首页 > 最新文献

2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)最新文献

英文 中文
Deep Learning Oriented Channel Estimation for Interference Reduction for 5G 面向深度学习的5G信道估计干扰抑制
Swapna, Tangelapalli, P. Saradhi, R. Pandya, S. Iyer
The increasing demand for high-speed data services, such as mobile gaming, Augmented/Virtual Reality (AR/VR) applications, vehicular communications, Internet of Everything (IoE), and haptic internet, results in high user densification in 5G and beyond networks. Moreover, the ultra-dense user scenarios raise the challenge of increased interference due to the highly shared spatial resources and unknown Channel State Information (CSI). Therefore, the optimal channel estimation helps in interference cancellation; however, the conventional channel estimation techniques are imperfect. On the other hand, the Deep Learning (DL) approach confers the potential solution for the channel estimation. In this paper, we implement the Convolutional Neural Network (CNN) dL architecture for channel estimation over the range of values of SNR for Single Input Single Output OFDM network. The proposed DL-CNN approach demonstrates a 94.30% reduction in Mean Square Error (MSE) compared to the traditional interpolation method-based channel estimation at different values of SNR considering the dense scenario.
移动游戏、增强/虚拟现实(AR/VR)应用、车载通信、万物互联(IoE)和触觉互联网等高速数据业务的需求不断增长,导致5G及以上网络的用户密度很高。此外,由于高度共享的空间资源和未知的信道状态信息(CSI),超密集用户场景增加了干扰的挑战。因此,最优信道估计有助于消除干扰;然而,传统的信道估计技术并不完善。另一方面,深度学习(DL)方法为信道估计提供了潜在的解决方案。在本文中,我们实现了卷积神经网络(CNN) dL架构,用于单输入单输出OFDM网络在信噪比范围内的信道估计。在不同信噪比下,与传统的基于插值方法的信道估计相比,本文提出的DL-CNN方法在密集场景下的均方误差(MSE)降低了94.30%。
{"title":"Deep Learning Oriented Channel Estimation for Interference Reduction for 5G","authors":"Swapna, Tangelapalli, P. Saradhi, R. Pandya, S. Iyer","doi":"10.1109/ICSES52305.2021.9633948","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633948","url":null,"abstract":"The increasing demand for high-speed data services, such as mobile gaming, Augmented/Virtual Reality (AR/VR) applications, vehicular communications, Internet of Everything (IoE), and haptic internet, results in high user densification in 5G and beyond networks. Moreover, the ultra-dense user scenarios raise the challenge of increased interference due to the highly shared spatial resources and unknown Channel State Information (CSI). Therefore, the optimal channel estimation helps in interference cancellation; however, the conventional channel estimation techniques are imperfect. On the other hand, the Deep Learning (DL) approach confers the potential solution for the channel estimation. In this paper, we implement the Convolutional Neural Network (CNN) dL architecture for channel estimation over the range of values of SNR for Single Input Single Output OFDM network. The proposed DL-CNN approach demonstrates a 94.30% reduction in Mean Square Error (MSE) compared to the traditional interpolation method-based channel estimation at different values of SNR considering the dense scenario.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"15 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81639230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Power Efficient Dynamic Comparator at 180 nm Process Technology for high-speed applications 实现功率高效动态比较器在180纳米工艺技术的高速应用
T. Sharma
This paper divulges an advanced dynamic model of comparator that contributes towards fast-rate of comparison, better slew-rate and lesser amount of power consumption. The preamplifier referred dynamic technique in comparators is extensively utilized in analogue to digital converters (ADCs). It provides positive feedback technique to rejuvenate the signal from analogue to full sway digital. When the output of preamplifier phase approaches to power supply, the added power is consumed by the overall circuit. In the proposed implementation of comparator model, the voltage swaying of preamplifier phase is restricted to one-half of the power supply. The new technique gives rise to lesser power and has high slew-rate. This paper depicts the comparison between separate dynamic comparator models. The simulation result is carried out using Pyxis tool (Mentor Graphics) in 180nm technology.
