首页 > 最新文献

2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
Design and Simulation of Elliptical Micro strip Patch Antenna with Coaxial Probe Feeding for Satellites Applications Using Matlab 卫星用同轴探头馈电椭圆微带贴片天线的设计与仿真
V. Prakasam, N. Reddy
This paper uses coaxial probe feed method to present, design, and simulate elliptical microstrip patch antenna at ISM band. This paper processes an innovative elliptical microstrip patch (MSPA) antenna at standard ISM frequency band ranges from 2.4 GHz to 2.5 GHz. The planned and simulated EMSPA operating frequency is 2.4 GHz to 2.5 GHz and 4.2, 4.4, 4.6 & 4.8 FR4 substrate, this selected frequency increases efficiency in terms of S11 and reasonable gain value. In this study, coaxial probes feed the proposed antenna fixed on an FR-4 substrate material which has 4.2, 4.4, 4.6 & 4.8 dielectric constant, substratum thickness is 6.6 mm. The intension of the proposed antenna is that to determine the higher gain, less S11 at different operating frequencies that are 2.35 GHz, 2.4 GHz, 2.45GHz and 2.5 GHz, which is the ISM band range. The high-performance systems such as rockets, ships, missiles and satellites use elliptical microstrip patch antennas. Antennas with optimal measurements of elliptical microstrip patches act as circularly polarized wave radiators. Various simulation antenna design software is available, such as FEKO, IE3D, CST, HFSS, Antenna Magus and MATLAB. Here, using MATLAB simulation software tool, the EMSPA is designed and simulated and also estimate the performance characteristics, such as s-parameter, vswr, EH fields, radiation pattern, current distribution, gain, elevation and azimuthal radiation pattern.
本文采用同轴探针馈电方法,设计并仿真了ISM波段的椭圆微带贴片天线。本文在2.4 GHz ~ 2.5 GHz标准ISM频段加工了一种新型椭圆微带贴片(MSPA)天线。规划和模拟的EMSPA工作频率为2.4 GHz至2.5 GHz和4.2、4.4、4.6和4.8 FR4衬底,该选择的频率在S11和合理增益值方面提高了效率。在本研究中,同轴探头馈送固定在介电常数为4.2、4.4、4.6和4.8的FR-4衬底材料上的天线,衬底厚度为6.6 mm。本天线的目的是确定在2.35 GHz、2.4 GHz、2.45GHz和2.5 GHz不同工作频率下的高增益、低S11,即ISM频段范围。火箭、舰船、导弹、卫星等高性能系统均采用椭圆微带贴片天线。椭圆微带贴片的最佳测量天线作为圆极化波辐射体。有FEKO、IE3D、CST、HFSS、antenna Magus、MATLAB等多种仿真天线设计软件。本文利用MATLAB仿真软件对EMSPA进行了设计和仿真,并对其s参数、驻波比、EH场、辐射方向图、电流分布、增益、仰角和方位辐射方向图等性能特性进行了估计。
{"title":"Design and Simulation of Elliptical Micro strip Patch Antenna with Coaxial Probe Feeding for Satellites Applications Using Matlab","authors":"V. Prakasam, N. Reddy","doi":"10.1109/I-SMAC49090.2020.9243472","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243472","url":null,"abstract":"This paper uses coaxial probe feed method to present, design, and simulate elliptical microstrip patch antenna at ISM band. This paper processes an innovative elliptical microstrip patch (MSPA) antenna at standard ISM frequency band ranges from 2.4 GHz to 2.5 GHz. The planned and simulated EMSPA operating frequency is 2.4 GHz to 2.5 GHz and 4.2, 4.4, 4.6 & 4.8 FR4 substrate, this selected frequency increases efficiency in terms of S11 and reasonable gain value. In this study, coaxial probes feed the proposed antenna fixed on an FR-4 substrate material which has 4.2, 4.4, 4.6 & 4.8 dielectric constant, substratum thickness is 6.6 mm. The intension of the proposed antenna is that to determine the higher gain, less S11 at different operating frequencies that are 2.35 GHz, 2.4 GHz, 2.45GHz and 2.5 GHz, which is the ISM band range. The high-performance systems such as rockets, ships, missiles and satellites use elliptical microstrip patch antennas. Antennas with optimal measurements of elliptical microstrip patches act as circularly polarized wave radiators. Various simulation antenna design software is available, such as FEKO, IE3D, CST, HFSS, Antenna Magus and MATLAB. Here, using MATLAB simulation software tool, the EMSPA is designed and simulated and also estimate the performance characteristics, such as s-parameter, vswr, EH fields, radiation pattern, current distribution, gain, elevation and azimuthal radiation pattern.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114827329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of Self Adaptive Equalizers using EPLMS Algorithm 基于EPLMS算法的自适应均衡器性能分析
Shwetha N, M. Priyatham
Digital communication has become an important part of our lives and technology has been undergoing advancements. The main two problems faced in digital communication is noise and inter-symbol interference (ISI). The IS I is induced due to channel characteristics, which is time-varying and unknown. Hence an adaptive channel equalizer is used to inverse the effect channel had on the signal to get back the initial information. There are many adaptive algorithms to update the coefficients of equalizers, evolutionary algorithms are used in this paper to do so. The two algorithms used before are particle swarm optimization (PSO) and conventional differential evolution (DE). The newest algorithm is the Evolutionary Programming Least Mean Square Algorithm (EPLMS) this gives a better solution faster.
