首页 > 最新文献

2021 2nd Global Conference for Advancement in Technology (GCAT)最新文献

英文 中文
Gate Drive for Power Electronic Converters : An Insight into KiCAD’s PCB design ! 电力电子转换器的栅极驱动:KiCAD PCB设计洞察!
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587716
A. Gautam, V. Laxmi
PCB (Printed Circuit Board) designing has been an integral part of almost all hardware projects since ages. Personalizing a PCB layout for an electrical circuit is the ultimate aim of an electrical and electronics engineer working on a project application in any practical scenario. PCB also has a significance while commercializing our design as a product in the market. This paper works through the KiCAD’s PCB design of the gate drive circuits used in power electronic converters.
多年来,PCB(印刷电路板)设计一直是几乎所有硬件项目中不可或缺的一部分。个性化电路的PCB布局是电气和电子工程师在任何实际情况下从事项目应用程序的最终目标。PCB在将我们的设计作为产品推向市场的过程中也具有重要意义。本文通过KiCAD的PCB设计,设计了用于电力电子变换器的栅极驱动电路。
{"title":"Gate Drive for Power Electronic Converters : An Insight into KiCAD’s PCB design !","authors":"A. Gautam, V. Laxmi","doi":"10.1109/GCAT52182.2021.9587716","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587716","url":null,"abstract":"PCB (Printed Circuit Board) designing has been an integral part of almost all hardware projects since ages. Personalizing a PCB layout for an electrical circuit is the ultimate aim of an electrical and electronics engineer working on a project application in any practical scenario. PCB also has a significance while commercializing our design as a product in the market. This paper works through the KiCAD’s PCB design of the gate drive circuits used in power electronic converters.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131087006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Recommender System for Over-the-Top Media Service 高效的超顶级媒体服务推荐系统
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587630
Ramya Patibandla, Yukthi Sravani Tummalapalli, Sneha Lingamaneni, Kumari A Prasanna, K. P. Kumar
Recommender System’s main idea is to decide the most suitable products for the customers. It enhances the relation between the users and the products. There are various applications of Recommender Systems. One such application that is most needed as well as helpful for users is the Movie Recommender System. A Movie Recommender System helps the users to find the movies those are more appropriate for them and which they may like the recommender system considers the user preferences to recommend movies to the users. There are various factors that can be considered to recommend a movie to the users. They are actors, genre and language of the movies. It will also consider the history of the movies watched by a particular user to recommend movies to them. The dataset that will be used for this project is Netflix prize dataset and hotstar dataset. Two models will be developed in this project namely Collaborative Filtering Algorithm and Pearson’s R Correlation algorithm. The outcome of this recommender system will be a customized list of top-rated movies from Netflix and Hotstar respectively. The future scope of this system is to recommend top rated movies from various OTT platforms which will help the user to identify his/her favorites in single application.
推荐系统的主要思想是为顾客决定最适合的产品。它增强了用户与产品之间的关系。推荐系统有各种各样的应用。一个这样的应用程序是最需要的,也是对用户有帮助的是电影推荐系统。电影推荐系统帮助用户找到那些更适合他们的电影,他们可能喜欢的电影,推荐系统考虑用户的偏好,向用户推荐电影。在向用户推荐电影时,可以考虑多种因素。他们是演员,电影的类型和语言。它还将考虑特定用户观看的电影历史,向他们推荐电影。这个项目将使用的数据集是Netflix奖数据集和hotstar数据集。本项目将开发两种模型,即协同过滤算法和皮尔逊R相关算法。这个推荐系统的结果将是一个定制的来自Netflix和Hotstar的顶级电影列表。该系统未来的发展范围是推荐各种OTT平台的顶级电影,帮助用户在一个应用程序中识别自己喜欢的电影。
{"title":"Efficient Recommender System for Over-the-Top Media Service","authors":"Ramya Patibandla, Yukthi Sravani Tummalapalli, Sneha Lingamaneni, Kumari A Prasanna, K. P. Kumar","doi":"10.1109/GCAT52182.2021.9587630","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587630","url":null,"abstract":"Recommender System’s main idea is to decide the most suitable products for the customers. It enhances the relation between the users and the products. There are various applications of Recommender Systems. One such application that is most needed as well as helpful for users is the Movie Recommender System. A Movie Recommender System helps the users to find the movies those are more appropriate for them and which they may like the recommender system considers the user preferences to recommend movies to the users. There are various factors that can be considered to recommend a movie to the users. They are actors, genre and language of the movies. It will also consider the history of the movies watched by a particular user to recommend movies to them. The dataset that will be used for this project is Netflix prize dataset and hotstar dataset. Two models will be developed in this project namely Collaborative Filtering Algorithm and Pearson’s R Correlation algorithm. The outcome of this recommender system will be a customized list of top-rated movies from Netflix and Hotstar respectively. The future scope of this system is to recommend top rated movies from various OTT platforms which will help the user to identify his/her favorites in single application.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125418169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taylor Series based RD trade-off and Laplace Correction based coding for HEVC encoder 基于泰勒级数的RD权衡和基于拉普拉斯校正的HEVC编码器编码
