首页 > 最新文献

2018 International Conference on Advanced Computation and Telecommunication (ICACAT)最新文献

英文 中文
A Literature Survey of Optimization Techniques for Satellite Image Segmentation 卫星图像分割优化技术文献综述
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933689
B. N. Pandey, A. Shrivastava, A. Rana
The satellite image segmentation is a key area for current research and numerous work has been done for exploration of this area. The nature inspired optimization algorithms are very promising with image segmentation techniques to provide a platform for processing of satellite images. In this paper a literature review of different nature based optimization algorithms such as modified artificial bee colony (MABC) algorithm, ABC algorithm, particle swarm optimization (PSO), Darwinian PSO, genetic algorithm (GA), Wind driven optimization (WDO) and cuckoo search(CS) using different objective functions has been discussed to find the optimized multilevel thresholds. These nature influenced optimization methods and their performances are compared using different objective functions for optimal multilevel thresholding. The comparative study shows that the MABC algorithm and different variants of CS algorithm are very strong and accurate in results generating using image segmentation. Both methods search multilevel thresholds very efficiently and correctly, and in MABC an improved bee’s search solution are used and in CS the cuckoo search solution are used.
卫星图像分割是当前研究的一个重点领域,在这一领域进行了大量的探索工作。自然启发优化算法在图像分割技术中非常有前途,为卫星图像的处理提供了一个平台。本文综述了基于自然的优化算法,如改进人工蜂群算法(MABC)、ABC算法、粒子群算法(PSO)、达尔文优化算法(达尔文PSO)、遗传算法(GA)、风力优化(WDO)和布谷鸟搜索(CS)等,利用不同的目标函数来寻找优化的多级阈值。利用不同的目标函数对不同的优化方法进行了性能比较。对比研究表明,MABC算法和CS算法的不同变体在图像分割生成结果方面具有很强的准确性。这两种方法都能有效、准确地搜索多水平阈值,在MABC中使用改进的蜜蜂搜索方案,在CS中使用布谷鸟搜索方案。
{"title":"A Literature Survey of Optimization Techniques for Satellite Image Segmentation","authors":"B. N. Pandey, A. Shrivastava, A. Rana","doi":"10.1109/ICACAT.2018.8933689","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933689","url":null,"abstract":"The satellite image segmentation is a key area for current research and numerous work has been done for exploration of this area. The nature inspired optimization algorithms are very promising with image segmentation techniques to provide a platform for processing of satellite images. In this paper a literature review of different nature based optimization algorithms such as modified artificial bee colony (MABC) algorithm, ABC algorithm, particle swarm optimization (PSO), Darwinian PSO, genetic algorithm (GA), Wind driven optimization (WDO) and cuckoo search(CS) using different objective functions has been discussed to find the optimized multilevel thresholds. These nature influenced optimization methods and their performances are compared using different objective functions for optimal multilevel thresholding. The comparative study shows that the MABC algorithm and different variants of CS algorithm are very strong and accurate in results generating using image segmentation. Both methods search multilevel thresholds very efficiently and correctly, and in MABC an improved bee’s search solution are used and in CS the cuckoo search solution are used.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"33 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85486681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
GaN-Based Oscillators for Wireless Power Transfer Applications 无线电力传输应用中基于gan的振荡器
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933533
A. Jarndal, T. Petrovic
This paper reports linear- and switching-mode oscillators based on GaN power device that can be used efficiently for wireless power transfer (WPT) applications. The proposed oscillators are designed using a packaged GaN high electron mobility transistor (HEMT) from Transphorm Inc. In the first design a class-AB has been adopted and implemented to provide lower harmonics oscillator that can be used for electromagnetic interference (EMI) sensitive WPT applications. In the second part, higher efficiency class-E oscillator based on the same transistor has been designed and implemented to provide an optimal solution for higher power WPT applications. Both oscillators have been implemented and tested. The oscillators produce high output voltage up 40 V with lower total harmonic distortion of around 10% for class-AB and higher efficiency of around 90% for class-E oscillator.
