首页 > 最新文献

2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)最新文献

英文 中文
Improved Haze Removal Method Using Proportionate Fusion of Color Attenuation Prior and Edge Preserving 基于颜色衰减先验和边缘保持比例融合的雾霾去除方法
Sudeep D. Thepade, Pratibha Mishra, Rucha Udgirkar, Sahil Singh, Poonam Mengwade
Nowadays, fog and haze are becoming a global challenge. Images captured under the hazy condition have poor contrast and corrupted colour. Such images limit the visibility and thus hinder the way for the computer vision purposes like video observation, entity recognition. Such hazy images affect the usual working in the transportation sector e.g. trains, ships etc. One of the prominent factors affecting the outdoor vision applications is poor vision and thus, it may result in an intangible loss like safety. The image captured shows this behaviour because of the air light. This paper analyses the widely used techniques for haze removal from images alias color attenuation prior based haze removal and haze removal with edge preserving. Also, the paper proposes the better haze removing techniques using fusion based approach which gives better quality haze removal compared to the bench mark haze removal techniques. Experimental results tested with NIQE have proved the worth of proposed methods.
如今,雾霾正在成为一个全球性的挑战。在朦胧的条件下拍摄的图像对比度差,色彩失真。这样的图像限制了可见性,从而阻碍了计算机视觉目的,如视频观察,实体识别的方式。这种朦胧的图像影响了交通部门的正常工作,如火车、轮船等。影响户外视觉应用的一个突出因素是视力不佳,从而可能造成安全等无形损失。这张照片显示了空气光的作用。分析了目前广泛应用的图像去雾技术,包括基于混叠色衰减先验的去雾技术和基于边缘保持的去雾技术。此外,本文还提出了基于融合方法的更好的雾霾去除技术,与基准雾霾去除技术相比,该方法具有更好的雾霾去除质量。用NIQE测试的实验结果证明了所提方法的有效性。
{"title":"Improved Haze Removal Method Using Proportionate Fusion of Color Attenuation Prior and Edge Preserving","authors":"Sudeep D. Thepade, Pratibha Mishra, Rucha Udgirkar, Sahil Singh, Poonam Mengwade","doi":"10.1109/ICCUBEA.2018.8697664","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697664","url":null,"abstract":"Nowadays, fog and haze are becoming a global challenge. Images captured under the hazy condition have poor contrast and corrupted colour. Such images limit the visibility and thus hinder the way for the computer vision purposes like video observation, entity recognition. Such hazy images affect the usual working in the transportation sector e.g. trains, ships etc. One of the prominent factors affecting the outdoor vision applications is poor vision and thus, it may result in an intangible loss like safety. The image captured shows this behaviour because of the air light. This paper analyses the widely used techniques for haze removal from images alias color attenuation prior based haze removal and haze removal with edge preserving. Also, the paper proposes the better haze removing techniques using fusion based approach which gives better quality haze removal compared to the bench mark haze removal techniques. Experimental results tested with NIQE have proved the worth of proposed methods.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"956 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114428187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Securing ATM Pins and Passwords Using Fingerprint Based Fuzzy Vault System 使用基于指纹的模糊保险库系统保护ATM pin和密码
Sweedle Machado, Prajyoti D’Silva, Snehal D'mello, Supriya Solaskar, Priya Chaudhari
Cryptography and Biometrics are two efficient and powerful technologies to achieve high proven information security. As private keys act as an important component in cryptography, one of the main challenges in the cryptosystem is maintaining the confidentiality of these private keys. This problem can be solved by making use of biometric traits. Biometric authentication verifies user's identity using biometric traits. However, a biometric authentication fails to protect the user's biometric template stored in a database, as it is susceptible to various attacks. The fuzzy vault system is the form of bio-cryptosystem that combines cryptography and biometrics together to overcome the pitfalls of these technologies. This project work aims at exploring a fuzzy vault system to secure ATM pins and passwords with the fingerprint data such that only the legitimate user can access the pins and passwords by providing the valid fingerprint. The proposed system was tested using dummy fingerprint dataset to test the performance of the proposed system.