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587588
Mahesh C. Pawaskar, G. Vijay
Digital video storing, video streaming and video conferencing are globally important industry which will continue to spread across the networks, businesses, and homes. Internet multimedia data like videos and images are the most frequently used digital format for information transmission. Video compression is the way to deliver more and higher quality video in a cost-effective way. Video coding process plays vital role to compress and decompress digital video. High Efficiency Video Coding (HEVC) is latest video compression standard which has potential to give better performance than any other standards like H.264. This paper proposes a novel video compression strategy to improve the quality of video without degradation. The newly devised RD tradeoff ensure mode decision effectively and the selection of the blocks optimally for motion estimation. Performance of proposed method is evaluated with the help of PSNR as well as SSIM, and it is compared with other two methods. Compression is done without affecting quality.
数字视频存储、视频流和视频会议是全球重要的行业,将继续在网络、企业和家庭中传播。视频和图像等互联网多媒体数据是最常用的信息传输数字格式。视频压缩是一种以经济有效的方式提供更多、更高质量视频的方法。视频编码过程在数字视频的压缩和解压缩中起着至关重要的作用。高效视频编码(HEVC)是最新的视频压缩标准,有可能比H.264等其他标准提供更好的性能。本文提出了一种新的视频压缩策略,以提高视频质量而不降低视频质量。新设计的RD权衡保证了运动估计中模式的有效决策和块的最优选择。利用PSNR和SSIM对该方法的性能进行了评价,并与其他两种方法进行了比较。压缩在不影响质量的情况下完成。
{"title":"Taylor Series based RD trade-off and Laplace Correction based coding for HEVC encoder","authors":"Mahesh C. Pawaskar, G. Vijay","doi":"10.1109/GCAT52182.2021.9587588","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587588","url":null,"abstract":"Digital video storing, video streaming and video conferencing are globally important industry which will continue to spread across the networks, businesses, and homes. Internet multimedia data like videos and images are the most frequently used digital format for information transmission. Video compression is the way to deliver more and higher quality video in a cost-effective way. Video coding process plays vital role to compress and decompress digital video. High Efficiency Video Coding (HEVC) is latest video compression standard which has potential to give better performance than any other standards like H.264. This paper proposes a novel video compression strategy to improve the quality of video without degradation. The newly devised RD tradeoff ensure mode decision effectively and the selection of the blocks optimally for motion estimation. Performance of proposed method is evaluated with the help of PSNR as well as SSIM, and it is compared with other two methods. Compression is done without affecting quality.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125513670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison Of Machine Learning Algorithms For Heart Rate Variability Based Driver Drowsiness Detection 基于心率变异性的驾驶员困倦检测的机器学习算法比较
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587733
Aswathi Cd, N. Mathew, K. S. Riyas, R. Jose
Drowsy driving due to insufficient sleep has led to many serious traffic accidents. Measuring the drowsiness of the driver and taking timely actions can avoid such accidents. Earlier, conventional methods such as eye states and facial expressions were used to detect drowsiness. Nowadays new techniques have been developed for the same purpose, which uses bio-electric signals like an Electro Cardio Gram(ECG). Heart Rate Variability (HRV) can be used to assess drivers’ drowsiness, fatigue, and stress levels. HRV is determined by the interval of RR measured by an Electro Cardiogram. Twelve features are monitored, including both time and frequency domains, in order to determine the HRV changes. HRV monitoring is used to actually predict epileptic seizures. The proposed work uses Heart Rate Variability (HRV) analysis with a Machine Learning and Deep Learning to detect drowsiness. A comparison is also made between the performance of four different Machine Learning(ML) algorithms while using one-dimensional convolutional neural networks (1D CNNs). Convolutional neural networks (CNN) are used increasingly in Computer Vision and Machine Learning operations. 2D CNNs consist of millions of parameters and many hidden layers, and it has Interpreting complex patterns and objects. Two-dimensional signals, such as images and video frames, are used as inputs for 2D CNNs. However, this may not be the ideal choice in many applications, especially those involving One-Dimensional signals such as biomedical signals. To solve the problem, 1D CNNs were introduced with the highest level of performance. Specifically, the 1D CNN has four layers: a Convolutional Layer, Batch Normalization Layer, Maxpooling Layer, and Fully Connected Layer. The proposed strategy has the potential to help avoid accidents caused by drowsy driving.