数字通信已经成为我们生活的重要组成部分,技术也在不断进步。数字通信面临的两个主要问题是噪声和码间干扰。IS I是由信道特性引起的,信道特性是时变的和未知的。因此,自适应通道均衡器被用来逆通道对信号的影响,以获得初始信息。有许多自适应算法来更新均衡器的系数,本文采用进化算法来实现。之前使用的两种算法是粒子群优化算法(PSO)和常规差分进化算法(DE)。最新的算法是进化规划最小均方算法(EPLMS),它能更快更好地解决问题。
{"title":"Performance Analysis of Self Adaptive Equalizers using EPLMS Algorithm","authors":"Shwetha N, M. Priyatham","doi":"10.1109/I-SMAC49090.2020.9243512","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243512","url":null,"abstract":"Digital communication has become an important part of our lives and technology has been undergoing advancements. The main two problems faced in digital communication is noise and inter-symbol interference (ISI). The IS I is induced due to channel characteristics, which is time-varying and unknown. Hence an adaptive channel equalizer is used to inverse the effect channel had on the signal to get back the initial information. There are many adaptive algorithms to update the coefficients of equalizers, evolutionary algorithms are used in this paper to do so. The two algorithms used before are particle swarm optimization (PSO) and conventional differential evolution (DE). The newest algorithm is the Evolutionary Programming Least Mean Square Algorithm (EPLMS) this gives a better solution faster.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121954224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
DB-Scan Algorithm based Colon Cancer Detection And Stratification Analysis 基于DB-Scan算法的结肠癌检测与分层分析
Gundlapalle Raiesh, Boda Saroia, Manian Dhivya, A. B. Gurulakshmi
Histopathological examination of tissue models is basic for the conclusion and reviewing of colon malignancy. In any case, the technique is subjective and prompts imperative intra/bury spectator distinction in the examination as it predominantly relies upon the graphical evaluation of histopathologists. Thus, a tried and true PC supported technique, which can naturally group harmful and ordinary colon tests are required; however, automating this strategy is demanding because of the nearness of exceptions. In this paper, a productive technique for identifying colon disease from biopsy tests which comprise of four imperative stages. DB-SCAN estimation to distinguish colon tumor from biopsy tests is presented in this paper. In the proposed approach, from the outset, the colon biopsy tests are preprocessed using DB-SCAN configuration to make a set of redundant localities in which groups or clusters are formed. At that point, the exceptions inside the bunched areas are created as a tree structure in light of the choice tree in which the anomalies are hubs, and the connection between hubs are delivered based on data about exceptions. At that point, entropy-based exception score calculation will be done on every hub of the tree. The Information picks up technique is utilized to figure the score for the exceptions. At long last, score based grouping is accomplished to order the ordinary or harmful cells. Experimental trials exhibit, the proposed strategy has better outcomes contrasted to existing strategies. It furthermore acclaims that the proposed procedure is adequate for the colon tumor identification process. The proposed strategy is executed on Matlab working platform and the investigations exhibit that the proposed technique has high accomplished high grouping precision contrasted and different strategies.
