首页 > 最新文献

2019 International Conference on Communication and Electronics Systems (ICCES)最新文献

英文 中文
An Improved Vivaldi Antenna Design for Through- Wall Radar Imaging 一种用于穿壁雷达成像的改进维瓦尔第天线设计
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002282
Rajashree Menon, Sultana Najeeb, Swetha N Prabhu, T. George, Anila Kuriakose, S. Diwakaran
This paper presents an improved Vivaldi antenna design for Through Wall Radar Imaging (TWRI). It is one of the most emerging radar technologies that has different applications in real-life situations. Radar uses EM waves to penetrate through the wall, and then detects the objects behind the wall. Antenna plays a very important role in TWRI system. Vivaldi antenna can be used as an ideal candidate for this system. The antenna presented here operates from the frequency 2.5 GHz to 11.3 GHz and shows a constant radiation pattern in the operating bandwidth. The gain obtained is around 6 dBi. The effect of various antenna parameters are also studied in this paper. Furthermore, corrugations and grating elements are added to analyze the effects on gain and bandwidth. With the above enhancements in design, a bandwidth of 8.8 GHz and an improved gain of around 9.6 dBi has been achieved.
提出了一种用于穿壁雷达成像(TWRI)的改进的维瓦尔第天线设计。它是最新兴的雷达技术之一,在现实生活中有不同的应用。雷达利用电磁波穿透墙壁,然后探测墙后的物体。天线在TWRI系统中起着非常重要的作用。维瓦尔第天线可以作为该系统的理想候选者。这里展示的天线工作频率从2.5 GHz到11.3 GHz,在工作带宽中显示恒定的辐射方向图。获得的增益约为6 dBi。本文还研究了各种天线参数的影响。此外,还加入了波纹和光栅元件,分析了对增益和带宽的影响。通过上述设计增强,实现了8.8 GHz的带宽和9.6 dBi左右的增益改进。
{"title":"An Improved Vivaldi Antenna Design for Through- Wall Radar Imaging","authors":"Rajashree Menon, Sultana Najeeb, Swetha N Prabhu, T. George, Anila Kuriakose, S. Diwakaran","doi":"10.1109/ICCES45898.2019.9002282","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002282","url":null,"abstract":"This paper presents an improved Vivaldi antenna design for Through Wall Radar Imaging (TWRI). It is one of the most emerging radar technologies that has different applications in real-life situations. Radar uses EM waves to penetrate through the wall, and then detects the objects behind the wall. Antenna plays a very important role in TWRI system. Vivaldi antenna can be used as an ideal candidate for this system. The antenna presented here operates from the frequency 2.5 GHz to 11.3 GHz and shows a constant radiation pattern in the operating bandwidth. The gain obtained is around 6 dBi. The effect of various antenna parameters are also studied in this paper. Furthermore, corrugations and grating elements are added to analyze the effects on gain and bandwidth. With the above enhancements in design, a bandwidth of 8.8 GHz and an improved gain of around 9.6 dBi has been achieved.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Non isolated DC DC Boost Converter based on Inductor for DC Microgrid Application 基于电感的直流微电网非隔离直流升压变换器的实现
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002553
Vishwesh Anand Sahasrabudhe, S. Gadgune, V. Savakhande
This article introduces “A high voltage gain non – isolated DC DC converter based on inductors for Microgrid application.” This converter presents high voltage gain without penalty of high duty ratio. The presented converter employs two single inductors, both are charging in parallel and discharging in series. The steady state analysis of proposed converter is shown in section IV. The simulation of proposed converter 17V/182V is developed in MATLAB Simulink to check the feasibility and performance of the converter.
