首页 > 最新文献

2018 Second International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
Differential Analysis of Microbial Community grown with different DO levels Using R Package 利用R Package分析不同DO水平下生长的微生物群落差异
Snehal V. Bhange, S. S. Dongre, H. Tikariha, H. Purohit
The microbial communities play a salient role in natural ecosystems and have a greater impact on animal and human health. To understand this entangled system and unlock its potential benefit there is need to study these community structures and function both analytically and statistically. This article briefs about the microbial community analysis R packages which are developed in R programming language, to assist researchers for creating abundance and functional profile from raw data and performs analyses specific to their needs. The analysis of biological data and information related to microbial community are known together to be the central issues within the space. Therefore several R packages are planned to perform a collective and complete interpretation of data using R modules in this area. In this paper we tend to present a bio-informative R package which can analyze the abundance of the species and determine the one way variance which is used as fdANOVA R package. The idea provides the straightforward categorical grouping, is custom-made to check the status of evolving microbes in a community and is appropriate and reliable as well.
微生物群落在自然生态系统中发挥着重要的作用,对动物和人类的健康都有较大的影响。为了理解这种纠缠系统并释放其潜在的好处,需要从分析和统计两方面研究这些群落的结构和功能。本文简要介绍了用R编程语言开发的微生物群落分析R包,以帮助研究人员从原始数据中创建丰度和功能概况,并根据他们的需求进行分析。与微生物群落有关的生物数据和信息的分析被认为是该领域的核心问题。因此,计划使用几个R包来执行这个领域中使用R模块的数据的集合和完整的解释。在本文中,我们倾向于提出一种生物信息性R包,它可以分析物种的丰度并确定单向方差,并用作danova R包。这个想法提供了直接的分类分组,是为检查群落中进化微生物的状态而定制的,也是适当和可靠的。
{"title":"Differential Analysis of Microbial Community grown with different DO levels Using R Package","authors":"Snehal V. Bhange, S. S. Dongre, H. Tikariha, H. Purohit","doi":"10.1109/ICCMC.2018.8488014","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488014","url":null,"abstract":"The microbial communities play a salient role in natural ecosystems and have a greater impact on animal and human health. To understand this entangled system and unlock its potential benefit there is need to study these community structures and function both analytically and statistically. This article briefs about the microbial community analysis R packages which are developed in R programming language, to assist researchers for creating abundance and functional profile from raw data and performs analyses specific to their needs. The analysis of biological data and information related to microbial community are known together to be the central issues within the space. Therefore several R packages are planned to perform a collective and complete interpretation of data using R modules in this area. In this paper we tend to present a bio-informative R package which can analyze the abundance of the species and determine the one way variance which is used as fdANOVA R package. The idea provides the straightforward categorical grouping, is custom-made to check the status of evolving microbes in a community and is appropriate and reliable as well.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"52 1","pages":"1078-1080"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86686697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DETECTION OF COMPROMISED ACCOUNTS IN ONLINE SOCIAL NETWORK 在线社交网络中受损账户的检测
S. Rane, Megha Ainapurkar, Amey Wadekar
Compromised accounts are of a severe risk to the social network users. People now a days are mostly dependent on Online Social Networks. While some persistent spams feat the relationship between the users by spreading spams. Therefore time to time detection of the compromised accounts is a necessity. In this paper, we will study different social user behaviour and detect the compromised accounts and spam users. Spam behaviour in social networks has a wide range of illegal activities. Such activities need to be evaluated and effect of spam users needs to be reduced. To reduce such effects, we require proper detection strategy. We validate the effectiveness of these behaviour by collecting the clickstream data on a social network website. Social behaviour reflects the users behaviour online. While an legitimate user coordinates its social behaviour carefully, it is hard for the fake users to pretend to be affected. Different studies are performed in spam behaviour analysis and define a structure for spam account detection.
