首页 > 最新文献

2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

英文 中文
Detection of Transmission Line Faults in the Presence of Wind Energy Power Generation Source Using Stockwell’s Transform 风电发电源存在时输电线路故障的斯托克韦尔变换检测
Surbhi Thukral, Om Prakash Mahela, B. Kumar
Wind energy conversion system (WECS) is one of the significant electrical power generation sources that have been given focus in electrical industry in recent time. On integration of WECS units in distributed and transmission networks of utility grid, behaviour of system changes and these units impose different effects on system behaviour. One major effect of such plants is observed on protection distributed network. A Stockwell Transform based algorithm is proposed in this paper for recognition of power system faults with wind energy power generation source integrated to the network. Fault recognition issues are investigated with different faults on power system network. Voltage signals are recorded and decomposed with the help of Stockwell Transform based multi-resolution for recognition and discrimination of faults on power network. Faults like between line and ground (LG), between two phases (LL), between two phases and ground (LLG) and between all phases and ground (LLLG) are investigated. Results are evaluated in MATLAB/Simulink.
风能转换系统(WECS)是近年来电力工业中备受关注的重要发电来源之一。在公用电网分布式和输电网中集成WECS单元时,系统行为发生了变化,这些单元对系统行为产生了不同的影响。这种植物对保护分布式网络的一个主要影响是观察到的。本文提出了一种基于Stockwell变换的风电发电源并网电力系统故障识别算法。研究了电网中不同故障的故障识别问题。利用基于斯托克韦尔变换的多分辨率对电压信号进行记录和分解,实现电网故障的识别和判别。研究了线路与地之间(LG)、两相之间(LL)、两相与地之间(LLG)以及所有相与地之间(LLLG)等故障。在MATLAB/Simulink中对结果进行了评估。
{"title":"Detection of Transmission Line Faults in the Presence of Wind Energy Power Generation Source Using Stockwell’s Transform","authors":"Surbhi Thukral, Om Prakash Mahela, B. Kumar","doi":"10.1109/ICICT46931.2019.8977695","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977695","url":null,"abstract":"Wind energy conversion system (WECS) is one of the significant electrical power generation sources that have been given focus in electrical industry in recent time. On integration of WECS units in distributed and transmission networks of utility grid, behaviour of system changes and these units impose different effects on system behaviour. One major effect of such plants is observed on protection distributed network. A Stockwell Transform based algorithm is proposed in this paper for recognition of power system faults with wind energy power generation source integrated to the network. Fault recognition issues are investigated with different faults on power system network. Voltage signals are recorded and decomposed with the help of Stockwell Transform based multi-resolution for recognition and discrimination of faults on power network. Faults like between line and ground (LG), between two phases (LL), between two phases and ground (LLG) and between all phases and ground (LLLG) are investigated. Results are evaluated in MATLAB/Simulink.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Survey on Quantum Key Distribution 量子密钥分发研究综述
Abhishek Sharma, Amit Kumar
Quantum key distribution is a catchword among industry specialist now a day.It is arising an alarming situation to all the current network security techniques. These are the basic properties of Quantum Mechanics, which makes a combination with network security. At present there are so many companies out there in market which are making progress it this fields day by day.Quantum cryptography is a very important technology now days as it is helping a lot to secure the future network communication. This particular field has gained the attention from industry as well as from academics. Here we are writing this paper to provide the general review of various fields belongs to Quantum Computing, but our main aim is to provide a brief review and analysis of recent development in the field of Quantum Key Distribution, most famous and developed field of Quantum Computing. This paper presents review of Quantum Computing including different application fields like Quantum public key cryptography, QKD, Quantum Authentication. First we discuss the basics of Quantum Cryptography then we discuss the definition of Quantum key Distribution, Various protocols of this field. Then after we discuss the opportunities in this field.
