首页 > 最新文献

2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)最新文献

英文 中文
Leakage current sensing techniques 漏电流传感技术
Pallavi Shede, S. Mane
Present paper gives overview of leakage current sensing techniques. As it is important to monitor and maintain the leakage current at the lower side by engineers and electric companies, this paper describes the highlighted concepts of leakage current for general electrical devices or instruments. In addition to this, various methods of measuring leakage current are reviewed. It also reports the current sensors in accordance with principle in order to mention their positives and negatives. Whereas some of the current sensing techniques rise with the new principles, for example Hall-effect sensors and fluxgate sensor or advanced technologies such as magneto resistance effect sensing and fiber-optic techniques which provide alternatives in current sensing, almost at affordable price than traditional techniques just like shunt resistors. In addition to this, the system will be modified with transmitter block and receiver block which are connected to leakage current sensor and remote controller respectively. This can be used for data processing and storage of data.
本文综述了泄漏电流传感技术。由于监测和维护下侧漏电电流是工程师和电气公司的重要工作,本文介绍了一般电气设备或仪器中漏电电流的重点概念。除此之外,还介绍了测量泄漏电流的各种方法。它还按照原则报告当前的传感器,以便提及它们的正负。然而,一些当前的传感技术随着新的原理而兴起,例如霍尔效应传感器和磁通门传感器或先进的技术,如磁阻效应传感和光纤技术,这些技术提供了电流传感的替代方案,几乎比传统技术(如分流电阻)价格实惠。在此基础上,对系统进行了改进,增加了分别与漏电流传感器和遥控器相连的发射模块和接收模块。这可以用于数据处理和数据存储。
{"title":"Leakage current sensing techniques","authors":"Pallavi Shede, S. Mane","doi":"10.1109/SSPS.2017.8071588","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071588","url":null,"abstract":"Present paper gives overview of leakage current sensing techniques. As it is important to monitor and maintain the leakage current at the lower side by engineers and electric companies, this paper describes the highlighted concepts of leakage current for general electrical devices or instruments. In addition to this, various methods of measuring leakage current are reviewed. It also reports the current sensors in accordance with principle in order to mention their positives and negatives. Whereas some of the current sensing techniques rise with the new principles, for example Hall-effect sensors and fluxgate sensor or advanced technologies such as magneto resistance effect sensing and fiber-optic techniques which provide alternatives in current sensing, almost at affordable price than traditional techniques just like shunt resistors. In addition to this, the system will be modified with transmitter block and receiver block which are connected to leakage current sensor and remote controller respectively. This can be used for data processing and storage of data.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129376527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
VM live migration time reduction using NAS based algorithm during VM live migration 虚拟机热迁移时,采用基于NAS的算法减少虚拟机热迁移时间
Preeti P. Thakre, V. Sahare
Live migration is the process used in virtualization environment of datacenters in order to take the benefit of zero downtime during system maintenance. But during migrating live virtual machines along with system files and storage data, network traffic gets increases across network bandwidth and delays in migration time. There is need to reduce the migration time in order to maintain the system performance by analyzing and optimizing the storage overheads which mainly creates due to unnecessary duplicated data transferred during live migration. So there is need of such storage device which will keep the duplicated data residing in both the source as well as target physical host i.e. NAS. The proposed hash map based algorithm maps all I/O operations in order to track the duplicated data by assigning hash value to both NAS and RAM data. Only the unique data then will be sent data to the target host without affecting service level agreement (SLA), without affecting VM migration time, application downtime, SLA violations, VM pre-migration and downtime post migration overheads during pre and post migration of virtual machines.
