首页 > 最新文献

2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
Telugu handwritten character recognition using deep residual learning 使用深度残差学习的泰卢固语手写字符识别
Bindu Madhuri Cheekati, Roje Spandana Rajeti
Present years are the exciting times for recognition of handwritten characters in the fields of Image Processing, Pattern Recognition, and Computer Vision. Recognizing handwritten characters using deep convolutional neural networks is a new era. There are various techniques available for handwritten recognition of characters, depending on hand-designed features. The proposed work is based on a systematic method to recognize both offline and online Telugu handwritten characters with residual learning framework called ResNet. A residual learning network is a concept of deeper neural networks where the training of the data is more effective. ResNet enables building very deep networks by addressing the vanishing gradient problem that occurs in deep convolutional neural networks. This paper deals in developing a fast, reliable Telugu handwritten ResNet for both online and offline character recognition and also improves the classification performance. The model is evaluated with IIITS-Telugu Handwriting Database; HP Labs database (Telugu) India and achieved very promising results. The Proposed residual net (ResNet-50) achieves 2.37% error on the ResNet-18 & 34 test set.
近年来是图像处理、模式识别和计算机视觉领域手写体字符识别的激动人心的时代。使用深度卷积神经网络识别手写字符是一个新时代。根据手工设计的特征,有各种可用于手写字符识别的技术。提出的工作是基于一个系统的方法来识别离线和在线泰卢固语手写字符与残余学习框架称为ResNet。残差学习网络是一个深度神经网络的概念,其中数据的训练更有效。通过解决深度卷积神经网络中出现的梯度消失问题,ResNet可以构建非常深度的网络。本文致力于开发一种快速、可靠的泰卢固语手写ResNet,用于在线和离线字符识别,并提高分类性能。使用iiits -泰卢固语笔迹数据库对该模型进行了评估;惠普实验室数据库(泰卢固语)印度取得了非常有希望的结果。所提出的残差网(ResNet-50)在ResNet-18和resnet - 34测试集上的误差达到2.37%。
{"title":"Telugu handwritten character recognition using deep residual learning","authors":"Bindu Madhuri Cheekati, Roje Spandana Rajeti","doi":"10.1109/I-SMAC49090.2020.9243348","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243348","url":null,"abstract":"Present years are the exciting times for recognition of handwritten characters in the fields of Image Processing, Pattern Recognition, and Computer Vision. Recognizing handwritten characters using deep convolutional neural networks is a new era. There are various techniques available for handwritten recognition of characters, depending on hand-designed features. The proposed work is based on a systematic method to recognize both offline and online Telugu handwritten characters with residual learning framework called ResNet. A residual learning network is a concept of deeper neural networks where the training of the data is more effective. ResNet enables building very deep networks by addressing the vanishing gradient problem that occurs in deep convolutional neural networks. This paper deals in developing a fast, reliable Telugu handwritten ResNet for both online and offline character recognition and also improves the classification performance. The model is evaluated with IIITS-Telugu Handwriting Database; HP Labs database (Telugu) India and achieved very promising results. The Proposed residual net (ResNet-50) achieves 2.37% error on the ResNet-18 & 34 test set.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"28 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
IoT based Classification Techniques for Soil Content Analysis and Crop Yield Prediction 基于物联网的土壤含量分析和作物产量预测分类技术
R. Reshma, V. Sathiyavathi, T. Sindhu, K. Selvakumar, L. Sairamesh
Agriculture aided by IoT is called Smart Agriculture and it gives rise to precision farming. Soil Monitoring combined with Internet of Things (IoT) technology aids in the enhancement of agriculture by increasing yield through gauging the exact soil characteristics such as Moisture, Temperature, Humidity, PH, and Nutrition content/Fertility. This data is then gathered in cloud storage and with the appropriate data operations; it enabled us to optimize farming strategies and helped create a trend analysis. This, then, allows us to precisely utilize resources and steer the farming methods in prudent ways to optimize yield. The proposed IoT system is composed of pH sensors, Humidity and temperature sensors, Soil moisture sensors, soil nutrient sensors (NPK) probes, microcontroller/microprocessor equipped with WiFi and Cloud storage. When the sensors are implemented, they measure the corresponding characteristics and transmit time-stamped live data to the cloud server. These sensors work together and provide wholesome data to the analyst. For the recommending system, the SVM and Decision Tree algorithm is proposed to get the crop suitable for the given soil data and helps to enhance the growth using an optimized farming process.