由于睡眠不足导致的昏睡驾驶已经导致了许多严重的交通事故。测量驾驶员的睡意并及时采取措施可以避免此类事故。早些时候,传统的方法,如眼睛状态和面部表情,被用来检测睡意。如今,为了同样的目的,新技术已经被开发出来,它使用像心电图(ECG)这样的生物电信号。心率变异性(HRV)可用于评估驾驶员的困倦、疲劳和压力水平。HRV由心电图测量的RR间隔决定。监测12个特征,包括时域和频域,以确定HRV的变化。心率变异监测实际上是用来预测癫痫发作的。提出的工作使用心率变异性(HRV)分析与机器学习和深度学习来检测困倦。在使用一维卷积神经网络(1D cnn)时,还比较了四种不同的机器学习(ML)算法的性能。卷积神经网络(CNN)在计算机视觉和机器学习操作中的应用越来越多。二维cnn由数百万个参数和许多隐藏层组成,具有解释复杂模式和对象的能力。二维信号,如图像和视频帧,被用作二维cnn的输入。然而,在许多应用中,这可能不是理想的选择,特别是那些涉及一维信号的应用,如生物医学信号。为了解决这个问题,引入了具有最高性能水平的1D cnn。具体来说,1D CNN有四个层:卷积层、批处理归一化层、Maxpooling层和完全连接层。拟议的策略有可能帮助避免因疲劳驾驶引起的事故。
{"title":"Comparison Of Machine Learning Algorithms For Heart Rate Variability Based Driver Drowsiness Detection","authors":"Aswathi Cd, N. Mathew, K. S. Riyas, R. Jose","doi":"10.1109/GCAT52182.2021.9587733","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587733","url":null,"abstract":"Drowsy driving due to insufficient sleep has led to many serious traffic accidents. Measuring the drowsiness of the driver and taking timely actions can avoid such accidents. Earlier, conventional methods such as eye states and facial expressions were used to detect drowsiness. Nowadays new techniques have been developed for the same purpose, which uses bio-electric signals like an Electro Cardio Gram(ECG). Heart Rate Variability (HRV) can be used to assess drivers’ drowsiness, fatigue, and stress levels. HRV is determined by the interval of RR measured by an Electro Cardiogram. Twelve features are monitored, including both time and frequency domains, in order to determine the HRV changes. HRV monitoring is used to actually predict epileptic seizures. The proposed work uses Heart Rate Variability (HRV) analysis with a Machine Learning and Deep Learning to detect drowsiness. A comparison is also made between the performance of four different Machine Learning(ML) algorithms while using one-dimensional convolutional neural networks (1D CNNs). Convolutional neural networks (CNN) are used increasingly in Computer Vision and Machine Learning operations. 2D CNNs consist of millions of parameters and many hidden layers, and it has Interpreting complex patterns and objects. Two-dimensional signals, such as images and video frames, are used as inputs for 2D CNNs. However, this may not be the ideal choice in many applications, especially those involving One-Dimensional signals such as biomedical signals. To solve the problem, 1D CNNs were introduced with the highest level of performance. Specifically, the 1D CNN has four layers: a Convolutional Layer, Batch Normalization Layer, Maxpooling Layer, and Fully Connected Layer. The proposed strategy has the potential to help avoid accidents caused by drowsy driving.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116204316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
[Copyright notice] (版权)
Pub Date : 2021-10-01 DOI: 10.1109/gcat52182.2021.9587646
{"title":"[Copyright notice]","authors":"","doi":"10.1109/gcat52182.2021.9587646","DOIUrl":"https://doi.org/10.1109/gcat52182.2021.9587646","url":null,"abstract":"","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Handwritten Mathematical Expression Solver Using Artificial Neural Network 使用人工神经网络的在线手写数学表达式求解器
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587866
Kanchi Tank