组织病理学检查是结论和回顾结肠恶性肿瘤的基础。在任何情况下,该技术都是主观的,并且在检查中提示必要的内部/隐藏观众区分,因为它主要依赖于组织病理学家的图形评估。因此,需要一种可靠的PC支持技术,它可以自然地将有害和普通的结肠测试分组;然而,由于异常的临近,自动化这个策略的要求很高。本文介绍了一种从活检检查中识别结肠疾病的生产技术,该技术包括四个重要阶段。本文提出了一种区分结肠肿瘤和活检检查的DB-SCAN估计方法。在建议的方法中,从一开始,使用DB-SCAN配置对结肠活检测试进行预处理,以形成一组冗余位置,其中形成组或簇。在这一点上,聚集区域内的异常被创建为一个树形结构,根据选择树,其中异常是中心,中心之间的连接是基于异常数据交付的。此时,基于熵的异常评分计算将在树的每个中心完成。利用信息拾取技术计算例外情况的得分。最后,实现了对正常细胞和有害细胞的分值排序。实验结果表明,与现有策略相比,本文提出的策略具有更好的效果。它进一步称赞,建议的程序是充分的结肠肿瘤鉴定过程。在Matlab工作平台上进行了实验,实验结果表明,该方法具有较高的成组精度。
{"title":"DB-Scan Algorithm based Colon Cancer Detection And Stratification Analysis","authors":"Gundlapalle Raiesh, Boda Saroia, Manian Dhivya, A. B. Gurulakshmi","doi":"10.1109/I-SMAC49090.2020.9243531","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243531","url":null,"abstract":"Histopathological examination of tissue models is basic for the conclusion and reviewing of colon malignancy. In any case, the technique is subjective and prompts imperative intra/bury spectator distinction in the examination as it predominantly relies upon the graphical evaluation of histopathologists. Thus, a tried and true PC supported technique, which can naturally group harmful and ordinary colon tests are required; however, automating this strategy is demanding because of the nearness of exceptions. In this paper, a productive technique for identifying colon disease from biopsy tests which comprise of four imperative stages. DB-SCAN estimation to distinguish colon tumor from biopsy tests is presented in this paper. In the proposed approach, from the outset, the colon biopsy tests are preprocessed using DB-SCAN configuration to make a set of redundant localities in which groups or clusters are formed. At that point, the exceptions inside the bunched areas are created as a tree structure in light of the choice tree in which the anomalies are hubs, and the connection between hubs are delivered based on data about exceptions. At that point, entropy-based exception score calculation will be done on every hub of the tree. The Information picks up technique is utilized to figure the score for the exceptions. At long last, score based grouping is accomplished to order the ordinary or harmful cells. Experimental trials exhibit, the proposed strategy has better outcomes contrasted to existing strategies. It furthermore acclaims that the proposed procedure is adequate for the colon tumor identification process. The proposed strategy is executed on Matlab working platform and the investigations exhibit that the proposed technique has high accomplished high grouping precision contrasted and different strategies.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125385971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
IoT System Accomplishment using BlockChain in Validating and Data Security with Cloud 利用区块链实现物联网系统验证和云数据安全
J. K. Solomon Doss, S. Kamalakkannan
In a block channel IoT system, sensitive details can be leaked by means of the proof of work or address check, as data or application Validation data is applied on the blockchain. In this, the zero-knowledge evidence is applied to a smart metering system to show how to improve the anonymity of the blockchain for privacy safety without disclosing information as a public key. Within this article, a blockchain has been implemented to deter security risks such as data counterfeiting by utilizing intelligent meters. Zero-Knowledge Proof, an anonymity blockchain technology, has been implemented through block inquiry to prevent threats to security like personal information infringement. It was suggested that intelligent contracts would be used to avoid falsification of intelligent meter data and abuse of personal details.
