首页 > 最新文献

2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)最新文献

英文 中文
A Systematic Study on Textual Data Processing in Text Mining 文本挖掘中文本数据处理的系统研究
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974506
Ksh. Nareshkumar Singh, H. Devi, K. Robindro, A. Mahanta
Advancement in digital technology has led to an increase in the text data exponentially. A field called ‘text mining’ turns the massive amount of text data into high quality or actionable knowledge so that it can help in making the optimal decision, reduces the time and human effort to analyze it. We can perform several tasks on text data including part of speech tagging, parsing text, extract the relevant information, classify the text data, clustering, etc. Text representation is a necessary step to do all these tasks and its effect, especially on the end results of text classification or clustering is highly considerable. The aim of this paper is to highlight the prerequisite procedures to represent text data, different text representation methods, the role of dimensionality reduction, different proximity measures and their evaluation methods to assess results of text clustering or classification.
数字技术的进步使文本数据呈指数级增长。一个名为“文本挖掘”的领域将大量文本数据转化为高质量或可操作的知识,从而有助于做出最佳决策,减少分析时间和人力。我们可以对文本数据执行词性标注、文本解析、提取相关信息、文本数据分类、聚类等任务。文本表示是完成所有这些任务的必要步骤,其影响,特别是对文本分类或聚类的最终结果是非常可观的。本文的目的是重点介绍文本数据表示的前提步骤、不同的文本表示方法、降维的作用、不同的接近度量及其评价方法,以评估文本聚类或分类的结果。
{"title":"A Systematic Study on Textual Data Processing in Text Mining","authors":"Ksh. Nareshkumar Singh, H. Devi, K. Robindro, A. Mahanta","doi":"10.1109/ICCCIS48478.2019.8974506","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974506","url":null,"abstract":"Advancement in digital technology has led to an increase in the text data exponentially. A field called ‘text mining’ turns the massive amount of text data into high quality or actionable knowledge so that it can help in making the optimal decision, reduces the time and human effort to analyze it. We can perform several tasks on text data including part of speech tagging, parsing text, extract the relevant information, classify the text data, clustering, etc. Text representation is a necessary step to do all these tasks and its effect, especially on the end results of text classification or clustering is highly considerable. The aim of this paper is to highlight the prerequisite procedures to represent text data, different text representation methods, the role of dimensionality reduction, different proximity measures and their evaluation methods to assess results of text clustering or classification.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114728250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Envisaging the Academic Performance of Students 设想学生的学习成绩
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974531
Ierin Babu, R. V. S. Balan, Paul P. Mathai
Certain Colleges students’ performance will be improved during their studies can be planned is important fortelling the studies performance of students. Here using the performance evaluation is measured on the basis of higher secondary level and, analysis of Emotional Quotient and Intelligent Quotient. An evaluation is doing according to the evaluation that is received from the analysis based on th mentioned above. The emotional quotient and intelligent quotient is not always same, it be far different in various people being. But these two content will be helping in the development of their academic knowledge and life long learning. In this paper presenting the performance of students by their higher secondary value, IQ and EQ values. It is find out only through some novel algorithms. It is defined on the basis of training, learning, analysis and prediction stage.Firstly students or faculty have to enter their marks in the interface provided and students have to attend an intelleigent quotient and emotional quotient questions that is set with the instruction of some psychologist. In prediction stage will producewheather the students will pass or fail. The testing phase it helps to determine is our prediction is correct or not.