本文提出了一种先进的比较器动态模型,该模型具有比较速率快、回转速率好、功耗小的特点。比较器中的前置放大器参考动态技术广泛应用于模数转换器(adc)中。它提供了正反馈技术,以恢复信号从模拟到全摇摆数字。当前置放大器相位的输出接近电源时,增加的功率被整个电路消耗。在所提出的比较器模型的实现中,前置放大器相位的电压摇摆被限制在电源的一半。新技术产生的功率小,回转率高。本文描述了不同的动态比较器模型之间的比较。仿真结果采用180nm工艺的Pyxis工具(Mentor Graphics)进行。
{"title":"Implementation of Power Efficient Dynamic Comparator at 180 nm Process Technology for high-speed applications","authors":"T. Sharma","doi":"10.1109/ICSES52305.2021.9633896","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633896","url":null,"abstract":"This paper divulges an advanced dynamic model of comparator that contributes towards fast-rate of comparison, better slew-rate and lesser amount of power consumption. The preamplifier referred dynamic technique in comparators is extensively utilized in analogue to digital converters (ADCs). It provides positive feedback technique to rejuvenate the signal from analogue to full sway digital. When the output of preamplifier phase approaches to power supply, the added power is consumed by the overall circuit. In the proposed implementation of comparator model, the voltage swaying of preamplifier phase is restricted to one-half of the power supply. The new technique gives rise to lesser power and has high slew-rate. This paper depicts the comparison between separate dynamic comparator models. The simulation result is carried out using Pyxis tool (Mentor Graphics) in 180nm technology.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"22 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81820211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gradient Conventional Recursive Neural Classifier Algorithm to Analyze the Malicious Software Detection Using Machine Learning 基于机器学习的梯度常规递归神经分类器恶意软件检测分析
B. Lavanya, C. Shanthi
Malware manual analysis still requires formula rules to verify that malicious samples are considered suspicious. Find the source of their software and malware as part of the code anatomy. To solve the security problem of the malware caused by the Android operating system, an efficient hybrid detection scheme is proposed for Android malware as the previous methods have not been efficient enough to detect advanced malware to limit/prevent damage. Machine learning technology provides the main novelty with high efficiency and low overhead. To verify that, this proposed gradient Conventional Recursive Neural Classifier (GCRNC) algorithm is feasible and many extensive malware data sets have been tested to prove its efficacy. The method has been classified into three stages: preprocessing, feature selection, and classification. The first preprocessing stage is based on Count Vectordistributionused to remove and extract the file types from the specified data set. Before classification, the feature is selected using the Adaboost Random Decision Tree Selection (ARDTS) method. The dataset uses are established to train first, and it is used with the expert weight assigned to each attribute by the domain expert. The rules are established based on the absolute rights assigned to this organization. The value of each selected feature is extracted and stored with the corresponding category label. The values are established based on the absolute rights assigned to this organization. A classification algorithm based on Gradient Conventional Recursive Neural Classifier (GCRNC) has been proposed to improve the achieved functional classification performance by only contributing to the effective classification process useful to classifying android malicious software datasets.
恶意软件手动分析仍然需要公式规则来验证恶意样本是否被认为是可疑的。查找他们的软件和恶意软件的源代码,作为代码剖析的一部分。针对Android操作系统带来的恶意软件安全问题,针对以往检测高级恶意软件的方法效率不足,提出了一种针对Android恶意软件的高效混合检测方案。机器学习技术具有高效率和低开销的特点。为了验证这一点,本文提出的梯度常规递归神经分类器(GCRNC)算法是可行的,并对大量恶意软件数据集进行了测试以证明其有效性。该方法分为预处理、特征选择和分类三个阶段。第一个预处理阶段是基于计数矢量分布,用于从指定的数据集中删除和提取文件类型。在分类之前,使用Adaboost随机决策树选择(ARDTS)方法选择特征。首先使用建立的数据集进行训练,并与领域专家分配给每个属性的专家权重一起使用。规则是根据分配给该组织的绝对权利建立的。每个选择的特征的值被提取并与相应的类别标签一起存储。这些值是根据分配给该组织的绝对权利建立的。提出了一种基于梯度常规递归神经分类器(GCRNC)的分类算法,通过只提供对android恶意软件数据集分类有用的有效分类过程来提高已实现的功能分类性能。