密码学和生物识别技术是两种高效而强大的技术,可以实现高度的信息安全。由于私钥在密码学中是一个重要的组成部分,因此在密码系统中面临的主要挑战之一是保持这些私钥的机密性。这个问题可以通过利用生物特征来解决。生物特征认证使用生物特征来验证用户身份。然而,生物特征认证无法保护存储在数据库中的用户生物特征模板,因为它容易受到各种攻击。模糊保险库系统是一种将密码学和生物识别技术相结合的生物密码系统,以克服这些技术的缺陷。本课题旨在探索一种模糊保险库系统,利用指纹数据保护ATM机的pin和密码,只有合法用户才能通过提供有效的指纹访问pin和密码。利用虚拟指纹数据集对所提系统进行了测试,以测试所提系统的性能。
{"title":"Securing ATM Pins and Passwords Using Fingerprint Based Fuzzy Vault System","authors":"Sweedle Machado, Prajyoti D’Silva, Snehal D'mello, Supriya Solaskar, Priya Chaudhari","doi":"10.1109/ICCUBEA.2018.8697794","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697794","url":null,"abstract":"Cryptography and Biometrics are two efficient and powerful technologies to achieve high proven information security. As private keys act as an important component in cryptography, one of the main challenges in the cryptosystem is maintaining the confidentiality of these private keys. This problem can be solved by making use of biometric traits. Biometric authentication verifies user's identity using biometric traits. However, a biometric authentication fails to protect the user's biometric template stored in a database, as it is susceptible to various attacks. The fuzzy vault system is the form of bio-cryptosystem that combines cryptography and biometrics together to overcome the pitfalls of these technologies. This project work aims at exploring a fuzzy vault system to secure ATM pins and passwords with the fingerprint data such that only the legitimate user can access the pins and passwords by providing the valid fingerprint. The proposed system was tested using dummy fingerprint dataset to test the performance of the proposed system.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123435418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Indoor Navigation System Using Bluetooth Low Energy Beacons 使用蓝牙低能量信标的室内导航系统
Amit R. Singh, Yash Shreshthi, Neelay Waghchoure, Amey Wakchaure
Global Positioning System (GPS) has been proven to be a boon for navigation across the globe using the geographical coordinates. Although, when we have to navigate inside an enclosed space or a building these coordinates do not help in this type of navigation. So, to facilitate Indoor Navigation, there are various techniques used such as Wi-Fi Fingerprinting, Digital Compass Technologies, QR Code, RFID etc. We propose to use BLE (Bluetooth Low Energy) Beacons for this Indoor Navigation System (INS) as it is more proficient than all the other technologies in terms of range, accuracy, privacy and security. BLE is a wireless personal area technology designed and marketed by Special Interest Group (SIG) aimed at novel applications in various domains. In this paper, we have implemented an INS using these BLE Beacons which calculate the available shortest path using Dijkstra's algorithm. This algorithm finds the shortest path tree from the source by building a set of available destinations that have a minimum distance from the source to the desired destination.
全球定位系统(GPS)已被证明是利用地理坐标进行全球导航的福音。然而,当我们在一个封闭的空间或建筑中导航时,这些坐标对这种导航没有帮助。因此,为了方便室内导航,使用了各种技术,如Wi-Fi指纹识别,数字罗盘技术,QR码,RFID等。我们建议在这个室内导航系统(INS)中使用BLE(低功耗蓝牙)信标,因为它在范围,精度,隐私和安全性方面比所有其他技术都更精通。BLE是一种无线个人区域技术,由特殊兴趣小组(SIG)设计和销售,旨在各种领域的新应用。在本文中,我们使用这些BLE信标实现了一个INS,它使用Dijkstra算法计算可用的最短路径。该算法通过构建一组从源到期望目的地的距离最小的可用目的地来找到从源到期望目的地的最短路径树。