被泄露的账户对社交网络用户来说是一个严重的风险。现在的人们大多依赖于在线社交网络。而一些持续的垃圾邮件通过传播垃圾邮件来破坏用户之间的关系。因此,有必要不时地检测受损帐户。在本文中,我们将研究不同的社交用户行为,并检测受损帐户和垃圾邮件用户。社交网络中的垃圾邮件行为具有广泛的非法活动。需要对此类活动进行评估,并减少垃圾邮件用户的影响。为了减少这种影响,我们需要适当的检测策略。我们通过收集社交网站上的点击流数据来验证这些行为的有效性。社交行为反映了用户在网络上的行为。正当用户会谨慎地协调其社交行为,而假用户很难假装受到影响。在垃圾邮件行为分析中进行了不同的研究,并定义了垃圾邮件帐户检测的结构。
{"title":"DETECTION OF COMPROMISED ACCOUNTS IN ONLINE SOCIAL NETWORK","authors":"S. Rane, Megha Ainapurkar, Amey Wadekar","doi":"10.1109/ICCMC.2018.8487486","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487486","url":null,"abstract":"Compromised accounts are of a severe risk to the social network users. People now a days are mostly dependent on Online Social Networks. While some persistent spams feat the relationship between the users by spreading spams. Therefore time to time detection of the compromised accounts is a necessity. In this paper, we will study different social user behaviour and detect the compromised accounts and spam users. Spam behaviour in social networks has a wide range of illegal activities. Such activities need to be evaluated and effect of spam users needs to be reduced. To reduce such effects, we require proper detection strategy. We validate the effectiveness of these behaviour by collecting the clickstream data on a social network website. Social behaviour reflects the users behaviour online. While an legitimate user coordinates its social behaviour carefully, it is hard for the fake users to pretend to be affected. Different studies are performed in spam behaviour analysis and define a structure for spam account detection.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"45 1","pages":"612-614"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89509065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dual-band High-gain Metamaterial Based Resonant Cavity Antenna 双频高增益超材料谐振腔天线
Sourav Ghosh, S. Sahu
A technique is presented to design dual-band, high-gain metamaterial based resonant cavity antenna using frequency selective surface (FSS) layer. The radiating dielectric resonator (DR) is connected by a microstrip line and a rectangular slot is cut from the ground surface. Cylindrical dielectric resonator antenna (CDRA) is used as an elementary radiator. CDRA is excited by the microstrip line through the rectangular slot and it is radiating in the broadside direction at two adjacent frequency bands (S and C bands). Antenna simulation results confirmed it resonates in two adjacent bands centered at 3.9 GHz and 7.1 GHz. The gain of the DRA at these two bands are 2.43 dBi and 4.32 dBi respectively. With a single layer 5 × 5 array superstrate the gain of the proposed antenna increased by 8.02 dBi from 3.6 to 4.1 GHz frequency band and 1.05 dBi from 6.7 to 7.5 GHz frequency band. This high-gain dual-band DRA can be used for millimeter wave wireless communication, small satellite communication terminals.
提出了一种利用频率选择表面(FSS)层设计双频高增益超材料谐振腔天线的技术。辐射介质谐振器(DR)通过微带线连接,并在地面上切割出矩形槽。采用圆柱形介质谐振器天线(CDRA)作为基本辐射体。CDRA由微带线通过矩形槽激发,在相邻的两个频段(S和C频段)沿宽侧方向辐射。天线仿真结果表明,该系统在3.9 GHz和7.1 GHz两个相邻频段共振。DRA在这两个波段的增益分别为2.43 dBi和4.32 dBi。采用单层5 × 5阵列叠加层,天线的增益在3.6 ~ 4.1 GHz频段增加了8.02 dBi,在6.7 ~ 7.5 GHz频段增加了1.05 dBi。这种高增益双频DRA可用于毫米波无线通信、小型卫星通信终端。
{"title":"Dual-band High-gain Metamaterial Based Resonant Cavity Antenna","authors":"Sourav Ghosh, S. Sahu","doi":"10.1109/ICCMC.2018.8487528","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487528","url":null,"abstract":"A technique is presented to design dual-band, high-gain metamaterial based resonant cavity antenna using frequency selective surface (FSS) layer. The radiating dielectric resonator (DR) is connected by a microstrip line and a rectangular slot is cut from the ground surface. Cylindrical dielectric resonator antenna (CDRA) is used as an elementary radiator. CDRA is excited by the microstrip line through the rectangular slot and it is radiating in the broadside direction at two adjacent frequency bands (S and C bands). Antenna simulation results confirmed it resonates in two adjacent bands centered at 3.9 GHz and 7.1 GHz. The gain of the DRA at these two bands are 2.43 dBi and 4.32 dBi respectively. With a single layer 5 × 5 array superstrate the gain of the proposed antenna increased by 8.02 dBi from 3.6 to 4.1 GHz frequency band and 1.05 dBi from 6.7 to 7.5 GHz frequency band. This high-gain dual-band DRA can be used for millimeter wave wireless communication, small satellite communication terminals.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"14 1","pages":"794-797"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88015896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of physical exercise intensity by using facial expression analysis 基于面部表情分析的体育锻炼强度分类
Salik Ram Khanal, J. Barroso, Jaime Sampaio, V. Filipe