本文介绍了一种应用于微电网的基于电感的高电压增益非隔离直流变换器。该变换器具有高电压增益而不受高占空比的影响。该变换器采用两个单电感并联充电和串联放电。第四节给出了所提变换器的稳态分析。在MATLAB Simulink中对所提变换器17V/182V进行了仿真,验证了所提变换器的可行性和性能。
{"title":"Implementation of Non isolated DC DC Boost Converter based on Inductor for DC Microgrid Application","authors":"Vishwesh Anand Sahasrabudhe, S. Gadgune, V. Savakhande","doi":"10.1109/ICCES45898.2019.9002553","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002553","url":null,"abstract":"This article introduces “A high voltage gain non – isolated DC DC converter based on inductors for Microgrid application.” This converter presents high voltage gain without penalty of high duty ratio. The presented converter employs two single inductors, both are charging in parallel and discharging in series. The steady state analysis of proposed converter is shown in section IV. The simulation of proposed converter 17V/182V is developed in MATLAB Simulink to check the feasibility and performance of the converter.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114349947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voice Activity Detection Using Novel Teager Energy Based Band Spectral Entropy 基于新型Teager能量的频带谱熵语音活动检测
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002565
Raveesh Hegde, R. Muralishankar
There are many features proposed in the literature for voice activity detection (VAD). Shen et al. [20] first used a spectral entropy-based feature to detect regions of speech spurts under noisy conditions. However, VAD employing this feature was unreliable when the noise level greatly exceeds the speech level. To improve the performance of spectral entropy based VAD under low signal-to-noise ratios (SNRs), spectrum of a signal over a frame is divided into sub bands and spectral entropy is computed over these bands. Later, these spectral entropies are weighted and summed to obtain the entropy. Based on the amount of noise in each band, weights were found empirically. This approach was named as banded spectral entropy (BSE) [21]. In [24], deviation threshold computed from approximate ramp line and the sorted spectral coefficients of the band are adopted to decide useful/useless bands. In this paper, we propose a novel Teager Energy Band Spectral Entropy (TE_BSE) feature for VAD. Here, we carryout enhancement of spectral peaks employing Teager energy of each frequency transformed speech frame. This is followed with dividing of spectrum into sub bands and entropy computation over each band. The summing of entropy from each useful band is done to get TE _ BSE feature. We identify useful/useless bands following [24]. Later, we present the performance of our proposed VAD in terms of probability of detection $(pmb{P}_{pmb{D}})$, probability of false alarm $(pmb{P}_{pmb{FA}})$ and probability of error under different noises and SNRs. Finally, from the VAD results on real-world sample, proposed VAD outperforms statistical based VAD by Sohn et. al. [8] with improved $pmb{P}_{pmb{D}}$ not at the cost of increase in $pmb{P}_{pmb{FA}}$.
针对语音活动检测(VAD),文献中提出了许多特征。Shen等人[20]首先使用基于谱熵的特征来检测噪声条件下的语音爆发区域。然而,当噪声水平大大超过语音水平时,采用该特性的VAD是不可靠的。为了提高基于谱熵的VAD在低信噪比条件下的性能,将一帧信号的频谱划分为若干子带,并在这些子带上计算谱熵。然后,对这些谱熵进行加权和,得到熵。根据每个波段的噪声量,经验地确定权重。这种方法被命名为带状谱熵(BSE)[21]。在[24]中,采用从近似斜坡线计算的偏差阈值和对波段进行排序的光谱系数来确定有用/无用波段。本文提出了一种新的Teager能带谱熵(TE_BSE)特征。在这里,我们利用每个频率变换语音帧的Teager能量对频谱峰进行增强。接下来是将频谱划分为子波段,并在每个波段上计算熵。对各有用波段的熵进行求和,得到t_ BSE特征。我们确定了有用/无用的波段如下[24]。随后,我们从检测概率$(pmb{P}_{pmb{D}})$、虚警概率$(pmb{P}_{pmb{FA}})$和不同噪声和信噪比下的误差概率三个方面介绍了我们所提出的VAD的性能。最后,从实际样本的VAD结果来看,本文提出的VAD优于Sohn等人[8]基于统计的VAD,改进了$pmb{P}_{pmb{D}}$,而不是以增加$pmb{P}_{pmb{FA}}$为代价。
{"title":"Voice Activity Detection Using Novel Teager Energy Based Band Spectral Entropy","authors":"Raveesh Hegde, R. Muralishankar","doi":"10.1109/ICCES45898.2019.9002565","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002565","url":null,"abstract":"There are many features proposed in the literature for voice activity detection (VAD). Shen et al. [20] first used a spectral entropy-based feature to detect regions of speech spurts under noisy conditions. However, VAD employing this feature was unreliable when the noise level greatly exceeds the speech level. To improve the performance of spectral entropy based VAD under low signal-to-noise ratios (SNRs), spectrum of a signal over a frame is divided into sub bands and spectral entropy is computed over these bands. Later, these spectral entropies are weighted and summed to obtain the entropy. Based on the amount of noise in each band, weights were found empirically. This approach was named as banded spectral entropy (BSE) [21]. In [24], deviation threshold