某些高校学生的学习成绩会在学习期间得到提高,可以计划对学生的学习成绩很重要。本文采用的是在高中二级水平的基础上,对中学生的情商和智商进行测评。根据基于上述分析得到的评价进行评价。情商和智商并不总是相同的,不同的人存在着很大的差异。但这两个内容将有助于他们的学术知识和终身学习的发展。本文从学生的高次值、智商值和情商值三个方面来介绍学生的表现。只有通过一些新颖的算法才能找到它。它是在训练、学习、分析和预测阶段的基础上定义的。首先,学生或教师必须在提供的界面中输入他们的分数,学生必须参加在心理学家的指导下设置的智商和情商问题。在预测阶段将产生学生是否会通过或不通过。在测试阶段,它有助于确定我们的预测是否正确。
{"title":"Envisaging the Academic Performance of Students","authors":"Ierin Babu, R. V. S. Balan, Paul P. Mathai","doi":"10.1109/ICCCIS48478.2019.8974531","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974531","url":null,"abstract":"Certain Colleges students’ performance will be improved during their studies can be planned is important fortelling the studies performance of students. Here using the performance evaluation is measured on the basis of higher secondary level and, analysis of Emotional Quotient and Intelligent Quotient. An evaluation is doing according to the evaluation that is received from the analysis based on th mentioned above. The emotional quotient and intelligent quotient is not always same, it be far different in various people being. But these two content will be helping in the development of their academic knowledge and life long learning. In this paper presenting the performance of students by their higher secondary value, IQ and EQ values. It is find out only through some novel algorithms. It is defined on the basis of training, learning, analysis and prediction stage.Firstly students or faculty have to enter their marks in the interface provided and students have to attend an intelleigent quotient and emotional quotient questions that is set with the instruction of some psychologist. In prediction stage will producewheather the students will pass or fail. The testing phase it helps to determine is our prediction is correct or not.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Architectural Model of Security Threats & theirCountermeasures in IoT 物联网中安全威胁的体系结构模型及其应对措施
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974544
Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan
Internet of Things (IoT) depicts a future technology where devices establish a connection with internet for building the intelligent structural system and to implement self-configuration system IoT is an internetworking of devices which are physically present, function of that device is to sense the data In today’s scenario IoT involves with different technologies like blockchain, WSN and many more to give better results. Also, IoT has various implementations like in healthcare, wearables, farming etc. Main objective of IoT is to produce a helpful communication between any two heterogeneous devices, which are physically present at various locations with the help of technology of networking. Applications and implementations of IoT is increasing day-by-day, to secure and maintain Confidentiality, Integrity, Availability (CIA) and other parameters becomes very crucial. We have discussed the principles of IoT in this paper, then comparison between the IoT and Traditional IT services is being discussed. Appropriate techniques and mechanisms to build a secure framework for covering all the IoT layers is being shown in this paper. This paper also discusses about the privacy and security challenges faced during the designing of IoT network. Then the security measures proposed by various researchers is being highlighted in this paper, so as to make a reliable IoT network.
物联网(IoT)描述了一种未来的技术,其中设备与互联网建立连接,以构建智能结构系统并实现自配置系统物联网是物理存在的设备的互联网络,该设备的功能是感知数据在当今的场景中,物联网涉及不同的技术,如区块链,WSN等,以提供更好的结果。此外,物联网在医疗保健,可穿戴设备,农业等方面有各种实现。物联网的主要目标是在任何两个异构设备之间产生有用的通信,这些设备在网络技术的帮助下物理上存在于不同的位置。物联网的应用和实施日益增加,确保和维护机密性、完整性、可用性(CIA)和其他参数变得非常重要。在本文中,我们讨论了物联网的原理,然后讨论了物联网与传统IT服务的比较。本文展示了构建覆盖所有物联网层的安全框架的适当技术和机制。本文还讨论了物联网网络设计过程中所面临的隐私和安全挑战。然后着重介绍了各种研究者提出的安全措施,从而构建一个可靠的物联网网络。
{"title":"Architectural Model of Security Threats & theirCountermeasures in IoT","authors":"Tanishq Varshney, Nikhil Sharma, I. Kaushik, B. Bhushan","doi":"10.1109/ICCCIS48478.2019.8974544","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974544","url":null,"abstract":"Internet of Things (IoT) depicts a future technology where devices establish a connection with internet for building the intelligent structural system and to implement self-configuration system IoT is an internetworking of devices which are physically present, function of that device is to sense the data In today’s scenario IoT involves with different technologies like blockchain, WSN and many more to give better results. Also, IoT has various implementations like in healthcare, wearables, farming etc. Main objective of IoT is to produce a helpful communication between any two heterogeneous devices, which are physically present at various locations with the help of technology of networking. Applications and implementations of IoT is increasing day-by-day, to secure and maintain Confidentiality, Integrity, Availability (CIA) and other parameters becomes very crucial. We have discussed the principles of IoT in this paper, then comparison between the IoT and Traditional IT services is being discussed. Appropriate techniques and mechanisms to build a secure framework for covering all the IoT layers is being shown in this paper. This paper also discusses about the privacy and security challenges faced during the designing of IoT network. Then the security measures proposed by various researchers is being highlighted in this paper, so as to make a reliable IoT network.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
