首页 > 最新文献

2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)最新文献

英文 中文
Passive sensing and detection of boats along coastline using static sensors 被动感知和探测船只沿海岸线使用静态传感器
R. Kavitha, M. Thayaambika, P. Malini, N. Almelu
One of the main issues confronted by Tamil Nadu Fishermen is encroachment of Indian trawlers into the Northern and Eastern shores of Sri Lanka. This problem becomes more complex when fishermen who unintentionally meander into Sri Lankan area are held captive. So there is a necessity for identifying those vessels which crosses the International Maritime Boundary Line. The Indian coast Guard has to track vessels which sail beyond the boundary and also has to determine the identity of vessel. The identity of the ship is necessary to differentiate registered ships of Tamil Nadu from the unregistered ships which may be considered suspicious. This arises the need for a static sensor which can be installed along the coastal line near Analtivu situated in Northern Province Jaffna of Sri Lanka which can detect, track and identify vessels crossing the border.
泰米尔纳德邦渔民面临的主要问题之一是印度拖网渔船侵入斯里兰卡北部和东部海岸。当无意中进入斯里兰卡海域的渔民被囚禁时,这个问题变得更加复杂。因此,有必要对越过国际海洋分界线的船只进行识别。印度海岸警卫队必须跟踪越过边界的船只,并确定船只的身份。船舶的身份对于区分泰米尔纳德邦的注册船舶和可能被认为是可疑的未注册船舶是必要的。这就需要在斯里兰卡北部贾夫纳省Analtivu附近的海岸线上安装一种静态传感器,可以探测、跟踪和识别越过边界的船只。
{"title":"Passive sensing and detection of boats along coastline using static sensors","authors":"R. Kavitha, M. Thayaambika, P. Malini, N. Almelu","doi":"10.1109/SSPS.2017.8071643","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071643","url":null,"abstract":"One of the main issues confronted by Tamil Nadu Fishermen is encroachment of Indian trawlers into the Northern and Eastern shores of Sri Lanka. This problem becomes more complex when fishermen who unintentionally meander into Sri Lankan area are held captive. So there is a necessity for identifying those vessels which crosses the International Maritime Boundary Line. The Indian coast Guard has to track vessels which sail beyond the boundary and also has to determine the identity of vessel. The identity of the ship is necessary to differentiate registered ships of Tamil Nadu from the unregistered ships which may be considered suspicious. This arises the need for a static sensor which can be installed along the coastal line near Analtivu situated in Northern Province Jaffna of Sri Lanka which can detect, track and identify vessels crossing the border.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133672265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of emerging video coding techniques for enhanced streaming 分析新兴的增强流媒体视频编码技术
V. Sulochana, B. Shanthini
Today in the world of Internet of things, video consumption becomes high due to social media sites and mobile phones. Live streaming, 3DTV, IPTV, 4K technology will be the future of broadcasting. Internet traffic increases exponentially due to video streaming hence the focus of the research is to optimize the performance of streaming. The key challenge is to provide large resolution support in a multicore platform with various medium [1]. Currently H.264 and in future, H.265 will be the most adopted video format. This paper evaluates various video codec's, mainly transition of H.264 to H.265 and its implementation.
在物联网的今天,由于社交媒体网站和手机的出现,视频消费变得很高。直播、3DTV、IPTV、4K技术将是广播的未来。由于视频流的发展,网络流量呈指数级增长,因此优化视频流的性能是研究的重点。关键的挑战是在多种介质的多核平台上提供大分辨率支持[1]。目前H.264和未来H.265将是采用最多的视频格式。本文对各种视频编解码器进行了评价,重点介绍了H.264到H.265的转换及其实现。
{"title":"Analysis of emerging video coding techniques for enhanced streaming","authors":"V. Sulochana, B. Shanthini","doi":"10.1109/SSPS.2017.8071555","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071555","url":null,"abstract":"Today in the world of Internet of things, video consumption becomes high due to social media sites and mobile phones. Live streaming, 3DTV, IPTV, 4K technology will be the future of broadcasting. Internet traffic increases exponentially due to video streaming hence the focus of the research is to optimize the performance of streaming. The key challenge is to provide large resolution support in a multicore platform with various medium [1]. Currently H.264 and in future, H.265 will be the most adopted video format. This paper evaluates various video codec's, mainly transition of H.264 to H.265 and its implementation.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116402900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solar powered water pumping system 太阳能水泵系统
Sonal S. Patil, Ranjit M. Zende
This paper proposes highly economical, low price photovoltaic water pumping system incorporating a boost converter and a diode clamped multilevel inverter employing photovoltaic panel is initiated without batteries. This system is used in areas where electrical power is not accessible. Using photovoltaic energy is one of the solution to this problem. The converter boosts the voltage of the panel and inverter drives the Induction Motor by using Sinusoidal Pulse Width Modulation (SPWM) control. At the given irradiance level MPPT technique pushes the photovoltaic panel to obtain peak power.