如今,量子密钥分发已成为业内专家的热门话题。这给当前的各种网络安全技术带来了令人担忧的局面。这些都是量子力学的基本性质,它与网络安全结合在一起。目前,市场上有很多公司在这一领域日益取得进步。量子加密技术是一项非常重要的技术,它对未来网络通信的安全起着重要的作用。这个特殊的领域已经得到了工业界和学术界的关注。在这里,我们写这篇论文是为了提供属于量子计算的各个领域的总体回顾,但我们的主要目的是提供一个简短的回顾和分析,在量子计算中最著名和最发达的领域——量子密钥分发领域的最新发展。本文综述了量子计算的研究进展,包括量子公钥加密、量子密钥分配、量子认证等不同的应用领域。首先讨论了量子密码学的基础知识,然后讨论了量子密钥分发的定义,以及该领域的各种协议。在我们讨论了这个领域的机会之后。
{"title":"A Survey on Quantum Key Distribution","authors":"Abhishek Sharma, Amit Kumar","doi":"10.1109/ICICT46931.2019.8977649","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977649","url":null,"abstract":"Quantum key distribution is a catchword among industry specialist now a day.It is arising an alarming situation to all the current network security techniques. These are the basic properties of Quantum Mechanics, which makes a combination with network security. At present there are so many companies out there in market which are making progress it this fields day by day.Quantum cryptography is a very important technology now days as it is helping a lot to secure the future network communication. This particular field has gained the attention from industry as well as from academics. Here we are writing this paper to provide the general review of various fields belongs to Quantum Computing, but our main aim is to provide a brief review and analysis of recent development in the field of Quantum Key Distribution, most famous and developed field of Quantum Computing. This paper presents review of Quantum Computing including different application fields like Quantum public key cryptography, QKD, Quantum Authentication. First we discuss the basics of Quantum Cryptography then we discuss the definition of Quantum key Distribution, Various protocols of this field. Then after we discuss the opportunities in this field.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115921934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Prioritizing Factors Used in Designing of Test Cases: An ISM-MICMAC Based Analysis 基于ISM-MICMAC的测试用例设计优先级分析
Parita Jain, Swati Sharma
This research attempts to prioritize the factors that are important for the designing of test cases. There are many researches done on making testing complexities easier such as by applying various algorithms, approaches and processes to make testing automated. There are techniques that have been applied to prioritize the test cases so that testing time can be reduced. Therefore, in this research we have considered some factors by taking advice of experts and by the help of literature in this field that are taken care of for designing of test case. We have applied a new methodology that is ISM (Interpretive Structural Modelling) with MICMAC analysis technique. This theory has been applied in various field like management, science etc. but in the field of software engineering we have tried to implement it for the first time. By the help of this we have prioritized the factors. The rank has been associated with all the factors as per the partitioning theory applied in ISM. A diagraph has been formed and an ISM model is developed that clearly differentiate the factors on the basis of ranks. Then a MICMAC analysis is performed on the ISM model, in which factors are differentiated on the basis of their dependence power and driver power. A graphical representation of MICMAC is done. And the factors have been prioritized.
本研究试图对设计测试用例的重要因素进行优先排序。在简化测试复杂性方面有许多研究,例如应用各种算法、方法和过程使测试自动化。已经应用了一些技术来划分测试用例的优先级,这样就可以减少测试时间。因此,在本研究中,我们考虑了一些因素,通过专家的建议,并在该领域的文献的帮助下,考虑到测试用例的设计。我们应用了一种新的方法,即ISM(解释结构建模)与MICMAC分析技术。这一理论已经应用于管理、科学等各个领域,但在软件工程领域,我们是第一次尝试实现它。通过这种方法,我们对这些因素进行了排序。按照ISM中应用的分区理论,将秩与所有因子关联起来。已经形成了一个图表,并开发了一个ISM模型,可以根据等级清楚地区分因素。然后在ISM模型上进行了MICMAC分析,其中根据因素的依赖程度和驱动程度对因素进行了区分。完成了MICMAC的图形化表示。这些因素都是优先考虑的。
{"title":"Prioritizing Factors Used in Designing of Test Cases: An ISM-MICMAC Based Analysis","authors":"Parita Jain, Swati Sharma","doi":"10.1109/ICICT46931.2019.8977643","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977643","url":null,"abstract":"This research attempts to prioritize the factors that are important for the designing of test cases. There are many researches done on making testing complexities easier such as by applying various algorithms, approaches and processes to make testing automated. There are techniques that have been applied to prioritize the test cases so that testing time can be reduced. Therefore, in this research we have considered some factors by taking advice of experts and by the help of literature in this field that are taken care of for designing of test case. We have applied a new methodology that is ISM (Interpretive Structural Modelling) with MICMAC analysis technique. This theory has been applied in various field like management, science etc. but in the field of software engineering we have tried to implement it for the first time. By the help of this we have prioritized the factors. The rank has been associated with all the factors as per the partitioning theory applied in ISM. A diagraph has been formed and an ISM model is developed that clearly differentiate the factors on the basis of ranks. Then a MICMAC analysis is performed on the ISM model, in which factors are differentiated on the basis of their dependence power and driver power. A graphical representation of MICMAC is done. And the factors have been prioritized.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymized searches and their tracing 匿名搜索和追踪
Dayanand, Mohini Chauhan
Tor protects against a common form of Internet monitoring known as "traffic analysis". Traffic analysis can be used to find out who is being talked to on a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can affect your check book, for example, an e-commerce site uses price discrimination based on your country or origin. It even reveals who and where you are. For example, if you are traveling abroad and you connect to your[1] employer's computer to check or send mails, you inadvertently send your national origin and professional affiliation to someone observing the network Can appear, even if the connection is encrypted. This paper will discuss how network traffic will be clear and transparent. People using tools such as ToR can now be easily tracked and therefore the organization can easily filter malicious content from the entire stack of networks. Using specific algorithms and its associated code, the tool will also simplify filtering traffic based on certain categories and, after operating some pre-defined algorithms, traffic will also be analyzed.