{"title":"Gradient Conventional Recursive Neural Classifier Algorithm to Analyze the Malicious Software Detection Using Machine Learning","authors":"B. Lavanya, C. Shanthi","doi":"10.1109/ICSES52305.2021.9633972","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633972","url":null,"abstract":"Malware manual analysis still requires formula rules to verify that malicious samples are considered suspicious. Find the source of their software and malware as part of the code anatomy. To solve the security problem of the malware caused by the Android operating system, an efficient hybrid detection scheme is proposed for Android malware as the previous methods have not been efficient enough to detect advanced malware to limit/prevent damage. Machine learning technology provides the main novelty with high efficiency and low overhead. To verify that, this proposed gradient Conventional Recursive Neural Classifier (GCRNC) algorithm is feasible and many extensive malware data sets have been tested to prove its efficacy. The method has been classified into three stages: preprocessing, feature selection, and classification. The first preprocessing stage is based on Count Vectordistributionused to remove and extract the file types from the specified data set. Before classification, the feature is selected using the Adaboost Random Decision Tree Selection (ARDTS) method. The dataset uses are established to train first, and it is used with the expert weight assigned to each attribute by the domain expert. The rules are established based on the absolute rights assigned to this organization. The value of each selected feature is extracted and stored with the corresponding category label. The values are established based on the absolute rights assigned to this organization. A classification algorithm based on Gradient Conventional Recursive Neural Classifier (GCRNC) has been proposed to improve the achieved functional classification performance by only contributing to the effective classification process useful to classifying android malicious software datasets.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"83 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90602979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability Analysis of Multi-Input DC-DC Converters 多输入DC-DC变换器的稳定性分析
M. Pushpavalli, P. Abirami, P. Sivagami, V. Geetha, M. Kavitha
This analyst for the most part centers around the steadiness examination of the multi-input DC converter framework. This MI contains two sources where wind and sun oriented can connect to the system. The performance of Multi-input DC Converters designed by the boost type with different converters configurations is Multi-input Boost, Buck-Boost, Sepic, Cuk, Zeta and KY Boost DC Converter. The Performance of the above converters analyzed in the closed-loop. Among this Multi-input KY boost, DC converter behaviour is superior to other MI DC Converters. MI KY boost DC converter is the most acceptable converter in terms of stability, time-domain analysis, and ripples. By comparing this, multi-input KY boost converter consumes less rise time, fall time and overshoot in percentage. Similarly, steady-state error (ESS) shows very low compared to other converters. Bode plot of a MI converter, measured gain margin in decibel and phase margin in degrees. Bode determines transfer function and pole-zero plot used to determine the balance of the plot. Dynamic conduct is tried and check with the assistance of MATLAB reproduction.
本分析主要围绕多输入直流变换器框架的稳定性检验展开。这个MI包含两个来源,风和太阳导向可以连接到系统。采用不同变换器配置的升压型设计的多输入直流变换器的性能有:多输入升压、Buck-Boost、Sepic、Cuk、Zeta和KY升压直流变换器。对上述变换器在闭环环境下的性能进行了分析。在这种多输入KY升压中,直流变换器的性能优于其他MI直流变换器。MI KY升压直流变换器是在稳定性,时域分析和波纹方面最可接受的变换器。通过比较,多输入KY升压变换器在百分比上消耗的上升时间、下降时间和超调量较少。同样,稳态误差(ESS)与其他转换器相比显示非常低。MI变换器的波德图,测量增益裕度(分贝)和相位裕度(度)。用波德法确定传递函数,用极零图确定平衡图。借助MATLAB的再现,对动态行为进行了试验和验证。
{"title":"Stability Analysis of Multi-Input DC-DC Converters","authors":"M. Pushpavalli, P. Abirami, P. Sivagami, V. Geetha, M. Kavitha","doi":"10.1109/ICSES52305.2021.9633877","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633877","url":null,"abstract":"This analyst for the most part centers around the steadiness examination of the multi-input DC converter framework. This MI contains two sources where wind and sun oriented can connect to the system. The performance of Multi-input DC Converters designed by the boost type with different converters configurations is Multi-input Boost, Buck-Boost, Sepic, Cuk, Zeta and KY Boost DC Converter. The Performance of the above converters analyzed in the closed-loop. Among this Multi-input KY boost, DC converter behaviour is superior to other MI DC Converters. MI KY boost DC converter is the most acceptable converter in terms of stability, time-domain analysis, and ripples. By comparing this, multi-input KY boost converter consumes less rise time, fall time and overshoot in percentage. Similarly, steady-state error (ESS) shows very low compared to other converters. Bode plot of a MI converter, measured gain margin in decibel and phase margin in degrees. Bode determines transfer function and pole-zero plot used to determine the balance of the plot. Dynamic conduct is tried and check with the assistance of MATLAB reproduction.