首页 > 最新文献

2018 International Conference on Advanced Computation and Telecommunication (ICACAT)最新文献

英文 中文
Agent Based Black Hole Detection Technique in AODV Routing Protocol AODV路由协议中基于Agent的黑洞检测技术
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933634
Heerendra Mahore, Ratish Agrawal, Roopam K. Gupta
Wireless Ad-hoc network is a dynamic network without any physical architecture in which each and every node participating in the network and may exit at any moment. Because of the nature of its simplicity and adaptability, a wireless network is widely employed in military communications, emergency communications, academic goals and mobile conferences. Due to the dynamic nature of the Adhoc network, it is prone to attacks. So, there are always security issues related to the wireless network because any node may enter into the network anytime or may leave anytime with authentication. So, there is always a chance that malicious node may enter into the network and hampers the communication system of the entire network. One among them is the black hole attack. The black hole affects the entire network with its malicious behaviour while checking out the communication path between source and destination. For connection, establishment RREQ message is transmitted from the source node and they will wait for RRRP. For each RREQ received, the black hole nodes send the source node fake RREP. The origin node responds to fake RREPs and sends their data by the path described in the fake RREP which ultimately may result in packet drop or alteration of the packets by black hole nodes. This research work designed a detection technique to avoid black hole attacks and improve network performance. In this work, an adaptive technique based on the AODV routing protocol is presented upon request. In this analysis, Some of the sender nodes are assigned a task of the agent that checks the incoming route reply message for the destination nodes and avoid malicious node in the network. The resulting analysis shows that packet delivery ratio had increased with detection technique as compared to without detection technique i.e. blackhole condition.
无线自组织网络是一种没有任何物理架构的动态网络,其中的每个节点都参与网络,并且可以随时退出。无线网络由于其简单、适应性强的特点,被广泛应用于军事通信、应急通信、学术目标和移动会议等领域。由于Adhoc网络的动态性,它很容易受到攻击。因此,无线网络始终存在着安全问题,因为任何节点都可以随时进入网络,也可以通过身份验证随时离开网络。因此,恶意节点总是有机会进入网络,阻碍整个网络的通信系统。其中之一就是黑洞攻击。黑洞在检测源和目标之间的通信路径时,以其恶意行为影响整个网络。对于连接,从源节点发送建立RREQ消息,等待RRRP。对于接收到的每个RREQ,黑洞节点向源节点发送假RREP。源节点响应假RREP,并根据假RREP中描述的路径发送数据,最终可能导致数据包丢失或黑洞节点更改数据包。本研究设计了一种避免黑洞攻击和提高网络性能的检测技术。本文提出了一种基于AODV路由协议的自适应技术。在此分析中,为一些发送节点分配了代理的任务,该任务为目的节点检查传入的路由回复消息,并避免网络中的恶意节点。分析结果表明,与没有检测技术(即黑洞条件)相比,有检测技术的数据包传送率有所增加。
{"title":"Agent Based Black Hole Detection Technique in AODV Routing Protocol","authors":"Heerendra Mahore, Ratish Agrawal, Roopam K. Gupta","doi":"10.1109/ICACAT.2018.8933634","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933634","url":null,"abstract":"Wireless Ad-hoc network is a dynamic network without any physical architecture in which each and every node participating in the network and may exit at any moment. Because of the nature of its simplicity and adaptability, a wireless network is widely employed in military communications, emergency communications, academic goals and mobile conferences. Due to the dynamic nature of the Adhoc network, it is prone to attacks. So, there are always security issues related to the wireless network because any node may enter into the network anytime or may leave anytime with authentication. So, there is always a chance that malicious node may enter into the network and hampers the communication system of the entire network. One among them is the black hole attack. The black hole affects the entire network with its malicious behaviour while checking out the communication path between source and destination. For connection, establishment RREQ message is transmitted from the source node and they will wait for RRRP. For each RREQ received, the black hole nodes send the source node fake RREP. The origin node responds to fake RREPs and sends their data by the path described in the fake RREP which ultimately may result in packet drop or alteration of the packets by black hole nodes. This research work designed a detection technique to avoid black hole attacks and improve network performance. In this work, an adaptive technique based on the AODV routing protocol is presented upon request. In this analysis, Some of the sender nodes are assigned a task of the agent that checks the incoming route reply message for the destination nodes and avoid malicious node in the network. The resulting analysis shows that packet delivery ratio had increased with detection technique as compared to without detection technique i.e. blackhole condition.