{"title":"Indoor Navigation System Using Bluetooth Low Energy Beacons","authors":"Amit R. Singh, Yash Shreshthi, Neelay Waghchoure, Amey Wakchaure","doi":"10.1109/ICCUBEA.2018.8697351","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697351","url":null,"abstract":"Global Positioning System (GPS) has been proven to be a boon for navigation across the globe using the geographical coordinates. Although, when we have to navigate inside an enclosed space or a building these coordinates do not help in this type of navigation. So, to facilitate Indoor Navigation, there are various techniques used such as Wi-Fi Fingerprinting, Digital Compass Technologies, QR Code, RFID etc. We propose to use BLE (Bluetooth Low Energy) Beacons for this Indoor Navigation System (INS) as it is more proficient than all the other technologies in terms of range, accuracy, privacy and security. BLE is a wireless personal area technology designed and marketed by Special Interest Group (SIG) aimed at novel applications in various domains. In this paper, we have implemented an INS using these BLE Beacons which calculate the available shortest path using Dijkstra's algorithm. This algorithm finds the shortest path tree from the source by building a set of available destinations that have a minimum distance from the source to the desired destination.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123690202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Saturating Exponential Law for Reduction of Power and PAPR in OFDM Networks 降低OFDM网络功率和PAPR的饱和指数律
Shilpa Mayannavar, Bahubali K. Shiragapur, U. Wali
Orthogonal frequency division multiplexing (OFDM) is an attractive technology for wireless communication applications with high data rate capability. However an OFDM system suffers from its inherently large Peak to Average Power Ratio (PAPR). High PAPR reduces the dynamic signal range utilization and forces non-linear operation of down side components like Digital to Analog Convertor (DAC) and High Power Amplifier (HPA). A qualitative analysis of the PAPR is presented and a transformation technique to mitigate the high PAPR problem is suggested. The Double Saturating Exponential law for reduction of PAPR is compared with standard $boldsymbol{mu}$-law companding technique.
正交频分复用技术(OFDM)是一种具有高数据速率的无线通信技术。然而,OFDM系统固有的高峰值平均功率比(PAPR)是其缺点。高PAPR降低了动态信号范围的利用率,并迫使下行组件(如数模转换器(DAC)和高功率放大器(HPA))进行非线性操作。本文对PAPR进行了定性分析,并提出了一种缓解高PAPR问题的转换技术。将双饱和指数法与标准的$boldsymbol{mu}$-law扩展技术进行了比较。
{"title":"Saturating Exponential Law for Reduction of Power and PAPR in OFDM Networks","authors":"Shilpa Mayannavar, Bahubali K. Shiragapur, U. Wali","doi":"10.1109/ICCUBEA.2018.8697644","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697644","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is an attractive technology for wireless communication applications with high data rate capability. However an OFDM system suffers from its inherently large Peak to Average Power Ratio (PAPR). High PAPR reduces the dynamic signal range utilization and forces non-linear operation of down side components like Digital to Analog Convertor (DAC) and High Power Amplifier (HPA). A qualitative analysis of the PAPR is presented and a transformation technique to mitigate the high PAPR problem is suggested. The Double Saturating Exponential law for reduction of PAPR is compared with standard $boldsymbol{mu}$-law companding technique.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of IPv4 to IPv6 Transition Mechanisms IPv4到IPv6转换机制的性能分析
Sheetal Singalar, R. Banakar
The rapid developments in science and technology has led to more and more devices and systems being connected to the internet. With this, the depletion of available IPv4 addresses has increased and the requirement of a full-fledged IPv6 architecture ameliorated. There are many available transition mechanisms each with distinct requirements, operational theory and availability that help in adapting IPv6. A performance analysis can help network engineers decide the best transition mechanism for their environment. Performance metrics like RTT, throughput and bandwidth help in examining these mechanisms and to select the appropriate technique. In this paper, the main focus is to evaluate the different transition mechanisms with the help of cisco packet tracer. The analysis depicts that dual stack has better performance when compared to tunneling.