Mathematics plays a predominant role in each of our lives. When it comes to solving a mathematical expression, we are highly dependent on the calculators that are available in almost every electronic gadget. Since all these gadgets are touchscreen-based nowadays, building a system that recognizes and solves online handwritten mathematical expressions is the potential area of this research. Recognition of online handwritten mathematical expressions is a complicated task. In this paper, an Artificial Neural Network model is built for the recognition of handwritten digits, operators, and symbols. Tkinter GUI interface is built for the users to type in their expressions and image processing is done by capturing an image from the canvas and converting it into a NumPy array and then applying the thresholding technique to convert it into a binary array. Connected component labeling is done to separate every number and symbol on the canvas. These numbers and symbols are then sent to the artificial neural network for predictions. The model gave a training accuracy of 98.97% and a test accuracy of 98.95%. Finally, the expression is evaluated, and the translated expression and output are shown on the Tkinter GUI interface.
数学在我们每个人的生活中都扮演着重要的角色。当涉及到解决一个数学表达式时,我们高度依赖计算器,几乎每个电子设备都有计算器。由于现在所有这些小工具都是基于触摸屏的,因此建立一个识别和解决在线手写数学表达式的系统是本研究的潜在领域。在线手写数学表达式的识别是一项复杂的任务。本文建立了一种用于手写体数字、运算符和符号识别的人工神经网络模型。Tkinter GUI界面是为用户输入他们的表达式而构建的,图像处理是通过从画布上捕获图像并将其转换为NumPy数组,然后应用阈值技术将其转换为二进制数组来完成的。连接组件标签是为了分离画布上的每个数字和符号。然后将这些数字和符号发送给人工神经网络进行预测。该模型的训练准确率为98.97%,测试准确率为98.95%。最后,对表达式求值,并在Tkinter GUI界面上显示翻译后的表达式和输出。
{"title":"Online Handwritten Mathematical Expression Solver Using Artificial Neural Network","authors":"Kanchi Tank","doi":"10.1109/GCAT52182.2021.9587866","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587866","url":null,"abstract":"Mathematics plays a predominant role in each of our lives. When it comes to solving a mathematical expression, we are highly dependent on the calculators that are available in almost every electronic gadget. Since all these gadgets are touchscreen-based nowadays, building a system that recognizes and solves online handwritten mathematical expressions is the potential area of this research. Recognition of online handwritten mathematical expressions is a complicated task. In this paper, an Artificial Neural Network model is built for the recognition of handwritten digits, operators, and symbols. Tkinter GUI interface is built for the users to type in their expressions and image processing is done by capturing an image from the canvas and converting it into a NumPy array and then applying the thresholding technique to convert it into a binary array. Connected component labeling is done to separate every number and symbol on the canvas. These numbers and symbols are then sent to the artificial neural network for predictions. The model gave a training accuracy of 98.97% and a test accuracy of 98.95%. Finally, the expression is evaluated, and the translated expression and output are shown on the Tkinter GUI interface.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"40 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cartoon Face to Human Face Translation using Contour Loss based CycleGAN 基于轮廓损失的CycleGAN的卡通人脸到人脸的翻译
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587703
Mayank Singhal, R. Agarwal
Cartoon to Human Translation transforms a 2D vector cartoon face to a Real Human Face. The mapping is based on semantic similarity of both the input domains. This is an image$rightarrow$mage translation problem that finds its applications in the entertainment and animation industry. Cartoon movies evolved from 2D animations in 1930 and became more lifelike with timeline. In image synthesis, audio, and other sorts of data, Generative Adversarial Networks have demonstrated promising outcomes. They also produce excellent results when translating images to images. In this research, a CycleGAN based methodology for generating target Human Faces from source Cartoon Faces is proposed, preserving the facial characteristics i.e. face shape, eyebrow alignment and hair style. In order to improve the mapping we have used contour loss along with cycle consistency loss in our model and patch discriminator is used with L2 norm.