物联网辅助的农业被称为智能农业,它带来了精准农业。土壤监测与物联网(IoT)技术相结合,通过测量精确的土壤特征(如湿度、温度、湿度、PH值和营养含量/肥力)来提高产量,从而有助于提高农业产量。然后将这些数据收集到云存储中并进行适当的数据操作;它使我们能够优化耕作策略,并帮助创建趋势分析。因此,我们可以精确地利用资源,谨慎地指导耕作方法,以优化产量。该物联网系统由pH传感器、湿度和温度传感器、土壤湿度传感器、土壤养分传感器(NPK)探针、配备WiFi和云存储的微控制器/微处理器组成。当传感器实现后,它们测量相应的特征,并将带有时间戳的实时数据传输到云服务器。这些传感器一起工作,为分析人员提供健康的数据。对于推荐系统,提出了支持向量机和决策树算法来获得适合给定土壤数据的作物,并通过优化的耕作过程来帮助提高作物的生长。
{"title":"IoT based Classification Techniques for Soil Content Analysis and Crop Yield Prediction","authors":"R. Reshma, V. Sathiyavathi, T. Sindhu, K. Selvakumar, L. Sairamesh","doi":"10.1109/I-SMAC49090.2020.9243600","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243600","url":null,"abstract":"Agriculture aided by IoT is called Smart Agriculture and it gives rise to precision farming. Soil Monitoring combined with Internet of Things (IoT) technology aids in the enhancement of agriculture by increasing yield through gauging the exact soil characteristics such as Moisture, Temperature, Humidity, PH, and Nutrition content/Fertility. This data is then gathered in cloud storage and with the appropriate data operations; it enabled us to optimize farming strategies and helped create a trend analysis. This, then, allows us to precisely utilize resources and steer the farming methods in prudent ways to optimize yield. The proposed IoT system is composed of pH sensors, Humidity and temperature sensors, Soil moisture sensors, soil nutrient sensors (NPK) probes, microcontroller/microprocessor equipped with WiFi and Cloud storage. When the sensors are implemented, they measure the corresponding characteristics and transmit time-stamped live data to the cloud server. These sensors work together and provide wholesome data to the analyst. For the recommending system, the SVM and Decision Tree algorithm is proposed to get the crop suitable for the given soil data and helps to enhance the growth using an optimized farming process.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132510850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Twitter data in Emotional Analysis - A study 情绪分析中的推特数据——一项研究
Lokesh Singh, P. Gupta, R. Katarya, Pragyat Jayvant
As the innovation age encourages individuals to communicate their emotions via web-based media locales like Facebook, Instagram, Twitter, and so on. Numerous individuals share their musings and thoughts step by step in twitter similar to other tweets. This is considered as an exciting and attractive way to express ourselves as inspections are increasing bit by bit, due to which rundown of surveys are necessary for the job where summed up of text is required to give helpful data from the huge number of surveys. It is exceptionally hard for an individual to extricate helpful information or sum up it from the extremely enormous record. This paper focuses on comparison and analysis of different sentiment analysis techniques. It gives a far-reaching review about the recent and past examinations on sentiment analysis, challenges, and approaches for future angles.