Tor防止一种被称为“流量分析”的常见形式的互联网监控。流量分析可以用来找出在公共网络上正在与谁通话。知道你的互联网流量的来源和目的地可以让其他人跟踪你的行为和兴趣。这可能会影响您的支票簿,例如,电子商务网站基于您的国家或原产国使用价格歧视。它甚至可以显示你是谁,你在哪里。例如,如果你在国外旅行,你连接到b[1]雇主的电脑来检查或发送邮件,你无意中把你的国籍和专业关系发送给了观察网络的人,即使连接是加密的。本文将讨论如何使网络流量变得清晰透明。使用ToR等工具的人现在可以很容易地被跟踪,因此组织可以很容易地从整个网络堆栈中过滤恶意内容。使用特定的算法及其相关代码,该工具还将简化基于某些类别的流量过滤,并且在运行一些预定义的算法后,还将分析流量。
{"title":"Anonymized searches and their tracing","authors":"Dayanand, Mohini Chauhan","doi":"10.1109/ICICT46931.2019.8977636","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977636","url":null,"abstract":"Tor protects against a common form of Internet monitoring known as \"traffic analysis\". Traffic analysis can be used to find out who is being talked to on a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can affect your check book, for example, an e-commerce site uses price discrimination based on your country or origin. It even reveals who and where you are. For example, if you are traveling abroad and you connect to your[1] employer's computer to check or send mails, you inadvertently send your national origin and professional affiliation to someone observing the network Can appear, even if the connection is encrypted. This paper will discuss how network traffic will be clear and transparent. People using tools such as ToR can now be easily tracked and therefore the organization can easily filter malicious content from the entire stack of networks. Using specific algorithms and its associated code, the tool will also simplify filtering traffic based on certain categories and, after operating some pre-defined algorithms, traffic will also be analyzed.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127552282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved matrix based Key Management Scheme for Wireless Sensor Network security 基于改进矩阵的无线传感器网络安全密钥管理方案
Rishabh Kamal, Priyanka Ahlawat
Wireless Sensor Network (WSN) consists of a large amount of sensor nodes fitted with restricted memory and computing capacities that have been powered by batteries. These contained sensors face several threats to safety and therefore some cryptographic mechanism is needed for secure communication. In WSNs, key management is a working research subject. In this paper, we have proposed a Lightweight Matrix based key management scheme for WSN. Our proposed key management system used encryption method to enhance storage space and node to become lightweight and nodes connectivity. We assessed our scheme and it is shown that our proposed scheme provide better connectivity and storage space for the network.