computed from approximate ramp line and the sorted spectral coefficients of the band are adopted to decide useful/useless bands. In this paper, we propose a novel Teager Energy Band Spectral Entropy (TE_BSE) feature for VAD. Here, we carryout enhancement of spectral peaks employing Teager energy of each frequency transformed speech frame. This is followed with dividing of spectrum into sub bands and entropy computation over each band. The summing of entropy from each useful band is done to get TE _ BSE feature. We identify useful/useless bands following [24]. Later, we present the performance of our proposed VAD in terms of probability of detection $(pmb{P}_{pmb{D}})$, probability of false alarm $(pmb{P}_{pmb{FA}})$ and probability of error under different noises and SNRs. Finally, from the VAD results on real-world sample, proposed VAD outperforms statistical based VAD by Sohn et. al. [8] with improved $pmb{P}_{pmb{D}}$ not at the cost of increase in $pmb{P}_{pmb{FA}}$.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Construction and Simulation of Various Structures of Unimorph Piezoelectric Cantilever for Energy Harvest 能量采集用单晶型压电悬臂梁的结构与仿真
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002157
Newton Rai, M. Nagaraj, Amogh.M. Morey, V. Shantha
Piezoelectric devices are globally considered as the alternative potential source for energy. The main focus of this paper is to maximize the output voltage in different shapes of piezoelectric cantilever beam with the same dimensions. In this paper we compare the power output between conventional structure and modified structure (E-shape) and conclude that modified structure has more possibilities in generating maximum power. The prototype E-shaped structure shows maximum deflection than the conventional one. This energy harvester is able to remove the battery problem in various fields like wireless, biomedical and so on. The various structure of cantilever beam is designed by using COMSOL multi-physics 5.1. The obtained results are compared using MATLAB simulation.
压电器件是全球公认的潜在替代能源。本文的研究重点是在相同尺寸的不同形状的压电悬臂梁上实现输出电压的最大化。本文比较了传统结构和改进结构(e型)的输出功率,认为改进结构产生最大功率的可能性更大。原型e型结构比常规结构挠度最大。这种能量采集器能够解决无线、生物医学等各个领域的电池问题。采用COMSOL multi-physics 5.1软件设计悬臂梁的各种结构。利用MATLAB仿真对所得结果进行了比较。
{"title":"Construction and Simulation of Various Structures of Unimorph Piezoelectric Cantilever for Energy Harvest","authors":"Newton Rai, M. Nagaraj, Amogh.M. Morey, V. Shantha","doi":"10.1109/ICCES45898.2019.9002157","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002157","url":null,"abstract":"Piezoelectric devices are globally considered as the alternative potential source for energy. The main focus of this paper is to maximize the output voltage in different shapes of piezoelectric cantilever beam with the same dimensions. In this paper we compare the power output between conventional structure and modified structure (E-shape) and conclude that modified structure has more possibilities in generating maximum power. The prototype E-shaped structure shows maximum deflection than the conventional one. This energy harvester is able to remove the battery problem in various fields like wireless, biomedical and so on. The various structure of cantilever beam is designed by using COMSOL multi-physics 5.1. The obtained results are compared using MATLAB simulation.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121729131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
STAVI : Smart Travelling Application for the Visually Impaired STAVI:视障人士智能旅行申请
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002238
V. Prerana, S. Tejaswini, Jasmine Manandhar, T. Santhosh, S. Pushpa, T. N. Manjunath
The main objective of this paper was to develop a software application for smart phones to help the visually impaired in assisting their daily activities. The approach focused on helping the visually impaired to navigate from a source to destination without any hassle and to avoid multiple rerouting. The above approach was used to ensure that the users no more faced the issues of re-routing and also provides a voice-based feedback system giving information about their surroundings. Furthermore, the proposed approach was carried out with a single voice assisted application where different features such as calling, messaging, emergency help, landmark and bus stop detection along with the main navigation without rerouting. Hence this helped to provide a single interface voice-based system for the visually impaired to perform basic functionalities on a Smart phone efficiently without depending on another human being for constant assistance.