在区块链通道物联网系统中,由于数据或应用验证数据在区块链上应用,敏感细节可能会通过工作量证明或地址检查的方式泄露。在此,将零知识证据应用于智能计量系统,以展示如何在不泄露信息作为公钥的情况下提高区块链的匿名性以确保隐私安全。在本文中,已经实施了区块链,通过使用智能仪表来防止数据伪造等安全风险。零知识证明是一种匿名区块链技术,通过块查询实现,以防止个人信息侵权等安全威胁。有人建议使用智能合同来避免伪造智能电表数据和滥用个人详细信息。
{"title":"IoT System Accomplishment using BlockChain in Validating and Data Security with Cloud","authors":"J. K. Solomon Doss, S. Kamalakkannan","doi":"10.1109/I-SMAC49090.2020.9243412","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243412","url":null,"abstract":"In a block channel IoT system, sensitive details can be leaked by means of the proof of work or address check, as data or application Validation data is applied on the blockchain. In this, the zero-knowledge evidence is applied to a smart metering system to show how to improve the anonymity of the blockchain for privacy safety without disclosing information as a public key. Within this article, a blockchain has been implemented to deter security risks such as data counterfeiting by utilizing intelligent meters. Zero-Knowledge Proof, an anonymity blockchain technology, has been implemented through block inquiry to prevent threats to security like personal information infringement. It was suggested that intelligent contracts would be used to avoid falsification of intelligent meter data and abuse of personal details.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"156 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125914070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Depression and Impaired Mental Health Analysis from Social Media Platforms using Predictive Modelling Techniques 使用预测建模技术分析社交媒体平台上的抑郁和心理健康受损
Vaibhav Jain, Dhruv Chandel, Piyush Garg, D. Vishwakarma
Depression is the leading global disability, and unipolar (as opposed to bipolar) depression is the 10th leading cause of early death, as stated by the World Health Organization (WHO) in 2015. The study aims to build an approach for depression and impaired mental health analysis from social media platforms. Although for Depression analysis and cure. Psyscologists preferred over machines because they are manipulative and precautionary to Human emotions to a greater extent, Machine Learning has an added advantage. It has no emotions; it studies patterns, not face or beauty or other factors. It studies a wide variety of data and then trains to give better predictions. Although it is not 100% reliable nor are the doctors. Moreover, in countries like India where people don't treat Depression as a Chronic Illness or don't even consider it as an illness of any sort, embedding Machine Learning Depression Detection Algorithms in Social Media combined with recommendation systems to treat a Human Mind positively, still being unnoticeable is a Great Boon to humanity The study is assisted by data collected from users after obtaining their consent and applying data preprocessing techniques. Several machine learning is used to analyze the data in the best way possible. A VAPID Technique is developed that performs far better than a classic feed-forward neural network. This study aims to develop a correlation between features and depressed people to observe a continuous pattern. Moreover, the aim is to conclude that social media can be a new exceptional methodology for analyzing depression and analyzing indirect patterns, improving many lives.
正如世界卫生组织(世卫组织)在2015年指出的那样,抑郁症是全球主要的残疾,单极(相对于双相)抑郁症是导致早期死亡的第十大原因。该研究旨在通过社交媒体平台建立一种分析抑郁症和精神健康受损的方法。虽然用于抑郁症的分析和治疗。心理学家更喜欢机器,因为它们在更大程度上可以操纵和预防人类的情绪,机器学习还有一个额外的优势。它没有情感;它研究的是模式,而不是脸、美或其他因素。它研究各种各样的数据,然后进行训练,以给出更好的预测。虽然它不是100%可靠,医生也不是。此外,在印度这样的国家,人们不把抑郁症当作一种慢性病,甚至不认为它是一种疾病,在社交媒体中嵌入机器学习抑郁症检测算法,结合推荐系统,积极地对待人类的心灵,仍然不引人注意,这对人类来说是一个巨大的福音。该研究是在征得用户同意并应用数据预处理技术后从用户那里收集数据来辅助的。几个机器学习被用来以最好的方式分析数据。开发了一种比经典前馈神经网络性能更好的VAPID技术。本研究旨在发展特征与抑郁症患者之间的相关性,以观察一种持续的模式。此外,我们的目的是得出结论,社交媒体可以成为分析抑郁症和间接模式的一种新的特殊方法,改善许多人的生活。
{"title":"Depression and Impaired Mental Health Analysis from Social Media Platforms using Predictive Modelling Techniques","authors":"Vaibhav Jain, Dhruv Chandel, Piyush Garg, D. Vishwakarma","doi":"10.1109/I-SMAC49090.2020.9243334","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243334","url":null,"abstract":"Depression is the leading global disability, and unipolar (as opposed to bipolar) depression is the 10th leading cause of early death, as stated by the World Health Organization (WHO) in 2015. The study aims to build an approach for depression and impaired mental health analysis from social media platforms. Although for Depression analysis and cure. Psyscologists preferred over machines because they are manipulative and precautionary to Human emotions to a greater extent, Machine Learning has an added advantage. It has no emotions; it studies patterns, not face or beauty or other factors. It studies a wide variety of data and then trains to give better predictions. Although it is not 100% reliable nor are the doctors. Moreover, in countries like India where people don't treat Depression as a Chronic Illness or don't even consider it as an illness of any sort, embedding Machine Learning Depression Detection Algorithms in Social Media combined with recommendation systems to treat a Human Mind positively, still being unnoticeable is a Great Boon to humanity The study is assisted by data collected from users after obtaining their consent and applying data preprocessing techniques. Several machine learning is used to analyze the data in the best way possible. A VAPID Technique is developed that performs far better than a classic feed-forward neural network. This study aims to develop a correlation between features and depressed people to observe a continuous pattern. Moreover, the aim is to conclude that social media can be a new exceptional methodology for analyzing depression and analyzing indirect patterns, improving many lives.