无线传感器网络(WSN)由大量传感器节点组成,这些节点具有有限的内存和计算能力,由电池供电。这些包含的传感器面临着一些安全威胁,因此需要一些加密机制来保证安全通信。在无线传感器网络中,密钥管理是一个工作研究课题。本文提出了一种基于轻量级矩阵的无线传感器网络密钥管理方案。我们提出的密钥管理系统采用加密的方法来增强存储空间和节点的轻量化以及节点的连通性。我们对方案进行了评估,结果表明我们的方案为网络提供了更好的连通性和存储空间。
{"title":"Improved matrix based Key Management Scheme for Wireless Sensor Network security","authors":"Rishabh Kamal, Priyanka Ahlawat","doi":"10.1109/ICICT46931.2019.8977700","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977700","url":null,"abstract":"Wireless Sensor Network (WSN) consists of a large amount of sensor nodes fitted with restricted memory and computing capacities that have been powered by batteries. These contained sensors face several threats to safety and therefore some cryptographic mechanism is needed for secure communication. In WSNs, key management is a working research subject. In this paper, we have proposed a Lightweight Matrix based key management scheme for WSN. Our proposed key management system used encryption method to enhance storage space and node to become lightweight and nodes connectivity. We assessed our scheme and it is shown that our proposed scheme provide better connectivity and storage space for the network.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data and Cloud Computing: An Emerging Perspective and Future Trends 大数据和云计算:一个新兴的视角和未来趋势
P. Yadav, Sanjiv Sharma, Amarkant Singh
Big Data is a collection of large amount of data which is growing very rapidly with the popularity of social networking sites. The size of the Big data has been extended from terabytes to petabytes. Big data are characterized by four important attributes: volume, velocity, variety and veracity. The volume attributes describe the data at rest in the range from terabytes to Exabyte’s, the velocity deals with data in motion, i.e streaming the data to respond within milliseconds rather than in seconds, the variety discuss the data in many different forms such as structured, unstructured, text and multimedia data, whereas the veracity deals with the data in doubt, i.e. uncertainty in data due to data inconsistency. These attributes of big data make it a challenge for organizations to have control over, and use such data. In today’s era we are overloaded with the information, however we are lacking the insight. The 90% of the data in the world today has been created in the last two years by various social networking sites. As big data grows it challenges the capabilities of traditional data warehouses that collect and store large amounts of internal and external data. Data drawn from these repositories are used to improve decision making, increase organizational efficiencies, and improve organizational effectiveness. In this paper an attempt has been made to explore the real life application of Big Data , cloud database, Hadoop, Map Reduce and Cloud Computing, in various domains.
大数据是大量数据的集合,随着社交网站的普及,大数据的增长非常迅速。大数据的规模已经从tb级扩展到pb级。大数据具有四个重要属性:体积、速度、种类和准确性。体积属性描述了从tb到Exabyte的静态数据,速度处理运动中的数据,即在毫秒而不是秒内流式处理数据,多样性讨论了许多不同形式的数据,如结构化、非结构化、文本和多媒体数据,而准确性处理数据的不确定性,即由于数据不一致而导致的数据的不确定性。大数据的这些属性给组织控制和使用这些数据带来了挑战。在当今时代,我们被信息超载,但我们缺乏洞察力。当今世界上90%的数据是在过去两年中由各种社交网站创建的。随着大数据的增长,它对传统数据仓库收集和存储大量内部和外部数据的能力提出了挑战。从这些存储库中提取的数据用于改进决策制定、提高组织效率和提高组织有效性。本文尝试探索大数据、云数据库、Hadoop、Map Reduce和云计算在各个领域的实际应用。
{"title":"Big Data and Cloud Computing: An Emerging Perspective and Future Trends","authors":"P. Yadav, Sanjiv Sharma, Amarkant Singh","doi":"10.1109/ICICT46931.2019.8977674","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977674","url":null,"abstract":"Big Data is a collection of large amount of data which is growing very rapidly with the popularity of social networking sites. The size of the Big data has been extended from terabytes to petabytes. Big data are characterized by four important attributes: volume, velocity, variety and veracity. The volume attributes describe the data at rest in the range from terabytes to Exabyte’s, the velocity deals with data in motion, i.e streaming the data to respond within milliseconds rather than in seconds, the variety discuss the data in many different forms such as structured, unstructured, text and multimedia data, whereas the veracity deals with the data in doubt, i.e. uncertainty in data due to data inconsistency. These attributes of big data make it a challenge for organizations to have control over, and use such data. In today’s era we are overloaded with the information, however we are lacking the insight. The 90% of the data in the world today has been created in the last two years by various social networking sites. As big data grows it challenges the capabilities of traditional data warehouses that collect and store large amounts of internal and external data. Data drawn from these repositories are used to improve decision making, increase organizational efficiencies, and improve organizational effectiveness. In this paper an attempt has been made to explore the real life application of Big Data , cloud database, Hadoop, Map Reduce and Cloud Computing, in various domains.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130400025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Identification System 人脸识别系统
Prerit Goel, Ritin Behl, Pranjul Aggarwal, Manish Srivastava, Sanyam Gupta
Face Affirmation (FR), the methodology toward recognizing people with the help of their facial pictures, has various affordable applications within the zone of statistics, information security; get to control, law demand, savvy cards and observation framework. Convolutional Neural Networks (Connets), a form of profound systems has been incontestable to be fruitful for Face Affirmation (FR). For in progress frameworks, some pre-process methods like examining ought to be done before utilizing to Connets. Be that because it could, at that time likewise complete footage (all the constituent esteems) square measure passed as contribution to Connets and each one amongst the suggests that (highlight determination, embody extraction, preparing) square measure performed by the system. this can be the rationale that death penalty Connets square measure once during a whereas advanced and tedious. Connets square measure at the start stage and also the exactnesses got square measure extraordinarily high, in order that they have way to travel. The paper proposes another technique for utilizing a profound neural system (another quite profound system) for facial acknowledgment. During this methodology, instead of giving crude constituent esteems as data, simply the separated facial highlights square measure given. This brings down the multifarious nature of whereas giving the exactness of ninety seven.05% on Yale faces dataset.