实时迁移是在数据中心的虚拟化环境中使用的过程,目的是在系统维护期间实现零停机。但是在迁移实时虚拟机以及系统文件和存储数据的过程中,网络流量会随着网络带宽的增加而增加,迁移时间也会延迟。需要通过分析和优化存储开销来减少迁移时间,以保持系统性能。存储开销主要是由于在热迁移过程中传输不必要的重复数据而产生的。因此需要这样的存储设备,它将保留复制的数据驻留在源和目标物理主机,即NAS。提出的基于哈希映射的算法通过为NAS和RAM数据分配哈希值来映射所有I/O操作,以便跟踪重复的数据。只有唯一的数据才会被发送到目标主机,而不会影响服务水平协议(SLA),不会影响虚拟机迁移时间、应用程序停机时间、SLA违规、虚拟机迁移前和迁移后停机时间的开销。
{"title":"VM live migration time reduction using NAS based algorithm during VM live migration","authors":"Preeti P. Thakre, V. Sahare","doi":"10.1109/SSPS.2017.8071599","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071599","url":null,"abstract":"Live migration is the process used in virtualization environment of datacenters in order to take the benefit of zero downtime during system maintenance. But during migrating live virtual machines along with system files and storage data, network traffic gets increases across network bandwidth and delays in migration time. There is need to reduce the migration time in order to maintain the system performance by analyzing and optimizing the storage overheads which mainly creates due to unnecessary duplicated data transferred during live migration. So there is need of such storage device which will keep the duplicated data residing in both the source as well as target physical host i.e. NAS. The proposed hash map based algorithm maps all I/O operations in order to track the duplicated data by assigning hash value to both NAS and RAM data. Only the unique data then will be sent data to the target host without affecting service level agreement (SLA), without affecting VM migration time, application downtime, SLA violations, VM pre-migration and downtime post migration overheads during pre and post migration of virtual machines.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122435684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware software co-design simulation modeling for image security concept using Matlab-Simulink with Xilinx system generator 利用Matlab-Simulink和Xilinx系统生成器对图像安全概念进行软硬件协同设计仿真建模
Mohammed G. Vayada, Hepi R. Patel, B. Muduli
In recent scenario, the hardware design is becoming a very complex task because programmable hardware like FPGA has become complex with regards to the increasing number of transistors. In this paper, an overview of tool for model based hardware design is mentioned. This tool enable to describe an algorithm in a model based description without going in to complex low-level VHDL or Verilog description. It is efficient in translating model based description to HDL automatically. These kind of high level tools bring hardware implementation such as FPGA to a wider aspects with increasing designing productivity. In this paper an image security model using Matlab-Simulink with Xilinx system generator is developed. The use is to secure image, i.e. secret image is kept behind the cover image. The concealed image is imposible to retrive from the cover image and user can only see cover image.
在最近的场景中,硬件设计变得非常复杂,因为像FPGA这样的可编程硬件随着晶体管数量的增加而变得复杂。本文概述了基于模型的硬件设计工具。该工具允许在基于模型的描述中描述算法,而无需进入复杂的低级VHDL或Verilog描述。将基于模型的描述自动转换为HDL是有效的。这些高级工具将FPGA等硬件实现带到更广泛的方面,提高了设计效率。本文利用Matlab-Simulink和Xilinx系统生成器开发了图像安全模型。其用途是保护图像,即隐藏在封面图像后面的秘密图像。隐藏图像无法从封面图像中检索,用户只能看到封面图像。
{"title":"Hardware software co-design simulation modeling for image security concept using Matlab-Simulink with Xilinx system generator","authors":"Mohammed G. Vayada, Hepi R. Patel, B. Muduli","doi":"10.1109/SSPS.2017.8071580","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071580","url":null,"abstract":"In recent scenario, the hardware design is becoming a very complex task because programmable hardware like FPGA has become complex with regards to the increasing number of transistors. In this paper, an overview of tool for model based hardware design is mentioned. This tool enable to describe an algorithm in a model based description without going in to complex low-level VHDL or Verilog description. It is efficient in translating model based description to HDL automatically. These kind of high level tools bring hardware implementation such as FPGA to a wider aspects with increasing designing productivity. In this paper an image security model using Matlab-Simulink with Xilinx system generator is developed. The use is to secure image, i.e. secret image is kept behind the cover image. The concealed image is imposible to retrive from the cover image and user can only see cover image.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121466350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ant star fuzzy routing for industrial wireless sensor network 工业无线传感器网络的蚁星模糊路由
M. Kannan, Selvakumar Chinnappan, C. Krishnamoorthy
In the process control field, nodes of WSN are deployed to receive the data. Efficient data collection is difficult and it depends on routing, power supply and remote location of node. To overcome the routing problem a new Bio-Inspired mechanism Ant Star Fuzzy (ASF) is proposed. ASF is a reliable and dynamic protocol, capable to provide energy efficient, data collecting routing structure in WSN. Network traffic and fast draining of energy of individual node is avoided. So this will increase the life of the network. ASF optimizes the routing paths even in the case of node drop of failure. It provides effective multi-path data transmission and reliable communication. The main objective is to increase the life span of network, during effective data communication in an efficient manner. This paper defines implementation of WSN and comparison of its performance with AODV, ACOAODV routing protocol based on ASF algorithm is done in terms of packet delivery ratio, throughput and energy level. Performance of ASF algorithm compare with conventional algorithms gives improved results.