本文的主要目的是为智能手机开发一个软件应用程序,以帮助视障人士协助他们的日常活动。这种方法的重点是帮助视力受损的人从一个地方导航到目的地,没有任何麻烦,避免多次改道。上述方法用于确保用户不再面临改道的问题,并提供基于语音的反馈系统,提供有关其周围环境的信息。此外,所提出的方法是通过一个单一的语音辅助应用程序来实现的,该应用程序具有不同的功能,如呼叫、消息传递、紧急帮助、地标和公交车站检测以及主导航,而无需重新路由。因此,这有助于为视障人士提供一个基于语音的单一界面系统,让他们在智能手机上高效地执行基本功能,而无需依赖他人的持续帮助。
{"title":"STAVI : Smart Travelling Application for the Visually Impaired","authors":"V. Prerana, S. Tejaswini, Jasmine Manandhar, T. Santhosh, S. Pushpa, T. N. Manjunath","doi":"10.1109/ICCES45898.2019.9002238","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002238","url":null,"abstract":"The main objective of this paper was to develop a software application for smart phones to help the visually impaired in assisting their daily activities. The approach focused on helping the visually impaired to navigate from a source to destination without any hassle and to avoid multiple rerouting. The above approach was used to ensure that the users no more faced the issues of re-routing and also provides a voice-based feedback system giving information about their surroundings. Furthermore, the proposed approach was carried out with a single voice assisted application where different features such as calling, messaging, emergency help, landmark and bus stop detection along with the main navigation without rerouting. Hence this helped to provide a single interface voice-based system for the visually impaired to perform basic functionalities on a Smart phone efficiently without depending on another human being for constant assistance.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SISA: A secret-sharing scheme application for cloud environment SISA:用于云环境的秘密共享方案应用程序
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002527
Rohit B. Chilwant, Taral S. Sarvagod, Kunal R. Kumbhar, Prathmesh N. Gunjgur, A. Vidhate
Security defies one of the galactic barrier when pondering the use of cloud services. Data outsourcing in the cloud (DOC) is conventionally based on data encryption, which imparts impregnable security, but deteriorating the efficiency and rimming the functionalities of cloud. In this proposal we aim to possess them by proposing a secret sharing scheme that depends on partitioning the data and distributed storage over multi-clouds. The scheme used in the proposal uses a combination of symmetric (AES) and asymmetric (RSA) encryption techniques to share the data among the peers in the cloud environment. The proficiency of the suggested scheme has been demonstrated by the empirical results.