本文提出了一种高经济、低价格的光伏水泵系统,该系统采用光伏板,采用升压变换器和二极管箝位多电平逆变器,无需电池。该系统用于电力供应不足的地区。利用光伏能源是解决这一问题的方法之一。逆变器采用正弦脉宽调制(SPWM)控制,驱动感应电机。在给定的辐照度水平下,MPPT技术推动光伏板获得峰值功率。
{"title":"Solar powered water pumping system","authors":"Sonal S. Patil, Ranjit M. Zende","doi":"10.1109/SSPS.2017.8071589","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071589","url":null,"abstract":"This paper proposes highly economical, low price photovoltaic water pumping system incorporating a boost converter and a diode clamped multilevel inverter employing photovoltaic panel is initiated without batteries. This system is used in areas where electrical power is not accessible. Using photovoltaic energy is one of the solution to this problem. The converter boosts the voltage of the panel and inverter drives the Induction Motor by using Sinusoidal Pulse Width Modulation (SPWM) control. At the given irradiance level MPPT technique pushes the photovoltaic panel to obtain peak power.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121775941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Evaluation of generalization based K-anonymization algorithms 基于泛化的k -匿名化算法的评价
Devyani Patil, R. Mohapatra, Korra Sathya Babu
The Electronic-Era has brought the major challenge to the individual's privacy by collecting the individual's information. This information is a threat to the privacy as it is published to the third party for the purpose of either research or study. Even though the identity is not published, based on some informative attributes and publicly available data, fraudulent can access the information which is supposed to be private. As a result, many researchers are attracted towards the challenge and developed many solutions. This paper is aimed to give comparative evolution of the various generalization hierarchy based K-anonymization algorithms. Major challenge while preserving the privacy of an individual, is to keep published data useful for the further research and analysis. Also, the data generated is voluminous and it should take less amount of time for anonymization. In this work these algorithms are compared for efficiency (in terms of time) and utility loss.
电子时代通过收集个人信息给个人隐私带来了重大挑战。这些信息是对隐私的威胁,因为它被发布给第三方用于研究或学习的目的。即使身份不公开,基于一些信息属性和公开可用的数据,欺诈者也可以访问应该是私有的信息。因此,许多研究人员被这一挑战所吸引,并开发了许多解决方案。本文旨在给出各种基于泛化层次的k -匿名化算法的比较进化。在保护个人隐私的同时,最大的挑战是保持发布的数据对进一步的研究和分析有用。此外,生成的数据量很大,匿名化所需的时间应该更少。在这项工作中,比较了这些算法的效率(在时间方面)和效用损失。
{"title":"Evaluation of generalization based K-anonymization algorithms","authors":"Devyani Patil, R. Mohapatra, Korra Sathya Babu","doi":"10.1109/SSPS.2017.8071586","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071586","url":null,"abstract":"The Electronic-Era has brought the major challenge to the individual's privacy by collecting the individual's information. This information is a threat to the privacy as it is published to the third party for the purpose of either research or study. Even though the identity is not published, based on some informative attributes and publicly available data, fraudulent can access the information which is supposed to be private. As a result, many researchers are attracted towards the challenge and developed many solutions. This paper is aimed to give comparative evolution of the various generalization hierarchy based K-anonymization algorithms. Major challenge while preserving the privacy of an individual, is to keep published data useful for the further research and analysis. Also, the data generated is voluminous and it should take less amount of time for anonymization. In this work these algorithms are compared for efficiency (in terms of time) and utility loss.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Securing multi-cloud by auditing 通过审计保护多云
Naveen Kumar, R. Meenakshi
An increasing variety of organisations sources their knowledge, applications and business processes to the cloud, empowering them to realise money and technical advantages because of on-demand provisioning and pay-per-use valuation. However, organisations are still hesitant to adopt cloud services thanks to security, privacy, and dependability issues relating to provisioned cloud services likewise as doubts regarding the trustiness of their cloud service supplier. Cloud service certifications (CSC) are smart suggests that to deal with these issues by establishing trust, and increasing transparency of the cloud market. Cloud service certifications commit to assuring a high level of security and submission. However, considering that cloud services are a part of Associate in Nursing dynamic setting, multi-year validity periods might place ensure dependability of such certifications. Continuous auditing (CA) of chosen certification criteria is needed to assure ceaselessly reliable and secure cloud services, and thereby increase the trustiness of certifications. CA of cloud services remains in its infancy and reveal that almost all of the prevailing methodologies aren't applicable for third party auditing functions. The propose an abstract CA design and highlight vital elements and processes that got to be enforced.
