首页 > 最新文献

2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)最新文献

英文 中文
Intelligence transportation service using Vehicular Cloud Network 基于车载云网络的智能交通服务
Ashwini B. Abhale, S. Khandelwal
Today transportation play important role and have major economic sector of world. In contrast, increase in number of vehicles can increase number of road accidents and human fatalities. In addition, we are facing traffic problem also. Under this condition, it is necessary to provide promising solution to prevent an accident and traffic on road. Vehicular cloud network is help to maintain the communication between vehicles and road side units. Vehicular cloud network is a hybrid solution for maintaining traffic information and providing road safety. In this paper, we focus on vehicular cloud network and provide simulation result explore the working of propose methodology.
今天,交通运输在世界经济中占有重要地位,是世界经济的主要组成部分。相反,车辆数量的增加会增加交通事故和死亡人数。此外,我们也面临交通问题。在这种情况下,有必要提供有前景的解决方案,以防止道路上的事故和交通。车载云网络有助于维护车辆与道路侧单元之间的通信。车载云网络是一种用于维护交通信息和提供道路安全的混合解决方案。本文以车载云网络为研究对象,给出仿真结果,探讨了所提方法的工作原理。
{"title":"Intelligence transportation service using Vehicular Cloud Network","authors":"Ashwini B. Abhale, S. Khandelwal","doi":"10.1109/ICAECCT.2016.7942598","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942598","url":null,"abstract":"Today transportation play important role and have major economic sector of world. In contrast, increase in number of vehicles can increase number of road accidents and human fatalities. In addition, we are facing traffic problem also. Under this condition, it is necessary to provide promising solution to prevent an accident and traffic on road. Vehicular cloud network is help to maintain the communication between vehicles and road side units. Vehicular cloud network is a hybrid solution for maintaining traffic information and providing road safety. In this paper, we focus on vehicular cloud network and provide simulation result explore the working of propose methodology.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"154 1","pages":"277-282"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83828098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Raspberry Pi voting system, a reliable technology for transparency in democracy 树莓派投票系统,民主透明的可靠技术
P. Vamsikrishna, Sonti Dinesh Kumar, Dinesh Bommisetty, Akshat Tyagi
Voting process takes the significant part of democratic systems. In most of the developing countries, paper ballot method is still being used. Information technology also has offered significant advantages and facilities to improve the quality of voting process. Digital recording electronic systems are developed replacing paper ballots. Although this is a great advancement, this process is prone to tampering threats and electoral frauds. This paper presents a new voting process which makes use of Raspberry Pi which has improved reliability and transparency over currently used systems. This system employs biometric identifiers in pursuit of authenticity. Pre collected details of all the voters in the country will be maintained as a central database by the government. This data is rechecked at the time of voting to ensure the identity of voters. Usage of Raspberry Pi for web casting the complete voting process and time to time display of polling percentage etc., details will tremendously affect the reliability of the process. Transparency and minimum usage of personnel is achieved at a cheaper cost and simpler process with this Raspberry Pi and its peripherals.