在过程控制领域,部署无线传感器网络节点接收数据。有效的数据采集是一个困难的问题,并且依赖于路由、供电和节点的远程位置。为了解决路由问题,提出了一种新的仿生蚁星模糊机制(ASF)。ASF协议是一种可靠的动态协议,能够为无线传感器网络提供节能、数据采集的路由结构。避免了单个节点的网络流量和能量的快速消耗。这将增加网络的寿命。ASF在节点丢失故障的情况下也能优化路由路径。它提供了有效的多路径数据传输和可靠的通信。其主要目的是提高网络的寿命,同时有效地进行数据通信。本文定义了WSN的实现,并将其与基于ASF算法的AODV、ACOAODV路由协议在分组传送率、吞吐量和能级方面进行了性能比较。与传统算法相比,ASF算法的性能得到了改进。
{"title":"Ant star fuzzy routing for industrial wireless sensor network","authors":"M. Kannan, Selvakumar Chinnappan, C. Krishnamoorthy","doi":"10.1109/SSPS.2017.8071637","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071637","url":null,"abstract":"In the process control field, nodes of WSN are deployed to receive the data. Efficient data collection is difficult and it depends on routing, power supply and remote location of node. To overcome the routing problem a new Bio-Inspired mechanism Ant Star Fuzzy (ASF) is proposed. ASF is a reliable and dynamic protocol, capable to provide energy efficient, data collecting routing structure in WSN. Network traffic and fast draining of energy of individual node is avoided. So this will increase the life of the network. ASF optimizes the routing paths even in the case of node drop of failure. It provides effective multi-path data transmission and reliable communication. The main objective is to increase the life span of network, during effective data communication in an efficient manner. This paper defines implementation of WSN and comparison of its performance with AODV, ACOAODV routing protocol based on ASF algorithm is done in terms of packet delivery ratio, throughput and energy level. Performance of ASF algorithm compare with conventional algorithms gives improved results.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sensor pattern noise based source anonymization 基于传感器模式噪声的源匿名化
Ninad N. Dafale, R. Naskar
In today's digital world, images are utilized as a method of communication in all spheres of life. Counter Forensics is the art and science of impeding and misleading forensic analysis of digital images. Camera sensor pattern noise is efficient in blind image source device identification. In this paper, we deliver an attack on digital images, where we completely remove the traces of sensor pattern noises of their source devices, so as to deceive forensic investigations. Next, we substitute the sensor pattern of a given image with that of a different (wrong) source device, such that it now appears to the forensic analyst, that the image was produced by device B, whereas originally it was produced by A. Our experimental results prove that high correlation is achieved between a tampered image and a wrong device, suggesting considerably high degree of anonymity, hence misleading forensics investigation.
在当今的数字世界中,图像被用作生活各个领域的交流方法。反取证是阻碍和误导数字图像的法医分析的艺术和科学。相机传感器模式噪声是一种有效的盲图像源设备识别方法。在本文中,我们对数字图像进行攻击,我们完全去除其源设备的传感器模式噪声痕迹,从而欺骗法医调查。接下来,我们用不同(错误)源设备的传感器模式替换给定图像的传感器模式,这样,现在在法医分析师看来,图像是由设备B产生的,而最初它是由a产生的。我们的实验结果证明,篡改图像和错误设备之间实现了高度相关性,这表明匿名程度相当高,因此误导了法医调查。
{"title":"Sensor pattern noise based source anonymization","authors":"Ninad N. Dafale, R. Naskar","doi":"10.1109/SSPS.2017.8071572","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071572","url":null,"abstract":"In today's digital world, images are utilized as a method of communication in all spheres of life. Counter Forensics is the art and science of impeding and misleading forensic analysis of digital images. Camera sensor pattern noise is efficient in blind image source device identification. In this paper, we deliver an attack on digital images, where we completely remove the traces of sensor pattern noises of their source devices, so as to deceive forensic investigations. Next, we substitute the sensor pattern of a given image with that of a different (wrong) source device, such that it now appears to the forensic analyst, that the image was produced by device B, whereas originally it was produced by A. Our experimental results prove that high correlation is achieved between a tampered image and a wrong device, suggesting considerably high degree of anonymity, hence misleading forensics investigation.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131167760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building management system in metro rail 地铁轨道楼宇管理系统
S. Sripriya, V. Divya, T. Babu
A Building Management System otherwise known as Building Automation System (BAS), is a Computer based control system installed in buildings that controls and monitors buildings mechanical and electrical equipments such as ventilation, lighting, power systems and security systems. A building management system for METRO includes inputs from the systems like HVAC (Heating Ventilation Air Conditioning), Lifts Escalators, UPS and Fire Alarm and Detection System etc. A BMS system uses a PLC controller along with SCADA suite to monitor and control all the systems included in the Metro. BMS provides Automatic Fault Detection System and diagnosis strategies for building energy performance.