科学技术的快速发展使得越来越多的设备和系统连接到互联网。因此,可用IPv4地址的消耗增加了,对成熟的IPv6架构的要求得到了改善。有许多可用的转换机制,每个都有不同的要求、操作理论和可用性,有助于适应IPv6。性能分析可以帮助网络工程师决定其环境的最佳转换机制。RTT、吞吐量和带宽等性能指标有助于检查这些机制并选择适当的技术。本文的重点是在cisco数据包跟踪器的帮助下评估不同的转换机制。分析表明,与隧道隧道相比,双栈具有更好的性能。
{"title":"Performance Analysis of IPv4 to IPv6 Transition Mechanisms","authors":"Sheetal Singalar, R. Banakar","doi":"10.1109/ICCUBEA.2018.8697539","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697539","url":null,"abstract":"The rapid developments in science and technology has led to more and more devices and systems being connected to the internet. With this, the depletion of available IPv4 addresses has increased and the requirement of a full-fledged IPv6 architecture ameliorated. There are many available transition mechanisms each with distinct requirements, operational theory and availability that help in adapting IPv6. A performance analysis can help network engineers decide the best transition mechanism for their environment. Performance metrics like RTT, throughput and bandwidth help in examining these mechanisms and to select the appropriate technique. In this paper, the main focus is to evaluate the different transition mechanisms with the help of cisco packet tracer. The analysis depicts that dual stack has better performance when compared to tunneling.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116832774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Portfolio Generation for Indian Stock Markets Using Unsupervised Machine Learning 使用无监督机器学习的印度股市投资组合生成
V. Kedia, Zubayr Khalid, Saptarsi Goswami, N. Sharma, Kavita Suryawanshi
Portfolio Management is a concept of selecting the proportions of various assets that is to be held in a portfolio to have a good return without a significant risk exposure. Portfolio optimization is one important building block in financial management and investment banking. One possible strategy for minimisation of risk is by enlarging or varying its field of operation for the portfolio. Constructing an optimal portfolio by judging and selecting the best possible combinations of different portfolio is a computationally challenging problem since it comes up with an exponential complexity. Here, we have proposed a simple k-means based clustering strategy for an optimal portfolio. BSE100 stocks are represented by their fundamental financial ratios. Clustering is performed, and a prototype stock is selected from each of the clusters. An equal investment strategy demonstrates superior return as compared to the indices as well as top mutual funds. The classification is done by considering a host of investment parameters. We compare the rate of return of these stocks to the benchmark of Indian Stock Exchange.
投资组合管理是一个概念,选择要在投资组合中持有的各种资产的比例,以获得良好的回报,而不承担重大风险。投资组合优化是财务管理和投资银行业务的重要组成部分。风险最小化的一个可能策略是扩大或改变其投资组合的操作领域。通过判断和选择不同投资组合的最佳可能组合来构建最优投资组合是一个具有计算挑战性的问题,因为它具有指数复杂度。在这里,我们提出了一个简单的基于k均值的最优组合聚类策略。BSE100股票由其基本财务比率表示。执行聚类,并从每个聚类中选择一个原型股票。与指数和顶级共同基金相比,平等的投资策略显示出更高的回报。分类是通过考虑一系列投资参数来完成的。我们将这些股票的回报率与印度证券交易所的基准进行比较。
{"title":"Portfolio Generation for Indian Stock Markets Using Unsupervised Machine Learning","authors":"V. Kedia, Zubayr Khalid, Saptarsi Goswami, N. Sharma, Kavita Suryawanshi","doi":"10.1109/ICCUBEA.2018.8697771","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697771","url":null,"abstract":"Portfolio Management is a concept of selecting the proportions of various assets that is to be held in a portfolio to have a good return without a significant risk exposure. Portfolio optimization is one important building block in financial management and investment banking. One possible strategy for minimisation of risk is by enlarging or varying its field of operation for the portfolio. Constructing an optimal portfolio by judging and selecting the best possible combinations of different portfolio is a computationally challenging problem since it comes up with an exponential complexity. Here, we have proposed a simple k-means based clustering strategy for an optimal portfolio. BSE100 stocks are represented by their fundamental financial ratios. Clustering is performed, and a prototype stock is selected from each of the clusters. An equal investment strategy demonstrates superior return as compared to the indices as well as top mutual funds. The classification is done by considering a host of investment parameters. We compare the rate of return of these stocks to the benchmark of Indian Stock Exchange.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":" 43","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Voyageur 旅行者
Akshen Kadakia, D. Desai, Urvi Mistry, Mitchell D'silva
In today's busy world, travelling can be one of the therapies that can reduce all our stress. A traveller has lots of dreams but lack of plans. If the user is sure about the place to visit, yet he never finds all the required information at the same place. Even if he finds all the information of the destination; he is not sure about the reviews of the places in that destination and it would take him a number of days to make an itinerary. There are many existing systems such as tour planning websites, offline customized tour planners, etc. to help plan an itinerary, but they don't suffice all the user requirements. Also, they do not provide instant customization. Our survey confirmed that the users experienced some problems with the existing systems. Thus, this paper presents a trip planning application ‘Voyageur’ which will help the users to plan their trips more efficiently. It will help the users to find all the information required at a single place. Also, it will give freedom to the user to build their customized itinerary automatically by taking into consideration various factors such as user preferences, the distance between places to visit, etc. It will provide the user with alternative plans for their trip using genetic algorithm. It will also suggest best hotels and places to visit based on ratings available on the internet. Thus, this instant itinerary generation will save a lot of user's time.