在考虑使用云服务时,安全性是最大的障碍之一。云中的数据外包(DOC)传统上是基于数据加密的,它赋予了坚不可摧的安全性,但却降低了云的效率和功能。在这个建议中,我们的目标是通过提出一个秘密共享方案来拥有它们,该方案依赖于在多云上划分数据和分布式存储。提案中使用的方案使用对称(AES)和非对称(RSA)加密技术的组合来在云环境中的对等体之间共享数据。实证结果证明了该方案的有效性。
{"title":"SISA: A secret-sharing scheme application for cloud environment","authors":"Rohit B. Chilwant, Taral S. Sarvagod, Kunal R. Kumbhar, Prathmesh N. Gunjgur, A. Vidhate","doi":"10.1109/ICCES45898.2019.9002527","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002527","url":null,"abstract":"Security defies one of the galactic barrier when pondering the use of cloud services. Data outsourcing in the cloud (DOC) is conventionally based on data encryption, which imparts impregnable security, but deteriorating the efficiency and rimming the functionalities of cloud. In this proposal we aim to possess them by proposing a secret sharing scheme that depends on partitioning the data and distributed storage over multi-clouds. The scheme used in the proposal uses a combination of symmetric (AES) and asymmetric (RSA) encryption techniques to share the data among the peers in the cloud environment. The proficiency of the suggested scheme has been demonstrated by the empirical results.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131969282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Secure Data Transmission Through the Use of Cryptography and Steganography 一种利用密码术和隐写术保证数据传输安全的方法
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002029
K. Manjula Shenoy, S. Shaikh
In this paper, an approach to transfer data securely is proposed. First, from the sender side, the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted data is hidden using Least Significant Bit image steganography concept in a image of the web page and its url is sent to the receiver. Then, at the receiving end, the encrypted data is obtained that is hidden in the image of the web page whose url is sent. This encrypted data is decrypted using the same RSA algorithm. When the sender sends the data to the receiver and incase this data is obtained by the third person or an intruder he will see a URL being sent. Then he will open the URL and he will find a webpage, and he would not find any data being hidden. Then he will try to view the source code of the webpage, and then also he would not find any data being hidden. Thus, the intruder will be assured that no data is been hidden in this and chances are more that he would not go to decode it further. Hence, the chances of doubt an intruder can get that some confidential or private data is hidden in the data being sent is reduced. And hence, the data sent by the sender to the receiver is secured.
本文提出了一种安全传输数据的方法。首先,从发送方,数据使用Rivest-Shamir-Adleman (RSA)算法进行加密,然后使用最低有效位图像隐写术概念将加密的数据隐藏在网页图像中,并将其url发送给接收方。然后,在接收端获得加密后的数据,这些数据隐藏在发送url的网页的图像中。使用相同的RSA算法对加密的数据进行解密。当发送方将数据发送给接收方时,如果该数据被第三方或入侵者获得,他将看到正在发送的URL。然后他会打开URL,他会找到一个网页,他不会发现任何数据被隐藏。然后他会尝试查看网页的源代码,然后他也不会发现任何数据被隐藏。因此,入侵者将确信没有数据隐藏在其中,并且更有可能他不会进一步解码它。因此,入侵者怀疑某些机密或私有数据隐藏在正在发送的数据中的可能性降低了。因此,发送方发送给接收方的数据是安全的。
{"title":"An Approach to Secure Data Transmission Through the Use of Cryptography and Steganography","authors":"K. Manjula Shenoy, S. Shaikh","doi":"10.1109/ICCES45898.2019.9002029","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002029","url":null,"abstract":"In this paper, an approach to transfer data securely is proposed. First, from the sender side, the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted data is hidden using Least Significant Bit image steganography concept in a image of the web page and its url is sent to the receiver. Then, at the receiving end, the encrypted data is obtained that is hidden in the image of the web page whose url is sent. This encrypted data is decrypted using the same RSA algorithm. When the sender sends the data to the receiver and incase this data is obtained by the third person or an intruder he will see a URL being sent. Then he will open the URL and he will find a webpage, and he would not find any data being hidden. Then he will try to view the source code of the webpage, and then also he would not find any data being hidden. Thus, the intruder will be assured that no data is been hidden in this and chances are more that he would not go to decode it further. Hence, the chances of doubt an intruder can get that some confidential or private data is hidden in the data being sent is reduced. And hence, the data sent by the sender to the receiver is secured.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132328887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliable Constrained Application Protocol to Sense and Avoid attacks in WSN for IoT Devices 在物联网设备的WSN中检测和避免攻击的可靠约束应用协议
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002383
D. R, Dr.Chinnaiyan R
The application that are envisioned with IoT has a vital role played by the security. we make use of reliable Constrained Application protocol to sense the threat for the security purpose for any applications associated to IoT devices in a wireless sensor network environment. The task of Sensors sensing and the devices associated to it is, included with the end to end support systern for the interior and exterior communication systems, which are always prone to all threats and attacks. Thus, we here propose a novel framework to sense and avoid the attacks in the framework of Internet-incorporated CoAP communication atmosphere. We here try to consequently estimate efficiency of reliable CoAP to sense and avoid attacks with respect to the DOS attacks in the communication protocol for IoT devices.