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"37 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77109895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Weight Ranking algorithm using R-F score for Efficient Caching 使用R-F分数的动态权重排序算法用于高效缓存
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933642
Debabrata Swain, Shreerag Marar, Nikhil Motwani, Vivek Hiwarkar, Puran Singh
There is a huge gap in the performance of the processor and the main memory. The speed of processor is much greater as compared to that of the main memory. The concept of paging has significantly increased the number of main memory accesses. In order to reduce the main memory access, a special hardware called the cache memory had been introduced. The cache memory bridges the performance gap between the main memory and the processor. This paper proposes a more efficient way to evaluate the weight factor thereby improving the results evaluated using CWRP [1]. The proposed work is easy to implement and provides better results compared to Least-Recently-Used (LRU), Clock with Adaptive Replacement (CAR) and First-In-First-Out (FIFO).
在处理器和主存储器的性能上有很大的差距。处理器的速度比主存储器快得多。分页的概念大大增加了主内存访问的数量。为了减少对主存储器的访问,一种叫做高速缓存的特殊硬件被引入。高速缓存存储器弥补了主存储器和处理器之间的性能差距。本文提出了一种更有效的权重因子评估方法,从而改善了CWRP[1]的评估结果。与最近最少使用(LRU)、自适应替换时钟(CAR)和先进先出(FIFO)相比,所提出的工作易于实现,并且提供了更好的结果。
{"title":"Dynamic Weight Ranking algorithm using R-F score for Efficient Caching","authors":"Debabrata Swain, Shreerag Marar, Nikhil Motwani, Vivek Hiwarkar, Puran Singh","doi":"10.1109/ICACAT.2018.8933642","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933642","url":null,"abstract":"There is a huge gap in the performance of the processor and the main memory. The speed of processor is much greater as compared to that of the main memory. The concept of paging has significantly increased the number of main memory accesses. In order to reduce the main memory access, a special hardware called the cache memory had been introduced. The cache memory bridges the performance gap between the main memory and the processor. This paper proposes a more efficient way to evaluate the weight factor thereby improving the results evaluated using CWRP [1]. The proposed work is easy to implement and provides better results compared to Least-Recently-Used (LRU), Clock with Adaptive Replacement (CAR) and First-In-First-Out (FIFO).","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"113 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73643980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction and Analysis of Student Performance using Hybrid Model of Multilayer Perceptron and Random Forest 基于多层感知机与随机森林混合模型的学生学习成绩预测与分析
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933580
Akagra Jain, Kushagra Shah, P. Chaturvedi, Anuj Tambe
Educational Data Research lays emphasis on analysis, prediction and generating accurate result. Every educational institute around the globe maintains the denouement repository. These repositories can be lay bared through data mining. In this paper multilayer perceptron and decision tree are set by side to predict the student grades from the repositories in which MLP (Multilayer Perceptron) gave finer and meticulous results compared to decision tree and there after the grades are processed using Random forest to predict the topic of their weak portion and help them to improve their future grades. This model will be helpful for teacher, student and their parents to know in advance about student predicted grade and will enable them to take preventive measure.