随着创新时代的到来,人们开始通过Facebook、Instagram、Twitter等网络媒体来交流自己的情感。许多人在推特上一步一步地分享他们的沉思和想法,就像其他推特一样。这被认为是一种令人兴奋和有吸引力的表达自己的方式,因为检查正在一点一点地增加,因此调查的概要对于工作是必要的,需要总结文本来从大量的调查中提供有用的数据。对于一个人来说,从极其庞大的记录中提取有用的信息或加以总结是异常困难的。本文着重对不同的情感分析技术进行了比较和分析。它对最近和过去的情感分析、挑战和未来角度的方法进行了深远的回顾。
{"title":"Twitter data in Emotional Analysis - A study","authors":"Lokesh Singh, P. Gupta, R. Katarya, Pragyat Jayvant","doi":"10.1109/I-SMAC49090.2020.9243326","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243326","url":null,"abstract":"As the innovation age encourages individuals to communicate their emotions via web-based media locales like Facebook, Instagram, Twitter, and so on. Numerous individuals share their musings and thoughts step by step in twitter similar to other tweets. This is considered as an exciting and attractive way to express ourselves as inspections are increasing bit by bit, due to which rundown of surveys are necessary for the job where summed up of text is required to give helpful data from the huge number of surveys. It is exceptionally hard for an individual to extricate helpful information or sum up it from the extremely enormous record. This paper focuses on comparison and analysis of different sentiment analysis techniques. It gives a far-reaching review about the recent and past examinations on sentiment analysis, challenges, and approaches for future angles.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Domain, Threats, Privacy issues in the Internet of Things (IoT): A Survey 物联网(IoT)中的安全领域、威胁、隐私问题:调查
Shipra Singh, Kaptan Singh, A. Saxena
With the evolution of technology, usage of the Internet of Things (IoT) has grown immensely. IoT is now getting used in homes, traffic controls, mode of commute, and many more. IoT brings different physical entities together virtually. IoT is revolutionizing how different devices communicate with each other. With IoT, in the future, the transformation of the physical devices into smart devices with additional capabilities, are increased in ease of usage. Due to the advancement of wireless communication over the internet exposed to these devices and objects including several threats and security vulnerabilities. This paper discusses different issues related to the security and privacy of the Internet of Things along with proposed countermeasures.
随着技术的发展,物联网(IoT)的使用已经大大增加。物联网现在被用于家庭、交通控制、通勤模式等等。物联网将不同的物理实体虚拟地结合在一起。物联网正在彻底改变不同设备之间的通信方式。随着物联网的发展,在未来,物理设备向具有额外功能的智能设备的转变在易用性方面有所增加。由于无线通信在互联网上的进步,暴露给这些设备和对象包括几个威胁和安全漏洞。本文讨论了与物联网安全和隐私相关的各种问题,并提出了对策。
{"title":"Security Domain, Threats, Privacy issues in the Internet of Things (IoT): A Survey","authors":"Shipra Singh, Kaptan Singh, A. Saxena","doi":"10.1109/I-SMAC49090.2020.9243358","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243358","url":null,"abstract":"With the evolution of technology, usage of the Internet of Things (IoT) has grown immensely. IoT is now getting used in homes, traffic controls, mode of commute, and many more. IoT brings different physical entities together virtually. IoT is revolutionizing how different devices communicate with each other. With IoT, in the future, the transformation of the physical devices into smart devices with additional capabilities, are increased in ease of usage. Due to the advancement of wireless communication over the internet exposed to these devices and objects including several threats and security vulnerabilities. This paper discusses different issues related to the security and privacy of the Internet of Things along with proposed countermeasures.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133216422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study of Secure cryptographic based Hardware security module in a cloud environment 云环境下基于安全密码的硬件安全模块研究
J. Divya, S. Shivagami
With the expansion of distributed computing, security of sensitive client information is emerging as a significant challenge. This paper proposes a secured cloud engineering with an equipment security module that separates cloud client information from conceivably malignant special areas or cloud chairmen. Further, the equipment security module gives basic security usefulness within a safely disconnected execution condition with just limited interfaces presented to weak administration frameworks or then again to cloud directors. Such limitation forestalls cloud directors from influencing the security of visitor instances [7]. The proposed building not simply makes preparations for wide attack vectors yet furthermore achieves a hardware security module [12]. This paper talks about the equipment and programming of the proposed cloud design along with its security and presents its exhibition results.