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130109443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud-based Protection and Performance Improvement in the E-Health Management Framework 电子健康管理框架中基于云的保护和性能改进
P. Kanehanadevi, D. Selvapandian, Laxmi Raja, R. Dhanapal
Cloud provides several benefits in e-health care. Based on current trends, the E-healthcare database could be linked to cloud services. This work provides an idea of combining a structure for monitoring electronic-health services based on the cloud environment. With this, we are planning to adapt it to distributed computing. This framework has been enhanced in order to provide a variety of health services. The whole framework of the E-Healthcare Database Maintenance System covers the consumer side and the application side and Cloud. In order to improve safety in the e-health system, the biometric confirmation system is added in order to avoid non-criminal situations and to forget about the password situation. In addition to this framework, we add a security module to enhance the safety and privacy of patients. Our proposed framework improves the security, privacy, time, and cost of access to health information.
云为电子医疗保健提供了几个好处。根据目前的趋势,电子医疗数据库可以与云服务相关联。这项工作提供了一种结合基于云环境的电子卫生服务监测结构的想法。有了它,我们计划将其应用于分布式计算。这一框架已得到加强,以便提供各种保健服务。电子医疗数据库维护系统的整体框架涵盖了用户端、应用端和云。为了提高电子医疗系统的安全性,增加了生物识别确认系统,以避免非犯罪情况和忘记密码的情况。除了这个框架,我们还增加了一个安全模块,以增强患者的安全性和隐私性。我们提出的框架提高了访问健康信息的安全性、隐私性、时间和成本。
{"title":"Cloud-based Protection and Performance Improvement in the E-Health Management Framework","authors":"P. Kanehanadevi, D. Selvapandian, Laxmi Raja, R. Dhanapal","doi":"10.1109/I-SMAC49090.2020.9243419","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243419","url":null,"abstract":"Cloud provides several benefits in e-health care. Based on current trends, the E-healthcare database could be linked to cloud services. This work provides an idea of combining a structure for monitoring electronic-health services based on the cloud environment. With this, we are planning to adapt it to distributed computing. This framework has been enhanced in order to provide a variety of health services. The whole framework of the E-Healthcare Database Maintenance System covers the consumer side and the application side and Cloud. In order to improve safety in the e-health system, the biometric confirmation system is added in order to avoid non-criminal situations and to forget about the password situation. In addition to this framework, we add a security module to enhance the safety and privacy of patients. Our proposed framework improves the security, privacy, time, and cost of access to health information.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of IoT Testbed with Improved Reliability using Conditional Probability Techniques 基于条件概率技术的物联网试验台可靠性改进设计与实现
Kayalvizhi Jayavel, Kanagaraj Venusamy, L. G
Internet of Things (IoT) test beds are widely used by developers predominantly. Off late, Test beds are being used by data analysts, academicians, industrial persons and hardware ardent. The real purpose of test beds, is to achieve accurate testing results, mimicking the real time environment to the extent possible which is otherwise not possible to reproduce using simulators. As predicted by many industrial giants IoT based devices will reach the scale of billions by 2015. The applications and opportunities they create will also be innumerable. This has created a huge demand for such testing grounds, because a system deployed without proper testing may be vulnerable and sometimes disastrous. Thus our research aims to explore the qualities of test beds, the services they offer and how to enhance the performance of test beds. Our test bed framework is designed and developed with open-source boards to achieved heterogeneity, reusability, interoperability and scalability. This framework would like to be addressed as a utility, with “X” as service: data, sensor client, actuator client, and platform. To achieve this, APIs which is platform and language independent has been developed and provides third-party developer support. The APIs developed have shown considerable improvement in terms of data transfer rate, database upload and retrieval, and user responsiveness. Thus, our framework is capable of offering services through our API. And have demonstrated with the help of conditional probability techniques enhancement in performance and reusability, visualized the same in terms of graphs and datasets.