选举程序是民主制度的重要组成部分。在大多数发展中国家,仍在使用纸质选票方法。信息技术也为提高投票过程的质量提供了显著的优势和便利。开发了数字记录电子系统来取代纸质选票。虽然这是一个巨大的进步,但这一过程容易受到篡改威胁和选举欺诈的影响。本文提出了一种利用树莓派的新的投票过程,它比目前使用的系统提高了可靠性和透明度。该系统采用生物特征识别来追求真实性。预先收集的全国所有选民的详细信息将由政府作为中央数据库进行维护。这些数据在投票时被重新检查,以确保选民的身份。使用树莓派进行网络投票,完整的投票过程和定时显示投票百分比等,细节将极大地影响过程的可靠性。透明和最少的人员使用以更便宜的成本和更简单的过程与这个树莓派及其外围设备实现。
{"title":"Raspberry Pi voting system, a reliable technology for transparency in democracy","authors":"P. Vamsikrishna, Sonti Dinesh Kumar, Dinesh Bommisetty, Akshat Tyagi","doi":"10.1109/ICAECCT.2016.7942629","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942629","url":null,"abstract":"Voting process takes the significant part of democratic systems. In most of the developing countries, paper ballot method is still being used. Information technology also has offered significant advantages and facilities to improve the quality of voting process. Digital recording electronic systems are developed replacing paper ballots. Although this is a great advancement, this process is prone to tampering threats and electoral frauds. This paper presents a new voting process which makes use of Raspberry Pi which has improved reliability and transparency over currently used systems. This system employs biometric identifiers in pursuit of authenticity. Pre collected details of all the voters in the country will be maintained as a central database by the government. This data is rechecked at the time of voting to ensure the identity of voters. Usage of Raspberry Pi for web casting the complete voting process and time to time display of polling percentage etc., details will tremendously affect the reliability of the process. Transparency and minimum usage of personnel is achieved at a cheaper cost and simpler process with this Raspberry Pi and its peripherals.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"36 1","pages":"443-449"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91426944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient method for detecting and tracking moving objects in video 一种有效的视频中运动目标检测与跟踪方法
Nilesh J. Uke, P. Futane
Detection and tracking of moving object in the video has turned into a fascinating zone of exploration in the field of computer vision and has wide applications in fields like video surveillance, service robots, public security and target recognition. Although researches have proposed many approaches for object detection, robustness remains a huge challenge. In this paper, we proposed hybrid method of object detection using motion estimation and tracking by parallel kalman filter. Detection of the moving object is performed by analyzing the moving parts by corner and the shape feature extraction. The parallel kalman filter is used to tracks the object that is detected by calculating the motion estimation in video. The object tracking using the shape and the corner feature helps in providing the extract tracking of the object.
视频中运动物体的检测与跟踪已成为计算机视觉领域的一个引人入胜的探索领域,在视频监控、服务机器人、公共安全、目标识别等领域有着广泛的应用。尽管研究人员提出了许多目标检测方法,但鲁棒性仍然是一个巨大的挑战。本文提出了一种基于运动估计和并行卡尔曼滤波跟踪的混合目标检测方法。通过对运动部件进行角点分析和形状特征提取来实现运动目标的检测。通过计算视频中的运动估计,利用并行卡尔曼滤波对检测到的目标进行跟踪。利用形状和角的特征对目标进行跟踪,有助于对目标进行提取跟踪。
{"title":"Efficient method for detecting and tracking moving objects in video","authors":"Nilesh J. Uke, P. Futane","doi":"10.1109/ICAECCT.2016.7942610","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942610","url":null,"abstract":"Detection and tracking of moving object in the video has turned into a fascinating zone of exploration in the field of computer vision and has wide applications in fields like video surveillance, service robots, public security and target recognition. Although researches have proposed many approaches for object detection, robustness remains a huge challenge. In this paper, we proposed hybrid method of object detection using motion estimation and tracking by parallel kalman filter. Detection of the moving object is performed by analyzing the moving parts by corner and the shape feature extraction. The parallel kalman filter is used to tracks the object that is detected by calculating the motion estimation in video. The object tracking using the shape and the corner feature helps in providing the extract tracking of the object.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"52 1","pages":"343-348"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85879729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA 基于签名匹配算法和模糊遗传算法的实时混合入侵检测系统
A. Desai, D. Gaikwad
In Internet-based communication, different types of networks are used to provide services to users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in network is increasing. There is possibility of getting system infected by internal or external intruders. Single computer system is shared by multiple users. Users use multiuser system by creating their own account, which is protected by unique id and password. Sometimes, authorized users attack system for some malicious purposes. Internal attacks include deleting some important files or data, altering some important data. For any intrusion detection system, it is very difficult to identify authorized internal intruders. SQL injection is one such attack, which can be launched by internal attacker. The purpose of external intruder is to perform malicious activities in remote system. To avoid these two types of attacks, the robust intrusion detection system is needed. In this paper, we have implemented hybrid intrusion detection system, which includes identification of both internal and external attacks. Signature matching algorithm is implemented to identify internal attacks. Fuzzy genetic algorithm is applied for implementation of external attacks detection. The system is hybrid and compatible in offline as well as online environment. Experimental results show that the accuracy of system is better than some of existing systems.