越来越多的组织将他们的知识、应用程序和业务流程转移到云上,使他们能够实现按需供应和按使用付费的价值,从而获得资金和技术优势。然而,由于与所提供的云服务相关的安全、隐私和可靠性问题,组织仍然对采用云服务犹豫不决,同样也对其云服务供应商的可信度心存疑虑。云服务认证(CSC)是明智的建议,通过建立信任和提高云市场的透明度来处理这些问题。云服务认证承诺确保高水平的安全性和提交。然而,考虑到云服务是护理助理动态设置的一部分,多年的有效期可能会确保此类认证的可靠性。为了确保云服务的持续可靠和安全,需要对所选择的认证标准进行持续审计(CA),从而提高认证的可信度。云服务的CA仍然处于起步阶段,并且表明几乎所有流行的方法都不适用于第三方审计功能。他们提出了一个抽象的CA设计,并强调了必须执行的重要元素和过程。
{"title":"Securing multi-cloud by auditing","authors":"Naveen Kumar, R. Meenakshi","doi":"10.1109/SSPS.2017.8071601","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071601","url":null,"abstract":"An increasing variety of organisations sources their knowledge, applications and business processes to the cloud, empowering them to realise money and technical advantages because of on-demand provisioning and pay-per-use valuation. However, organisations are still hesitant to adopt cloud services thanks to security, privacy, and dependability issues relating to provisioned cloud services likewise as doubts regarding the trustiness of their cloud service supplier. Cloud service certifications (CSC) are smart suggests that to deal with these issues by establishing trust, and increasing transparency of the cloud market. Cloud service certifications commit to assuring a high level of security and submission. However, considering that cloud services are a part of Associate in Nursing dynamic setting, multi-year validity periods might place ensure dependability of such certifications. Continuous auditing (CA) of chosen certification criteria is needed to assure ceaselessly reliable and secure cloud services, and thereby increase the trustiness of certifications. CA of cloud services remains in its infancy and reveal that almost all of the prevailing methodologies aren't applicable for third party auditing functions. The propose an abstract CA design and highlight vital elements and processes that got to be enforced.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal data dissemination over wireless network 无线网络的最佳数据传播
P. K. Chakaravarthi, Dr.K.Suriyakrishnaan, K. Sujatha
Data dissemination is big issue to mobile users using a wireless network. Wireless networks face many difficulties like limited resources and high susceptibility to harsh environmental conditions that have to be considered carefully. The load-balancing algorithm can afford the accelerate path to reach the destination without any packet loss. After the nodes being allocated the data will be transferred to the sink and is secure to the control host, which issues commands and configures the network. In the modification process a general framework for the use of wireless networks using load-balancing to alteration the data and monitoring with emphasis on Authentication and security during the data transfer is proposed.
对于使用无线网络的移动用户来说,数据传播是一个大问题。无线网络面临许多困难,如有限的资源和对恶劣环境条件的高度敏感性,必须仔细考虑。负载均衡算法可以在不丢包的情况下提供到达目的地的加速路径。在分配节点之后,数据将被传输到接收器,并且对控制主机是安全的,控制主机发出命令并配置网络。在修改过程中,提出了一个利用负载均衡对数据进行修改和监控的通用框架,并强调了数据传输过程中的身份验证和安全性。
{"title":"Optimal data dissemination over wireless network","authors":"P. K. Chakaravarthi, Dr.K.Suriyakrishnaan, K. Sujatha","doi":"10.1109/SSPS.2017.8071640","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071640","url":null,"abstract":"Data dissemination is big issue to mobile users using a wireless network. Wireless networks face many difficulties like limited resources and high susceptibility to harsh environmental conditions that have to be considered carefully. The load-balancing algorithm can afford the accelerate path to reach the destination without any packet loss. After the nodes being allocated the data will be transferred to the sink and is secure to the control host, which issues commands and configures the network. In the modification process a general framework for the use of wireless networks using load-balancing to alteration the data and monitoring with emphasis on Authentication and security during the data transfer is proposed.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127065979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-cognitive color and texture based image segmentation amalgamation with evidence theory of crop images 基于作物图像证据理论的非认知颜色和纹理图像分割融合
Masoom Jain, Mohammed G. Vayada
The present scenario of image processing is approaching towards the perceptualization. This paper proposes perceptual segmentation with non cognitive low level color and texture features and the application is directly to crop images. Higher efficiency is guaranteed when human intervention is involved. This paper basically takes care of color texture based image segmentation specifically for the images in which the information frequencies are higher. Paper aims to present efficient and robust image segmentation of various crop images and providing some tuning between the low level color and texture feature with high level semantics to improve efficiency of segmentation. With the significant performance improvement a perceptual tuning can be used. Major difference between the normal image segmentation and perceptual image segmentation is also emphasis very clearly in this paper. The future work can be extended by involving non cognitive methodology such as evidence theory, data can be amalgam to make algorithm robust and efficient.