人脸确认(FR)是一种通过人脸照片来识别人的方法,在统计学、信息安全领域有各种可负担得起的应用;掌握控制、法律需求、悟性和观察框架。卷积神经网络(Connets)作为深度系统的一种形式,在人脸识别(FR)方面取得了无可争议的成果。对于正在进行的框架,在使用连接之前应该执行一些预处理方法,如检查。因为它当时同样可以完成镜头(所有组成部分)的平方度量作为对网络的贡献和其中的每一个建议(突出确定、体现提取、准备)的平方度量由系统执行。这可能是死刑在一个较为先进和繁琐的过程中只进行一次量刑的基本原理。在开始阶段,连接线的平方测量精度也非常高,这样它们就有了行进的道路。本文提出了另一种利用深度神经系统(另一种相当深刻的系统)进行面部识别的技术。在此方法中,不再给出粗糙的成分值作为数据,而是简单地给出分离的面部亮点平方度量。这就降低了“然而”的多样性,给出了“九十七”的精确性。耶鲁面对数据集的5%。
{"title":"Face Identification System","authors":"Prerit Goel, Ritin Behl, Pranjul Aggarwal, Manish Srivastava, Sanyam Gupta","doi":"10.1109/ICICT46931.2019.8977684","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977684","url":null,"abstract":"Face Affirmation (FR), the methodology toward recognizing people with the help of their facial pictures, has various affordable applications within the zone of statistics, information security; get to control, law demand, savvy cards and observation framework. Convolutional Neural Networks (Connets), a form of profound systems has been incontestable to be fruitful for Face Affirmation (FR). For in progress frameworks, some pre-process methods like examining ought to be done before utilizing to Connets. Be that because it could, at that time likewise complete footage (all the constituent esteems) square measure passed as contribution to Connets and each one amongst the suggests that (highlight determination, embody extraction, preparing) square measure performed by the system. this can be the rationale that death penalty Connets square measure once during a whereas advanced and tedious. Connets square measure at the start stage and also the exactnesses got square measure extraordinarily high, in order that they have way to travel. The paper proposes another technique for utilizing a profound neural system (another quite profound system) for facial acknowledgment. During this methodology, instead of giving crude constituent esteems as data, simply the separated facial highlights square measure given. This brings down the multifarious nature of whereas giving the exactness of ninety seven.05% on Yale faces dataset.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128134296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computer vision based method for identification of freshness in mushrooms 基于计算机视觉的蘑菇新鲜度鉴定方法
A. Anil, Hardik Gupta, Monika Arora
Scientific testing of mushroom (Agaricus Bisporus) samples, and especially non-destructive can prove to be very beneficial in different fields of research including agriculture, food processing, health care, etc. This is mainly because, when these mushrooms are left exposed in the open atmosphere, these tend to react with surrounding and develop a brown coloured pigment. This phenomenon is commonly referred to as the "enzymatic browning". Here, this reaction is utilized to observe certain chemical changes over a course of time. This has led to a result which can be used for classification of mushroom samples. Hence, this classification can be used to prove the gradual change in pattern behaviour of mushrooms during different time intervals. SVM classifier is seen to give the result with an accuracy of 80%. Thus, this classification can also give an overlook of whether these mushroom samples are fresh for consumption or not.