随着分布式计算的发展,客户端敏感信息的安全问题日益突出。本文提出了一种安全的云工程,通过设备安全模块将云客户端信息与可想象的恶性特殊区域或云主席分离开来。此外,设备安全模块在安全断开连接的执行条件下提供基本的安全功能,仅向弱管理框架或云主管提供有限的接口。这种限制可以防止云管理员影响访问者实例的安全性[7]。提出的建筑不仅为广泛的攻击媒介做好了准备,而且进一步实现了硬件安全模块[12]。本文讨论了所提出的云设计的设备、程序设计及安全性,并介绍了其展示结果。
{"title":"A study of Secure cryptographic based Hardware security module in a cloud environment","authors":"J. Divya, S. Shivagami","doi":"10.1109/I-SMAC49090.2020.9243328","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243328","url":null,"abstract":"With the expansion of distributed computing, security of sensitive client information is emerging as a significant challenge. This paper proposes a secured cloud engineering with an equipment security module that separates cloud client information from conceivably malignant special areas or cloud chairmen. Further, the equipment security module gives basic security usefulness within a safely disconnected execution condition with just limited interfaces presented to weak administration frameworks or then again to cloud directors. Such limitation forestalls cloud directors from influencing the security of visitor instances [7]. The proposed building not simply makes preparations for wide attack vectors yet furthermore achieves a hardware security module [12]. This paper talks about the equipment and programming of the proposed cloud design along with its security and presents its exhibition results.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"71 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of Fraudulent Transactions in Credit Card using Machine Learning Algorithms 利用机器学习算法检测信用卡欺诈交易
Praveen Kumar Sadineni
Today we are living in a digital world where most of the activities performed are online. Fraud transactions are ever growing since the growth of ecommerce applications. Millions of transactions are happening around every second everyday giving us the benefit of enjoying financial services through credit and debit cards. Fraud transactions are allowing illegal users to misuse the money of genuine users causing them financial loss. Accessibility of credit card transactions data, techniques used by the frauds, identifying scams in the bulk data which is getting produced very quickly, imbalanced data are some of the major challenges involved in detecting fraudulent credit card transactions. Hence, we need powerful techniques to identify fraudulent transactions. The current paper deals with various machine learning techniques such as Artificial Neural Network (ANN), Decision Trees, Support Vector Machine (SVM), Logistic Regression and Random Forest to detect fraudulent transactions. Performance analysis of these techniques is done using Accuracy, Precision and False alarm rate metrics. Dataset used to carry out the experiment is taken from Kaggle data repository. The experiment shows that Radom Forest could achieve an accuracy of 99.21%, Decision Tree 98.47%. Logistic Regression 95.55%, SVM 95.16% and ANN 99.92%.