Facial expression analysis has a wide area of applications including health, psychology, sports etc. In this study, we explored different methods of automatic classification of exercise intensities using facial image processing of a subject performing exercise on a cycloergometer during an incremental standardized protocol. The method can be implemented in real time using facial video analysis. The experiments were done with images extracted from a 12 min HD video collected in laboratorial normalized settings (TechSport from the University of Trás-os-Montes e Alto Douro) with a static camera (90° angle with face and camera). The time slot for video to extract images for a particular class of exercise intensity is correspondence to the incremental heart rate. The facial expression recognition has been performed mainly in two steps: facial landmark detection and classification using the facial landmarks. Luxand application was used to detect 70 landmarks were detect using the adaptation of code available in Luxand application and we applied machine learning classification algorithms including discriminant analysis, KNN and SVM to classify the exercise intensities from the facial images. KNN algorithms presents up to 100% accuracy in classification into 2 and 3 classes. The distances between a lowermost landmark of the faces, which is indicated in landmark number 11 in the Luxand application, and the 26 landmarks around mouth were calculated and considered as features vector to train and test the classifier. Separate experiments were done for classification into two, three, and four classes and the accuracy of each algorithm was analyzed. From the overall results, classification into two and three classes was easy and resulted in very good classification performance whereas the classification with four classes had poor classification performance in each algorithm. Preliminary results suggest that distinguishing more levels of exertion, might require additional feature variables.
面部表情分析具有广泛的应用领域,包括健康、心理学、体育等。在这项研究中,我们探索了在增量标准化方案中,利用受试者在旋转计量器上进行运动的面部图像处理来自动分类运动强度的不同方法。该方法可以通过人脸视频分析实时实现。实验采用静态摄像机(面部与摄像机呈90°角),从实验室标准化设置(Trás-os-Montes e Alto Douro大学的TechSport)收集的12分钟高清视频中提取图像。视频提取特定运动强度的图像的时间间隔与增量心率相对应。面部表情识别主要分为两个步骤:面部特征点检测和面部特征点分类。使用Luxand应用程序检测70个地标,使用Luxand应用程序中可用的代码进行自适应检测,并使用判别分析、KNN和SVM等机器学习分类算法对面部图像中的运动强度进行分类。KNN算法在2类和3类分类中呈现高达100%的准确率。计算人脸最下面的一个地标(在Luxand应用程序中标记号为11)与嘴巴周围的26个地标之间的距离,并将其作为特征向量来训练和测试分类器。分别进行了2类、3类和4类分类实验,并对每种算法的准确率进行了分析。从整体结果来看,两类和三类分类容易,分类性能很好,而四类分类在各算法中的分类性能都很差。初步结果表明,区分更多的运动水平,可能需要额外的特征变量。
{"title":"Classification of physical exercise intensity by using facial expression analysis","authors":"Salik Ram Khanal, J. Barroso, Jaime Sampaio, V. Filipe","doi":"10.1109/ICCMC.2018.8488080","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488080","url":null,"abstract":"Facial expression analysis has a wide area of applications including health, psychology, sports etc. In this study, we explored different methods of automatic classification of exercise intensities using facial image processing of a subject performing exercise on a cycloergometer during an incremental standardized protocol. The method can be implemented in real time using facial video analysis. The experiments were done with images extracted from a 12 min HD video collected in laboratorial normalized settings (TechSport from the University of Trás-os-Montes e Alto Douro) with a static camera (90° angle with face and camera). The time slot for video to extract images for a particular class of exercise intensity is correspondence to the incremental heart rate. The facial expression recognition has been performed mainly in two steps: facial landmark detection and classification using the facial landmarks. Luxand application was used to detect 70 landmarks were detect using the adaptation of code available in Luxand application and we applied machine learning classification algorithms including discriminant analysis, KNN and SVM to classify the exercise intensities from the facial images. KNN algorithms presents up to 100% accuracy in classification into 2 and 3 classes. The distances between a lowermost landmark of the faces, which is indicated in landmark number 11 in the Luxand application, and the 26 landmarks around mouth were calculated and considered as features vector to train and test the classifier. Separate experiments were done for classification into two, three, and four classes and the accuracy of each algorithm was analyzed. From the overall results, classification into two and three classes was easy and resulted in very good classification performance whereas the classification with four classes had poor classification performance in each algorithm. Preliminary results suggest that distinguishing more levels of exertion, might require additional feature variables.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"196 1","pages":"765-770"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86830179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoT Based Vigilance Robot using Gesture Control 使用手势控制的基于物联网的警戒机器人
S. Srividhya, G. D. Kumar, J. Manivannan, V. A. MOHAMED WASIF RIHFATH, K. Ragunathan
This paper described about a robot used for vigilance purpose. The robot can be controlled via wireless controls. It can be moved in all directions and gets a live stream on android platform using Raspberry Pi. The signals generated from Android app are sent to Raspberry Pi. These received signals are processed by the commands and the robot is directed with used directive. Existing system is CCTV camera which is fixed one. But robot is movable and it is very easy to cover all the directions. So the issues of existing system is solved. The video clarity is very good in the proposed system.