在当今繁忙的世界里,旅行是一种可以减轻我们所有压力的疗法。旅行者有很多梦想,但缺乏计划。如果用户确定要访问的地方,但他从来没有在同一个地方找到所有需要的信息。即使他找到了目的地的所有信息;他不确定目的地地方的评价,他需要几天的时间来制定行程。现有的很多系统,如旅游策划网站、线下定制旅游规划师等,都可以帮助规划行程,但它们并不能满足所有用户的需求。此外,它们不提供即时定制。我们的调查证实,用户在使用现有系统时遇到了一些问题。因此,本文提出了一个旅行计划应用程序“Voyageur”,它将帮助用户更有效地计划他们的旅行。它将帮助用户在一个地方找到所需的所有信息。此外,它将给予用户自由,通过考虑用户偏好、访问地点之间的距离等各种因素,自动建立自己的定制行程。它将使用遗传算法为用户提供不同的旅行计划。它还会根据互联网上的评分推荐最好的酒店和旅游地点。因此,这种即时生成行程将节省大量用户的时间。
{"title":"Voyageur","authors":"Akshen Kadakia, D. Desai, Urvi Mistry, Mitchell D'silva","doi":"10.1109/iccubea.2018.8697358","DOIUrl":"https://doi.org/10.1109/iccubea.2018.8697358","url":null,"abstract":"In today's busy world, travelling can be one of the therapies that can reduce all our stress. A traveller has lots of dreams but lack of plans. If the user is sure about the place to visit, yet he never finds all the required information at the same place. Even if he finds all the information of the destination; he is not sure about the reviews of the places in that destination and it would take him a number of days to make an itinerary. There are many existing systems such as tour planning websites, offline customized tour planners, etc. to help plan an itinerary, but they don't suffice all the user requirements. Also, they do not provide instant customization. Our survey confirmed that the users experienced some problems with the existing systems. Thus, this paper presents a trip planning application ‘Voyageur’ which will help the users to plan their trips more efficiently. It will help the users to find all the information required at a single place. Also, it will give freedom to the user to build their customized itinerary automatically by taking into consideration various factors such as user preferences, the distance between places to visit, etc. It will provide the user with alternative plans for their trip using genetic algorithm. It will also suggest best hotels and places to visit based on ratings available on the internet. Thus, this instant itinerary generation will save a lot of user's time.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracking Human Movements in Large View Cases 在大视角下跟踪人类运动
M V Patil, Meenakshi Patil
Object tracking is an important task in the field of computer vision. In which the camera tracking have become a common requirement in today's society. The inexpensive video camera and the high quality lens generate a great interest in the object tracking field. Generally, it is not easy to track human behavior in an environment with a large view. So the project aims to solve the big problems which are associated with the large view camera system to track the people in the large area which is single targets in nonlinear motion, handle occlusion & to reduce the processing time. In this paper a new algorithm is used to solve the problems which are by using a GbLN-BCO & model based particle filter. The proposed algorithm is tested on the several set of video data. The accuracy of the tracking perform is greater than the previous techniques i.e. unscented Kalman filter & Parzen Particle Filter.