[ICCCIS 2019 Blank Page] [ICCCIS 2019空白页]
Pub Date : 2019-10-01 DOI: 10.1109/icccis48478.2019.8974497
{"title":"[ICCCIS 2019 Blank Page]","authors":"","doi":"10.1109/icccis48478.2019.8974497","DOIUrl":"https://doi.org/10.1109/icccis48478.2019.8974497","url":null,"abstract":"","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134528472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Source Authentication Mechanism for Multicast Communication System Using Adaptive Hash Tree 基于自适应哈希树的组播通信系统源认证机制
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974510
Vicky Vikrant, Hariom Tyagi
An internet is backbone of all kind of communication such as unicast, broadcast and multicast, as multicast communication is more efficient because it provide a better communication than unicast and broadcast in the context of bandwidth utilization. The multicast communication is popular in the area of audio-conferencing, video-conferencing and data distribution. There are several schemes such as hashing technique, tree based Hashing and Hash tree signing technique. These schemes have a lot of issues like communication cost, hash computation technique. Aim of this work is to compute the growth of proposed work and compare the performance with existing schemes. An adaptive technique has been proposed for source authentication in multicast system. The new technique is named elliptic curve cryptography source authentication (ECCSA). It has less communication cost as compared to SHS, EMSS, and HMSA.
互联网是诸如单播、广播和组播等各种通信的主干,因为在带宽利用率方面,组播通信比单播和广播提供更好的通信,因此组播通信效率更高。多播通信在音频会议、视频会议和数据分发等领域得到了广泛的应用。有几种方案,如哈希技术,基于树的哈希和哈希树签名技术。这些方案存在通信成本、哈希计算技术等诸多问题。本工作的目的是计算所提出的工作的增长,并与现有方案的性能进行比较。提出了一种用于组播系统源认证的自适应技术。这种新技术被称为椭圆曲线密码源认证(ECCSA)。与SHS、EMSS和HMSA相比,它具有更低的通信成本。
{"title":"A Source Authentication Mechanism for Multicast Communication System Using Adaptive Hash Tree","authors":"Vicky Vikrant, Hariom Tyagi","doi":"10.1109/ICCCIS48478.2019.8974510","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974510","url":null,"abstract":"An internet is backbone of all kind of communication such as unicast, broadcast and multicast, as multicast communication is more efficient because it provide a better communication than unicast and broadcast in the context of bandwidth utilization. The multicast communication is popular in the area of audio-conferencing, video-conferencing and data distribution. There are several schemes such as hashing technique, tree based Hashing and Hash tree signing technique. These schemes have a lot of issues like communication cost, hash computation technique. Aim of this work is to compute the growth of proposed work and compare the performance with existing schemes. An adaptive technique has been proposed for source authentication in multicast system. The new technique is named elliptic curve cryptography source authentication (ECCSA). It has less communication cost as compared to SHS, EMSS, and HMSA.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129383761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physical Layer Performance Analysis of LTE Networks for Downlink LTE网络下行链路物理层性能分析
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974494
Sandeep Gulia, Anwar Ahmad
The Long Term Evolution (LTE) and LTE-Advanced are two most versatile mobile technologies in the cellular networks that have been deployed at a fast pace all over the world. Theses technologies have been aggressively deployed than any other cellular technology previously and their adoption rate by the cellular operators over the world has surpassed even Global System for Mobile (GSM) and the Universal Mobile Telecommunications System (UMTS) that were deployed in the 1990s & early 2000s respectively. In this paper, we investigate several key LTE physical layer parameters such as Bit Error Rate (BER), Block Error Rate (BLER), throughput, Cumulative Distribution Function (CDF), macroscopic path losses, Signal to Noise Ratio (SNR) etc. We comprehensively evaluate & analyze the performance of above mentioned parameters using various dependent parameters & provide the simulation results for each parameter considered. At the end we conclude & discuss the performance simulation results.
