化和自动化的快速傅里叶变换对周期和频率范围内的电磁场进行模拟。将这些电流值与标准内所需的保护级别进行比较。研究结果表明,为了提高系统的防雷保护能力,必须将总电网作为改进源来研究该变电站的屏蔽影响和保护水平。
{"title":"Controllability Intelligence of Lightning Protection System due to 110kV Transmission line","authors":"M. Ibrahim, Lin Li, Ping Wang","doi":"10.1109/ICCES45898.2019.9002106","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002106","url":null,"abstract":"A lightning protection system (LPS) of an urban 110 kV substation is designed and analysed according to NFPA 780 and IEC 62305–3 standards. The analysis of the LPS is based on the value of risk assessment. The total area of the plant is described by one soil layer with uniform resistivity. This study aims to improve the understanding of unexpected attitude of the grounding grid system under lightning strike currents by explaining the basic notion of the lightning protection level. The program is integrated with the CDEGS software, which provides effective geometrical modeling with object and result visualization. Furthermore, module and automated fast Fourier fransform is implemented in this study to simulate electromagnetic fields in the period and frequency scope. These current values are compared to the desired protection levels within the standards. The study results show that for the improved protection of the system against lightning, the total power grid must be considered as a source of improvement for studying shielding influence and the protection levels provided inside this substation.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Conference on Communication and Electronics Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1