卡通到人类的翻译转换一个二维矢量卡通脸到一个真正的人脸。该映射基于两个输入域的语义相似性。这是一个在娱乐和动画行业中应用的image$right - row$ image翻译问题。卡通电影从1930年的2D动画发展而来,随着时间的推移变得更加逼真。在图像合成、音频和其他类型的数据中,生成对抗网络已经展示了有希望的结果。它们在将图像转换为图像时也能产生出色的结果。在本研究中,提出了一种基于CycleGAN的从源卡通人脸生成目标人脸的方法,该方法保留了人脸特征,如脸型、眉毛排列和发型。为了改善映射,我们在模型中使用了轮廓损失和周期一致性损失,并在L2范数中使用了补丁鉴别器。
{"title":"Cartoon Face to Human Face Translation using Contour Loss based CycleGAN","authors":"Mayank Singhal, R. Agarwal","doi":"10.1109/GCAT52182.2021.9587703","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587703","url":null,"abstract":"Cartoon to Human Translation transforms a 2D vector cartoon face to a Real Human Face. The mapping is based on semantic similarity of both the input domains. This is an image$rightarrow$mage translation problem that finds its applications in the entertainment and animation industry. Cartoon movies evolved from 2D animations in 1930 and became more lifelike with timeline. In image synthesis, audio, and other sorts of data, Generative Adversarial Networks have demonstrated promising outcomes. They also produce excellent results when translating images to images. In this research, a CycleGAN based methodology for generating target Human Faces from source Cartoon Faces is proposed, preserving the facial characteristics i.e. face shape, eyebrow alignment and hair style. In order to improve the mapping we have used contour loss along with cycle consistency loss in our model and patch discriminator is used with L2 norm.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network 移动自组网中黑洞攻击的检测与防范
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587471
Imran Ali Shah, Nitika Kapoor
Mobile Ad hoc Networks ‘MANETs’ are still defenseless against peripheral threats due to the fact that this network has vulnerable access and also the absence of significant fact of administration. The black hole attack is a kind of some routing attack, in this type of attack the attacker node answers to the Route Requests (RREQs) thru faking and playing itself as an adjacent node of the destination node in order to get through the data packets transported from the source node. To counter this situation, we propose to deploy some nodes (exhibiting some distinctive functionality) in the network called DPS (Detection and Prevention System) nodes that uninterruptedly monitor the RREQs advertised by all other nodes in the networks. DPS nodes target to satisfy the set objectives in which it has to sense the mischievous nodes by detecting the activities of their immediate neighbor. In the case, when a node demonstrates some peculiar manners, which estimates according to the experimental data, DPS node states that particular distrustful node as black hole node by propagation of a threat message to all the remaining nodes in the network. A protocol with a clustering approach in AODV routing protocol is used to sense and avert the black hole attack in the mentioned network. Consequently, empirical evaluation shows that the black hole node is secluded and prohibited from the whole system and is not allowed any data transfer from any node thereafter.