本文介绍了一种用于警戒目的的机器人。这个机器人可以通过无线控制来控制。它可以向各个方向移动,并使用树莓派在android平台上获得实时流。Android应用程序产生的信号发送给树莓派。这些接收到的信号被指令处理,机器人被使用指令指挥。现有的系统是闭路电视摄像机,是固定的。但是机器人是可移动的,它很容易覆盖所有的方向。从而解决了现有系统存在的问题。该系统的视频清晰度非常好。
{"title":"IoT Based Vigilance Robot using Gesture Control","authors":"S. Srividhya, G. D. Kumar, J. Manivannan, V. A. MOHAMED WASIF RIHFATH, K. Ragunathan","doi":"10.1109/iccmc.2018.8488072","DOIUrl":"https://doi.org/10.1109/iccmc.2018.8488072","url":null,"abstract":"This paper described about a robot used for vigilance purpose. The robot can be controlled via wireless controls. It can be moved in all directions and gets a live stream on android platform using Raspberry Pi. The signals generated from Android app are sent to Raspberry Pi. These received signals are processed by the commands and the robot is directed with used directive. Existing system is CCTV camera which is fixed one. But robot is movable and it is very easy to cover all the directions. So the issues of existing system is solved. The video clarity is very good in the proposed system.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"12 1","pages":"1065-1072"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87405296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of Image Fusion Techniques 图像融合技术综述
Karishma C Bhataria, Bhumika Shah
The technique of blending two images or more than two images which produces outcome as the composite fused image. The obtained fused image is the upgraded version of original images because it has all the salient information. The present applications makes majority usage of this fused image to speed up their processing tasks in their respective fields. Recent real-time applications which require image fusion are remote sensing applications, medical applications, surveillance application, photography applications etc. The broad categorization of image fusion techniques are Non-transform domain or spatial domain and Transform domain or frequency domain. This paper initiates with the introduction of image fusion. In the second section it explains the levels of fusion. The third section explains generic image fusion strategy. Further sections elaborates the taxonomy of image fusion techniques and their comparative tables lists all the merits and demerits of the same.