本文报道了基于GaN功率器件的线性和开关模式振荡器,它们可以有效地用于无线电力传输(WPT)应用。所提出的振荡器是使用transhorm公司的封装GaN高电子迁移率晶体管(HEMT)设计的。在第一个设计中,采用并实现了ab类振荡器,以提供可用于电磁干扰(EMI)敏感WPT应用的低谐波振荡器。在第二部分中,设计并实现了基于相同晶体管的更高效率的e类振荡器,为更高功率的WPT应用提供了最佳解决方案。这两个振荡器已经实现和测试。振荡器产生高达40 V的高输出电压,ab类振荡器的总谐波失真约为10%,e类振荡器的效率约为90%。
{"title":"GaN-Based Oscillators for Wireless Power Transfer Applications","authors":"A. Jarndal, T. Petrovic","doi":"10.1109/ICACAT.2018.8933533","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933533","url":null,"abstract":"This paper reports linear- and switching-mode oscillators based on GaN power device that can be used efficiently for wireless power transfer (WPT) applications. The proposed oscillators are designed using a packaged GaN high electron mobility transistor (HEMT) from Transphorm Inc. In the first design a class-AB has been adopted and implemented to provide lower harmonics oscillator that can be used for electromagnetic interference (EMI) sensitive WPT applications. In the second part, higher efficiency class-E oscillator based on the same transistor has been designed and implemented to provide an optimal solution for higher power WPT applications. Both oscillators have been implemented and tested. The oscillators produce high output voltage up 40 V with lower total harmonic distortion of around 10% for class-AB and higher efficiency of around 90% for class-E oscillator.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"10 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81625014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Head Posture Analysis using sEMG Signal 基于表面肌电信号的头部姿势分析
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933731
Kavita Kushwah, R. Narvey, A. Singhal
The purpose of this study was to determine the muscle activity of upper trapezius muscle of different head posture at standing and sitting positions by using surface electromyography (sEMG) signals. This tool may be a non-invasive technique that enables the analysis of muscle activity. Human’s head posture is significant part of human body and have a big role to analyze posture of human body. During this approach surface electrodes are employed to record surface electromyography (sEMG) signals of head posture at different angles. It is discovered that the muscle action of upper trapezius at both standing and sitting position is higher at 60 degree of head pose, whereas it’s lower just in case of zero degree that may be a neutral posture of head. It was also found that the muscle activity at standing position is higher than that of sitting position and in the result right trapezius muscle is more activate in standing position than the sitting position. It was also investigated that the muscle activity in standing is higher than that of sitting position. It is suggested that the muscle activity of head posture is lower in neutral position of head.
本研究的目的是利用肌表电(sEMG)信号测定不同头部姿势站立和坐姿时斜方肌上肌的肌肉活动。该工具可能是一种非侵入性技术,可以分析肌肉活动。人的头部姿势是人体的重要组成部分,对人体姿势的分析有着重要的作用。在此过程中,使用表面电极记录不同角度头部姿势的表面肌电信号。我们发现,无论站姿还是坐姿,斜方肌上部的肌肉活动在头位60度时都较高,而在头位零度时则较低,这可能是头部的中性姿势。站立时的肌肉活跃性高于坐姿,结果表明站立时右斜方肌的活跃性高于坐姿。研究还发现,站立时的肌肉活动高于坐姿。提示头部中性位时,头部姿势的肌肉活动度较低。
{"title":"Head Posture Analysis using sEMG Signal","authors":"Kavita Kushwah, R. Narvey, A. Singhal","doi":"10.1109/ICACAT.2018.8933731","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933731","url":null,"abstract":"The purpose of this study was to determine the muscle activity of upper trapezius muscle of different head posture at standing and sitting positions by using surface electromyography (sEMG) signals. This tool may be a non-invasive technique that enables the analysis of muscle activity. Human’s head posture is significant part of human body and have a big role to analyze posture of human body. During this approach surface electrodes are employed to record surface electromyography (sEMG) signals of head posture at different angles. It is discovered that the muscle action of upper trapezius at both standing and sitting position is higher at 60 degree of head pose, whereas it’s lower just in case of zero degree that may be a neutral posture of head. It was also found that the muscle activity at standing position is higher than that of sitting position and in the result right trapezius muscle is more activate in standing position than the sitting position. It was also investigated that the muscle activity in standing is higher than that of sitting position. It is suggested that the muscle activity of head posture is lower in neutral position of head.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"299 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79655307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local and Global Feature Fusion Based Visual Concept Detection in Images 基于局部和全局特征融合的图像视觉概念检测
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933717
S. M. Patil, K. Bhoyar
With the advent of digital cameras and mobile phones, advances in telecommunication and internet, millions of images are uploaded on the internet without much information about the image. An efficient method is necessary for automatic image annotation and indexing for the vast collection of images. Concept detection is task of detecting concepts present in image. In this paper, concept detection is obtained by effectively fusing local feature descriptors and global features descriptors. First object extraction is carried out using edge and color, and the aspect ratio of each extracted object is calculated. The local features of all extracted objects and global features of the image are computed. The detected concept of the query image is displayed based on the local and global feature matching scores obtained using our algorithm. The proposed algorithm is evaluated on Wang’s Corel dataset consisting of 1000 images. Results demonstrate that the proposed approach outperforms the KNN and ANN methods with high accuracy.