楼宇管理系统或称为楼宇自动化系统(BAS),是一种安装在建筑物内的基于计算机的控制系统,用于控制和监控建筑物的机电设备,如通风,照明,电力系统和安全系统。地铁的建筑管理系统包括来自HVAC(采暖通风空调)、电梯、自动扶梯、UPS和火灾报警和探测系统等系统的输入。BMS系统使用PLC控制器和SCADA套件来监视和控制地铁中的所有系统。BMS为建筑节能提供自动故障检测系统和诊断策略。
{"title":"Building management system in metro rail","authors":"S. Sripriya, V. Divya, T. Babu","doi":"10.1109/SSPS.2017.8071629","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071629","url":null,"abstract":"A Building Management System otherwise known as Building Automation System (BAS), is a Computer based control system installed in buildings that controls and monitors buildings mechanical and electrical equipments such as ventilation, lighting, power systems and security systems. A building management system for METRO includes inputs from the systems like HVAC (Heating Ventilation Air Conditioning), Lifts Escalators, UPS and Fire Alarm and Detection System etc. A BMS system uses a PLC controller along with SCADA suite to monitor and control all the systems included in the Metro. BMS provides Automatic Fault Detection System and diagnosis strategies for building energy performance.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart collision avoidance and driver alert recognition (SCADAR) system 智能防撞和驾驶员警报识别(SCADAR)系统
P. Kalaivani, R. P. Kumar, J. Thrshan, R. S. Kolapan
Road accidents have always been freak and unexpected, almost 1.3 million lives have been claimed by motor vehicle based accidents till now. Accidents itself is a rectifiable phenomenon which could be partially averted by proper precaution and care. Using the ARDUINO series of Microcontrollers with compatible sensors and components, the accidents could be reduced in an efficient way. Whenever there is an obstacle while driving, this sensor enables the driver to know the obstacle or other vehicles heading the same way in case of a divider-less road. This kind of sensing provides the driver with a warning to slow down or change his current position far ahead from the event of an accident.
道路交通事故一直是怪异和意想不到的,到目前为止,机动车事故夺去了近130万人的生命。事故本身是一种可以纠正的现象,通过适当的预防和护理可以部分避免。使用ARDUINO系列微控制器和兼容的传感器和组件,可以有效地减少事故。当驾驶过程中遇到障碍物时,该传感器可以使驾驶员了解障碍物或在无隔板的情况下行驶在同一方向的其他车辆。这种传感系统可以在事故发生前很远的地方向驾驶员发出减速或改变当前位置的警告。
{"title":"Smart collision avoidance and driver alert recognition (SCADAR) system","authors":"P. Kalaivani, R. P. Kumar, J. Thrshan, R. S. Kolapan","doi":"10.1109/SSPS.2017.8071624","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071624","url":null,"abstract":"Road accidents have always been freak and unexpected, almost 1.3 million lives have been claimed by motor vehicle based accidents till now. Accidents itself is a rectifiable phenomenon which could be partially averted by proper precaution and care. Using the ARDUINO series of Microcontrollers with compatible sensors and components, the accidents could be reduced in an efficient way. Whenever there is an obstacle while driving, this sensor enables the driver to know the obstacle or other vehicles heading the same way in case of a divider-less road. This kind of sensing provides the driver with a warning to slow down or change his current position far ahead from the event of an accident.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129805387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification and counting of mature apple fruit based on BP feed forward neural network 基于BP前馈神经网络的苹果成熟果实识别与计数
Shreya Lal, S. Behera, Dr. Prabira Kumar Sethy, A. Rath
Classification of fruits is an onerous and tedious task because of countless number of fruits. The traditional approach for detection and classification of fruit and its maturity level is based on the naked eye observation by the experts, which is both time consuming and causes eye fatigue. Advance techniques in image processing and machine learning helps to automatic classify and count the fruits, accurately, quickly and non-destructively. A method to automatic detect and classify apple fruit maturity level, whether it is mature or immature based on its color features has been proposed. Images of the apple are resized and Image Processing Techniques are applied for the extraction of apple color components (R, G, B). Artificial Neural Network is used as a classifier to identify and count the mature and immature applesusingcolor components. The proposed model has an accuracy of 98.1%, when all the three attributes are used as an input.