将两幅或两幅以上图像混合,产生合成融合图像的技术。融合后的图像具有所有显著信息,是原始图像的升级版。目前的应用程序大多使用这种融合图像来加快各自领域的处理任务。最近需要图像融合的实时应用有遥感应用、医疗应用、监控应用、摄影应用等。图像融合技术大致分为非变换域或空间域和变换域或频域。本文首先介绍了图像融合。第二部分解释了融合的层次。第三部分解释了通用的图像融合策略。进一步的章节详细阐述了图像融合技术的分类和他们的比较表列出了所有的优点和缺点。
{"title":"A Review of Image Fusion Techniques","authors":"Karishma C Bhataria, Bhumika Shah","doi":"10.1109/ICCMC.2018.8487686","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487686","url":null,"abstract":"The technique of blending two images or more than two images which produces outcome as the composite fused image. The obtained fused image is the upgraded version of original images because it has all the salient information. The present applications makes majority usage of this fused image to speed up their processing tasks in their respective fields. Recent real-time applications which require image fusion are remote sensing applications, medical applications, surveillance application, photography applications etc. The broad categorization of image fusion techniques are Non-transform domain or spatial domain and Transform domain or frequency domain. This paper initiates with the introduction of image fusion. In the second section it explains the levels of fusion. The third section explains generic image fusion strategy. Further sections elaborates the taxonomy of image fusion techniques and their comparative tables lists all the merits and demerits of the same.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"44 1","pages":"114-123"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80090575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
IoT Based Distributed Control System Using CAN 基于物联网的CAN分布式控制系统
A. Niveditha, M. Nivetha, K. Priyadharshini, K. Punithavathy
Industrial automation systems play a crucial role in controlling several process- related operations. Due to the implementation of a wide variety of industrial networks with their geographical distribution over industry, the floor data transferring and controlling capability has become more sophisticated and the need for a reliable, fast, high level communication network arises which can be satisfied by Controller Area Network. Our proposed system implements the CAN protocol in Industrial Automation. In this system, a single node consists of various sensors which monitors and provides process variables to ATmega328 Microcontroller. This is then connected to a CAN controller which exchanges data with ATmega328 Microcontrollers using serial peripheral interface. CAN controller does the process of control, error management and bit stream conversion. This serial data is connected to the CAN transceiver for the CAN bus establishment. Many such nodes are connected to the CAN bus. On the other end of the bus, the master NXPlpc1768 which has inbuilt CAN ports receive and control the datas and process variables from the nodes by using CAN protocol. This master NXPlpc1768 is improvised with the inclusion of IoT which uses internet connectivity by using ethernet shield that sends datas and process variables from the remote location of the industry to the user at any geographical area.
工业自动化系统在控制一些过程相关操作方面起着至关重要的作用。由于各种工业网络的实施,其地理分布遍及整个工业,地板数据传输和控制能力变得越来越复杂,需要一个可靠、快速、高水平的通信网络,而控制器局域网可以满足这一需求。本系统实现了工业自动化中的CAN协议。在该系统中,单个节点由各种传感器组成,这些传感器监测并向ATmega328微控制器提供过程变量。然后连接到CAN控制器,该控制器使用串行外设接口与ATmega328微控制器交换数据。CAN控制器完成控制、错误管理和位流转换过程。该串行数据连接到CAN收发器,用于CAN总线的建立。许多这样的节点都连接到CAN总线。在总线的另一端,内置CAN端口的主NXPlpc1768通过CAN协议接收和控制来自各节点的数据和进程变量。这个主NXPlpc1768是临时包含物联网,通过使用以太网屏蔽将数据和过程变量从行业的远程位置发送到任何地理区域的用户,从而使用互联网连接。
{"title":"IoT Based Distributed Control System Using CAN","authors":"A. Niveditha, M. Nivetha, K. Priyadharshini, K. Punithavathy","doi":"10.1109/ICCMC.2018.8488003","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488003","url":null,"abstract":"Industrial automation systems play a crucial role in controlling several process- related operations. Due to the implementation of a wide variety of industrial networks with their geographical distribution over industry, the floor data transferring and controlling capability has become more sophisticated and the need for a reliable, fast, high level communication network arises which can be satisfied by Controller Area Network. Our proposed system implements the CAN protocol in Industrial Automation. In this system, a single node consists of various sensors which monitors and provides process variables to ATmega328 Microcontroller. This is then connected to a CAN controller which exchanges data with ATmega328 Microcontrollers using serial peripheral interface. CAN controller does the process of control, error management and bit stream conversion. This serial data is connected to the CAN transceiver for the CAN bus establishment. Many such nodes are connected to the CAN bus. On the other end of the bus, the master NXPlpc1768 which has inbuilt CAN ports receive and control the datas and process variables from the nodes by using CAN protocol. This master NXPlpc1768 is improvised with the inclusion of IoT which uses internet connectivity by using ethernet shield that sends datas and process variables from the remote location of the industry to the user at any geographical area.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"967-971"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76401756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Hybrid Computing Model for Intelligent Transportation System (ITS) 面向智能交通系统的物联网混合计算模型
M. Swarnamugi, Dr.Chinnaiyan R
IoT – a new proliferation in the technological advancement, changed the way object is perceived and used. It enables connecting smart objects to the internet and aims to develop new promising future to Intelligent Transportation System (ITS). ITS uses techniques such as wireless communication, computational technologies, GPS, and sensor technologies to provide smart and quick services to users and to be better informed and make safer, more coordinated, and 'smarter' use of transportation medium. As number of objects connected to ITS application increases, the amount of data generated also increases and they are send to cloud for data analysis and knowledge discovery. However, sending and retrieving of data across cloud is less useful due to delay latency and others. An alternative to cloud is fog (edge) model that overcomes the weakness of cloud by analyzing and discovering knowledge at the edge. However, the fog computing model has limited computational capability. For an IoT enabled Intelligent Transportation System with enormous number of objects connected, neither cloud nor fog computing model addresses the issues alone. This paper focuses on presenting an IoT hybrid model for Intelligent Transportation System (ITS). We also address the effectiveness of the model by discussing use case scenarios.