长期演进(LTE)和LTE- advanced是蜂窝网络中最通用的两种移动技术,在全球范围内得到了快速部署。这些技术的部署比以往任何其他蜂窝技术都要积极,它们在全球蜂窝运营商中的采用率甚至超过了分别在20世纪90年代和21世纪初部署的全球移动系统(GSM)和通用移动通信系统(UMTS)。在本文中,我们研究了几个关键的LTE物理层参数,如误码率(BER)、分组误码率(BLER)、吞吐量、累积分布函数(CDF)、宏观路径损耗、信噪比(SNR)等。我们使用各种相关参数对上述参数的性能进行了综合评价和分析,并给出了所考虑的每个参数的仿真结果。最后对性能仿真结果进行了总结和讨论。
{"title":"Physical Layer Performance Analysis of LTE Networks for Downlink","authors":"Sandeep Gulia, Anwar Ahmad","doi":"10.1109/ICCCIS48478.2019.8974494","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974494","url":null,"abstract":"The Long Term Evolution (LTE) and LTE-Advanced are two most versatile mobile technologies in the cellular networks that have been deployed at a fast pace all over the world. Theses technologies have been aggressively deployed than any other cellular technology previously and their adoption rate by the cellular operators over the world has surpassed even Global System for Mobile (GSM) and the Universal Mobile Telecommunications System (UMTS) that were deployed in the 1990s & early 2000s respectively. In this paper, we investigate several key LTE physical layer parameters such as Bit Error Rate (BER), Block Error Rate (BLER), throughput, Cumulative Distribution Function (CDF), macroscopic path losses, Signal to Noise Ratio (SNR) etc. We comprehensively evaluate & analyze the performance of above mentioned parameters using various dependent parameters & provide the simulation results for each parameter considered. At the end we conclude & discuss the performance simulation results.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123174414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Localisation using UAV in RFID and Sensor Network Environment:Needs and Challenges 无人机在RFID和传感器网络环境下的定位:需求与挑战
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974536
Dushyant Singh Jasrotia, M. Nene
Study in paper accentuates the need of utilising Unmanned Aerial Vehicles(UAVs) in an Radio Frequency Identification (RFID) Sensor Network environment to develop mission critical applications. UAVs can act as a data logger and enable localisation in such an integrated environment, that can help us develop mission critical applications which can be deployed in harsh environments. The paper focuses on investigation and comparison of localisation techniques using UAVs in the given technology space. The need to establish localisation using UAVs, which demands rigorous mathematical models, approaches and experimental setups, is envisaged.
论文中的研究强调了在射频识别(RFID)传感器网络环境中利用无人机(uav)来开发关键任务应用的必要性。无人机可以作为数据记录器,并在这样的集成环境中实现本地化,这可以帮助我们开发可部署在恶劣环境中的关键任务应用程序。本文的重点是在给定的技术空间中使用无人机的定位技术的调查和比较。设想需要使用无人机建立本地化,这需要严格的数学模型、方法和实验设置。
{"title":"Localisation using UAV in RFID and Sensor Network Environment:Needs and Challenges","authors":"Dushyant Singh Jasrotia, M. Nene","doi":"10.1109/ICCCIS48478.2019.8974536","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974536","url":null,"abstract":"Study in paper accentuates the need of utilising Unmanned Aerial Vehicles(UAVs) in an Radio Frequency Identification (RFID) Sensor Network environment to develop mission critical applications. UAVs can act as a data logger and enable localisation in such an integrated environment, that can help us develop mission critical applications which can be deployed in harsh environments. The paper focuses on investigation and comparison of localisation techniques using UAVs in the given technology space. The need to establish localisation using UAVs, which demands rigorous mathematical models, approaches and experimental setups, is envisaged.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127823525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cross-Layer Design of Control and Feedback Signal Frames for LANs of Drones 无人机局域网控制与反馈信号帧的跨层设计
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974560
Prabhu Jyot Singh, Rohan G. de Silva
Unmanned Aerial Vehicles (UAVs) have become popular in commercial applications and the focus of interest has moved to UAV networks as well. A private UAV network or a Local Area Network of Drones (LoDs) is the best suitable UAV network for a small organization or an individual to perform specific tasks. The commercial UAVs which are available in the market has limited processing power and memory capacity. Although a UAV in a LoD can transfer the control and data signals to another UAV and finally, to the ground station, the performance of a LoD is limited by these constraints of the UAVs.In this paper, we propose a design of single control and feedback signal frame which uses a cross-layer approach. We compared the performance of this signaling mechanism with the existing signaling mechanism (a separate control and a feedback frame for each UAV) in LoD networks. We calculate the delay from the ground station to each UAV node for both signaling mechanisms and show that the new cross-layer single control and feedback frame signaling mechanism is better (less delay on the average) for signaling in a LoD network.