目标跟踪是计算机视觉领域的一项重要任务。其中摄像头跟踪已经成为当今社会的一种普遍需求。廉价的摄像机和高质量的镜头引起了人们对目标跟踪领域的极大兴趣。一般来说,在一个大视野的环境中跟踪人类行为是不容易的。因此,该项目旨在解决大视场摄像机系统在非线性运动的单一目标下大面积跟踪人、处理遮挡和减少处理时间的大问题。本文提出了一种新的基于GbLN-BCO和基于模型的粒子滤波算法来解决这些问题。在多组视频数据上对该算法进行了测试。跟踪执行的准确性比以前的技术,即无气味卡尔曼滤波和Parzen粒子滤波更大。
{"title":"Tracking Human Movements in Large View Cases","authors":"M V Patil, Meenakshi Patil","doi":"10.1109/ICCUBEA.2018.8697860","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697860","url":null,"abstract":"Object tracking is an important task in the field of computer vision. In which the camera tracking have become a common requirement in today's society. The inexpensive video camera and the high quality lens generate a great interest in the object tracking field. Generally, it is not easy to track human behavior in an environment with a large view. So the project aims to solve the big problems which are associated with the large view camera system to track the people in the large area which is single targets in nonlinear motion, handle occlusion & to reduce the processing time. In this paper a new algorithm is used to solve the problems which are by using a GbLN-BCO & model based particle filter. The proposed algorithm is tested on the several set of video data. The accuracy of the tracking perform is greater than the previous techniques i.e. unscented Kalman filter & Parzen Particle Filter.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124644242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Division and Replication Approach for Improving Security and Availability of Cloud Storage 提高云存储安全性和可用性的数据分割和复制方法
A. Londhe, Vikrant Bhalerao, Suyog Ghodey, S. Kate, Niranjan Dandekar, Shubham Bhange
Large, distributed network systems such as the Cloud cater to the immense data storage needs of people around the world. This data stored upon the cloud may be sensitive, which makes the Security aspect of these Cloud systems extremely imperative. The Cloud nodes host this data. If these nodes are compromised by a malicious entity then consequences may be dire. In this paper we have proposed and put forth the results of a system which will implement a storage methodology that uses the Division and Replication strategy for storing the data. In this system, the file will be fragmented and these fragments will be replicated according to the replication factor before storing it upon the cloud. The fragments are dispersed such that consecutive nodes on the Cloud do not hold the fragments of a same file and so that even if a node is compromised no significant information is leaked to the attacker. This system will enhance cloud security using Division and Replication of data in Cloud for Optimal Performance and Security (DROPS) methodology. This additional security will come without any cryptographic techniques being applied. Lack of these computation heavy cryptographic techniques will mean that security will come without the compromise of increasing the computation load. The system will analyze the performance of our methodology by portraying it in a virtual environment comprising of virtual machines which form a Cloud network. We will depict the results of our system and how it handled storing data onto the cloud.
像云这样的大型分布式网络系统迎合了世界各地人们的巨大数据存储需求。存储在云上的这些数据可能是敏感的,这使得这些云系统的安全方面非常重要。云节点托管这些数据。如果这些节点被恶意实体破坏,那么后果可能是可怕的。在本文中,我们提出并提出了一个系统的结果,该系统将实现使用分割和复制策略存储数据的存储方法。在此系统中,文件将被分割,这些碎片将根据复制因子进行复制,然后将其存储在云上。碎片是分散的,这样云上的连续节点就不会保存同一文件的碎片,因此即使一个节点被攻破,也不会向攻击者泄露重要信息。该系统将使用云中的数据分割和复制以实现最佳性能和安全性(DROPS)方法来增强云安全性。这种额外的安全性不需要应用任何加密技术。缺乏这些计算繁重的加密技术将意味着在不增加计算负载的情况下实现安全性。该系统将通过在一个由虚拟机组成的云网络的虚拟环境中描绘我们的方法来分析其性能。我们将描述系统的结果以及它如何处理将数据存储到云中。
{"title":"Data Division and Replication Approach for Improving Security and Availability of Cloud Storage","authors":"A. Londhe, Vikrant Bhalerao, Suyog Ghodey, S. Kate, Niranjan Dandekar, Shubham Bhange","doi":"10.1109/ICCUBEA.2018.8697355","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697355","url":null,"abstract":"Large, distributed network systems such as the Cloud cater to the immense data storage needs of people around the world. This data stored upon the cloud may be sensitive, which makes the Security aspect of these Cloud systems extremely imperative. The Cloud nodes host this data. If these nodes are compromised by a malicious entity then consequences may be dire. In this paper we have proposed and put forth the results of a system which will implement a storage methodology that uses the Division and Replication strategy