随着数码相机和移动电话的出现,电信和互联网的进步,数以百万计的图像被上传到互联网上,而没有多少关于图像的信息。对海量图像进行自动标注和索引,需要一种有效的方法。概念检测是对图像中存在的概念进行检测的任务。本文通过有效融合局部特征描述子和全局特征描述子来实现概念检测。首先利用边缘和颜色进行目标提取,并计算每个提取目标的长宽比;计算所有提取对象的局部特征和图像的全局特征。根据算法得到的局部和全局特征匹配分数显示查询图像的检测概念。该算法在Wang的包含1000张图像的Corel数据集上进行了评估。结果表明,该方法优于KNN和ANN方法,具有较高的准确率。
{"title":"Local and Global Feature Fusion Based Visual Concept Detection in Images","authors":"S. M. Patil, K. Bhoyar","doi":"10.1109/ICACAT.2018.8933717","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933717","url":null,"abstract":"With the advent of digital cameras and mobile phones, advances in telecommunication and internet, millions of images are uploaded on the internet without much information about the image. An efficient method is necessary for automatic image annotation and indexing for the vast collection of images. Concept detection is task of detecting concepts present in image. In this paper, concept detection is obtained by effectively fusing local feature descriptors and global features descriptors. First object extraction is carried out using edge and color, and the aspect ratio of each extracted object is calculated. The local features of all extracted objects and global features of the image are computed. The detected concept of the query image is displayed based on the local and global feature matching scores obtained using our algorithm. The proposed algorithm is evaluated on Wang’s Corel dataset consisting of 1000 images. Results demonstrate that the proposed approach outperforms the KNN and ANN methods with high accuracy.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"32 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80782781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Advanced Graphical Authentication to Resist Shoulder Surfing Attack 抗肩冲浪攻击的高级图形认证技术综述
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933699
D. Thosar, Manmohan Singh
In today’s world of newly coming technologies, an authentication play’s an efficient role to provide authenticity to every user’s vital information from variety of system attacks. So we need to provide strong authenticity to avoid from such an unsecured problems. Up till now most of the users prefer text passwords to provide authenticity to their account. In many cases there will be a risk of textual password by selecting an irrelevant or easily remembered password or the way of putting it in the insecure way are said to be “the unsecured way” in the authentication chain. Except choosing a strong character set, the user will select the easier password which is less complicated or short or the text as a password which is easier to kept in mind. So with new & advanced, emerging technologies and a large set of mobile application to be developed on regular basis. Due to this user can access their account anytime, anywhere on mobiles, Laptops etc. It’s a better thing through which we decrease the time consumption but automatically increases the chance of exposing the credentials to the shoulder surfing attacker’s. It can be happened directly or indirectly with naked eyes or indirectly by using some hidden recording devices to detect user’sconfidential data.