教育数据研究注重分析、预测和生成准确的结果。全球的每一个教育机构都维护着结局库。这些存储库可以通过数据挖掘暴露出来。本文将多层感知器和决策树放在一起,从知识库中预测学生的成绩,其中MLP(多层感知器)给出了比决策树更精细的结果,然后使用随机森林对成绩进行处理,预测其薄弱部分的主题,并帮助他们提高未来的成绩。该模型有助于教师、学生和家长提前了解学生的预测成绩,并使他们能够采取预防措施。
{"title":"Prediction and Analysis of Student Performance using Hybrid Model of Multilayer Perceptron and Random Forest","authors":"Akagra Jain, Kushagra Shah, P. Chaturvedi, Anuj Tambe","doi":"10.1109/ICACAT.2018.8933580","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933580","url":null,"abstract":"Educational Data Research lays emphasis on analysis, prediction and generating accurate result. Every educational institute around the globe maintains the denouement repository. These repositories can be lay bared through data mining. In this paper multilayer perceptron and decision tree are set by side to predict the student grades from the repositories in which MLP (Multilayer Perceptron) gave finer and meticulous results compared to decision tree and there after the grades are processed using Random forest to predict the topic of their weak portion and help them to improve their future grades. This model will be helpful for teacher, student and their parents to know in advance about student predicted grade and will enable them to take preventive measure.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"94 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77617831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VLSI Architecture for Low Cost and Power Reversible Arithmetic Logic Unit based on Reversible Gate 基于可逆门的低成本低功耗可逆算术逻辑单元的VLSI结构
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933737
Shaili Jain, Shashilata Rawat, P. Chaturvedi, Monika Kapoor
Reversible computing spans computational models that are both forward and backward deterministic. These models have applications in program inversion and bidirectional computing, and are also interesting as a study of theoretical properties. A reversible computation does, thus, not have to use energy, though this is impossible to avoid in practice, due to the way computers are build. It is, however, not always obvious how to implement reversible computing systems. The restriction to avoid information loss imposes new design criteria that need to be incorporated into the design; criteria that do not follow directly from conventional models.In this paper, research junk free reversible focal handling unit registering frameworks to physical door level usage. Math tasks are a reason for some registering frameworks, so a proposed the outline of snake, sub tractor, multiplexer, encoder and work towards a reversible circuit for general circuit are essential new circuits. In all plan actualized Xilinx programming and mimicked VHDL content sea.
可逆计算涵盖了前向和后向确定性的计算模型。这些模型在程序反演和双向计算中有应用,并且作为理论性质的研究也很有趣。因此,可逆计算不需要使用能量,尽管由于计算机的构造方式,这在实践中是不可能避免的。然而,如何实现可逆计算系统并不总是显而易见的。避免信息丢失的限制提出了需要纳入设计的新设计标准;不直接遵循传统模型的标准。本文研究了无垃圾可逆聚焦处理单元注册框架在物理门级的应用。数学任务是一些注册框架的原因,因此提出了蛇形轮廓,子拖拉机,多路复用器,编码器和工作朝着可逆电路的通用电路是必不可少的新电路。在整个方案中实现了Xilinx编程,并模拟了VHDL内容库。
{"title":"VLSI Architecture for Low Cost and Power Reversible Arithmetic Logic Unit based on Reversible Gate","authors":"Shaili Jain, Shashilata Rawat, P. Chaturvedi, Monika Kapoor","doi":"10.1109/ICACAT.2018.8933737","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933737","url":null,"abstract":"Reversible computing spans computational models that are both forward and backward deterministic. These models have applications in program inversion and bidirectional computing, and are also interesting as a study of theoretical properties. A reversible computation does, thus, not have to use energy, though this is impossible to avoid in practice, due to the way computers are build. It is, however, not always obvious how to implement reversible computing systems. The restriction to avoid information loss imposes new design criteria that need to be incorporated into the design; criteria that do not follow directly from conventional models.In this paper, research junk free reversible focal handling unit registering frameworks to physical door level usage. Math tasks are a reason for some registering frameworks, so a proposed the outline of snake, sub tractor, multiplexer, encoder and work towards a reversible circuit for general circuit are essential new circuits. In all plan actualized Xilinx programming and mimicked VHDL content sea.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"158 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73777426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Energy Efficient Coverage and Prolonging Lifetime by Comparing Homogenous and Heterogeneous Wireless Sensor Networks 同质和异质无线传感器网络的节能覆盖和寿命延长分析
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933686
Dr. Akhilesh A. Waoo, S. Sharma
Wireless sensor networks are one of the attractive and emerging research domains, with tremendous applications in various aspects like health care monitoring, area monitoring, environmental/ earth real time sensing and monitoring of industries, etc. A WSN are capable of sensing and detecting different minute changes in events by means miniature sensor nodes dispersed over that network area. Each sensor node has the sensor for detection, controller, storage memory, A/D converter, battery and transceiver. Sensing, processing and communication are three main operation of a sensor node. Here, it is an important to collect data periodically from an area of interest, in case of time-sensitive applications. Then this sensed data must be collected and transmitted to a base station and the base station further process the data to meet the end-user queries. As the sensors of sensor nodes are operated on battery which is having a limited power, it is a huge challenge to design an energy efficient routing protocol for minimization of energy consumption and offering a long network lifetime with high-energy efficiency. Present work concerned with comparing the homogenous and heterogeneous systems for energy efficiency and long span of network lifetime.