物联网(IoT)测试平台被开发人员广泛使用。最近,试验台被数据分析师、学者、工业人士和硬件爱好者使用。试验台的真正目的是获得准确的测试结果,尽可能地模拟实时环境,否则无法使用模拟器再现。正如许多工业巨头预测的那样,到2015年,基于物联网的设备将达到数十亿的规模。它们创造的应用和机会也将是无数的。这就产生了对此类测试场地的巨大需求,因为未经适当测试的系统部署可能是脆弱的,有时甚至是灾难性的。因此,我们的研究旨在探讨试验台的质量,他们提供的服务,以及如何提高试验台的性能。我们的测试平台框架是用开源板设计和开发的,以实现异构性、可重用性、互操作性和可扩展性。这个框架将被视为一个实用程序,“X”作为服务:数据、传感器客户端、执行器客户端和平台。为了实现这一目标,开发了与平台和语言无关的api,并提供第三方开发人员支持。所开发的api在数据传输速率、数据库上传和检索以及用户响应性方面显示出了相当大的改进。因此,我们的框架能够通过我们的API提供服务。并在条件概率技术的帮助下证明了性能和可重用性的增强,并在图形和数据集方面进行了可视化。
{"title":"Design and Implementation of IoT Testbed with Improved Reliability using Conditional Probability Techniques","authors":"Kayalvizhi Jayavel, Kanagaraj Venusamy, L. G","doi":"10.1109/I-SMAC49090.2020.9243309","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243309","url":null,"abstract":"Internet of Things (IoT) test beds are widely used by developers predominantly. Off late, Test beds are being used by data analysts, academicians, industrial persons and hardware ardent. The real purpose of test beds, is to achieve accurate testing results, mimicking the real time environment to the extent possible which is otherwise not possible to reproduce using simulators. As predicted by many industrial giants IoT based devices will reach the scale of billions by 2015. The applications and opportunities they create will also be innumerable. This has created a huge demand for such testing grounds, because a system deployed without proper testing may be vulnerable and sometimes disastrous. Thus our research aims to explore the qualities of test beds, the services they offer and how to enhance the performance of test beds. Our test bed framework is designed and developed with open-source boards to achieved heterogeneity, reusability, interoperability and scalability. This framework would like to be addressed as a utility, with “X” as service: data, sensor client, actuator client, and platform. To achieve this, APIs which is platform and language independent has been developed and provides third-party developer support. The APIs developed have shown considerable improvement in terms of data transfer rate, database upload and retrieval, and user responsiveness. Thus, our framework is capable of offering services through our API. And have demonstrated with the help of conditional probability techniques enhancement in performance and reusability, visualized the same in terms of graphs and datasets.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122153410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simulation based reactive power compensation by using TBSC/TBSR for dynamic load 基于仿真的TBSC/TBSR动态负载无功补偿
M. Hans, Manoj Kumar Nigam, Maheshwari D. Mirajkar, Brijesh Patel
The advanced control method for electric reactive power compensation with the help of electronics components is binary current control method. This method allows a sufficient number of compensating branches to establish a fine and precise control of reactive power in electrical system. This method consists of Thyristor binary switched capacitor (TBSC) and Thyristor binary switched reactor (TBSR), which are based on the series of Thyristor switched capacitor (TSC) and Thyristor controlled reactor (TCR). The bank of TSC, TCR arranged in binary form i.e. split bank in multiple of two. For harmonic elimination use transient free switching of TBSC, TBSR In this paper three topologies are explained 1) TBSC 2) TBSR 3) TBSC-TBSR for reactive power compensation of dynamic load. In the third topology excessive KVAR given by TBSC is absorbed by TBSR. The simulation results show that the proposed topologies can achieve reactive power compensation.