今天,我们生活在一个数字世界,大多数活动都是在网上进行的。随着电子商务应用的发展,欺诈交易越来越多。每时每刻都有数以百万计的交易发生,这让我们可以通过信用卡和借记卡享受金融服务。欺诈交易允许非法用户滥用真正用户的钱,给他们造成经济损失。信用卡交易数据的可访问性、欺诈者使用的技术、在快速生成的大量数据中识别骗局、不平衡数据是检测欺诈性信用卡交易所涉及的一些主要挑战。因此,我们需要强大的技术来识别欺诈性交易。本文涉及各种机器学习技术,如人工神经网络(ANN),决策树,支持向量机(SVM),逻辑回归和随机森林来检测欺诈交易。这些技术的性能分析是使用准确度、精度和虚警率指标来完成的。用于实验的数据集取自Kaggle数据库。实验表明,随机森林的准确率为99.21%,决策树的准确率为98.47%。Logistic回归95.55%,SVM 95.16%, ANN 99.92%。
{"title":"Detection of Fraudulent Transactions in Credit Card using Machine Learning Algorithms","authors":"Praveen Kumar Sadineni","doi":"10.1109/I-SMAC49090.2020.9243545","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243545","url":null,"abstract":"Today we are living in a digital world where most of the activities performed are online. Fraud transactions are ever growing since the growth of ecommerce applications. Millions of transactions are happening around every second everyday giving us the benefit of enjoying financial services through credit and debit cards. Fraud transactions are allowing illegal users to misuse the money of genuine users causing them financial loss. Accessibility of credit card transactions data, techniques used by the frauds, identifying scams in the bulk data which is getting produced very quickly, imbalanced data are some of the major challenges involved in detecting fraudulent credit card transactions. Hence, we need powerful techniques to identify fraudulent transactions. The current paper deals with various machine learning techniques such as Artificial Neural Network (ANN), Decision Trees, Support Vector Machine (SVM), Logistic Regression and Random Forest to detect fraudulent transactions. Performance analysis of these techniques is done using Accuracy, Precision and False alarm rate metrics. Dataset used to carry out the experiment is taken from Kaggle data repository. The experiment shows that Radom Forest could achieve an accuracy of 99.21%, Decision Tree 98.47%. Logistic Regression 95.55%, SVM 95.16% and ANN 99.92%.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Non-cryptographic Approaches for Collaborative Social Network Data Publishing - A Survey 协作社会网络数据发布的非加密方法——综述
Komal P. Kansara, Bintu Kadhiwala
In today's world, trillions of persons are providing their data to social network data provider for connecting, interacting and data sharing with other users. The data provider may utilize these collected data for analysis purpose. Alternatively, multiple data providers prefer collaboration to attain enhanced analysis outcomes from the collected collaborated data. For such collaboration, the data providers do not share their data directly due to privacy issues instead they share the collected data with the trusted data publisher. The data publisher combines these collected data and subsequently publishes the data. Data collected at trusted data publisher site from multiple providers contain individuals' information that may be sensitive. Hence, the privacy of individuals may be compromised if it is published by the publisher in its original form. As a consequence, in literature, various non-cryptographic approaches are discussed for privacy-preserving collaborative social network data publishing. The motive of this paper is to emphasize the evaluation of these existing approaches with the help of different parameters.
当今世界,数以万亿计的人将自己的数据提供给社交网络数据提供商,与其他用户进行连接、交互和数据共享。数据提供者可以利用这些收集的数据进行分析。另外,多个数据提供者更喜欢协作,以便从收集的协作数据中获得增强的分析结果。对于这种协作,由于隐私问题,数据提供者不会直接共享其数据,而是与受信任的数据发布者共享收集到的数据。数据发布者将这些收集到的数据组合起来,然后发布这些数据。在可信数据发布者站点从多个提供者收集的数据包含可能敏感的个人信息。因此,如果出版商以其原始形式出版,个人的隐私可能会受到损害。因此,在文献中,讨论了用于保护隐私的协作社交网络数据发布的各种非加密方法。本文的目的是强调在不同参数的帮助下对这些现有方法的评价。