移动自组织网络“manet”仍然无法抵御外围威胁,因为该网络具有易受攻击的访问权限,并且缺乏重要的管理事实。黑洞攻击是一种路由攻击,在这种类型的攻击中,攻击者节点通过伪装成目标节点的相邻节点来应答路由请求(rreq),以通过源节点传输的数据包。为了应对这种情况,我们建议在网络中部署一些节点(表现出一些独特的功能),称为DPS(检测和预防系统)节点,这些节点不间断地监控网络中所有其他节点发布的rreq。DPS节点的目标是满足设定的目标,它必须通过检测其近邻的活动来感知有害节点。在这种情况下,当一个节点表现出一些特殊的行为时,根据实验数据进行估计,DPS节点通过向网络中所有剩余节点传播威胁信息,将该特定不信任节点声明为黑洞节点。利用AODV路由协议中的聚类方法来感知和避免网络中的黑洞攻击。因此,经验评估表明,黑洞节点与整个系统隔离和禁止,此后不允许从任何节点传输任何数据。
{"title":"To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network","authors":"Imran Ali Shah, Nitika Kapoor","doi":"10.1109/GCAT52182.2021.9587471","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587471","url":null,"abstract":"Mobile Ad hoc Networks ‘MANETs’ are still defenseless against peripheral threats due to the fact that this network has vulnerable access and also the absence of significant fact of administration. The black hole attack is a kind of some routing attack, in this type of attack the attacker node answers to the Route Requests (RREQs) thru faking and playing itself as an adjacent node of the destination node in order to get through the data packets transported from the source node. To counter this situation, we propose to deploy some nodes (exhibiting some distinctive functionality) in the network called DPS (Detection and Prevention System) nodes that uninterruptedly monitor the RREQs advertised by all other nodes in the networks. DPS nodes target to satisfy the set objectives in which it has to sense the mischievous nodes by detecting the activities of their immediate neighbor. In the case, when a node demonstrates some peculiar manners, which estimates according to the experimental data, DPS node states that particular distrustful node as black hole node by propagation of a threat message to all the remaining nodes in the network. A protocol with a clustering approach in AODV routing protocol is used to sense and avert the black hole attack in the mentioned network. Consequently, empirical evaluation shows that the black hole node is secluded and prohibited from the whole system and is not allowed any data transfer from any node thereafter.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116497864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DVAR: Data Visualization using Augmented Reality DVAR:使用增强现实的数据可视化
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587831
Pareena Padwal, Yashpreet Singh, Jeetesh Singh, Suvarna Pansambal
In this paper, we have discussed the use of augmented reality for data visualization. As we know that data is one of the most valued resources of today’s world, analysis of this data is a task of great importance. Multiple technologies have come up with data visualization for enabling accurate data analysis. Clearer the visualization the easier it is to perform accurate data analysis. Another technology that has grown vastly in various domains is Augmented Reality. It aims to bridge the gap between the physical and the digital world by introducing virtual elements into our environment. Our Implementation is a use case of AR technology in data visualization and analytics. Our proposed system uses mobile AR to perform data visualization giving more engagement and immersion to the users which can be used to gain more human insights over data such as trends and patterns that would otherwise get missed out in a depthless 2D visualization. We have developed an application as a prototype of our proposed system demonstrating different visualization techniques.
在本文中,我们讨论了增强现实在数据可视化中的应用。我们知道,数据是当今世界最宝贵的资源之一,对这些数据的分析是一项非常重要的任务。为了实现准确的数据分析,已经出现了多种数据可视化技术。可视化越清晰,就越容易执行准确的数据分析。另一项在各个领域发展迅速的技术是增强现实。它旨在通过将虚拟元素引入我们的环境,弥合物理世界和数字世界之间的差距。我们的实现是AR技术在数据可视化和分析中的一个用例。我们提出的系统使用移动增强现实来执行数据可视化,为用户提供更多的参与和沉浸感,这可以用来获得更多的人类洞察数据,如趋势和模式,否则会在深度2D可视化中被遗漏。我们已经开发了一个应用程序作为我们提出的系统的原型,演示了不同的可视化技术。
{"title":"DVAR: Data Visualization using Augmented Reality","authors":"Pareena Padwal, Yashpreet Singh, Jeetesh Singh, Suvarna Pansambal","doi":"10.1109/GCAT52182.2021.9587831","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587831","url":null,"abstract":"In this paper, we have discussed the use of augmented reality for data visualization. As we know that data is one of the most valued resources of today’s world, analysis of this data is a task of great importance. Multiple technologies have come up with data visualization for enabling accurate data analysis. Clearer the visualization the easier it is to perform accurate data analysis. Another technology that has grown vastly in various domains is Augmented Reality. It aims to bridge the gap between the physical and the digital world by introducing virtual elements into our environment. Our Implementation is a use case of AR technology in data visualization and analytics. Our proposed system uses mobile AR to perform data visualization giving more engagement and immersion to the users which can be used to gain more human insights over data such as trends and patterns that would otherwise get missed out in a depthless 2D visualization. We have developed an application as a prototype of our proposed system demonstrating different visualization techniques.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptosystem using Facial Landmark for Authentication Pairing and Key Generation in Bluetooth Security 基于人脸标记的蓝牙安全认证配对与密钥生成密码系统