无人驾驶飞行器(UAV)在商业应用中越来越受欢迎,人们的兴趣焦点也转移到了无人机网络上。专用无人机网络或无人机局域网(LoDs)是最适合小型组织或个人执行特定任务的无人机网络。市场上可用的商用无人机具有有限的处理能力和存储容量。尽管LoD中的一架无人机可以将控制和数据信号传输到另一架无人机,并最终传输到地面站,LoD的性能受到无人机这些约束的限制。在本文中,我们提出了一种采用跨层方法的单控制和反馈信号帧的设计。我们将这种信号机制的性能与LoD网络中现有的信号机制(每个无人机有一个单独的控制和一个反馈帧)进行了比较。我们计算了两种信令机制从地面站到每个无人机节点的延迟,并表明新的跨层单控制和反馈帧信令机制对于LoD网络中的信令更好(平均延迟更小)。
{"title":"Cross-Layer Design of Control and Feedback Signal Frames for LANs of Drones","authors":"Prabhu Jyot Singh, Rohan G. de Silva","doi":"10.1109/ICCCIS48478.2019.8974560","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974560","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have become popular in commercial applications and the focus of interest has moved to UAV networks as well. A private UAV network or a Local Area Network of Drones (LoDs) is the best suitable UAV network for a small organization or an individual to perform specific tasks. The commercial UAVs which are available in the market has limited processing power and memory capacity. Although a UAV in a LoD can transfer the control and data signals to another UAV and finally, to the ground station, the performance of a LoD is limited by these constraints of the UAVs.In this paper, we propose a design of single control and feedback signal frame which uses a cross-layer approach. We compared the performance of this signaling mechanism with the existing signaling mechanism (a separate control and a feedback frame for each UAV) in LoD networks. We calculate the delay from the ground station to each UAV node for both signaling mechanisms and show that the new cross-layer single control and feedback frame signaling mechanism is better (less delay on the average) for signaling in a LoD network.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"63 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptualizing BCI and AI in Video Games 将电子游戏中的BCI和AI概念化
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974549
Hardik Arora, A. Agrawal, Ankur Choudhary
Video Games are the most common and popular ways of entertainment mainly amongst the younger generation of world. Due to the advent of Virtual Reality (VR) and Brain Computer Interface (BCI), the gaming experience has increased exponentially amongst the users and the use of Artificial Intelligence (AI) in video games makes it less predictive and more tough and exciting to play. With Virtual Reality now looking distinctly normal, Brain Computer Interface is all set to become the futuristic technology in the gaming horizon. The researchers discover where the technology is at present and how it could transform the way users play in the future. Through this paper, we propose a method to make the video games more exciting and challenging for the users to experience ultimate gaming by combining the trending topics in the world of computer science i.e. BCI and AI.