在当今新技术层出不穷的世界中,身份验证在各种系统攻击中为每个用户的重要信息提供真实性方面发挥着有效的作用。所以我们需要提供强大的真实性来避免这样的不安全问题。到目前为止,大多数用户更喜欢使用文本密码来保证他们账户的真实性。在许多情况下,通过选择不相关或容易记住的密码或将其置于不安全方式的方式将存在文本密码的风险,这种方式在身份验证链中被称为“不安全方式”。除了选择强字符集外,用户还会选择不那么复杂或简短的简单密码,或者选择更容易记住的文本密码。因此,随着新的和先进的,新兴的技术和大量的移动应用程序被定期开发。由于这个用户可以访问他们的帐户,随时随地在手机,笔记本电脑等。这是一件更好的事情,通过它我们减少了时间消耗,但自动增加了将凭据暴露给肩部冲浪攻击者的机会。它可以直接发生,也可以通过肉眼间接发生,也可以通过使用一些隐藏的记录设备来间接检测用户的机密数据。
{"title":"A Review on Advanced Graphical Authentication to Resist Shoulder Surfing Attack","authors":"D. Thosar, Manmohan Singh","doi":"10.1109/ICACAT.2018.8933699","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933699","url":null,"abstract":"In today’s world of newly coming technologies, an authentication play’s an efficient role to provide authenticity to every user’s vital information from variety of system attacks. So we need to provide strong authenticity to avoid from such an unsecured problems. Up till now most of the users prefer text passwords to provide authenticity to their account. In many cases there will be a risk of textual password by selecting an irrelevant or easily remembered password or the way of putting it in the insecure way are said to be “the unsecured way” in the authentication chain. Except choosing a strong character set, the user will select the easier password which is less complicated or short or the text as a password which is easier to kept in mind. So with new & advanced, emerging technologies and a large set of mobile application to be developed on regular basis. Due to this user can access their account anytime, anywhere on mobiles, Laptops etc. It’s a better thing through which we decrease the time consumption but automatically increases the chance of exposing the credentials to the shoulder surfing attacker’s. It can be happened directly or indirectly with naked eyes or indirectly by using some hidden recording devices to detect user’sconfidential data.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"42 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77818389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Content Based Facial Emotion Recognition Model using Machine Learning Algorithm 基于内容的机器学习人脸情感识别模型
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933790
Ranjana S. Jadhav, P. Ghadekar
Emotion recognition or sentiment analysis is identified as an important research topic in computer vision community. The challenges include identification of face, recognition of accurate emotion, appropriate database and so on. We have proposed and implemented a general Convolutional Neural network (CNN) building framework for emotion recognition. The model is formalized by developing a coincident system which fulfills the tasks of face detection and emotion classification using our proposed CNN architecture. The model is validated using the FER-2013 dataset. In the proposed work, we discuss the applicability of the proposed CNN model. This model lays a valuable analysis of the effect of adjusting the network size, pooling, and dropout. For a given model, the final accuracy on the validation data is around 63%.
情感识别或情感分析是计算机视觉领域的一个重要研究课题。面临的挑战包括人脸识别、准确的情绪识别、合适的数据库等。我们提出并实现了一个通用的卷积神经网络(CNN)构建框架,用于情感识别。该模型通过开发一个符合系统来形式化,该系统使用我们提出的CNN架构来完成人脸检测和情感分类的任务。利用FER-2013数据集对模型进行了验证。在本文中,我们讨论了所提出的CNN模型的适用性。该模型对调整网络规模、池化和退出的效果进行了有价值的分析。对于给定的模型,验证数据的最终精度约为63%。
{"title":"Content Based Facial Emotion Recognition Model using Machine Learning Algorithm","authors":"Ranjana S. Jadhav, P. Ghadekar","doi":"10.1109/ICACAT.2018.8933790","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933790","url":null,"abstract":"Emotion recognition or sentiment analysis is identified as an important research topic in computer vision community. The challenges include identification of face, recognition of accurate emotion, appropriate database and so on. We have proposed and implemented a general Convolutional Neural network (CNN) building framework for emotion recognition. The model is formalized by developing a coincident system which fulfills the tasks of face detection and emotion classification using our proposed CNN architecture. The model is validated using the FER-2013 dataset. In the proposed work, we discuss the applicability of the proposed CNN model. This model lays a valuable analysis of the effect of adjusting the network size, pooling, and dropout. For a given model, the final accuracy on the validation data is around 63%.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82895058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Classification of Spam Mail using different machine learning algorithms 垃圾邮件分类使用不同的机器学习算法
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933787
A. Shrivastava, R. Dubey
Email is necessary and essential for communication in today's life. Today internet users are increases, and email is necessary for communication over the internet. Spam mail is a major and big problem of researchers to analyze and reduce it. Spam emails are received in bulk amount and it contains trojans, viruses, malware and causes phishing attacks. Problems are arise when number of unwanted mails are come from unknown sites and how to classify the user that email are received which is spam email or ham. This paper used to classify that incoming emails are spam mail or ham by the use of different classification techniques to identify spam mail and remove it. Naive bayes classifier are apply in the concept of posterior probability and decision tree algorithms are apply namely Random Tree, REPTree, Random Forest,and J48 decision tree classifier. For the identification of spam mail, UCI spambase dataset is used. It is a benchmark dataset which contains 58 attributes and 4601 instances. Weka software is used for the analysis and implementation of results. In Weka tool, classification algorithms are used to find spam mail in the classification phase of weka software.These papers play a very important role to remove viruses, trojans, malware and websites including phishing attacks and fraudulent attempts in emails. Feature selection is applied on dataset for training set and cross validation. Cfs Subset evaluation method is used for best first method in feature selection. For the classification of spam mail, we use two tests are cross validation and training set under classifier option in Weka Tool. For training set, same data will be used for training and testing. And for cross validation, training data is segmented in a number of folds. And finally using training set, Random Tree gives the best result for the classification of spam mail.