物联网所设想的应用程序在安全性方面发挥着至关重要的作用。我们利用可靠的约束应用协议来感知无线传感器网络环境中与物联网设备相关的任何应用程序的安全威胁。传感器传感及其相关设备的任务包括内部和外部通信系统的端到端支持系统,这些系统总是容易受到各种威胁和攻击。因此,我们提出了一种新的框架来感知和避免互联网合并CoAP通信环境下的攻击。因此,我们在此尝试估计可靠CoAP的效率,以感知和避免针对物联网设备通信协议中的DOS攻击的攻击。
{"title":"Reliable Constrained Application Protocol to Sense and Avoid attacks in WSN for IoT Devices","authors":"D. R, Dr.Chinnaiyan R","doi":"10.1109/ICCES45898.2019.9002383","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002383","url":null,"abstract":"The application that are envisioned with IoT has a vital role played by the security. we make use of reliable Constrained Application protocol to sense the threat for the security purpose for any applications associated to IoT devices in a wireless sensor network environment. The task of Sensors sensing and the devices associated to it is, included with the end to end support systern for the interior and exterior communication systems, which are always prone to all threats and attacks. Thus, we here propose a novel framework to sense and avoid the attacks in the framework of Internet-incorporated CoAP communication atmosphere. We here try to consequently estimate efficiency of reliable CoAP to sense and avoid attacks with respect to the DOS attacks in the communication protocol for IoT devices.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130437931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Swarm Optimization techniques using Attribute assortment and Clustering for Machine Learning Classifiers 基于属性分类和聚类的机器学习分类器群优化技术
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002279
T. Vadivu, B. Sumathi
Software defined Networking addresses the growth of traffic with static architectures. SDN is a standard which separates the network structures. Quality of Service is used with network traffic to transfer high bandwidth and multimedia information. Fractional Order Darwinian optimization (FODPSO) is used with Particle Swarm Optimization algorithm to enhance the detection accuracy. In this research paper, comparison of different Classification algorithms are used to achieve better performance.