{"title":"Non-cryptographic Approaches for Collaborative Social Network Data Publishing - A Survey","authors":"Komal P. Kansara, Bintu Kadhiwala","doi":"10.1109/I-SMAC49090.2020.9243431","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243431","url":null,"abstract":"In today's world, trillions of persons are providing their data to social network data provider for connecting, interacting and data sharing with other users. The data provider may utilize these collected data for analysis purpose. Alternatively, multiple data providers prefer collaboration to attain enhanced analysis outcomes from the collected collaborated data. For such collaboration, the data providers do not share their data directly due to privacy issues instead they share the collected data with the trusted data publisher. The data publisher combines these collected data and subsequently publishes the data. Data collected at trusted data publisher site from multiple providers contain individuals' information that may be sensitive. Hence, the privacy of individuals may be compromised if it is published by the publisher in its original form. As a consequence, in literature, various non-cryptographic approaches are discussed for privacy-preserving collaborative social network data publishing. The motive of this paper is to emphasize the evaluation of these existing approaches with the help of different parameters.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Simulation of Elliptical Micro strip Patch Antenna with Coaxial Probe Feeding for Satellites Applications Using Matlab 卫星用同轴探头馈电椭圆微带贴片天线的设计与仿真
V. Prakasam, N. Reddy
This paper uses coaxial probe feed method to present, design, and simulate elliptical microstrip patch antenna at ISM band. This paper processes an innovative elliptical microstrip patch (MSPA) antenna at standard ISM frequency band ranges from 2.4 GHz to 2.5 GHz. The planned and simulated EMSPA operating frequency is 2.4 GHz to 2.5 GHz and 4.2, 4.4, 4.6 & 4.8 FR4 substrate, this selected frequency increases efficiency in terms of S11 and reasonable gain value. In this study, coaxial probes feed the proposed antenna fixed on an FR-4 substrate material which has 4.2, 4.4, 4.6 & 4.8 dielectric constant, substratum thickness is 6.6 mm. The intension of the proposed antenna is that to determine the higher gain, less S11 at different operating frequencies that are 2.35 GHz, 2.4 GHz, 2.45GHz and 2.5 GHz, which is the ISM band range. The high-performance systems such as rockets, ships, missiles and satellites use elliptical microstrip patch antennas. Antennas with optimal measurements of elliptical microstrip patches act as circularly polarized wave radiators. Various simulation antenna design software is available, such as FEKO, IE3D, CST, HFSS, Antenna Magus and MATLAB. Here, using MATLAB simulation software tool, the EMSPA is designed and simulated and also estimate the performance characteristics, such as s-parameter, vswr, EH fields, radiation pattern, current distribution, gain, elevation and azimuthal radiation pattern.
本文采用同轴探针馈电方法,设计并仿真了ISM波段的椭圆微带贴片天线。本文在2.4 GHz ~ 2.5 GHz标准ISM频段加工了一种新型椭圆微带贴片(MSPA)天线。规划和模拟的EMSPA工作频率为2.4 GHz至2.5 GHz和4.2、4.4、4.6和4.8 FR4衬底,该选择的频率在S11和合理增益值方面提高了效率。在本研究中,同轴探头馈送固定在介电常数为4.2、4.4、4.6和4.8的FR-4衬底材料上的天线,衬底厚度为6.6 mm。本天线的目的是确定在2.35 GHz、2.4 GHz、2.45GHz和2.5 GHz不同工作频率下的高增益、低S11,即ISM频段范围。火箭、舰船、导弹、卫星等高性能系统均采用椭圆微带贴片天线。椭圆微带贴片的最佳测量天线作为圆极化波辐射体。有FEKO、IE3D、CST、HFSS、antenna Magus、MATLAB等多种仿真天线设计软件。本文利用MATLAB仿真软件对EMSPA进行了设计和仿真,并对其s参数、驻波比、EH场、辐射方向图、电流分布、增益、仰角和方位辐射方向图等性能特性进行了估计。
{"title":"Design and Simulation of Elliptical Micro strip Patch Antenna with Coaxial Probe Feeding for Satellites Applications Using Matlab","authors":"V. Prakasam, N. Reddy","doi":"10.1109/I-SMAC49090.2020.9243472","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243472","url":null,"abstract":"This paper uses coaxial probe feed method to present, design, and simulate elliptical microstrip patch antenna at ISM band. This paper processes an innovative elliptical microstrip patch (MSPA) antenna at standard ISM frequency band ranges from 2.4 GHz to 2.5 GHz. The planned and simulated EMSPA operating frequency is 2.4 GHz to 2.5 GHz and 4.2, 4.4, 4.6 & 4.8 FR4 substrate, this selected frequency increases efficiency in terms of S11 and reasonable gain value. In this study, coaxial probes feed the proposed antenna fixed on an FR-4 substrate