在基于internet的通信中,使用不同类型的网络向用户提供服务。由于对不同类型漏洞的探索,网络攻击的威胁日益增加。系统有可能被内部或外部入侵者感染。单个计算机系统由多个用户共享。用户通过创建自己的帐户来使用多用户系统,该帐户由唯一的id和密码保护。有时,授权用户出于恶意目的攻击系统。内部攻击包括删除一些重要文件或数据,修改一些重要数据。对于任何入侵检测系统来说,识别授权的内部入侵者都是非常困难的。SQL注入就是这样一种攻击,它可以由内部攻击者发起。外部入侵者的目的是在远程系统中进行恶意活动。为了避免这两种类型的攻击,需要健壮的入侵检测系统。在本文中,我们实现了混合入侵检测系统,包括内部和外部攻击的识别。采用签名匹配算法识别内部攻击。采用模糊遗传算法实现外部攻击检测。该系统是混合型的,在离线和在线环境下都能兼容。实验结果表明,该系统的精度优于现有的一些系统。
{"title":"Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA","authors":"A. Desai, D. Gaikwad","doi":"10.1109/ICAECCT.2016.7942601","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942601","url":null,"abstract":"In Internet-based communication, different types of networks are used to provide services to users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in network is increasing. There is possibility of getting system infected by internal or external intruders. Single computer system is shared by multiple users. Users use multiuser system by creating their own account, which is protected by unique id and password. Sometimes, authorized users attack system for some malicious purposes. Internal attacks include deleting some important files or data, altering some important data. For any intrusion detection system, it is very difficult to identify authorized internal intruders. SQL injection is one such attack, which can be launched by internal attacker. The purpose of external intruder is to perform malicious activities in remote system. To avoid these two types of attacks, the robust intrusion detection system is needed. In this paper, we have implemented hybrid intrusion detection system, which includes identification of both internal and external attacks. Signature matching algorithm is implemented to identify internal attacks. Fuzzy genetic algorithm is applied for implementation of external attacks detection. The system is hybrid and compatible in offline as well as online environment. Experimental results show that the accuracy of system is better than some of existing systems.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"11 1","pages":"291-294"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85796821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
WHT and Double WHT: An effective PAPR reduction approach in OFDM 二WHT和双WHT: OFDM中有效的PAPR降低方法
S. Shete, G. Bhide, M. Jadhav
With rapid growth in communication orthogonal frequency division multiplexing (OFDM) is multi-carrier communication technique becomes more popular which is used in both wired and wireless communication. OFDM consist of multiple carriers over single channel for signal transmission. OFDM is the time domain signal which is made up of several sinusoids and due to this sinusoids Peak to Average Power Ratio (PAPR)of OFDM signal increases. Due to this high PAPR transmission efficiency reduces so PAPR is major drawback of OFDM. There are several PAPR reduction techniques but, pre-coding techniques shows better result. In this paper, we propose Walsh Hadamard Transform (WHT) and Double Walsh Hadamard Transform (Double WHT). The proposed scheme shows the better results.
随着通信技术的飞速发展,正交频分复用技术(OFDM)作为一种多载波通信技术,在有线和无线通信中都得到了广泛的应用。OFDM由多个载波在单通道上进行信号传输。OFDM信号是由多个正弦波组成的时域信号,由于正弦波的存在,OFDM信号的峰值平均功率比(PAPR)增大。由于这种高的PAPR降低了传输效率,因此PAPR是OFDM的主要缺点。有几种减少PAPR的技术,但预编码技术表现出更好的效果。本文提出了Walsh Hadamard变换(WHT)和Double Walsh Hadamard变换(Double WHT)。该方案取得了较好的效果。
{"title":"WHT and Double WHT: An effective PAPR reduction approach in OFDM","authors":"S. Shete, G. Bhide, M. Jadhav","doi":"10.1109/ICAECCT.2016.7942577","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942577","url":null,"abstract":"With rapid growth in communication orthogonal frequency division multiplexing (OFDM) is multi-carrier communication technique becomes more popular which is used in both wired and wireless communication. OFDM consist of multiple carriers over single channel for signal transmission. OFDM is the time domain signal which is made up of several sinusoids and due to this sinusoids Peak to Average Power Ratio (PAPR)of OFDM signal increases. Due to this high PAPR transmission efficiency reduces so PAPR is major drawback of OFDM. There are several PAPR reduction techniques but, pre-coding techniques shows better result. In this paper, we propose Walsh Hadamard Transform (WHT) and Double Walsh Hadamard Transform (Double WHT). The proposed scheme shows the better results.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"16 1","pages":"172-175"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87048612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An effective denoising and enhancement technique for removal of random impulse noise in images 一种去除图像中随机脉冲噪声的有效去噪和增强技术
R. Rajesh, P. Malathi
Digital images are likely to suffer from impulse noise during the process of acquisition and subsequent transmission. In this brief a decision tree based method (DTBM) is presented which effectively removes random valued impulse noise from gray scale images. The pixels corrupted by noise are detected by an impulse detector and are reconstructed using an edge preserving image filter. The reconstructed pixels are written back in an adaptive manner so that they will be available for the next computation. The desirable feature of DTBM is that the design requires simple mathematical computations which results in a cost effective implementation of the system. The quantifiable evaluation and visual quality results of the presented system prove that the system's performance is good in both respects. Image enhancement is done on the denoised image using discrete cosine transform (DCT) which improves the visual quality of the image.