无线传感器网络是一个极具吸引力的新兴研究领域,在医疗监测、区域监测、环境/地球实时传感和工业监测等各个方面有着巨大的应用。无线传感器网络能够通过分散在网络区域上的微型传感器节点来感知和检测事件中的不同微小变化。每个传感器节点都有检测传感器、控制器、存储存储器、A/D转换器、电池和收发器。传感、处理和通信是传感器节点的三大主要工作。在这里,对于时间敏感的应用程序,定期从感兴趣的领域收集数据非常重要。然后,这些被感知的数据必须被收集并传输到基站,基站进一步处理这些数据以满足最终用户的查询。由于传感器节点的传感器都是依靠电池供电,而电池的电量是有限的,因此如何设计一种高效节能的路由协议,既能最大限度地降低能耗,又能提供高能效的长网络寿命,是一个巨大的挑战。目前的工作是比较同质和异质系统的能源效率和网络寿命的长跨度。
{"title":"Analysis of Energy Efficient Coverage and Prolonging Lifetime by Comparing Homogenous and Heterogeneous Wireless Sensor Networks","authors":"Dr. Akhilesh A. Waoo, S. Sharma","doi":"10.1109/ICACAT.2018.8933686","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933686","url":null,"abstract":"Wireless sensor networks are one of the attractive and emerging research domains, with tremendous applications in various aspects like health care monitoring, area monitoring, environmental/ earth real time sensing and monitoring of industries, etc. A WSN are capable of sensing and detecting different minute changes in events by means miniature sensor nodes dispersed over that network area. Each sensor node has the sensor for detection, controller, storage memory, A/D converter, battery and transceiver. Sensing, processing and communication are three main operation of a sensor node. Here, it is an important to collect data periodically from an area of interest, in case of time-sensitive applications. Then this sensed data must be collected and transmitted to a base station and the base station further process the data to meet the end-user queries. As the sensors of sensor nodes are operated on battery which is having a limited power, it is a huge challenge to design an energy efficient routing protocol for minimization of energy consumption and offering a long network lifetime with high-energy efficiency. Present work concerned with comparing the homogenous and heterogeneous systems for energy efficiency and long span of network lifetime.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"24 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86833075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Classification of Sentiments Using Predictive Analysis Over Social Network: A Review 基于社会网络预测分析的情感分类研究综述
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933586
Ankit Shukla, Dhanpratap Singh
Sentiment is the way of representing our self in front of other so that other can respond accordingly or oppose it. The process of defining the emotion or opinion of a part of data is called sentiment analysis. The main reason for sentiment analysis is to categorize an author’s attitude toward numerous subjects into positive, terrible or impartial classes. However not limited to, commercial enterprise intelligence, politics, sociology, etc..Predictive analysis is required to predict the future for the validity of content on social network. The sentiments of the people can be collected from social networking websites, micro blogs, wikis and web packages etc.. In the proposed work predictive analysis techniques are investigated and compared on the ground of performance. It is observed that most of the high performing techniques are based on neural network machine learning algorithm.