对双孢蘑菇(Agaricus Bisporus)样品的科学检测,特别是无损检测,在农业、食品加工、医疗保健等不同研究领域都是非常有益的。这主要是因为,当这些蘑菇暴露在露天环境中时,它们倾向于与周围环境发生反应并形成棕色色素。这种现象通常被称为“酶促褐变”。在这里,这个反应被用来观察一段时间内的某些化学变化。这导致了一个可以用于蘑菇样品分类的结果。因此,这种分类可以用来证明蘑菇在不同时间间隔内模式行为的逐渐变化。SVM分类器给出的结果准确率为80%。因此,这种分类也可以忽略这些蘑菇样品是否新鲜可供食用。
{"title":"Computer vision based method for identification of freshness in mushrooms","authors":"A. Anil, Hardik Gupta, Monika Arora","doi":"10.1109/ICICT46931.2019.8977698","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977698","url":null,"abstract":"Scientific testing of mushroom (Agaricus Bisporus) samples, and especially non-destructive can prove to be very beneficial in different fields of research including agriculture, food processing, health care, etc. This is mainly because, when these mushrooms are left exposed in the open atmosphere, these tend to react with surrounding and develop a brown coloured pigment. This phenomenon is commonly referred to as the \"enzymatic browning\". Here, this reaction is utilized to observe certain chemical changes over a course of time. This has led to a result which can be used for classification of mushroom samples. Hence, this classification can be used to prove the gradual change in pattern behaviour of mushrooms during different time intervals. SVM classifier is seen to give the result with an accuracy of 80%. Thus, this classification can also give an overlook of whether these mushroom samples are fresh for consumption or not.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Review on Quantum Computers with Emphasize on Linear Optics Quantum Computing 量子计算机综述——以线性光学量子计算为重点
Amit Kumar Sharma, A. Ghunawat
Recently researchers have been explored quantum phenomena’s for computation purpose and demonstrated important computational algorithms such as integer factorization using Shor’s algorithm, unsorted date base search using Grover’s algorithm, quantum cryptography, teleportation and many more. Many approaches have been investigated for implementing quantum algorithm physically. In this review quantum computer implementation techniques are introduced with an emphasize on linear optics quantum computing.
近年来,研究人员已经探索了量子现象的计算目的,并展示了重要的计算算法,如使用Shor算法的整数分解,使用Grover算法的未排序数据库搜索,量子密码学,隐形传态等等。人们研究了许多物理实现量子算法的方法。本文介绍了量子计算机的实现技术,重点介绍了线性光学量子计算技术。
{"title":"A Review on Quantum Computers with Emphasize on Linear Optics Quantum Computing","authors":"Amit Kumar Sharma, A. Ghunawat","doi":"10.1109/ICICT46931.2019.8977637","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977637","url":null,"abstract":"Recently researchers have been explored quantum phenomena’s for computation purpose and demonstrated important computational algorithms such as integer factorization using Shor’s algorithm, unsorted date base search using Grover’s algorithm, quantum cryptography, teleportation and many more. Many approaches have been investigated for implementing quantum algorithm physically. In this review quantum computer implementation techniques are introduced with an emphasize on linear optics quantum computing.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Patient waiting time prediction in hospital queuing system using improved random forest in big data 基于大数据改进随机森林的医院排队系统患者等待时间预测
Prashant S. Patil, Sanjay Thakur
At this moment, mainly hospitals are overloaded and require a helpful patient wait in line management. Patient row executive and wait for time prophecy appearance a tough, as well as difficult occupation since every patient capacity, involves different segment or procedures, such as checkups, a variety of check-up like a Urine test, injection or a regular checkup, negligible operations, throughout the action. Consequently although evaluating these whole check patients have to pass the time in a queue and redundant waiting time as well as also give frustration during waiting in the queue. To reduce patient waiting times using minimized path-awareness we propose an Incremental Patient Treatment Time Prediction (IPTTP) algorithm based on improved Random Forest method which is used to calculate the waiting instant for all handling jobs for a patient. It would be innovative suitable if a patient possibly will get the predicted waiting time and treatment plan on an application that shows the treatment preparation and forecast waiting moment in real-time. We utilize realistic patient data from the data acquisition model where data is generated by randomly using some features like patient gender, age, task, hospital departments, etc. to accomplish a patient handling time for every one job. Depend on this significant, sensible information, the action waiting time for every patient in the wait in a line of every task is suggested. Based on the forecast behind you occasion for every patient, Hospital Queuing-Recommendation (HQR) with the minimized path- awareness system is developed by makes use of treatment task features. HQR determines and forecasts a well-organized and suitable management plan suggested for every patient. For the reason that of the significant, sensible information, the prerequisite for instantaneous come back with, An IPTTP as well as HQR system with minimized path-awareness, acquiescence effectiveness, and low-latency reaction. We bring into play a Hadoop pig script implementation at the Department of Computer Engg at Lord Krishna College Of Technology in Indore, India to achieve the objective as mentioned earlier. Widespread conducting experiment and imitation consequences reveal the effectiveness and applicability of our projected representation to propose a successful action plan for patients to reduce their waiting time in the hospital.
