首页 > 最新文献

2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)最新文献

英文 中文
Comparative Evaluation of Spectral Indices and Sensors for Mapping of Urban Surface Water Bodies in Jodhpur Area : Smart & Sustainable Growth 焦特布尔地区城市地表水水体测绘光谱指数和传感器的比较评价:智能和可持续增长
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974505
S. Parihar, S. Borana, S. K. Yadav
Remote sensing data increasingly used to identify and map open water bodies at comprehensive scales. The Jodhpur city experienced high urbanization in last one decade with population about 13Lakhs, and therefore needs effective public amenities alongwith safe water. In this research, compared accessible surface water bodies mapping approaches using seven spectral indices, viz. normalized difference water index (NDWI), tasseled cap wetness index (TCW), automated water extraction index (AWEIsh and AWEInsh), modified normalized difference water index (MNDWI), Water ratio index (WRI) and normalized difference vegetation index (NDVI) as well as two medium resolution sensors (Sentinel-2A and Landsat 8 OLI). The combinations of different water algorithms and satellite sensors were used to evaluate accuracy of the open water body. The results confirmed that water algorithms have high accuracies with Kappa Coefficients ranging from 0.12 to 0.98. The MNDWI water algorithms performed better than other water indices algorithms, and could be associated with pure water dominance in study area.The resultant water mapping from Sentinel-2A (10m) data has superior accuracies than Sentinel-2 (20m) and Landsat 8 OLI (30m). This research illustrates the enhanced performance in Sentinel-2A (10m) and Sentinel-2A (20m) for mapping of water body. The present study shows the availability of alternate water resources, which shall also be useful during frequent maintenance work of Rajeev Gandhi canal which supply water to whole city. The nearest neighbour technique is used to resample Sentibel-2A (10m) data of the visible and near IR bands to 20 m resolution bands to perform further analysis and comparisons.
遥感数据越来越多地用于在综合尺度上识别和绘制开放水体。焦特布尔在过去十年中经历了高度城市化,人口约为130万,因此需要有效的公共设施和安全的水。采用归一化差水指数(NDWI)、流苏帽湿度指数(TCW)、自动取水指数(AWEIsh和AWEInsh)、修正归一化差水指数(MNDWI)、水分比率指数(WRI)和归一化差植被指数(NDVI) 7种光谱指数以及Sentinel-2A和Landsat 8 OLI两种中分辨率传感器,对可达地表水体的制图方法进行了比较。结合不同的水体算法和卫星传感器,对开阔水体的精度进行了评价。结果表明,水算法具有较高的精度,Kappa系数在0.12 ~ 0.98之间。MNDWI水指数算法优于其他水指数算法,与研究区纯水优势相关。Sentinel-2A (10m)数据生成的水图精度优于Sentinel-2 (20m)和Landsat 8 OLI (30m)。本研究展示了Sentinel-2A (10m)和Sentinel-2A (20m)在水体制图中的增强性能。目前的研究显示了可替代水资源的可用性,这在为整个城市供水的拉吉夫甘地运河的频繁维护工作中也很有用。采用最近邻技术对sentinel - 2a (10m)可见光和近红外波段的数据重新采样到20m分辨率波段,进行进一步的分析和比较。
{"title":"Comparative Evaluation of Spectral Indices and Sensors for Mapping of Urban Surface Water Bodies in Jodhpur Area : Smart & Sustainable Growth","authors":"S. Parihar, S. Borana, S. K. Yadav","doi":"10.1109/ICCCIS48478.2019.8974505","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974505","url":null,"abstract":"Remote sensing data increasingly used to identify and map open water bodies at comprehensive scales. The Jodhpur city experienced high urbanization in last one decade with population about 13Lakhs, and therefore needs effective public amenities alongwith safe water. In this research, compared accessible surface water bodies mapping approaches using seven spectral indices, viz. normalized difference water index (NDWI), tasseled cap wetness index (TCW), automated water extraction index (AWEIsh and AWEInsh), modified normalized difference water index (MNDWI), Water ratio index (WRI) and normalized difference vegetation index (NDVI) as well as two medium resolution sensors (Sentinel-2A and Landsat 8 OLI). The combinations of different water algorithms and satellite sensors were used to evaluate accuracy of the open water body. The results confirmed that water algorithms have high accuracies with Kappa Coefficients ranging from 0.12 to 0.98. The MNDWI water algorithms performed better than other water indices algorithms, and could be associated with pure water dominance in study area.The resultant water mapping from Sentinel-2A (10m) data has superior accuracies than Sentinel-2 (20m) and Landsat 8 OLI (30m). This research illustrates the enhanced performance in Sentinel-2A (10m) and Sentinel-2A (20m) for mapping of water body. The present study shows the availability of alternate water resources, which shall also be useful during frequent maintenance work of Rajeev Gandhi canal which supply water to whole city. The nearest neighbour technique is used to resample Sentibel-2A (10m) data of the visible and near IR bands to 20 m resolution bands to perform further analysis and comparisons.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122127749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Traffic Density Investigation & Road Accident Analysis in India using Deep Learning 使用深度学习的印度交通密度调查和道路事故分析