物联网——技术进步的新扩散,改变了物体被感知和使用的方式。它使智能物体能够连接到互联网,旨在为智能交通系统(ITS)开发新的前景。ITS使用无线通信、计算技术、GPS和传感器技术等技术,为用户提供智能和快速的服务,并更好地了解情况,更安全、更协调、更“智能”地使用交通工具。随着连接到ITS应用程序的对象数量的增加,生成的数据量也会增加,这些数据将被发送到云端进行数据分析和知识发现。但是,由于延迟和其他原因,跨云发送和检索数据的用处不大。雾(边缘)模型是云的替代方案,它通过分析和发现边缘的知识来克服云的弱点。然而,雾计算模型的计算能力有限。对于具有大量连接对象的物联网智能交通系统,云和雾计算模型都无法单独解决问题。提出了一种用于智能交通系统(ITS)的物联网混合模型。我们还通过讨论用例场景来讨论模型的有效性。
{"title":"IoT Hybrid Computing Model for Intelligent Transportation System (ITS)","authors":"M. Swarnamugi, Dr.Chinnaiyan R","doi":"10.1109/ICCMC.2018.8487843","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487843","url":null,"abstract":"IoT – a new proliferation in the technological advancement, changed the way object is perceived and used. It enables connecting smart objects to the internet and aims to develop new promising future to Intelligent Transportation System (ITS). ITS uses techniques such as wireless communication, computational technologies, GPS, and sensor technologies to provide smart and quick services to users and to be better informed and make safer, more coordinated, and 'smarter' use of transportation medium. As number of objects connected to ITS application increases, the amount of data generated also increases and they are send to cloud for data analysis and knowledge discovery. However, sending and retrieving of data across cloud is less useful due to delay latency and others. An alternative to cloud is fog (edge) model that overcomes the weakness of cloud by analyzing and discovering knowledge at the edge. However, the fog computing model has limited computational capability. For an IoT enabled Intelligent Transportation System with enormous number of objects connected, neither cloud nor fog computing model addresses the issues alone. This paper focuses on presenting an IoT hybrid model for Intelligent Transportation System (ITS). We also address the effectiveness of the model by discussing use case scenarios.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"550 1","pages":"802-806"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77445663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Analysis of Multicarrier Switching Techniques for Nine Level Inverter 九电平逆变器多载波开关技术分析
Kamlesh D. Wanjari, P. Salodkar, M. Waghmare
The demand for multilevel inverter have increased over time due to the high total harmonic distortion and unsatisfactory operation of conventional inverter. Cascaded H-bridge (CHB) multilevel inverter is simple, requiring fewer power components and more reliable than other types of topology so it is more preferable. But to increase the level of inverter output more number of components are required which makes more switching losses. So we are going toward asymmetrical topology which helps to get more number of levels with less number of power components. In this paper nine-level asymmetric CHB inverter is presented with eight power switches and two dc voltage sources of 1:3 proportion. The analysis is done for carrier scheme, amplitude index, and modulation index. Results are obtained with MATLAB Simulink software.