material which has 4.2, 4.4, 4.6 & 4.8 dielectric constant, substratum thickness is 6.6 mm. The intension of the proposed antenna is that to determine the higher gain, less S11 at different operating frequencies that are 2.35 GHz, 2.4 GHz, 2.45GHz and 2.5 GHz, which is the ISM band range. The high-performance systems such as rockets, ships, missiles and satellites use elliptical microstrip patch antennas. Antennas with optimal measurements of elliptical microstrip patches act as circularly polarized wave radiators. Various simulation antenna design software is available, such as FEKO, IE3D, CST, HFSS, Antenna Magus and MATLAB. Here, using MATLAB simulation software tool, the EMSPA is designed and simulated and also estimate the performance characteristics, such as s-parameter, vswr, EH fields, radiation pattern, current distribution, gain, elevation and azimuthal radiation pattern.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114827329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DB-Scan Algorithm based Colon Cancer Detection And Stratification Analysis 基于DB-Scan算法的结肠癌检测与分层分析
Gundlapalle Raiesh, Boda Saroia, Manian Dhivya, A. B. Gurulakshmi
Histopathological examination of tissue models is basic for the conclusion and reviewing of colon malignancy. In any case, the technique is subjective and prompts imperative intra/bury spectator distinction in the examination as it predominantly relies upon the graphical evaluation of histopathologists. Thus, a tried and true PC supported technique, which can naturally group harmful and ordinary colon tests are required; however, automating this strategy is demanding because of the nearness of exceptions. In this paper, a productive technique for identifying colon disease from biopsy tests which comprise of four imperative stages. DB-SCAN estimation to distinguish colon tumor from biopsy tests is presented in this paper. In the proposed approach, from the outset, the colon biopsy tests are preprocessed using DB-SCAN configuration to make a set of redundant localities in which groups or clusters are formed. At that point, the exceptions inside the bunched areas are created as a tree structure in light of the choice tree in which the anomalies are hubs, and the connection between hubs are delivered based on data about exceptions. At that point, entropy-based exception score calculation will be done on every hub of the tree. The Information picks up technique is utilized to figure the score for the exceptions. At long last, score based grouping is accomplished to order the ordinary or harmful cells. Experimental trials exhibit, the proposed strategy has better outcomes contrasted to existing strategies. It furthermore acclaims that the proposed procedure is adequate for the colon tumor identification process. The proposed strategy is executed on Matlab working platform and the investigations exhibit that the proposed technique has high accomplished high grouping precision contrasted and different strategies.
组织病理学检查是结论和回顾结肠恶性肿瘤的基础。在任何情况下,该技术都是主观的,并且在检查中提示必要的内部/隐藏观众区分,因为它主要依赖于组织病理学家的图形评估。因此,需要一种可靠的PC支持技术,它可以自然地将有害和普通的结肠测试分组;然而,由于异常的临近,自动化这个策略的要求很高。本文介绍了一种从活检检查中识别结肠疾病的生产技术,该技术包括四个重要阶段。本文提出了一种区分结肠肿瘤和活检检查的DB-SCAN估计方法。在建议的方法中,从一开始,使用DB-SCAN配置对结肠活检测试进行预处理,以形成一组冗余位置,其中形成组或簇。在这一点上,聚集区域内的异常被创建为一个树形结构,根据选择树,其中异常是中心,中心之间的连接是基于异常数据交付的。此时,基于熵的异常评分计算将在树的每个中心完成。利用信息拾取技术计算例外情况的得分。最后,实现了对正常细胞和有害细胞的分值排序。实验结果表明,与现有策略相比,本文提出的策略具有更好的效果。它进一步称赞,建议的程序是充分的结肠肿瘤鉴定过程。在Matlab工作平台上进行了实验,实验结果表明,该方法具有较高的成组精度。