目前的图像处理场景正在向感知化方向发展。本文提出了一种基于非认知的低层次颜色和纹理特征的感知分割方法,并将其直接应用于图像裁剪。当有人为干预时,保证了更高的效率。本文主要针对信息频率较高的图像进行基于颜色纹理的图像分割。本文旨在对各种作物图像进行高效鲁棒的图像分割,并在低层次颜色特征和高层次语义纹理特征之间进行一些调整,以提高分割效率。随着性能的显著提高,可以使用感知调优。本文还非常明确地强调了正常图像分割与感知图像分割的主要区别。未来的工作可以扩展到非认知方法,如证据理论,数据可以融合,使算法鲁棒性和效率。
{"title":"Non-cognitive color and texture based image segmentation amalgamation with evidence theory of crop images","authors":"Masoom Jain, Mohammed G. Vayada","doi":"10.1109/SSPS.2017.8071584","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071584","url":null,"abstract":"The present scenario of image processing is approaching towards the perceptualization. This paper proposes perceptual segmentation with non cognitive low level color and texture features and the application is directly to crop images. Higher efficiency is guaranteed when human intervention is involved. This paper basically takes care of color texture based image segmentation specifically for the images in which the information frequencies are higher. Paper aims to present efficient and robust image segmentation of various crop images and providing some tuning between the low level color and texture feature with high level semantics to improve efficiency of segmentation. With the significant performance improvement a perceptual tuning can be used. Major difference between the normal image segmentation and perceptual image segmentation is also emphasis very clearly in this paper. The future work can be extended by involving non cognitive methodology such as evidence theory, data can be amalgam to make algorithm robust and efficient.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient detection of missing object using Zigbee technology 利用Zigbee技术高效检测缺失物体
D. S. Immaculate, P. Latha
In today's era, whether the client left a wallet in a taxicab or lost something at home, losing things is a genuine annoyance. What is more awful is that it feels like an issue that we shouldn't need to manage in the time of smart devices. The process of detecting the misplaced object manually is also time consuming. There are some most serious issues like size, range and area precision. To overcome these issues we use a technique to detect the misplaced objects based on Zigbee technology. Zigbee communication setup is used for detecting the misplaced objects. Zigbee is connected to mobile through OTG (On-The-Go) cable and one more Zigbee is connected to object. In case if any object is missing, with the help of Zigbee communication the object is detected automatically. The Zigbee is used to detect the objects in the indoor as well as in the outdoor environment. Thus the user can detect the missing object easily, the Zigbee and a phone app work together to do this.