此时,主要是医院超载,需要一个有帮助的病人排队管理。病人排执行和等待时间预言是一个艰难的职业,因为每个病人的能力,涉及不同的部分或程序,如检查,各种检查,如尿检,注射或定期检查,可忽略的手术,整个行动。因此,虽然评估这些整体检查的病人必须在队列和多余的等待时间中度过的时间,以及在排队等待期间也给予挫折。为了利用最小化路径感知减少患者的等待时间,我们提出了一种基于改进随机森林方法的增量患者治疗时间预测(IPTTP)算法,该算法用于计算患者所有处理工作的等待时间。如果在一个实时显示治疗准备和预测等待时刻的应用程序上,患者可能会得到预测的等待时间和治疗计划,这将是一种创新。我们利用数据采集模型中的真实患者数据,随机使用患者性别、年龄、任务、医院科室等特征生成数据,完成每项工作的患者处理时间。根据这些有意义的、合理的信息,建议每个任务队列中每个病人的动作等待时间。基于对每个患者背后情况的预测,利用治疗任务的特点,开发了具有最小化路径感知的医院排队推荐系统。HQR确定并预测为每位患者建议的组织良好且合适的管理计划。因为重要的,明智的信息,瞬时返回的先决条件,一个IPTTP和HQR系统具有最小的路径意识,默认有效性和低延迟反应。为了实现前面提到的目标,我们在印度印多尔的Lord Krishna理工学院的计算机工程系使用了一个Hadoop pig脚本实现。广泛开展的实验和模仿结果揭示了我们的预测代表的有效性和适用性,为患者提出了一个成功的行动计划,以减少他们在医院的等待时间。
{"title":"Patient waiting time prediction in hospital queuing system using improved random forest in big data","authors":"Prashant S. Patil, Sanjay Thakur","doi":"10.1109/ICICT46931.2019.8977717","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977717","url":null,"abstract":"At this moment, mainly hospitals are overloaded and require a helpful patient wait in line management. Patient row executive and wait for time prophecy appearance a tough, as well as difficult occupation since every patient capacity, involves different segment or procedures, such as checkups, a variety of check-up like a Urine test, injection or a regular checkup, negligible operations, throughout the action. Consequently although evaluating these whole check patients have to pass the time in a queue and redundant waiting time as well as also give frustration during waiting in the queue. To reduce patient waiting times using minimized path-awareness we propose an Incremental Patient Treatment Time Prediction (IPTTP) algorithm based on improved Random Forest method which is used to calculate the waiting instant for all handling jobs for a patient. It would be innovative suitable if a patient possibly will get the predicted waiting time and treatment plan on an application that shows the treatment preparation and forecast waiting moment in real-time. We utilize realistic patient data from the data acquisition model where data is generated by randomly using some features like patient gender, age, task, hospital departments, etc. to accomplish a patient handling time for every one job. Depend on this significant, sensible information, the action waiting time for every patient in the wait in a line of every task is suggested. Based on the forecast behind you occasion for every patient, Hospital Queuing-Recommendation (HQR) with the minimized path- awareness system is developed by makes use of treatment task features. HQR determines and forecasts a well-organized and suitable management plan suggested for every patient. For the reason that of the significant, sensible information, the prerequisite for instantaneous come back with, An IPTTP as well as HQR system with minimized path-awareness, acquiescence effectiveness, and low-latency reaction. We bring into play a Hadoop pig script implementation at the Department of Computer Engg at Lord Krishna College Of Technology in Indore, India to achieve the objective as mentioned earlier. Widespread conducting experiment and imitation consequences reveal the effectiveness and applicability of our projected representation to propose a successful action plan for patients to reduce their waiting time in the hospital.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127538490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1