Pub Date : 2021-10-01 DOI: 10.1109/GCAT52182.2021.9587742
Asif Ikbal Mondal, B. Mandal, Amitava Choudhury
In this paper, the whole system starts with a real time picture of the sender and the receiver. The pairing is done utilizing the image of the sender and the receiver at the place of the pin used for pairing. The key generation for the encryption also utilizes the facial characteristics of the parties involved. This method will always generate a key of variable length. As the same person taking the snap of his/her face will change the coordinates every time making it is hard to predict the exact key. The text converted into ciphertext is also padded from both sides with variable bits to make it hard to identify the starting point of the ciphertext to start the actual decryption. The overall aim of this research is to develop a cryptosystem that can be used for achieving good encryption even if the length of the plain text is very small(one or two words). It is an encryption system with associated authentication. An electronic device cannot distinguish between its real users and fake one just by looking at the number which is used for the authentication process but if trained to identify the picture of the used the device up to a certain point is secure. Next thing if someone has requested a pairing merely by looking at the numbers one cannot predict that a legal connection is made but by looking at the real-time image of the person the same can be done with satisfaction. Previously used encryption used key and ciphertext of fixed length but here, a variable ciphertext and key are created in every session of transmission as the image of every sender and the receiver is different.
在本文中,整个系统从发送方和接收方的实时图像开始。配对是利用发送方和接收方在用于配对的引脚位置的图像完成的。加密密钥的生成也利用了当事人的面部特征。此方法将始终生成可变长度的键。由于同一个人每次拍摄他/她的脸都会改变坐标,因此很难预测准确的键。转换成密文的文本还从两边填充了可变位,使得很难识别密文的起始点来开始实际的解密。本研究的总体目标是开发一种可以用于实现良好加密的密码系统,即使纯文本的长度非常小(一个或两个单词)。它是一个具有关联身份验证的加密系统。电子设备无法通过查看用于身份验证过程的号码来区分其真实用户和假用户,但如果经过培训以识别被使用者的照片,则在一定程度上是安全的。其次,如果有人要求配对,仅仅通过看数字,我们无法预测是否建立了合法的联系,但通过看这个人的实时图像,我们可以满意地完成同样的事情。以前使用的加密使用固定长度的密钥和密文,但在这里,由于每个发送方和接收方的图像不同,因此在每个传输会话中都会创建一个可变的密文和密钥。
{"title":"Cryptosystem using Facial Landmark for Authentication Pairing and Key Generation in Bluetooth Security","authors":"Asif Ikbal Mondal, B. Mandal, Amitava Choudhury","doi":"10.1109/GCAT52182.2021.9587742","DOIUrl":"https://doi.org/10.1109/GCAT52182.2021.9587742","url":null,"abstract":"In this paper, the whole system starts with a real time picture of the sender and the receiver. The pairing is done utilizing the image of the sender and the receiver at the place of the pin used for pairing. The key generation for the encryption also utilizes the facial characteristics of the parties involved. This method will always generate a key of variable length. As the same person taking the snap of his/her face will change the coordinates every time making it is hard to predict the exact key. The text converted into ciphertext is also padded from both sides with variable bits to make it hard to identify the starting point of the ciphertext to start the actual decryption. The overall aim of this research is to develop a cryptosystem that can be used for achieving good encryption even if the length of the plain text is very small(one or two words). It is an encryption system with associated authentication. An electronic device cannot distinguish between its real users and fake one just by looking at the number which is used for the authentication process but if trained to identify the picture of the used the device up to a certain point is secure. Next thing if someone has requested a pairing merely by looking at the numbers one cannot predict that a legal connection is made but by looking at the real-time image of the person the same can be done with satisfaction. Previously used encryption used key and ciphertext of fixed length but here, a variable ciphertext and key are created in every session of transmission as the image of every sender and the receiver is different.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128027600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 2nd Global Conference for Advancement in Technology (GCAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1