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974528
Chinkit Manchanda, Rajat Rathi, Nikhil Sharma
Traffic congestion is a common affair in the big cities and towns. This issue is the outcome of the rapid increase in the population and increasing number of vehicles, so predicting the level of traffic congestion will be beneficial for every individual. However, interpretation and implementation of traffic state can be exceptionally tough. With this pace of increasing vehicles, existing algorithms may come up with some limitations due to various aspects of features which we cannot process. In this paper, we introduce a Hybrid Deep Neural Network (HDNN) for forecasting the traffic conditions on roads with the images using Convolutional Neural Network (CNN) and predicting road accident statistics of a particular area on a specific time. This model will exploit the development of algorithms in machine learning and majorly grasping over the Deep learning algorithm CNN. Experimental results show superior results of traffic conditions prediction and road accidentsanalysis, HDNN outshine the standard benchmark for the level of traffic congestion.
交通拥堵在大城市和城镇是一件常见的事情。这个问题是人口和车辆数量快速增长的结果,所以预测交通拥堵的程度对每个人都是有益的。然而,流量状态的解释和实现可能异常困难。随着车辆的增加,现有的算法可能会因为我们无法处理的各个方面的特征而受到一些限制。本文介绍了一种混合深度神经网络(HDNN),用于使用卷积神经网络(CNN)对图像进行道路交通状况预测,并预测特定区域在特定时间的道路交通事故统计数据。该模型将利用机器学习中算法的发展,主要是对深度学习算法CNN的抓取。实验结果表明,HDNN在交通状况预测和道路事故分析方面取得了优异的成绩,在交通拥堵程度方面优于标准基准。
{"title":"Traffic Density Investigation & Road Accident Analysis in India using Deep Learning","authors":"Chinkit Manchanda, Rajat Rathi, Nikhil Sharma","doi":"10.1109/ICCCIS48478.2019.8974528","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974528","url":null,"abstract":"Traffic congestion is a common affair in the big cities and towns. This issue is the outcome of the rapid increase in the population and increasing number of vehicles, so predicting the level of traffic congestion will be beneficial for every individual. However, interpretation and implementation of traffic state can be exceptionally tough. With this pace of increasing vehicles, existing algorithms may come up with some limitations due to various aspects of features which we cannot process. In this paper, we introduce a Hybrid Deep Neural Network (HDNN) for forecasting the traffic conditions on roads with the images using Convolutional Neural Network (CNN) and predicting road accident statistics of a particular area on a specific time. This model will exploit the development of algorithms in machine learning and majorly grasping over the Deep learning algorithm CNN. Experimental results show superior results of traffic conditions prediction and road accidentsanalysis, HDNN outshine the standard benchmark for the level of traffic congestion.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Weak Form Efficiency Of Currency Futures: Evidence From India 货币期货的弱形式效率:来自印度的证据
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974483
Amandeep Kaur, D. Chahal, LATIKA KHARB
With the advent of LPG Policy many foreign firms have invested in India and home country firms too have expanded their operations outside the nation which results in greater inflow and outflow of foreign currency and INR giving rise to currency fluctuations, these fluctuations were exposed to more volatility after the US financial crisis of 2008. The increased risk exposure can be mitigated by employing techniques such as hedging, speculation and by using instruments like Futures and Forward contracts. Currency futures have been considered as the best instruments for managing risk against foreign currency exchange rate volatility. Keeping this into consideration the present paper analyses the efficiency of random walk hypothesis by testing currency futures in weak form efficiency post financial crisis of 2008. The sample includes the monthly closing price indices for the period January 2009 to March 2019. The hypothesis tested is whether the currency futures USD/INR are weak form efficient. Statistical tools employed in the study encompasses Runs Test, Autocorrelation Function, Kolmogorov-Smirnov Test (K-S Test), Augmented Dickey Fuller Test (ADF Test), and Ljung Box Test. The results of the employed tests provide evidence on the non-randomness of the time series.