水果的分类是一项繁重而繁琐的工作,因为水果的数量不计其数。传统的水果及其成熟度的检测和分类方法是基于专家的肉眼观察,既费时又容易造成眼睛疲劳。先进的图像处理和机器学习技术有助于准确、快速和无损地对水果进行自动分类和计数。提出了一种基于苹果果实颜色特征的成熟与不成熟成熟度自动检测与分类方法。调整苹果图像大小,应用图像处理技术提取苹果颜色成分(R, G, B),使用人工神经网络作为分类器,利用颜色成分对成熟和不成熟的苹果进行识别和计数。当使用所有三个属性作为输入时,所提出的模型的准确率为98.1%。
{"title":"Identification and counting of mature apple fruit based on BP feed forward neural network","authors":"Shreya Lal, S. Behera, Dr. Prabira Kumar Sethy, A. Rath","doi":"10.1109/SSPS.2017.8071621","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071621","url":null,"abstract":"Classification of fruits is an onerous and tedious task because of countless number of fruits. The traditional approach for detection and classification of fruit and its maturity level is based on the naked eye observation by the experts, which is both time consuming and causes eye fatigue. Advance techniques in image processing and machine learning helps to automatic classify and count the fruits, accurately, quickly and non-destructively. A method to automatic detect and classify apple fruit maturity level, whether it is mature or immature based on its color features has been proposed. Images of the apple are resized and Image Processing Techniques are applied for the extraction of apple color components (R, G, B). Artificial Neural Network is used as a classifier to identify and count the mature and immature applesusingcolor components. The proposed model has an accuracy of 98.1%, when all the three attributes are used as an input.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A review of traditional and swarm search based feature selection algorithms for handling data stream classification 基于群搜索和传统特征选择算法在数据流分类中的应用综述
S. Sasikala, D. R. Devi
With the increase in recent development in hardware and software technologies, streaming data is used everywhere in today's environment and it is a very difficult task to store, process, investigate and visualize huge volumes of data. One of the most important and challenging issue in the data stream domain is the classification of the big datasets. However the conventional classification methods developed to run in a streaming environment with high use of memory constraints and longer execution running time. Another three major important issues in the data stream classification methods are huge length, conception drift and Feature Selection (FS). In this review paper, we consider the difficult problem of FS algorithms for streaming data, in which the size of streaming data for the feature set is unknown, primary to an inflexible demand in computation constraints, and not every feature is available from classifier model. In order to solve this difficulty, Swarm Intelligence (SI) algorithms are performed on the high dimensionality and streaming big dataset samples which result in increase classification accuracy, less memory consumption and lesser running time when compared to the existing streaming FS algorithms on various datasets. The proposed SI based FS algorithms overcomes the difficulty of the traditional FS algorithms.