{"title":"DB-Scan Algorithm based Colon Cancer Detection And Stratification Analysis","authors":"Gundlapalle Raiesh, Boda Saroia, Manian Dhivya, A. B. Gurulakshmi","doi":"10.1109/I-SMAC49090.2020.9243531","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243531","url":null,"abstract":"Histopathological examination of tissue models is basic for the conclusion and reviewing of colon malignancy. In any case, the technique is subjective and prompts imperative intra/bury spectator distinction in the examination as it predominantly relies upon the graphical evaluation of histopathologists. Thus, a tried and true PC supported technique, which can naturally group harmful and ordinary colon tests are required; however, automating this strategy is demanding because of the nearness of exceptions. In this paper, a productive technique for identifying colon disease from biopsy tests which comprise of four imperative stages. DB-SCAN estimation to distinguish colon tumor from biopsy tests is presented in this paper. In the proposed approach, from the outset, the colon biopsy tests are preprocessed using DB-SCAN configuration to make a set of redundant localities in which groups or clusters are formed. At that point, the exceptions inside the bunched areas are created as a tree structure in light of the choice tree in which the anomalies are hubs, and the connection between hubs are delivered based on data about exceptions. At that point, entropy-based exception score calculation will be done on every hub of the tree. The Information picks up technique is utilized to figure the score for the exceptions. At long last, score based grouping is accomplished to order the ordinary or harmful cells. Experimental trials exhibit, the proposed strategy has better outcomes contrasted to existing strategies. It furthermore acclaims that the proposed procedure is adequate for the colon tumor identification process. The proposed strategy is executed on Matlab working platform and the investigations exhibit that the proposed technique has high accomplished high grouping precision contrasted and different strategies.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125385971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Performance Analysis of Self Adaptive Equalizers using EPLMS Algorithm 基于EPLMS算法的自适应均衡器性能分析
Shwetha N, M. Priyatham
Digital communication has become an important part of our lives and technology has been undergoing advancements. The main two problems faced in digital communication is noise and inter-symbol interference (ISI). The IS I is induced due to channel characteristics, which is time-varying and unknown. Hence an adaptive channel equalizer is used to inverse the effect channel had on the signal to get back the initial information. There are many adaptive algorithms to update the coefficients of equalizers, evolutionary algorithms are used in this paper to do so. The two algorithms used before are particle swarm optimization (PSO) and conventional differential evolution (DE). The newest algorithm is the Evolutionary Programming Least Mean Square Algorithm (EPLMS) this gives a better solution faster.
数字通信已经成为我们生活的重要组成部分,技术也在不断进步。数字通信面临的两个主要问题是噪声和码间干扰。IS I是由信道特性引起的,信道特性是时变的和未知的。因此,自适应通道均衡器被用来逆通道对信号的影响,以获得初始信息。有许多自适应算法来更新均衡器的系数,本文采用进化算法来实现。之前使用的两种算法是粒子群优化算法(PSO)和常规差分进化算法(DE)。最新的算法是进化规划最小均方算法(EPLMS),它能更快更好地解决问题。
{"title":"Performance Analysis of Self Adaptive Equalizers using EPLMS Algorithm","authors":"Shwetha N, M. Priyatham","doi":"10.1109/I-SMAC49090.2020.9243512","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243512","url":null,"abstract":"Digital communication has become an important part of our lives and technology has been undergoing advancements. The main two problems faced in digital communication is noise and inter-symbol interference (ISI). The IS I is induced due to channel characteristics, which is time-varying and unknown. Hence an adaptive channel equalizer is used to inverse the effect channel had on the signal to get back the initial information. There are many adaptive algorithms to update the coefficients of equalizers, evolutionary algorithms are used in this paper to do so. The two algorithms used before are particle swarm optimization (PSO) and conventional differential evolution (DE). The newest algorithm is the Evolutionary Programming Least Mean Square Algorithm (EPLMS) this gives a better solution faster.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121954224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1