随着液化石油气政策的出台,许多外国公司在印度投资,本国公司也扩大了在国外的业务,导致外币和印度卢比的流入和流出增加,导致货币波动,这些波动在2008年美国金融危机后暴露于更大的波动。增加的风险敞口可以通过采用套期保值、投机等技术以及使用期货和远期合约等工具来减轻。外汇期货一直被认为是管理外汇汇率波动风险的最佳工具。考虑到这一点,本文通过检验2008年金融危机后弱形式货币期货的效率来分析随机游走假设的效率。样本包括2009年1月至2019年3月的月度收盘价指数。检验的假设是货币期货美元/印度卢比是弱还是有效。本研究使用的统计工具包括run检验、自相关函数、Kolmogorov-Smirnov检验(K-S检验)、Augmented Dickey Fuller检验(ADF检验)和Ljung Box检验。所采用的检验结果为时间序列的非随机性提供了证据。
{"title":"Weak Form Efficiency Of Currency Futures: Evidence From India","authors":"Amandeep Kaur, D. Chahal, LATIKA KHARB","doi":"10.1109/ICCCIS48478.2019.8974483","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974483","url":null,"abstract":"With the advent of LPG Policy many foreign firms have invested in India and home country firms too have expanded their operations outside the nation which results in greater inflow and outflow of foreign currency and INR giving rise to currency fluctuations, these fluctuations were exposed to more volatility after the US financial crisis of 2008. The increased risk exposure can be mitigated by employing techniques such as hedging, speculation and by using instruments like Futures and Forward contracts. Currency futures have been considered as the best instruments for managing risk against foreign currency exchange rate volatility. Keeping this into consideration the present paper analyses the efficiency of random walk hypothesis by testing currency futures in weak form efficiency post financial crisis of 2008. The sample includes the monthly closing price indices for the period January 2009 to March 2019. The hypothesis tested is whether the currency futures USD/INR are weak form efficient. Statistical tools employed in the study encompasses Runs Test, Autocorrelation Function, Kolmogorov-Smirnov Test (K-S Test), Augmented Dickey Fuller Test (ADF Test), and Ljung Box Test. The results of the employed tests provide evidence on the non-randomness of the time series.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"21 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114049965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Clustering using Bisecting K-Means 使用平分k均值的数据聚类
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974537
V. Rohilla, Ms Sanika Singh kumar, Sudeshna Chakraborty, Ms. Sanika Singh
Clustering is one the one of the most important technique of data mining. It is used in many applications like fraud detection, image processing, bioinformatics etc. It has been used in various domains. Many types of the clustering techniques are the following like hierarchical, partitional, spectral clustering, density clustering, grid clustering, model based clustering etc. Bisecting K-Means comes under partitional clustering. It gives better performane, when huge data is used. There are many approached that are developed in the similar domain.One of the technique is Text Mining through which useful information is extracted through text. One of the important concept is statistical pattern mining through which important information is extracted by planning different trends and patterns. Input text patterns are structured that are derived from structured data and corresponding output is generated. The steps of text mining are categories of text, clustering text, extraction, summarization of text, E-R modeling. The various steps of text analysis are retrieval of information, lex. analysis for distribution of word freq. distribution study, recognition of pattern,tagging, extraction of information, techniques of data mining and also link analysis, association, visual. and predictive analyt. In the given paper bisect. K Means algorithm is presented which has the features of k-Means and hierar. clustering.