随着时间的推移,由于传统逆变器的高总谐波失真和不理想的运行,对多电平逆变器的需求不断增加。级联h桥(CHB)多电平逆变器结构简单,所需功率元件少,比其他类型的拓扑结构更可靠,因此更受欢迎。但是为了提高逆变器的输出水平,需要更多的元件,这就造成了更大的开关损耗。因此,我们正在朝着非对称拓扑的方向发展,这有助于用更少的功率元件获得更多的电平。本文设计了一种九电平非对称CHB逆变器,采用八个电源开关和两个1:3比例的直流电压源。对载波方案、幅度指数和调制指数进行了分析。利用MATLAB Simulink软件进行了仿真计算。
{"title":"Analysis of Multicarrier Switching Techniques for Nine Level Inverter","authors":"Kamlesh D. Wanjari, P. Salodkar, M. Waghmare","doi":"10.1109/ICCMC.2018.8487776","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487776","url":null,"abstract":"The demand for multilevel inverter have increased over time due to the high total harmonic distortion and unsatisfactory operation of conventional inverter. Cascaded H-bridge (CHB) multilevel inverter is simple, requiring fewer power components and more reliable than other types of topology so it is more preferable. But to increase the level of inverter output more number of components are required which makes more switching losses. So we are going toward asymmetrical topology which helps to get more number of levels with less number of power components. In this paper nine-level asymmetric CHB inverter is presented with eight power switches and two dc voltage sources of 1:3 proportion. The analysis is done for carrier scheme, amplitude index, and modulation index. Results are obtained with MATLAB Simulink software.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"59 1","pages":"577-581"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87646970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
APRIGUARD: The Automatic and Eficient Method for Privacy Violations Detection in OSNs (Online Social Networks aprigard:在线社交网络中隐私侵犯的自动高效检测方法
Karuna Sonone, V. Barkade
The users from the social networks like Facebook, Twitter etc. expecting that social networks can able to preserve their privacy. To address this, recently PRIGUARD framework introduced in which meta model and description logic used for describing the social network commitments and domain in order to specify the privacy needs of end users. This approach is able to detect the violations of privacy in both sound and complete. However the still there is scope of improvement in PRIGUARD method and limitations. One such limitation of PRIGUARD does not supporting the proactive violations of its commitments whenever its required to pro-vide the context dependent privacy management. In this paper we are presenting the Automated PRIGUARD (APRI-GUARD) which is based on existing PRIGUARD method. APRIGUARD method not only supports the functionality of existing PRIGUARD but also enabling the approach of proactively violates its commitments. This achieves more efficiency and security to end users privacy. The proposed approach will be used before taking a particular action for checking whether it will lead violation and hence it will results in its prevention before it happens. Antithesis, it will be utilized to do sporadic checks on the system to see if any violations have occurred.)
Facebook、Twitter等社交网络的用户希望社交网络能够保护他们的隐私。为了解决这个问题,最近引入了prguard框架,其中元模型和描述逻辑用于描述社交网络承诺和领域,以指定最终用户的隐私需求。这种方法能够检测到侵犯隐私的声音和完整。然而,prguard方法仍有改进的余地和局限性。prguard的一个这样的限制是,当需要提供上下文相关的隐私管理时,它不支持主动违反其承诺。本文提出了一种基于现有prguard方法的自动prguard (aprii - guard)。apguard方法不仅支持现有的prguard功能,而且还支持主动违反其承诺的方法。从而达到更高的效率和安全性,以保护最终用户的隐私。建议的方法将在采取特定行动之前使用,以检查其是否会导致违规,因此它将导致在其发生之前进行预防。相反,它将用于对系统进行零星检查,以查看是否发生了任何违规行为。)
{"title":"APRIGUARD: The Automatic and Eficient Method for Privacy Violations Detection in OSNs (Online Social Networks","authors":"Karuna Sonone, V. Barkade","doi":"10.1109/ICCMC.2018.8487824","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487824","url":null,"abstract":"The users from the social networks like Facebook, Twitter etc. expecting that social networks can able to preserve their privacy. To address this, recently PRIGUARD framework introduced in which meta model and description logic used for describing the social network commitments and domain in order to specify the privacy needs of end users. This approach is able to detect the violations of privacy in both sound and complete. However the still there is scope of improvement in PRIGUARD method and limitations. One such limitation of PRIGUARD does not supporting the proactive violations of its commitments whenever its required to pro-vide the context dependent privacy management. In this paper we are presenting the Automated PRIGUARD (APRI-GUARD) which is based on existing PRIGUARD method. APRIGUARD method not only supports the functionality of existing PRIGUARD but also enabling the approach of proactively violates its commitments. This achieves more efficiency and security to end users privacy. The proposed approach will be used before taking a particular action for checking whether it will lead violation and hence it will results in its prevention before it happens. Antithesis, it will be utilized to do sporadic checks on the system to see if any violations have occurred.)","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"82 1","pages":"945-949"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87046865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 Second International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1