电子邮件是当今生活中必不可少的交流工具。今天,互联网用户在增加,电子邮件是在互联网上交流所必需的。垃圾邮件的分析和减少是研究人员面临的一个重大问题。垃圾邮件是大量收到的,它包含木马、病毒、恶意软件,并引起网络钓鱼攻击。当大量的垃圾邮件来自未知的网站时,以及如何将收到的电子邮件分类为垃圾邮件或火腿时,问题就出现了。本文通过使用不同的分类技术来识别和删除垃圾邮件,从而对收到的电子邮件进行垃圾邮件和非垃圾邮件的分类。朴素贝叶斯分类器应用于后验概率的概念,决策树算法应用于随机树、REPTree、随机森林和J48决策树分类器。对于垃圾邮件的识别,使用UCI spambase数据集。它是一个基准数据集,包含58个属性和4601个实例。使用Weka软件对结果进行分析和实现。在Weka工具中,在Weka软件的分类阶段,使用分类算法来发现垃圾邮件。这些文件在清除病毒、木马、恶意软件和网站(包括网络钓鱼攻击和电子邮件中的欺诈企图)方面发挥着非常重要的作用。对数据集进行特征选择,进行训练集和交叉验证。在特征选择中,采用Cfs子集评价方法作为最佳优先方法。对于垃圾邮件的分类,我们使用了Weka Tool中分类器选项下的交叉验证和训练集两个测试。对于训练集,将使用相同的数据进行训练和测试。对于交叉验证,训练数据被分割成许多折叠。最后利用训练集,随机树给出了垃圾邮件分类的最佳结果。
{"title":"Classification of Spam Mail using different machine learning algorithms","authors":"A. Shrivastava, R. Dubey","doi":"10.1109/ICACAT.2018.8933787","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933787","url":null,"abstract":"Email is necessary and essential for communication in today's life. Today internet users are increases, and email is necessary for communication over the internet. Spam mail is a major and big problem of researchers to analyze and reduce it. Spam emails are received in bulk amount and it contains trojans, viruses, malware and causes phishing attacks. Problems are arise when number of unwanted mails are come from unknown sites and how to classify the user that email are received which is spam email or ham. This paper used to classify that incoming emails are spam mail or ham by the use of different classification techniques to identify spam mail and remove it. Naive bayes classifier are apply in the concept of posterior probability and decision tree algorithms are apply namely Random Tree, REPTree, Random Forest,and J48 decision tree classifier. For the identification of spam mail, UCI spambase dataset is used. It is a benchmark dataset which contains 58 attributes and 4601 instances. Weka software is used for the analysis and implementation of results. In Weka tool, classification algorithms are used to find spam mail in the classification phase of weka software.These papers play a very important role to remove viruses, trojans, malware and websites including phishing attacks and fraudulent attempts in emails. Feature selection is applied on dataset for training set and cross validation. Cfs Subset evaluation method is used for best first method in feature selection. For the classification of spam mail, we use two tests are cross validation and training set under classifier option in Weka Tool. For training set, same data will be used for training and testing. And for cross validation, training data is segmented in a number of folds. And finally using training set, Random Tree gives the best result for the classification of spam mail.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"4 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87851345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combinational and sequential standard cell design using Radiation Hardened By Design (RHBD) Technique 采用设计强化辐射(RHBD)技术设计组合和顺序标准电池
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933597
H. K. Dwivedi, Shuvendu Nandi, Shweta Lahariya, Sangeeta Nakhate
The work in this paper centres around comparison amongst conventional and RHBD technique based combinational and sequential standard cells in 0.18μmCMOS technology using SCL PDK in Cadence Virtuoso. In space radioactive particles (proton, neutrons, $alpha$) and heavy ions makes the biggest threat to Integrated Circuits (IC). With continuously decreasing feature size and lowering of the supply voltage, causes Single Event Transients (SETs) which is becoming a major problem for both combinational and sequential digital circuits in the Deep Submicron technology (DSM). The proposed C- element based cells investigated are Inverter, NAND gate, Buffer and D-Flip Flop. Schematic and layout of these cells are developed using Cadence Virtuoso tool. Circuits which are designed with the RHBD approaches are more tolerant to Single Event Effects (SEE), have better noise immunity and less static power consumption. The reduction in the average power in proposed style is 94% and the delay reduction is 85% as compared to DCVSL methodology.