聚类是数据挖掘中最重要的技术之一。它被广泛应用于欺诈检测、图像处理、生物信息学等领域。它已被用于各个领域。聚类技术有:分层聚类、分区聚类、谱聚类、密度聚类、网格聚类、基于模型的聚类等。分割K-Means属于分区聚类。当使用大量数据时,它提供了更好的性能。在类似的领域中有许多方法被开发出来。其中一种技术是文本挖掘,通过文本提取有用的信息。其中一个重要的概念是统计模式挖掘,通过规划不同的趋势和模式提取重要的信息。输入文本模式是结构化的,它来源于结构化数据,并生成相应的输出。文本挖掘的步骤包括:文本分类、文本聚类、文本抽取、文本摘要、E-R建模。文本分析的各个步骤是:信息检索、文本分析和文本分析。词频分布分析、分布研究、模式识别、标注、信息提取、数据挖掘技术以及链接分析、关联、可视化。预测分析师。在给定的纸上等分。提出了K均值算法,该算法具有K均值和层次性的特点。集群。
{"title":"Data Clustering using Bisecting K-Means","authors":"V. Rohilla, Ms Sanika Singh kumar, Sudeshna Chakraborty, Ms. Sanika Singh","doi":"10.1109/ICCCIS48478.2019.8974537","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974537","url":null,"abstract":"Clustering is one the one of the most important technique of data mining. It is used in many applications like fraud detection, image processing, bioinformatics etc. It has been used in various domains. Many types of the clustering techniques are the following like hierarchical, partitional, spectral clustering, density clustering, grid clustering, model based clustering etc. Bisecting K-Means comes under partitional clustering. It gives better performane, when huge data is used. There are many approached that are developed in the similar domain.One of the technique is Text Mining through which useful information is extracted through text. One of the important concept is statistical pattern mining through which important information is extracted by planning different trends and patterns. Input text patterns are structured that are derived from structured data and corresponding output is generated. The steps of text mining are categories of text, clustering text, extraction, summarization of text, E-R modeling. The various steps of text analysis are retrieval of information, lex. analysis for distribution of word freq. distribution study, recognition of pattern,tagging, extraction of information, techniques of data mining and also link analysis, association, visual. and predictive analyt. In the given paper bisect. K Means algorithm is presented which has the features of k-Means and hierar. clustering.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128495219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep Neural Network Based Sentence Boundary Detection and End Marker Suggestion for Social Media Text 基于深度神经网络的社交媒体文本句子边界检测及结束标记建议
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974495
J. Kaur, J. Singh
For processing any natural language processing application, the knowledge of structure of sentence including its boundaries plays a vital role. Incorrect sentence boundary may lead to wrong outputs and hence decreasing the performance of NLP systems. Detecting sentence boundaries in code mixed social media text is not an easy task. People generally omits the boundary markers and use punctuation for other stylistic tasks. We propose a deep neural network approach for sentence boundary marking as well as suggesting appropriate punctuation mark in code mixed social media text. We experimented with single layer bidirectional and two layer bidirectional models. Both word sequence and character sequence are experimented. Bidirectional model using character sequence out performs all other models for sentence boundary detection as well as end marker suggestion.
对于任何自然语言处理应用,包括句子边界在内的句子结构知识都起着至关重要的作用。不正确的句子边界可能导致错误的输出,从而降低NLP系统的性能。在代码混合的社交媒体文本中检测句子边界不是一件容易的事。人们通常省略边界标记,使用标点符号完成其他文体任务。我们提出了一种深度神经网络方法来标记混合社交媒体文本的句子边界,并建议适当的标点符号。我们尝试了单层双向和双层双向模型。单词序列和字符序列都进行了实验。使用字符序列out的双向模型代替了所有其他模型进行句子边界检测和结束标记提示。
{"title":"Deep Neural Network Based Sentence Boundary Detection and End Marker Suggestion for Social Media Text","authors":"J. Kaur, J. Singh","doi":"10.1109/ICCCIS48478.2019.8974495","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974495","url":null,"abstract":"For processing any natural language processing application, the knowledge of structure of sentence including its boundaries plays a vital role. Incorrect sentence boundary may lead to wrong outputs and hence decreasing the performance of NLP systems. Detecting sentence boundaries in code mixed social media text is not an easy task. People generally omits the boundary markers and use punctuation for other stylistic tasks. We propose a deep neural network approach for sentence boundary marking as well as suggesting appropriate punctuation mark in code mixed social media text. We experimented with single layer bidirectional and two layer bidirectional models. Both word sequence and character sequence are experimented. Bidirectional model using character sequence out performs all other models for sentence boundary detection as well as end marker suggestion.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Autonomic Resource Allocation Mechanism for Service-based Cloud Applications 基于服务的云应用的自主资源分配机制
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974515
Tushar Bhardwaj, Himanshu Upadhyay, S. Sharma
The user’s request changes dynamically in service-based cloud applications, which requires optimal amount of computing resources to meet service-level agreements (SLAs). The existing server-side resource allocation mechanisms have limitations in provisioning the required resources to handle the incoming load on the basis of user’s requests. To overcome the aforementioned situation, cloud computing provides ample amount of computing resources to meet the SLAs. There are possibilities that cloud resources might not be properly utilized and might suffer over and under utilization. In this study, the authors have proposed an autonomous resource allocation mechanism, that automatically provisions (allocate and de-allocate) the required computing resources as per the load. The primary goal of this study is to improve the virtual resource utilization and response time with respect to the existing methods. The proposed model leverages the simple heuristic with response time and the number of virtual machines as the parameters. Finally, the results have shown that the response time and resource utilization have been improved.