软件定义的网络通过静态架构解决流量的增长问题。SDN是一种分离网络结构的标准。服务质量与网络流量一起用于传输高带宽和多媒体信息。将分数阶达尔文优化算法(FODPSO)与粒子群优化算法相结合,提高了检测精度。本文对不同的分类算法进行了比较,以获得更好的性能。
{"title":"Swarm Optimization techniques using Attribute assortment and Clustering for Machine Learning Classifiers","authors":"T. Vadivu, B. Sumathi","doi":"10.1109/ICCES45898.2019.9002279","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002279","url":null,"abstract":"Software defined Networking addresses the growth of traffic with static architectures. SDN is a standard which separates the network structures. Quality of Service is used with network traffic to transfer high bandwidth and multimedia information. Fractional Order Darwinian optimization (FODPSO) is used with Particle Swarm Optimization algorithm to enhance the detection accuracy. In this research paper, comparison of different Classification algorithms are used to achieve better performance.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126587654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Saliency Guided Image Super-Resolution using PSO and MLP based Interpolation in Wavelet Domain 基于小波域PSO和MLP插值的显著性引导图像超分辨率
Pub Date : 2019-07-01 DOI: 10.1109/ICCES45898.2019.9002042
Sheetal Shivagunde, M. Biswas
Super resolution algorithms always used as a tradeoff between the cost of the high definition (HD) cameras and the quality and/or clarity of the image obtained. There are various predefined algorithms that obtain Super Resolved images from Low Resolution (LR) images, some (such as, Convolutional Neural Network (CNN), Deep learning, Sparse Representation based algorithms) gives better results for e.g. deburring of zoomed part, removal of noise, color enhancement and so on but are computationally complex or hard to implement in real-time environment whereas some are very simple to use (such as, interpolation based, wavelet based algorithms) but lack quality for e.g. ringing artifacts, edge blurs, poor image quality etc. In this paper, we proposed a method that combines advantages of some of the above mentioned methods. Our proposed method obtains High Resolution (HR) image using saliency model for detection of visually dominant regions, Discrete Wavelet Transform (DWT) for extraction of high frequency details, finally Multi-layer Perceptron (MLP) and Particle Swarm Optimization (PSO) for interpolation. Experimental results visually and quantitatively show that for considered test images our proposed super resolution method appears to be most promising compared to bi-cubic, Chopade et al., Yu et al. and Man et al. methods.
超分辨率算法一直被用作高清晰度(HD)相机的成本与获得的图像质量和/或清晰度之间的权衡。有各种预定义的算法从低分辨率(LR)图像中获得超分辨率图像,一些(如卷积神经网络(CNN),深度学习,基于稀疏表示的算法)给出了更好的结果,例如缩放部分的去毛刺,去除噪声,颜色增强等,但计算复杂或难以在实时环境中实现,而一些非常简单使用(如基于插值,基于小波的算法),但缺乏质量,例如环形伪影,边缘模糊,图像质量差等。在本文中,我们提出了一种结合上述几种方法优点的方法。该方法利用显著性模型检测视觉优势区域,利用离散小波变换(DWT)提取高频细节,最后利用多层感知机(MLP)和粒子群优化(PSO)进行插值,获得高分辨率图像。视觉和定量实验结果表明,对于考虑的测试图像,与双立方、Chopade等、Yu等和Man等方法相比,我们提出的超分辨率方法似乎最有希望。
{"title":"Saliency Guided Image Super-Resolution using PSO and MLP based Interpolation in Wavelet Domain","authors":"Sheetal Shivagunde, M. Biswas","doi":"10.1109/ICCES45898.2019.9002042","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002042","url":null,"abstract":"Super resolution algorithms always used as a tradeoff between the cost of the high definition (HD) cameras and the quality and/or clarity of the image obtained. There are various predefined algorithms that obtain Super Resolved images from Low Resolution (LR) images, some (such as, Convolutional Neural Network (CNN), Deep learning, Sparse Representation based algorithms) gives better results for e.g. deburring of zoomed part, removal of noise, color enhancement and so on but are computationally complex or hard to implement in real-time environment whereas some are very simple to use (such as, interpolation based, wavelet based algorithms) but lack quality for e.g. ringing artifacts, edge blurs, poor image quality etc. In this paper, we proposed a method that combines advantages of some of the above mentioned methods. Our proposed method obtains High Resolution (HR) image using saliency model for detection of visually dominant regions, Discrete Wavelet Transform (DWT) for extraction of high frequency details, finally Multi-layer Perceptron (MLP) and Particle Swarm Optimization (PSO) for interpolation. Experimental results visually and quantitatively show that for considered test images our proposed super resolution method appears to be most promising compared to bi-cubic, Chopade et al., Yu et al. and Man et al. methods.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"289-292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130788019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Communication and Electronics Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1