数字图像在采集和传输过程中容易受到脉冲噪声的干扰。本文提出了一种基于决策树的方法,可以有效地去除灰度图像中的随机脉冲噪声。被噪声损坏的像素由脉冲检测器检测,并使用保持边缘的图像滤波器重建。重建的像素以一种自适应的方式被写回来,以便它们将在下一次计算中可用。dbm的理想特点是设计需要简单的数学计算,从而使系统的实现具有成本效益。系统的可量化评价和视觉质量结果证明了系统在这两个方面的良好性能。利用离散余弦变换(DCT)对去噪后的图像进行图像增强,提高图像的视觉质量。
{"title":"An effective denoising and enhancement technique for removal of random impulse noise in images","authors":"R. Rajesh, P. Malathi","doi":"10.1109/ICAECCT.2016.7942594","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942594","url":null,"abstract":"Digital images are likely to suffer from impulse noise during the process of acquisition and subsequent transmission. In this brief a decision tree based method (DTBM) is presented which effectively removes random valued impulse noise from gray scale images. The pixels corrupted by noise are detected by an impulse detector and are reconstructed using an edge preserving image filter. The reconstructed pixels are written back in an adaptive manner so that they will be available for the next computation. The desirable feature of DTBM is that the design requires simple mathematical computations which results in a cost effective implementation of the system. The quantifiable evaluation and visual quality results of the presented system prove that the system's performance is good in both respects. Image enhancement is done on the denoised image using discrete cosine transform (DCT) which improves the visual quality of the image.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"3 1","pages":"256-261"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82564743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Image management and data access control for Multi-authority cloud storage with use of certificate less encryption 多权威云存储的图像管理和数据访问控制,使用较少的证书加密
V. Gutte, Amol N. Jadhav, Pramod Mundhe
Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.
云计算技术越来越受到重视,其安全性受到高度关注。在私人、公共或政府组织的领域内。它展示了透明度的新方面。云计算提供透明度的主要问题是,分布式方案中不同级别的资源共享具有严重的影响。当涉及敏感或与隐私相关的数据时,最具挑战性的任务是安全。在云计算中,数据访问控制是保证数据安全的有效途径。不安全的云服务器或不受信任的云服务器的问题,对各种供应商的数据访问控制成为当今云存储系统中最具挑战性和最不安全的问题。但是在用户的数据或属性被撤销后,我们必须通过重新加密的过程来显示更多的安全性。在提出的方法中,我们通过依赖公共云服务器使用基于证书的加密方案。我们将其作为底层技术应用于数据用户的设计和过程中的数据访问控制方案。我们了解到,我们的无证书加密方法不仅可以有效地提供前向安全,而且可以更有效地提供后向安全。
{"title":"Image management and data access control for Multi-authority cloud storage with use of certificate less encryption","authors":"V. Gutte, Amol N. Jadhav, Pramod Mundhe","doi":"10.1109/ICAECCT.2016.7942557","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942557","url":null,"abstract":"Cloud computing technologies getting importance with a high level in security concern. In a domain of private, public or government organization. It shows new aspect for transparency. The main issue that Cloud computing provides transparency, but sharing of resources at different level in distributed scheme has severe implications. When at sensitive or privacy-relevant data is concerned for most secure challenging task. In cloud computing ensure the data security in data access control is an effective way. The problem with unsecured cloud servers or the untrusted cloud servers, data access control to various vendors becomes a challenging and most unsecured issue in cloud storage systems in these days. However after user's data or attribute revocation if we have to show the more security through re-encryption process. In the proposed method we uses certificate less encryption-based schemes by relying on a public cloud server. We have applied it as underlying techniques to design the data users and data access control scheme in process. We came to know that our certificate less encryption method can efficiently provide not only forward security but also backward security with more efficient way.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"136 1","pages":"64-67"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86310007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Attribute based image retrieval and hypergraph learning based image search reranking 基于属性的图像检索和基于超图学习的图像搜索排序