在基于服务的云应用程序中,用户的请求会动态变化,这需要最优数量的计算资源来满足服务水平协议(sla)。现有的服务器端资源分配机制在根据用户请求提供所需资源以处理传入负载方面存在限制。为了克服上述情况,云计算提供了充足的计算资源来满足sla。云资源可能没有得到适当的利用,可能出现过度利用和利用不足的情况。在这项研究中,作者提出了一种自主的资源分配机制,可以根据负载自动提供(分配和取消分配)所需的计算资源。本研究的主要目标是提高虚拟资源的利用率和响应时间相对于现有的方法。该模型利用简单的启发式算法,以响应时间和虚拟机数量为参数。最后,结果表明,响应时间和资源利用率得到了改善。
{"title":"Autonomic Resource Allocation Mechanism for Service-based Cloud Applications","authors":"Tushar Bhardwaj, Himanshu Upadhyay, S. Sharma","doi":"10.1109/ICCCIS48478.2019.8974515","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974515","url":null,"abstract":"The user’s request changes dynamically in service-based cloud applications, which requires optimal amount of computing resources to meet service-level agreements (SLAs). The existing server-side resource allocation mechanisms have limitations in provisioning the required resources to handle the incoming load on the basis of user’s requests. To overcome the aforementioned situation, cloud computing provides ample amount of computing resources to meet the SLAs. There are possibilities that cloud resources might not be properly utilized and might suffer over and under utilization. In this study, the authors have proposed an autonomous resource allocation mechanism, that automatically provisions (allocate and de-allocate) the required computing resources as per the load. The primary goal of this study is to improve the virtual resource utilization and response time with respect to the existing methods. The proposed model leverages the simple heuristic with response time and the number of virtual machines as the parameters. Finally, the results have shown that the response time and resource utilization have been improved.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128490316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A High Throughput And Speed Architecture of Lightweight Cipher LEA 轻量级密码LEA的高吞吐量和高速度架构
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974468
Shubham Mishra, Zeesha Mishra, B. Acharya
A high-speed cryptography algorithm is the necessity of today’s world to communicate between two resource-constrained tools. We have proposed a 128-bit block size and 256-bit key size LEA cipher for high speed and throughput purpose. High speed is an essential requirement with the secure transmission of information. Pipelining is the best way to achieve these requirements with higher throughput. The implementation results have shown that this method has a higher capability of speed and throughput as compared to previous ciphers. LEA has security against all existing cipher attacks and compatible with both hardware and software. Proposed work is 73.7% and 62.85% improved version of compared paper for respectively throughput and speed.