情感是我们在别人面前表现自我的一种方式,这样别人就可以做出相应的反应或反对。定义一部分数据的情感或观点的过程称为情感分析。情感分析的主要目的是将作者对众多主题的态度分为积极的、可怕的和公正的三类。但不局限于商业、企业情报、政治、社会学等领域,对于社交网络上内容的有效性,需要进行预测分析来预测未来。人们的情绪可以从社交网站,微博,维基和网络包等收集。在提出的工作中,对预测分析技术进行了研究,并在性能的基础上进行了比较。观察到,大多数高性能技术都是基于神经网络的机器学习算法。
{"title":"Classification of Sentiments Using Predictive Analysis Over Social Network: A Review","authors":"Ankit Shukla, Dhanpratap Singh","doi":"10.1109/ICACAT.2018.8933586","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933586","url":null,"abstract":"Sentiment is the way of representing our self in front of other so that other can respond accordingly or oppose it. The process of defining the emotion or opinion of a part of data is called sentiment analysis. The main reason for sentiment analysis is to categorize an author’s attitude toward numerous subjects into positive, terrible or impartial classes. However not limited to, commercial enterprise intelligence, politics, sociology, etc..Predictive analysis is required to predict the future for the validity of content on social network. The sentiments of the people can be collected from social networking websites, micro blogs, wikis and web packages etc.. In the proposed work predictive analysis techniques are investigated and compared on the ground of performance. It is observed that most of the high performing techniques are based on neural network machine learning algorithm.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"47 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75883960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unique Identification In Elections through Internet Of Things 通过物联网实现选举的唯一身份识别
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933615
P. Shrivastava, S. Agrawal
The IoT is a wide network of devices, both domestic and industrial, connected via the web and connected to one another. This paper proposed an idea of unique identification through UID sensor. Communication in IoT can perform various tasks such as identification, controlling, verification and computation etc. communication is usually performed by using WIFI or Bluetooth. UID sensor deals with collecting the information from server and then sent this information to the datacenter. This scheme protects the welfare system from the fake voting. UID will reduce the duplication and provide authenticated scheme during election. People can poll using the AADHAR card. AADHAR card is a digital identity having 12 -16 digit. Unique ID number is given to the every citizen of INDIA which would help in fair polling system. Aadhaar Authentication is the authentication of demographic or biometric information of any person. In this authentication process of welfare system the Central Identities Data Repository (CIDR) receives the demographic or biometric information along with their Aadhaar number.
物联网是一个广泛的设备网络,包括家用和工业设备,通过网络连接并相互连接。本文提出了一种通过UID传感器进行唯一识别的思想。物联网中的通信可以完成识别、控制、验证和计算等各种任务,通信通常通过WIFI或蓝牙来完成。UID传感器负责从服务器收集信息,然后将这些信息发送到数据中心。这个计划保护了福利制度不受假投票的影响。UID将减少重复,并在选举期间提供经过身份验证的方案。人们可以使用AADHAR卡进行投票。AADHAR卡是12 -16位数字的数字身份。每个印度公民都有唯一的身份证号码,这将有助于公平的投票制度。Aadhaar身份验证是对任何人的人口统计或生物特征信息进行身份验证。在这个福利系统的认证过程中,中央身份数据存储库(CIDR)接收人口统计或生物特征信息以及他们的身份证号码。
{"title":"Unique Identification In Elections through Internet Of Things","authors":"P. Shrivastava, S. Agrawal","doi":"10.1109/ICACAT.2018.8933615","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933615","url":null,"abstract":"The IoT is a wide network of devices, both domestic and industrial, connected via the web and connected to one another. This paper proposed an idea of unique identification through UID sensor. Communication in IoT can perform various tasks such as identification, controlling, verification and computation etc. communication is usually performed by using WIFI or Bluetooth. UID sensor deals with collecting the information from server and then sent this information to the datacenter. This scheme protects the welfare system from the fake voting. UID will reduce the duplication and provide authenticated scheme during election. People can poll using the AADHAR card. AADHAR card is a digital identity having 12 -16 digit. Unique ID number is given to the every citizen of INDIA which would help in fair polling system. Aadhaar Authentication is the authentication of demographic or biometric information of any person. In this authentication process of welfare system the Central Identities Data Repository (CIDR) receives the demographic or biometric information along with their Aadhaar number.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83083886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Development of Reconfigurable Antenna Using MEMSM 基于MEMSM的可重构天线设计与开发