S. Patil, A. Dani
Image search re-ranking is a powerful method to enhanced result we get from text-based search. We get noisy data from text-based search. The objective of this work is to enhance the system which re-arrange the images which user get from simple text-based search in such a way that, resultant image set contains relevant images. On this challenge, this paper proposed to use the semantic attributes for re-ranking. Every image describe through specific attribute. These attributes have already ready classifiers. User will gets responses from these classifiers on the basis of attribute. Every image in responses have relation with each other by mean of its attribute. This relation supposed to be shown by hypergraph. Images in the hypergraph ranked as per their ranking score. Ranking score represents similarity factor with respect to common attribute of images in hypergraph. This paper use attribute learning of images and hypergraph formation method to get valuable result.
图像搜索重新排序是增强文本搜索结果的一种有效方法。我们从基于文本的搜索中得到嘈杂的数据。本工作的目的是增强系统,使用户从简单的基于文本的搜索中获得的图像重新排列,从而使生成的图像集包含相关图像。针对这一挑战,本文提出使用语义属性进行重新排序。每个图像都通过特定的属性来描述。这些属性有现成的分类器。用户将根据属性从这些分类器获得响应。响应中的每个图像都通过其属性相互关联。这种关系可以用超图来表示。超图中的图像根据其排名分数进行排名。排名分数表示超图中图像的共同属性的相似度因子。利用图像的属性学习和超图的形成方法,得到了有价值的结果。
{"title":"Attribute based image retrieval and hypergraph learning based image search reranking","authors":"S. Patil, A. Dani","doi":"10.1109/ICAECCT.2016.7942585","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942585","url":null,"abstract":"Image search re-ranking is a powerful method to enhanced result we get from text-based search. We get noisy data from text-based search. The objective of this work is to enhance the system which re-arrange the images which user get from simple text-based search in such a way that, resultant image set contains relevant images. On this challenge, this paper proposed to use the semantic attributes for re-ranking. Every image describe through specific attribute. These attributes have already ready classifiers. User will gets responses from these classifiers on the basis of attribute. Every image in responses have relation with each other by mean of its attribute. This relation supposed to be shown by hypergraph. Images in the hypergraph ranked as per their ranking score. Ranking score represents similarity factor with respect to common attribute of images in hypergraph. This paper use attribute learning of images and hypergraph formation method to get valuable result.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"44 1","pages":"216-220"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78127038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross layer design approach for Congestion Control in MANETs manet中拥塞控制的跨层设计方法
Mazher Khan, D. M., Sayyad Ajij D.
In Mobile Ad-hoc Network (MANET), there is no centralized infrastructure. Nodes are free to move anywhere in the network so routing is very challenging task. Mobile nodes are responsible for link failure, interference and congestion. Congestion is one of the main reasons for degradation of performance of network. When traffic in the network increases over the stipulated capacity, congestion takes place. The traditional routing protocols are not effective for addressing the received signal strength related problems. In this paper, authors designed a new algorithm using the combination of Ad-hoc on Demand Distance Vector (AODV) and Cross layer design approach. It is referred as Congestion Control AODV (CCAODV) approach. It is used to avoid link break in MANET. Received signal strength is used as cross layer design parameter. The CCAODV protocol creates strong and stable route by using signal strength of node. The signal strength mainly depends on the parameters like transmission power of node and distance between two nodes. The cross layer design approach is tested by using Ns 2.35 simulator and compared with the AODV routing protocol.