高速加密算法是当今世界两种资源受限工具之间通信的必要条件。我们提出了一种128位块大小和256位密钥大小的高速和高吞吐量LEA密码。高速是信息安全传输的基本要求。流水线是用更高的吞吐量实现这些要求的最佳方式。实现结果表明,与以往的密码相比,该方法具有更高的速度和吞吐量。LEA具有针对所有现有密码攻击的安全性,并且与硬件和软件兼容。所提出的作品在吞吐量和速度上分别提高了73.7%和62.85%。
{"title":"A High Throughput And Speed Architecture of Lightweight Cipher LEA","authors":"Shubham Mishra, Zeesha Mishra, B. Acharya","doi":"10.1109/ICCCIS48478.2019.8974468","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974468","url":null,"abstract":"A high-speed cryptography algorithm is the necessity of today’s world to communicate between two resource-constrained tools. We have proposed a 128-bit block size and 256-bit key size LEA cipher for high speed and throughput purpose. High speed is an essential requirement with the secure transmission of information. Pipelining is the best way to achieve these requirements with higher throughput. The implementation results have shown that this method has a higher capability of speed and throughput as compared to previous ciphers. LEA has security against all existing cipher attacks and compatible with both hardware and software. Proposed work is 73.7% and 62.85% improved version of compared paper for respectively throughput and speed.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121250451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Two layer secure image encryption technique 一种两层安全图像加密技术
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974474
Indrani Das, Sanjoy Das, S. Sahana, Ashwini Kumar
The growing use of networking in almost every possible field, data transferring or data sharing has become an essential need. All kinds of users directly or indirectly involved in data transfer. But data transferring is susceptible to various risks i.e. hacking of potential data, tempering, etc. Various services based on data sharing or transferring across the network needs security and reliability of the system. Most of the stakeholders may not be fully aware about the fact that their communication is unsecure. Users are relying upon the system they are using and assume that their ongoing communication is secure.Generally, data categorized into text and image messages. There are many works on securing of text message through encryption has been achieved in last decades. But securing images are differs in many ways from that because text. Nowadays, securing image is necessary and quite in demand. In this paper, we have proposed an image encryption algorithm to secure image while being transmitted in two layers.
随着网络在几乎所有可能领域的日益使用,数据传输或数据共享已成为一种基本需求。各类用户直接或间接参与数据传输。但数据传输容易受到各种风险的影响,如潜在数据的黑客攻击、篡改等。基于数据共享或跨网络传输的各种业务需要系统的安全性和可靠性。大多数涉众可能没有完全意识到他们的通信是不安全的。用户依赖于他们正在使用的系统,并假设他们正在进行的通信是安全的。通常,数据分为文本和图像消息。近几十年来,人们在短信加密安全方面做了很多工作。但是保护图像在很多方面与保护文本不同。如今,保护图像是必要的,也是非常需要的。在本文中,我们提出了一种图像加密算法来保证图像在两层传输时的安全性。
{"title":"A Two layer secure image encryption technique","authors":"Indrani Das, Sanjoy Das, S. Sahana, Ashwini Kumar","doi":"10.1109/ICCCIS48478.2019.8974474","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974474","url":null,"abstract":"The growing use of networking in almost every possible field, data transferring or data sharing has become an essential need. All kinds of users directly or indirectly involved in data transfer. But data transferring is susceptible to various risks i.e. hacking of potential data, tempering, etc. Various services based on data sharing or transferring across the network needs security and reliability of the system. Most of the stakeholders may not be fully aware about the fact that their communication is unsecure. Users are relying upon the system they are using and assume that their ongoing communication is secure.Generally, data categorized into text and image messages. There are many works on securing of text message through encryption has been achieved in last decades. But securing images are differs in many ways from that because text. Nowadays, securing image is necessary and quite in demand. In this paper, we have proposed an image encryption algorithm to secure image while being transmitted in two layers.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"20 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115219081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancement of security and energy efficiency in WSNs: Machine Learning to the rescue 增强无线传感器网络的安全性和能源效率:机器学习的拯救
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974465
Divyansh Puri, B. Bhushan
With the new emerging technologies of this era, demands are increasing, concerning the increase in the population, Consumer desires everything to be high tech and automatized, Which leads to more sophisticated systems, WSNs or the wireless sensor networks can overcome these complications, Regardless sensors should be able to deliver diverse services, To make that possible Machine Learning techniques have been introduced which can help in efficient working of WSNs at a very low cost by stabilizing the energy and thus increasing the life span of the Wireless Sensor Networks, machine learning helps in various WSN applications some of those applications have been discussed further in this paper, there are various types of machine learning methods used in this paper and their comparisons have been given in tabular form.