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"41 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91517647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Detailed Survey on Bit Plane Complexity Segmentation (BPCS) and RSA Algorithm for Secured Medical Data Transfer 安全医疗数据传输中位平面复杂度分割(BPCS)和RSA算法的详细研究
D. Indira, Kavitha Chaduvula
For computer users, data security is a major concern. In the medical field the data must be present in a hidden form rather than original. Each of us has essential medical data that we want to keep safe from others. Bit Plane Complexity Segmentation (BPCS) is described in this article as a method for hiding information within images in various planes. The algorithm can be used with the RSA public key encryption scheme to enhance security in data transmission. It is important to determine a threshold (approximate) value so that the stego and original images are the same, and so that the hiding capacity is greater with less computing cost. This process imposes a number of restrictions. This paper presents two modules encryption and decryption while transferring medical text in a hidden mode. Error rate is calculating with PSNR, BER and MER with three bit planes Red, Blue and Green.
对于计算机用户来说,数据安全是一个主要问题。在医疗领域,数据必须以隐藏形式呈现,而不是原始形式。我们每个人都有重要的医疗数据,我们希望保护这些数据不被他人知道。位平面复杂度分割(BPCS)在本文中被描述为一种在不同平面的图像中隐藏信息的方法。该算法可与RSA公钥加密方案配合使用,提高数据传输的安全性。确定一个阈值(近似值)是很重要的,它可以使隐去图像和原始图像相同,从而在较小的计算成本下获得更大的隐藏能力。这个过程施加了一些限制。本文介绍了医学文本隐式传输时的加密和解密两个模块。误码率是用红、蓝、绿三个位平面的PSNR、BER和MER来计算的。
{"title":"A Detailed Survey on Bit Plane Complexity Segmentation (BPCS) and RSA Algorithm for Secured Medical Data Transfer","authors":"D. Indira, Kavitha Chaduvula","doi":"10.1109/ICSES52305.2021.9633914","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633914","url":null,"abstract":"For computer users, data security is a major concern. In the medical field the data must be present in a hidden form rather than original. Each of us has essential medical data that we want to keep safe from others. Bit Plane Complexity Segmentation (BPCS) is described in this article as a method for hiding information within images in various planes. The algorithm can be used with the RSA public key encryption scheme to enhance security in data transmission. It is important to determine a threshold (approximate) value so that the stego and original images are the same, and so that the hiding capacity is greater with less computing cost. This process imposes a number of restrictions. This paper presents two modules encryption and decryption while transferring medical text in a hidden mode. Error rate is calculating with PSNR, BER and MER with three bit planes Red, Blue and Green.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84870129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Accuracy of Lung Nodule Classification Using AlexNet Model 利用AlexNet模型提高肺结节分类的准确性
Priyanka Gupta, A. P. Shukla
Lung Cancer is the world's fastest-growing cancer & is detected mainly at an early stage. Various modalities of medical imaging, such as computed tomography (CT) have been employed to reduce delays in diagnosis. So far, numerous machine learning architectures have been used by researchers to categorize lung nodules captured in CT scans into benign or cancerous. In this article, we proposed a novel 8-layer two-architecture of a three-dimensional deep convolutional neural network called AlexNet to classifying benign & malignant nodules from CT-Scan images. The Deep neural network extracts the features automatically. We apply binary cross-entropy to our proposed network's loss functionimprovetraining precision and validation accuracy of the model with 99% and 97% respectively.