电子游戏是世界上最常见和最受欢迎的娱乐方式,主要是在年轻一代中。由于虚拟现实(VR)和脑机接口(BCI)的出现,游戏体验在用户中呈指数级增长,人工智能(AI)在电子游戏中的使用使其更具预测性,更加困难和令人兴奋。随着虚拟现实现在看起来非常正常,脑机接口将成为游戏界的未来技术。研究人员发现了这项技术目前的发展状况,以及它将如何改变用户未来的游戏方式。通过本文,我们提出了一种方法,通过结合计算机科学领域的热门话题,即BCI和AI,使电子游戏更令人兴奋和具有挑战性,让用户体验终极游戏。
{"title":"Conceptualizing BCI and AI in Video Games","authors":"Hardik Arora, A. Agrawal, Ankur Choudhary","doi":"10.1109/ICCCIS48478.2019.8974549","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974549","url":null,"abstract":"Video Games are the most common and popular ways of entertainment mainly amongst the younger generation of world. Due to the advent of Virtual Reality (VR) and Brain Computer Interface (BCI), the gaming experience has increased exponentially amongst the users and the use of Artificial Intelligence (AI) in video games makes it less predictive and more tough and exciting to play. With Virtual Reality now looking distinctly normal, Brain Computer Interface is all set to become the futuristic technology in the gaming horizon. The researchers discover where the technology is at present and how it could transform the way users play in the future. Through this paper, we propose a method to make the video games more exciting and challenging for the users to experience ultimate gaming by combining the trending topics in the world of computer science i.e. BCI and AI.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"391 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115203334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated Smartphone Based System for Diagnosis of Diabetic Retinopathy 基于智能手机的糖尿病视网膜病变自动诊断系统
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974492
Misgina Tsighe Hagos, Shri Kant, Surayya Ado Bala
Early diagnosis of diabetic retinopathy for the treatment of the disease has been failing to reach diabetic people living in rural areas. The shortage of trained ophthalmologists, limited availability of healthcare centers, and expensiveness of diagnostic equipment are among the reasons. Although many deep learning-based automatic diagnosis of diabetic retinopathy techniques have been implemented in the literature, these methods still fail to provide a point-of-care diagnosis, and this raises the need for an independent diagnostic of diabetic retinopathy that can be used by a non-expert. Recently the usage of smartphones has been increasing across the world; automated diagnoses of diabetic retinopathy can be deployed on smartphones in order to provide an instant diagnosis to diabetic people residing in remote areas. In this paper, inception based convolutional neural network and binary decision tree-based ensemble of classifiers have been proposed and implemented to detect and classify diabetic retinopathy. The proposed method was imported to a smartphone application for further classification, which provides an easy and automatic system for diagnosis of diabetic retinopathy.
糖尿病视网膜病变的早期诊断和治疗一直未能惠及农村地区的糖尿病患者。训练有素的眼科医生短缺,医疗中心的可用性有限,以及诊断设备的昂贵都是其中的原因。尽管文献中已经实现了许多基于深度学习的糖尿病视网膜病变自动诊断技术,但这些方法仍然无法提供即时诊断,这就提出了对非专家可使用的糖尿病视网膜病变独立诊断的需求。最近,智能手机的使用在全球范围内不断增加;糖尿病视网膜病变的自动诊断可以部署在智能手机上,以便为居住在偏远地区的糖尿病患者提供即时诊断。本文提出并实现了基于inception的卷积神经网络和基于二叉决策树的分类器集合来检测和分类糖尿病视网膜病变。将该方法导入智能手机应用程序进行进一步分类,为糖尿病视网膜病变的诊断提供了一个简单、自动的系统。
{"title":"Automated Smartphone Based System for Diagnosis of Diabetic Retinopathy","authors":"Misgina Tsighe Hagos, Shri Kant, Surayya Ado Bala","doi":"10.1109/ICCCIS48478.2019.8974492","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974492","url":null,"abstract":"Early diagnosis of diabetic retinopathy for the treatment of the disease has been failing to reach diabetic people living in rural areas. The shortage of trained ophthalmologists, limited availability of healthcare centers, and expensiveness of diagnostic equipment are among the reasons. Although many deep learning-based automatic diagnosis of diabetic retinopathy techniques have been implemented in the literature, these methods still fail to provide a point-of-care diagnosis, and this raises the need for an independent diagnostic of diabetic retinopathy that can be used by a non-expert. Recently the usage of smartphones has been increasing across the world; automated diagnoses of diabetic retinopathy can be deployed on smartphones in order to provide an instant diagnosis to diabetic people residing in remote areas. In this paper, inception based convolutional neural network and binary decision tree-based ensemble of classifiers have been proposed and implemented to detect and classify diabetic retinopathy. The proposed method was imported to a smartphone application for further classification, which provides an easy and automatic system for diagnosis of diabetic retinopathy.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115392110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1