利用电子元件进行电力无功补偿的先进控制方法是二元电流控制法。该方法允许有足够数量的补偿支路,以建立对电力系统无功功率的精细和精确控制。该方法由晶闸管二进制开关电容器(TBSC)和晶闸管二进制开关电抗器(TBSR)组成,它们是在晶闸管开关电容器(TSC)和晶闸管控制电抗器(TCR)系列的基础上形成的。TSC的银行,TCR以二进制形式排列,即以2的倍数分割银行。本文介绍了三种拓扑结构:1)TBSC; 2) TBSR; 3) TBSC-TBSR用于动态负载的无功补偿。在第三种拓扑结构中,TBSC给出的过量KVAR被TBSR吸收。仿真结果表明,所提出的拓扑结构能够实现无功补偿。
{"title":"Simulation based reactive power compensation by using TBSC/TBSR for dynamic load","authors":"M. Hans, Manoj Kumar Nigam, Maheshwari D. Mirajkar, Brijesh Patel","doi":"10.1109/I-SMAC49090.2020.9243473","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243473","url":null,"abstract":"The advanced control method for electric reactive power compensation with the help of electronics components is binary current control method. This method allows a sufficient number of compensating branches to establish a fine and precise control of reactive power in electrical system. This method consists of Thyristor binary switched capacitor (TBSC) and Thyristor binary switched reactor (TBSR), which are based on the series of Thyristor switched capacitor (TSC) and Thyristor controlled reactor (TCR). The bank of TSC, TCR arranged in binary form i.e. split bank in multiple of two. For harmonic elimination use transient free switching of TBSC, TBSR In this paper three topologies are explained 1) TBSC 2) TBSR 3) TBSC-TBSR for reactive power compensation of dynamic load. In the third topology excessive KVAR given by TBSC is absorbed by TBSR. The simulation results show that the proposed topologies can achieve reactive power compensation.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"17 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Fraudulent Transactions in Credit Card using Machine Learning Algorithms 利用机器学习算法检测信用卡欺诈交易
Praveen Kumar Sadineni
Today we are living in a digital world where most of the activities performed are online. Fraud transactions are ever growing since the growth of ecommerce applications. Millions of transactions are happening around every second everyday giving us the benefit of enjoying financial services through credit and debit cards. Fraud transactions are allowing illegal users to misuse the money of genuine users causing them financial loss. Accessibility of credit card transactions data, techniques used by the frauds, identifying scams in the bulk data which is getting produced very quickly, imbalanced data are some of the major challenges involved in detecting fraudulent credit card transactions. Hence, we need powerful techniques to identify fraudulent transactions. The current paper deals with various machine learning techniques such as Artificial Neural Network (ANN), Decision Trees, Support Vector Machine (SVM), Logistic Regression and Random Forest to detect fraudulent transactions. Performance analysis of these techniques is done using Accuracy, Precision and False alarm rate metrics. Dataset used to carry out the experiment is taken from Kaggle data repository. The experiment shows that Radom Forest could achieve an accuracy of 99.21%, Decision Tree 98.47%. Logistic Regression 95.55%, SVM 95.16% and ANN 99.92%.