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933633
M. Shrivastava, R. Agrawal, Pratibhadevi Tapashetti
In the proposed research work, frequency reconfigurable microstrip patch antenna concept (also called tunable antennas) has been presented. Microstrip patch antennas have been used as these are proved to be suitable structures for various types of reconfigurable antennas. These can be equipped with switches. Upon toggling the switch between on and off states, the antenna can be reconfigured. A square shaped reconfigurable microstrip slot antenna operating in the frequency range of 2.5 to 7 GHz is proposed. It is having one port, excited with microstrip line feed mechanism. A single layer patch antenna with substrate dielectric constant 4.4 (Epoxi glass) and height 1.7 mm is designed with two parallel slots controlled via mems. By making the two switches ON or OFF simultaneously, the resonant frequency is shown altering. The performance parameters of antenna i.e. reflection coefficient, gain etc. are determined. Reconfigurable antennas have been simulated through CST software and fabricated in the microwave laboratory. Developed prototype is measured experimentally in order to validate the reconfigurability basis.
在本研究中,提出了频率可重构微带贴片天线的概念(也称为可调谐天线)。微带贴片天线已被证明是适合各种类型的可重构天线的结构。这些可以配备开关。在打开和关闭状态之间切换开关后,天线可以重新配置。提出了一种工作在2.5 ~ 7 GHz频率范围内的方形可重构微带槽天线。它有一个端口,用微带线馈电机构激励。设计了一种衬底介电常数为4.4(环氧玻璃)、高度为1.7 mm的单层贴片天线,并通过mems控制其两个平行槽。通过同时使两个开关开或关,显示谐振频率的变化。确定了天线的反射系数、增益等性能参数。利用CST软件对可重构天线进行了仿真,并在微波实验室进行了制作。为验证所研制的样机的可重构性,对其进行了实验测量。
{"title":"Design and Development of Reconfigurable Antenna Using MEMSM","authors":"M. Shrivastava, R. Agrawal, Pratibhadevi Tapashetti","doi":"10.1109/ICACAT.2018.8933633","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933633","url":null,"abstract":"In the proposed research work, frequency reconfigurable microstrip patch antenna concept (also called tunable antennas) has been presented. Microstrip patch antennas have been used as these are proved to be suitable structures for various types of reconfigurable antennas. These can be equipped with switches. Upon toggling the switch between on and off states, the antenna can be reconfigured. A square shaped reconfigurable microstrip slot antenna operating in the frequency range of 2.5 to 7 GHz is proposed. It is having one port, excited with microstrip line feed mechanism. A single layer patch antenna with substrate dielectric constant 4.4 (Epoxi glass) and height 1.7 mm is designed with two parallel slots controlled via mems. By making the two switches ON or OFF simultaneously, the resonant frequency is shown altering. The performance parameters of antenna i.e. reflection coefficient, gain etc. are determined. Reconfigurable antennas have been simulated through CST software and fabricated in the microwave laboratory. Developed prototype is measured experimentally in order to validate the reconfigurability basis.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"40 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78527509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
White Light Emission from Dy (III) activated Sr2 SiO4 phosphor Dy (III)活化sr2sio4荧光粉的白光发射
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933577
Vikram Awate, A. K. Shrivastava, R. Tiwari, V. Dubey, A. K. Beliya, V. Singh, Neha Dubey
In this manuscript we report synthesis of phosphor which is activated by Dysprosium ion and its luminescence properties are studied. Herein synthesized phosphor are characterized by photoluminescence studies and its CCT and CRI values are calculated and it is found near to white light so the synthesized phosphor will be useful for white light emission in several display device.