在Cadence Virtuoso中使用SCL PDK,对基于0.18μmCMOS技术的组合和顺序标准细胞的传统和RHBD技术进行了比较。在太空中,放射性粒子(质子、中子、α)和重离子对集成电路(IC)构成最大的威胁。随着特征尺寸的不断减小和电源电压的不断降低,引起的单事件瞬变(set)问题已成为深亚微米技术(DSM)中组合和顺序数字电路的主要问题。所研究的基于C元的单元有逆变器、非与门、缓冲器和d触发器。这些单元的示意图和布局是使用Cadence Virtuoso工具开发的。采用RHBD方法设计的电路对单事件效应(SEE)的容忍度更高,具有更好的抗噪性和更低的静态功耗。与DCVSL方法相比,该方法的平均功率降低了94%,延迟降低了85%。
{"title":"Combinational and sequential standard cell design using Radiation Hardened By Design (RHBD) Technique","authors":"H. K. Dwivedi, Shuvendu Nandi, Shweta Lahariya, Sangeeta Nakhate","doi":"10.1109/ICACAT.2018.8933597","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933597","url":null,"abstract":"The work in this paper centres around comparison amongst conventional and RHBD technique based combinational and sequential standard cells in 0.18μmCMOS technology using SCL PDK in Cadence Virtuoso. In space radioactive particles (proton, neutrons, $alpha$) and heavy ions makes the biggest threat to Integrated Circuits (IC). With continuously decreasing feature size and lowering of the supply voltage, causes Single Event Transients (SETs) which is becoming a major problem for both combinational and sequential digital circuits in the Deep Submicron technology (DSM). The proposed C- element based cells investigated are Inverter, NAND gate, Buffer and D-Flip Flop. Schematic and layout of these cells are developed using Cadence Virtuoso tool. Circuits which are designed with the RHBD approaches are more tolerant to Single Event Effects (SEE), have better noise immunity and less static power consumption. The reduction in the average power in proposed style is 94% and the delay reduction is 85% as compared to DCVSL methodology.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"25 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87402480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Median Filters and Fuzzy Rules for Filtering of Images Corrupted With Mixed Noise 混合噪声图像中值滤波及模糊规则的研究
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933809
Jagrati Gupta, S. Agrawal
Pixels of the digital images has been corrupted by noises came out of faulty communication channel or nonlinear sensors. Such noise models can be either Salt & pepper noise (impulse noise) or Gaussian noise. Sometimes both of the noises corrupt the same image; such combination of two noise model is called as mixed noise. These noises can be removed by using image filtering algorithms. The most popular image filtering algorithm is median filters. Two models of median filters, that are simple median filter and switching median filter has been discussed in this paper. Fuzzy logic controller has been discussed in details so that its combination with median filters can be discussed for future work. Terminologies like fuzzy logic operator, membership functions and fuzzy rules have been discussed. Quality parameter PSNR (Peak Signal to Noise Ratio) has been studied to find the quality of image numerically.