今天,我们生活在一个数字世界,大多数活动都是在网上进行的。随着电子商务应用的发展,欺诈交易越来越多。每时每刻都有数以百万计的交易发生,这让我们可以通过信用卡和借记卡享受金融服务。欺诈交易允许非法用户滥用真正用户的钱,给他们造成经济损失。信用卡交易数据的可访问性、欺诈者使用的技术、在快速生成的大量数据中识别骗局、不平衡数据是检测欺诈性信用卡交易所涉及的一些主要挑战。因此,我们需要强大的技术来识别欺诈性交易。本文涉及各种机器学习技术,如人工神经网络(ANN),决策树,支持向量机(SVM),逻辑回归和随机森林来检测欺诈交易。这些技术的性能分析是使用准确度、精度和虚警率指标来完成的。用于实验的数据集取自Kaggle数据库。实验表明,随机森林的准确率为99.21%,决策树的准确率为98.47%。Logistic回归95.55%,SVM 95.16%, ANN 99.92%。
{"title":"Detection of Fraudulent Transactions in Credit Card using Machine Learning Algorithms","authors":"Praveen Kumar Sadineni","doi":"10.1109/I-SMAC49090.2020.9243545","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243545","url":null,"abstract":"Today we are living in a digital world where most of the activities performed are online. Fraud transactions are ever growing since the growth of ecommerce applications. Millions of transactions are happening around every second everyday giving us the benefit of enjoying financial services through credit and debit cards. Fraud transactions are allowing illegal users to misuse the money of genuine users causing them financial loss. Accessibility of credit card transactions data, techniques used by the frauds, identifying scams in the bulk data which is getting produced very quickly, imbalanced data are some of the major challenges involved in detecting fraudulent credit card transactions. Hence, we need powerful techniques to identify fraudulent transactions. The current paper deals with various machine learning techniques such as Artificial Neural Network (ANN), Decision Trees, Support Vector Machine (SVM), Logistic Regression and Random Forest to detect fraudulent transactions. Performance analysis of these techniques is done using Accuracy, Precision and False alarm rate metrics. Dataset used to carry out the experiment is taken from Kaggle data repository. The experiment shows that Radom Forest could achieve an accuracy of 99.21%, Decision Tree 98.47%. Logistic Regression 95.55%, SVM 95.16% and ANN 99.92%.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A study of Secure cryptographic based Hardware security module in a cloud environment 云环境下基于安全密码的硬件安全模块研究
J. Divya, S. Shivagami
With the expansion of distributed computing, security of sensitive client information is emerging as a significant challenge. This paper proposes a secured cloud engineering with an equipment security module that separates cloud client information from conceivably malignant special areas or cloud chairmen. Further, the equipment security module gives basic security usefulness within a safely disconnected execution condition with just limited interfaces presented to weak administration frameworks or then again to cloud directors. Such limitation forestalls cloud directors from influencing the security of visitor instances [7]. The proposed building not simply makes preparations for wide attack vectors yet furthermore achieves a hardware security module [12]. This paper talks about the equipment and programming of the proposed cloud design along with its security and presents its exhibition results.
随着分布式计算的发展,客户端敏感信息的安全问题日益突出。本文提出了一种安全的云工程,通过设备安全模块将云客户端信息与可想象的恶性特殊区域或云主席分离开来。此外,设备安全模块在安全断开连接的执行条件下提供基本的安全功能,仅向弱管理框架或云主管提供有限的接口。这种限制可以防止云管理员影响访问者实例的安全性[7]。提出的建筑不仅为广泛的攻击媒介做好了准备,而且进一步实现了硬件安全模块[12]。本文讨论了所提出的云设计的设备、程序设计及安全性,并介绍了其展示结果。
{"title":"A study of Secure cryptographic based Hardware security module in a cloud environment","authors":"J. Divya, S. Shivagami","doi":"10.1109/I-SMAC49090.2020.9243328","DOIUrl":"https://doi.org/10.1109/I-SMAC49090.2020.9243328","url":null,"abstract":"With the expansion of distributed computing, security of sensitive client information is emerging as a significant challenge. This paper proposes a secured cloud engineering with an equipment security module that separates cloud client information from conceivably malignant special areas or cloud chairmen. Further, the equipment security module gives basic security usefulness within a safely disconnected execution condition with just limited interfaces presented to weak administration frameworks or then again to cloud directors. Such limitation forestalls cloud directors from influencing the security of visitor instances [7]. The proposed building not simply makes preparations for wide attack vectors yet furthermore achieves a hardware security module [12]. This paper talks about the equipment and programming of the proposed cloud design along with its security and presents its exhibition results.","PeriodicalId":432766,"journal":{"name":"2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"71 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1