随着这个时代的新兴技术,需求不断增加,关于人口的增加,消费者希望一切都是高科技和自动化的,这导致了更复杂的系统,无线传感器网络或无线传感器网络可以克服这些复杂性,无论传感器应该能够提供多样化的服务,为了实现这一目标,已经引入了机器学习技术,通过稳定能量,从而增加无线传感器网络的寿命,机器学习可以帮助WSN以非常低的成本高效工作,机器学习有助于各种WSN应用,其中一些应用已在本文中进一步讨论,本文中使用了各种类型的机器学习方法,并以表格形式给出了它们的比较。
{"title":"Enhancement of security and energy efficiency in WSNs: Machine Learning to the rescue","authors":"Divyansh Puri, B. Bhushan","doi":"10.1109/ICCCIS48478.2019.8974465","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974465","url":null,"abstract":"With the new emerging technologies of this era, demands are increasing, concerning the increase in the population, Consumer desires everything to be high tech and automatized, Which leads to more sophisticated systems, WSNs or the wireless sensor networks can overcome these complications, Regardless sensors should be able to deliver diverse services, To make that possible Machine Learning techniques have been introduced which can help in efficient working of WSNs at a very low cost by stabilizing the energy and thus increasing the life span of the Wireless Sensor Networks, machine learning helps in various WSN applications some of those applications have been discussed further in this paper, there are various types of machine learning methods used in this paper and their comparisons have been given in tabular form.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122442730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Bridging Learning Gap for Autism Spectrum Disorder 弥合自闭症谱系障碍的学习差距
Pub Date : 2019-10-01 DOI: 10.1109/ICCCIS48478.2019.8974529
Avantika Singh, Aakriti Mathur, Nitasha Hasteer
Technology is the most revolutionary and confidence inspiring step taken by mankind. The evolution of technology with the combination of health care has proven to be beneficial in every possible field spanning across all branches of medicine from progressive to in-born abnormalities affecting humans. In order to cater to the sector of people with in-born diseases specifically Autism, a certain kind of assistive technology is accessible that is, Augmentative and Alternative Communication (AAC). This paper introduces an android application AutistiCare targeting children of age 4 to 12 years old. It has features like information around us and caters to the health of the child. There are fun learning games which help the child build skills and coordination. AutistiCare aims at creating friendly yet informative interface for children who have been diagnosed with Autism. On the usage of the designed system, this study advocates the usability of android based application for bridging the learning gap for autistic children and brings forth the research direction in the field.
科技是人类迈出的最具革命性、最鼓舞人心的一步。技术的发展与医疗保健的结合已被证明在医学所有分支的每个可能领域都是有益的,从影响人类的进行性到先天性异常。为了满足患有先天性疾病特别是自闭症的人的需求,可以使用某种辅助技术,即辅助和替代通信(AAC)。本文介绍了一款针对4 - 12岁儿童的android应用程序autiticare。它的特点就像我们周围的信息,迎合了孩子的健康。有有趣的学习游戏,帮助孩子建立技能和协调能力。autiticare旨在为被诊断患有自闭症的儿童创建友好而信息丰富的界面。在设计系统的使用上,本研究倡导基于android的应用程序的可用性,以弥合自闭症儿童的学习差距,并提出该领域的研究方向。
{"title":"Bridging Learning Gap for Autism Spectrum Disorder","authors":"Avantika Singh, Aakriti Mathur, Nitasha Hasteer","doi":"10.1109/ICCCIS48478.2019.8974529","DOIUrl":"https://doi.org/10.1109/ICCCIS48478.2019.8974529","url":null,"abstract":"Technology is the most revolutionary and confidence inspiring step taken by mankind. The evolution of technology with the combination of health care has proven to be beneficial in every possible field spanning across all branches of medicine from progressive to in-born abnormalities affecting humans. In order to cater to the sector of people with in-born diseases specifically Autism, a certain kind of assistive technology is accessible that is, Augmentative and Alternative Communication (AAC). This paper introduces an android application AutistiCare targeting children of age 4 to 12 years old. It has features like information around us and caters to the health of the child. There are fun learning games which help the child build skills and coordination. AutistiCare aims at creating friendly yet informative interface for children who have been diagnosed with Autism. On the usage of the designed system, this study advocates the usability of android based application for bridging the learning gap for autistic children and brings forth the research direction in the field.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1