在当今时代,无论客户把钱包落在出租车上,还是在家里丢了东西,丢东西都是一件真正的烦恼。更糟糕的是,在智能设备时代,这似乎是一个我们不需要管理的问题。手工检测放错位置的过程也很耗时。有一些最严重的问题,如大小,范围和区域精度。为了克服这些问题,我们采用了一种基于Zigbee技术的物体错位检测技术。Zigbee通信设置用于检测放错位置的物体。Zigbee通过OTG (on - go)电缆连接到移动设备,另外一个Zigbee连接到对象。如果有任何物体丢失,在Zigbee通信的帮助下,物体会被自动检测出来。Zigbee用于检测室内和室外环境中的物体。因此,用户可以很容易地检测到丢失的物体,Zigbee和手机应用程序一起工作来做到这一点。
{"title":"Efficient detection of missing object using Zigbee technology","authors":"D. S. Immaculate, P. Latha","doi":"10.1109/SSPS.2017.8071645","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071645","url":null,"abstract":"In today's era, whether the client left a wallet in a taxicab or lost something at home, losing things is a genuine annoyance. What is more awful is that it feels like an issue that we shouldn't need to manage in the time of smart devices. The process of detecting the misplaced object manually is also time consuming. There are some most serious issues like size, range and area precision. To overcome these issues we use a technique to detect the misplaced objects based on Zigbee technology. Zigbee communication setup is used for detecting the misplaced objects. Zigbee is connected to mobile through OTG (On-The-Go) cable and one more Zigbee is connected to object. In case if any object is missing, with the help of Zigbee communication the object is detected automatically. The Zigbee is used to detect the objects in the indoor as well as in the outdoor environment. Thus the user can detect the missing object easily, the Zigbee and a phone app work together to do this.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123546347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MYSQL to cassandra conversion engine MYSQL到cassandra转换引擎
M. G. Gopalan, C. Prasanna, Y.V. Srihari Krishna, B. Shanthini, A. Arulkumar
As Technology advances, huge amount of data are generated every day from various sources like Social Media, Banking, Hospital Management etc. Modern businesses that use big data use cases are helping to build a different set of technologies to replace MySQL. Currently, the data migration is very important because of the ever-mounting volume of data, that are collected via many sources, has motivated the migration from Relational Database Management System (RDBMS) to NoSQL (Not Only SQL) database. The main aim this paper is to present a methodology for data migration from RDBMS to NoSQL database. To illustrate this methodology, we implement a software prototype using MySQL as a RDBMS and CassandraDB as a NoSQL database. In this, the MySQL database and the Cassandra database are connected to the Python Environment and the Conversion of Schema is processed, followed by Conversion of Data.
随着技术的进步,每天都会从社交媒体、银行、医院管理等各种来源产生大量数据。使用大数据用例的现代企业正在帮助构建一套不同的技术来取代MySQL。目前,数据迁移非常重要,因为通过许多来源收集的数据量不断增加,促使了从关系数据库管理系统(RDBMS)向NoSQL(不仅仅是SQL)数据库的迁移。本文的主要目的是提出一种从RDBMS到NoSQL数据库的数据迁移方法。为了说明这种方法,我们实现了一个软件原型,使用MySQL作为RDBMS, CassandraDB作为NoSQL数据库。其中,MySQL数据库和Cassandra数据库连接到Python环境,然后进行模式转换,然后进行数据转换。
{"title":"MYSQL to cassandra conversion engine","authors":"M. G. Gopalan, C. Prasanna, Y.V. Srihari Krishna, B. Shanthini, A. Arulkumar","doi":"10.1109/SSPS.2017.8071648","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071648","url":null,"abstract":"As Technology advances, huge amount of data are generated every day from various sources like Social Media, Banking, Hospital Management etc. Modern businesses that use big data use cases are helping to build a different set of technologies to replace MySQL. Currently, the data migration is very important because of the ever-mounting volume of data, that are collected via many sources, has motivated the migration from Relational Database Management System (RDBMS) to NoSQL (Not Only SQL) database. The main aim this paper is to present a methodology for data migration from RDBMS to NoSQL database. To illustrate this methodology, we implement a software prototype using MySQL as a RDBMS and CassandraDB as a NoSQL database. In this, the MySQL database and the Cassandra database are connected to the Python Environment and the Conversion of Schema is processed, followed by Conversion of Data.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Vehicle pollutants control using sensors and Arduino 使用传感器和Arduino控制车辆污染物
R. Priyanka, S. Bhuvana, Archanaa Raveendran, R. Kavitha
The basic objective of this paper is to control the vehicle effluents like carbon dioxide, sulphur dioxide, carbon monoxide that may harm the ecosystem. We are also focussing on avoiding disasters due to fire and harmful gases using the appropriate sensors. Hence, this will be useful for Pollution Control Board to monitor the emission rate of harmful effluents from vehicles.
本文的基本目的是控制可能危害生态系统的二氧化碳、二氧化硫、一氧化碳等汽车废气。我们还将重点放在使用适当的传感器避免火灾和有害气体造成的灾害上。因此,这将有助于污染控制委员会监测车辆有害排放物的排放率。
{"title":"Vehicle pollutants control using sensors and Arduino","authors":"R. Priyanka, S. Bhuvana, Archanaa Raveendran, R. Kavitha","doi":"10.1109/SSPS.2017.8071644","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071644","url":null,"abstract":"The basic objective of this paper is to control the vehicle effluents like carbon dioxide, sulphur dioxide, carbon monoxide that may harm the ecosystem. We are also focussing on avoiding disasters due to fire and harmful gases using the appropriate sensors. Hence, this will be useful for Pollution Control Board to monitor the emission rate of harmful effluents from vehicles.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124723748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1