本文报道了镝离子活化荧光粉的合成及其发光性能的研究。本文对合成的荧光粉进行了光致发光特性研究,计算了其CCT和CRI值,发现其接近白光,因此合成的荧光粉可用于多种显示器件的白光发射。
{"title":"White Light Emission from Dy (III) activated Sr2 SiO4 phosphor","authors":"Vikram Awate, A. K. Shrivastava, R. Tiwari, V. Dubey, A. K. Beliya, V. Singh, Neha Dubey","doi":"10.1109/ICACAT.2018.8933577","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933577","url":null,"abstract":"In this manuscript we report synthesis of phosphor which is activated by Dysprosium ion and its luminescence properties are studied. Herein synthesized phosphor are characterized by photoluminescence studies and its CCT and CRI values are calculated and it is found near to white light so the synthesized phosphor will be useful for white light emission in several display device.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"74 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75916219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Credit Risk Assessment in Banking Sector using Data Mining Techniques 基于数据挖掘技术的银行业信用风险评估研究
Pub Date : 2018-12-01 DOI: 10.1109/ICACAT.2018.8933604
Ankita Mittal, A. Shrivastava, A. Saxena, M. Manoria
The emerging complexity of banking and its dynamic environment, risk assessment has become very important, particularly in the financial sector. As a result, there is a high level of competition between financial institutions, resulting in the loss of most loans. In order to improve credit quality and reduce credit risk, banks and researchers have developed credit scoring models to improve the credit assessment process during the credit assessment process. It is quite difficult for anyone for assess credibility of customer due to the complexity of the database. In order to tackle such issues, there is need for a framework which can decides the risk assessment by combining some characteristics. In this paper a brief study of risk assessment models using machine learning approach is discussed as well as proposed architecture is designed with an aim to significantly reduce the dimensionality of the data as well as to increase the accuracy of the classifications compared to other existing methods.
银行业及其动态环境的日益复杂,使得风险评估变得非常重要,尤其是在金融领域。因此,金融机构之间存在着高度的竞争,导致了大部分贷款的损失。为了提高信用质量,降低信用风险,银行和研究人员开发了信用评分模型,以改进信用评估过程中的信用评估过程。由于数据库的复杂性,对客户的信誉度进行评估是相当困难的。为了解决这些问题,需要一个框架,该框架可以结合一些特征来决定风险评估。本文讨论了使用机器学习方法的风险评估模型的简要研究,并设计了拟议的体系结构,目的是与其他现有方法相比,显著降低数据的维数并提高分类的准确性。
{"title":"A Study on Credit Risk Assessment in Banking Sector using Data Mining Techniques","authors":"Ankita Mittal, A. Shrivastava, A. Saxena, M. Manoria","doi":"10.1109/ICACAT.2018.8933604","DOIUrl":"https://doi.org/10.1109/ICACAT.2018.8933604","url":null,"abstract":"The emerging complexity of banking and its dynamic environment, risk assessment has become very important, particularly in the financial sector. As a result, there is a high level of competition between financial institutions, resulting in the loss of most loans. In order to improve credit quality and reduce credit risk, banks and researchers have developed credit scoring models to improve the credit assessment process during the credit assessment process. It is quite difficult for anyone for assess credibility of customer due to the complexity of the database. In order to tackle such issues, there is need for a framework which can decides the risk assessment by combining some characteristics. In this paper a brief study of risk assessment models using machine learning approach is discussed as well as proposed architecture is designed with an aim to significantly reduce the dimensionality of the data as well as to increase the accuracy of the classifications compared to other existing methods.","PeriodicalId":6575,"journal":{"name":"2018 International Conference on Advanced Computation and Telecommunication (ICACAT)","volume":"75 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84006120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 International Conference on Advanced Computation and Telecommunication (ICACAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1