在移动自组织网络(MANET)中,没有集中的基础设施。节点在网络中可以自由移动,因此路由是一项非常具有挑战性的任务。移动节点负责链路故障、干扰和拥塞。拥塞是导致网络性能下降的主要原因之一。当网络中的流量增加超过规定的容量时,就会发生拥塞。传统的路由协议不能有效地解决与接收信号强度相关的问题。本文将Ad-hoc随需应变距离向量(AODV)与跨层设计方法相结合,设计了一种新的算法。它被称为拥塞控制AODV (CCAODV)方法。它用于在MANET中避免链路中断。接收信号强度作为跨层设计参数。CCAODV协议利用节点的信号强度创建强而稳定的路由。信号强度主要取决于节点的传输功率、节点间的距离等参数。利用Ns 2.35仿真器对跨层设计方法进行了测试,并与AODV路由协议进行了比较。
{"title":"Cross layer design approach for Congestion Control in MANETs","authors":"Mazher Khan, D. M., Sayyad Ajij D.","doi":"10.1109/ICAECCT.2016.7942633","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942633","url":null,"abstract":"In Mobile Ad-hoc Network (MANET), there is no centralized infrastructure. Nodes are free to move anywhere in the network so routing is very challenging task. Mobile nodes are responsible for link failure, interference and congestion. Congestion is one of the main reasons for degradation of performance of network. When traffic in the network increases over the stipulated capacity, congestion takes place. The traditional routing protocols are not effective for addressing the received signal strength related problems. In this paper, authors designed a new algorithm using the combination of Ad-hoc on Demand Distance Vector (AODV) and Cross layer design approach. It is referred as Congestion Control AODV (CCAODV) approach. It is used to avoid link break in MANET. Received signal strength is used as cross layer design parameter. The CCAODV protocol creates strong and stable route by using signal strength of node. The signal strength mainly depends on the parameters like transmission power of node and distance between two nodes. The cross layer design approach is tested by using Ns 2.35 simulator and compared with the AODV routing protocol.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"9 1","pages":"464-468"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78876972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Fall detection system for older adults 老年人跌倒检测系统
Y. Angal, A. Jagtap
Fall is a major health issue among older adults. Fall may cause serious injury to the older adults such as heap fractures and head traumas. A method for detecting falls among older adults is presented which uses the Microsoft Kinect sensor. The system consists of two parts. The first one is to detect fall using Kinect sensor and second part is to generate control signal to send message. To detect fall condition, motion related features are calculated. For this sensor's color and depth output is used. Ground event segmentation is done to detect moving objects from the video stream followed by feature extraction and event classification. After fall detection, help message will send to the registered number so that immediate medical assistance will get. The system works on real time data.
跌倒是老年人的一个主要健康问题。跌倒对老年人可能造成严重的伤害,如堆骨折和头部创伤。提出了一种使用微软Kinect传感器检测老年人跌倒的方法。该系统由两部分组成。第一部分是使用Kinect传感器检测跌倒,第二部分是生成控制信号发送信息。为了检测坠落状态,计算运动相关特征。对于这个传感器的颜色和深度输出使用。首先进行地面事件分割,检测视频流中的运动物体,然后进行特征提取和事件分类。在检测到跌倒后,帮助信息将发送到注册号码,以便立即获得医疗援助。该系统处理实时数据。
{"title":"Fall detection system for older adults","authors":"Y. Angal, A. Jagtap","doi":"10.1109/ICAECCT.2016.7942595","DOIUrl":"https://doi.org/10.1109/ICAECCT.2016.7942595","url":null,"abstract":"Fall is a major health issue among older adults. Fall may cause serious injury to the older adults such as heap fractures and head traumas. A method for detecting falls among older adults is presented which uses the Microsoft Kinect sensor. The system consists of two parts. The first one is to detect fall using Kinect sensor and second part is to generate control signal to send message. To detect fall condition, motion related features are calculated. For this sensor's color and depth output is used. Ground event segmentation is done to detect moving objects from the video stream followed by feature extraction and event classification. After fall detection, help message will send to the registered number so that immediate medical assistance will get. The system works on real time data.","PeriodicalId":6629,"journal":{"name":"2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)","volume":"32 1","pages":"262-266"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73360587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1