for storing the data. In this system, the file will be fragmented and these fragments will be replicated according to the replication factor before storing it upon the cloud. The fragments are dispersed such that consecutive nodes on the Cloud do not hold the fragments of a same file and so that even if a node is compromised no significant information is leaked to the attacker. This system will enhance cloud security using Division and Replication of data in Cloud for Optimal Performance and Security (DROPS) methodology. This additional security will come without any cryptographic techniques being applied. Lack of these computation heavy cryptographic techniques will mean that security will come without the compromise of increasing the computation load. The system will analyze the performance of our methodology by portraying it in a virtual environment comprising of virtual machines which form a Cloud network. We will depict the results of our system and how it handled storing data onto the cloud.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129420598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Region Growing Based Segmentation Using Forstner Corner Detection Theory for Accurate Microaneurysms Detection in Retinal Fundus Images 基于Forstner角检测理论的区域生长分割用于视网膜眼底图像微动脉瘤的精确检测
R. Badgujar, P. Deore
Several diseases have adverb effect on visual system of human visual system (eye) and diabetes is leading one among them. Prolong and uncontrolled diabetic patient is prone to Diabetic Retinopathy (DR). DR is asymptomatic disease hence requires detection in early stages to avoid big loss in vision. It shows immediate necessity of screening system to access eye images and analyze for DR detection. Microaneurysms (MAs) are primary lesion of DR, so their detection can give time for patient and ophthalmologist to prevent further vision loss. Region growing segmentation method is proposed for accurate detection of MAs. The preprocessing of retinal images uses non local means (NLM) filter and contrast limited adaptive histogram equalization (CLAHE) for noise removal and enhancement image quality. In segmentation, region growing algorithm in which the seeds for the grower are selected and positioned by means of Forstner Corner Detection theory is utilized. After segmentation, the redundant areas are removed using morphological operations (Niblack Adaptive Thresholding) and finally the Predator prey optimizer is used for optimizing the features for MA detection.
几种疾病对人的视觉系统(眼睛)有影响,糖尿病是其中的主要疾病之一。长期未控制的糖尿病患者易发生糖尿病视网膜病变(DR)。DR是一种无症状的疾病,因此需要在早期发现,以避免严重的视力丧失。因此,对人眼图像进行采集和分析,对DR检测具有迫切的必要性。微动脉瘤(MAs)是DR的原发病变,因此其检测可以为患者和眼科医生提供时间,以防止进一步的视力丧失。为了准确检测MAs,提出了区域增长分割方法。视网膜图像预处理采用非局部均值(NLM)滤波和对比度有限自适应直方图均衡化(CLAHE)去噪,增强图像质量。在分割中,采用区域生长算法,利用Forstner角点检测理论对生长者的种子进行选择和定位。分割后,使用形态学操作(Niblack Adaptive Thresholding)去除冗余区域,最后使用捕食者猎物优化器(Predator prey optimizer)优化特征进行MA检测。
{"title":"Region Growing Based Segmentation Using Forstner Corner Detection Theory for Accurate Microaneurysms Detection in Retinal Fundus Images","authors":"R. Badgujar, P. Deore","doi":"10.1109/ICCUBEA.2018.8697671","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697671","url":null,"abstract":"Several diseases have adverb effect on visual system of human visual system (eye) and diabetes is leading one among them. Prolong and uncontrolled diabetic patient is prone to Diabetic Retinopathy (DR). DR is asymptomatic disease hence requires detection in early stages to avoid big loss in vision. It shows immediate necessity of screening system to access eye images and analyze for DR detection. Microaneurysms (MAs) are primary lesion of DR, so their detection can give time for patient and ophthalmologist to prevent further vision loss. Region growing segmentation method is proposed for accurate detection of MAs. The preprocessing of retinal images uses non local means (NLM) filter and contrast limited adaptive histogram equalization (CLAHE) for noise removal and enhancement image quality. In segmentation, region growing algorithm in which the seeds for the grower are selected and positioned by means of Forstner Corner Detection theory is utilized. After segmentation, the redundant areas are removed using morphological operations (Niblack Adaptive Thresholding) and finally the Predator prey optimizer is used for optimizing the features for MA detection.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128324412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1