由于通信信道故障或非线性传感器产生的噪声会对数字图像的像素点造成破坏。这种噪声模型可以是盐和胡椒噪声(脉冲噪声)或高斯噪声。有时,两种噪声都会破坏同一图像;这种两种噪声模型的结合称为混合噪声。这些噪声可以通过图像滤波算法去除。最流行的图像滤波算法是中值滤波。本文讨论了两种中值滤波器模型,即简单中值滤波器和切换中值滤波器。本文对模糊逻辑控制器进行了详细的讨论,以便在今后的工作中对其与中值滤波器的结合进行讨论。讨论了模糊逻辑算子、隶属函数和模糊规则等术语。研究了图像质量参数PSNR(峰值信噪比)的数值计算方法。
{"title":"Study of Median Filters and Fuzzy Rules for Filtering of Images Corrupted With Mixed Noise","authors":"Jagrati Gupta, S. Agrawal","doi":"10.1109/ICACAT.2018.8933809","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933809","url":null,"abstract":"Pixels of the digital images has been corrupted by noises came out of faulty communication channel or nonlinear sensors. Such noise models can be either Salt & pepper noise (impulse noise) or Gaussian noise. Sometimes both of the noises corrupt the same image; such combination of two noise model is called as mixed noise. These noises can be removed by using image filtering algorithms. The most popular image filtering algorithm is median filters. Two models of median filters, that are simple median filter and switching median filter has been discussed in this paper. Fuzzy logic controller has been discussed in details so that its combination with median filters can be discussed for future work. Terminologies like fuzzy logic operator, membership functions and fuzzy rules have been discussed. Quality parameter PSNR (Peak Signal to Noise Ratio) has been studied to find the quality of image numerically.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77517470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of Thresholding Techniques on Modi Script 阈值技术在莫迪文字上的性能评价
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933594
B. Solanki, M. Ingle
Images are degraded during image procurement in terms of several disturbances. As a result, poor illumination, low contrast value, background blurring etc. occur in images that hampers its quality. Using thresholding process, we attempt to improve eminence of image, enhance contrast value as well as separates foreground and background information. There exist several prevailing thresholding techniques such as bernsen, wolf, sauvola, otsu, niblack and bradley for numerous scripts. A threshold model is proposed in this paper for binarizing Modi character images efficiently. It uses various global and local thresholding techniques in order to achieve high contrast value, better illumination etc. Two performance parameters such as mean square error and peak signal to noise ratio is used to measure the effects of varied thresholding techniques. As a result, Otsu thresholding technique shows effective outcome for binarizing Modi vowels in more appropriate form.
在图像采集过程中,由于多种干扰,图像会出现退化。因此,在图像中会出现光照差、对比度低、背景模糊等影响图像质量的问题。采用阈值处理,提高图像的突出性,增强对比度值,分离前景和背景信息。对于许多剧本,目前存在着几种流行的阈值分割技术,如bernsen、wolf、sauvola、otsu、niblack和bradley。本文提出了一种阈值模型,用于有效地对莫迪字符图像进行二值化。它使用各种全局和局部阈值技术来实现高对比度值,更好的照明等。使用均方误差和峰值信噪比这两个性能参数来衡量不同阈值技术的效果。结果表明,Otsu阈值技术可以有效地将Modi元音二值化成更合适的形式。
{"title":"Performance Evaluation of Thresholding Techniques on Modi Script","authors":"B. Solanki, M. Ingle","doi":"10.1109/ICACAT.2018.8933594","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933594","url":null,"abstract":"Images are degraded during image procurement in terms of several disturbances. As a result, poor illumination, low contrast value, background blurring etc. occur in images that hampers its quality. Using thresholding process, we attempt to improve eminence of image, enhance contrast value as well as separates foreground and background information. There exist several prevailing thresholding techniques such as bernsen, wolf, sauvola, otsu, niblack and bradley for numerous scripts. A threshold model is proposed in this paper for binarizing Modi character images efficiently. It uses various global and local thresholding techniques in order to achieve high contrast value, better illumination etc. Two performance parameters such as mean square error and peak signal to noise ratio is used to measure the effects of varied thresholding techniques. As a result, Otsu thresholding technique shows effective outcome for binarizing Modi vowels in more appropriate form.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"44 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90502589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2018 International Conference on Advanced Computation and Telecommunication (ICACAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1