随着最近硬件和软件技术的发展,流数据在当今环境中无处不在,存储、处理、调查和可视化大量数据是一项非常困难的任务。数据流领域中最重要和最具挑战性的问题之一是大数据集的分类。然而,传统的分类方法是在流环境中运行的,具有较高的内存使用限制和较长的执行时间。数据流分类方法中的另外三个重要问题是数据流的长度、概念漂移和特征选择。在这篇综述文章中,我们考虑了流数据的FS算法的难题,其中流数据的特征集大小是未知的,主要是计算约束的不灵活需求,并且不是每个特征都可以从分类器模型中获得。为了解决这一难题,将Swarm Intelligence (SI)算法应用于高维、流式的大数据集样本上,与现有的流式FS算法相比,可以提高分类精度、减少内存消耗和缩短运行时间。本文提出的基于SI的FS算法克服了传统FS算法的不足。
{"title":"A review of traditional and swarm search based feature selection algorithms for handling data stream classification","authors":"S. Sasikala, D. R. Devi","doi":"10.1109/SSPS.2017.8071650","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071650","url":null,"abstract":"With the increase in recent development in hardware and software technologies, streaming data is used everywhere in today's environment and it is a very difficult task to store, process, investigate and visualize huge volumes of data. One of the most important and challenging issue in the data stream domain is the classification of the big datasets. However the conventional classification methods developed to run in a streaming environment with high use of memory constraints and longer execution running time. Another three major important issues in the data stream classification methods are huge length, conception drift and Feature Selection (FS). In this review paper, we consider the difficult problem of FS algorithms for streaming data, in which the size of streaming data for the feature set is unknown, primary to an inflexible demand in computation constraints, and not every feature is available from classifier model. In order to solve this difficulty, Swarm Intelligence (SI) algorithms are performed on the high dimensionality and streaming big dataset samples which result in increase classification accuracy, less memory consumption and lesser running time when compared to the existing streaming FS algorithms on various datasets. The proposed SI based FS algorithms overcomes the difficulty of the traditional FS algorithms.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130184026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improvement of network lifetime with security and load balancing mobile data clustering for wireless sensor networks 基于安全性和负载均衡移动数据聚类的无线传感器网络生存期改进
A. Abdulasik, Dr.K.Suriyakrishnaan
The main objective of designing the project is provide good scalability and increase networks lifespan. Sensor networks faces consequences such as insufficient amount of resources and they are susceptible to environmental condition, thus decreasing lifespan of sensor node. To resolve such issues multi user multiple-input/output (MU-MIMO) system is established in that multi cluster heads are implemented in each cluster to facilitate dual data uploading and to balance workload. Wireless sensor networks which works as a sensor nodes senses the data and SenCar collects information from environment. Then data is forwarded to sink node from SenCar via single or multiple hops. WSN is proved to be a effective in fields like medical, military, home etc. But authentication is essential in such fields. To provide authentication sink generates questions based on selection of SenCar node. An intruder might come and collect whole data in each cluster. To avoid such arrival of intruder, sink uploads the answer to SenCar node for multiple cluster head location based questions.
设计该项目的主要目标是提供良好的可扩展性和延长网络寿命。传感器网络面临着资源不足、易受环境条件影响等后果,从而降低了传感器节点的寿命。为了解决这些问题,我们建立了多用户多输入输出(MU-MIMO)系统,在每个集群中实施多个集群头,以方便双重数据上传和平衡工作量。无线传感器网络作为传感器节点感知数据,SenCar从环境中收集信息。然后数据通过单跳或多跳从SenCar转发到汇聚节点。事实证明,无线传感器网络在医疗、军事、家庭等领域都是有效的。但在这些领域,身份验证是必不可少的。提供基于SenCar节点选择的认证sink生成问题。入侵者可能会来收集每个集群中的全部数据。为了避免这种入侵者的到来,sink将多个基于簇头位置的问题的答案上传到SenCar节点。
{"title":"Improvement of network lifetime with security and load balancing mobile data clustering for wireless sensor networks","authors":"A. Abdulasik, Dr.K.Suriyakrishnaan","doi":"10.1109/SSPS.2017.8071641","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071641","url":null,"abstract":"The main objective of designing the project is provide good scalability and increase networks lifespan. Sensor networks faces consequences such as insufficient amount of resources and they are susceptible to environmental condition, thus decreasing lifespan of sensor node. To resolve such issues multi user multiple-input/output (MU-MIMO) system is established in that multi cluster heads are implemented in each cluster to facilitate dual data uploading and to balance workload. Wireless sensor networks which works as a sensor nodes senses the data and SenCar collects information from environment. Then data is forwarded to sink node from SenCar via single or multiple hops. WSN is proved to be a effective in fields like medical, military, home etc. But authentication is essential in such fields. To provide authentication sink generates questions based on selection of SenCar node. An intruder might come and collect whole data in each cluster. To avoid such arrival of intruder, sink uploads the answer to SenCar node for multiple cluster head location based questions.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1