肺癌是世界上增长最快的癌症,主要在早期发现。各种医学成像方式,如计算机断层扫描(CT)已被用于减少诊断延误。到目前为止,研究人员已经使用了许多机器学习架构来将CT扫描中捕获的肺结节分类为良性或癌性。在本文中,我们提出了一种新的8层双层结构的三维深度卷积神经网络AlexNet,用于ct扫描图像的良恶性结节分类。深度神经网络自动提取特征。我们将二元交叉熵应用于我们所提出的网络损失函数,将模型的训练精度和验证精度分别提高了99%和97%。
{"title":"Improving Accuracy of Lung Nodule Classification Using AlexNet Model","authors":"Priyanka Gupta, A. P. Shukla","doi":"10.1109/ICSES52305.2021.9633903","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633903","url":null,"abstract":"Lung Cancer is the world's fastest-growing cancer & is detected mainly at an early stage. Various modalities of medical imaging, such as computed tomography (CT) have been employed to reduce delays in diagnosis. So far, numerous machine learning architectures have been used by researchers to categorize lung nodules captured in CT scans into benign or cancerous. In this article, we proposed a novel 8-layer two-architecture of a three-dimensional deep convolutional neural network called AlexNet to classifying benign & malignant nodules from CT-Scan images. The Deep neural network extracts the features automatically. We apply binary cross-entropy to our proposed network's loss functionimprovetraining precision and validation accuracy of the model with 99% and 97% respectively.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86532274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Study and Secure Data Deduplication techniques for Cloud Computing storage 云计算存储的安全重复数据删除技术比较研究
P. Malathi, S. Suganthidevi
Cloud based communication is a tremendous growth in the world and which provides the services through virtualized resources with support of internet. In cloud computing, optimized storage techniques require to store the hugea mount of data. Performing the data deduplication technique over the encrypted data consider as the major challenging task. Eliminating the redundant data file from the optimized storage, which results the minimizing the band width and reduces the cost and disk usage. In Existing approach, the most of the research work are using Attribute Based Encryption to prevent the data security. However, the security protection issues during the Attribute Based Encryption are considered as challenging task. In the traditional method of cloud data storage, the data are usually encrypted in the server side and then securely stored in remote server. Many researchers proposed many algorithms in which it makes easier for user's convenience so that it makes them fulfil their requirements. In, this proposed work detailed comparative study for data deduplication techniques in cloud storage are analysed. The results indicate that the cloud computing allows the users to perform the limited outsourcing performance of computational task with extraordinary server. Our proposed deduplication scheme enhances to improve a secured connection for attribute-based encryption for an emerging source to use and it proved the secured against the application system.
基于云的通信在世界范围内得到了巨大的发展,它在互联网的支持下通过虚拟化资源提供服务。在云计算中,优化的存储技术需要存储大量的数据。对加密后的数据执行重复数据删除技术被认为是最具挑战性的任务。从优化后的存储中删除冗余的数据文件,使带宽达到最小,降低了成本和磁盘使用率。在现有的方法中,大多数研究工作都是使用基于属性的加密来防止数据安全。然而,基于属性的加密过程中的安全保护问题被认为是一项具有挑战性的任务。在传统的云数据存储方式中,数据通常在服务器端进行加密,然后安全地存储在远程服务器上。许多研究人员提出了许多算法,这些算法都是为了方便用户,使用户能够满足他们的要求。在本工作中,对云存储中的重复数据删除技术进行了详细的比较研究。研究结果表明,云计算允许用户使用特殊的服务器来完成有限的外包性能的计算任务。我们提出的重复数据删除方案增强了基于属性加密的安全连接,并证明了对应用系统的安全性。
{"title":"Comparative Study and Secure Data Deduplication techniques for Cloud Computing storage","authors":"P. Malathi, S. Suganthidevi","doi":"10.1109/ICSES52305.2021.9633960","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633960","url":null,"abstract":"Cloud based communication is a tremendous growth in the world and which provides the services through virtualized resources with support of internet. In cloud computing, optimized storage techniques require to store the hugea mount of data. Performing the data deduplication technique over the encrypted data consider as the major challenging task. Eliminating the redundant data file from the optimized storage, which results the minimizing the band width and reduces the cost and disk usage. In Existing approach, the most of the research work are using Attribute Based Encryption to prevent the data security. However, the security protection issues during the Attribute Based Encryption are considered as challenging task. In the traditional method of cloud data storage, the data are usually encrypted in the server side and then securely stored in remote server. Many researchers proposed many algorithms in which it makes easier for user's convenience so that it makes them fulfil their requirements. In, this proposed work detailed comparative study for data deduplication techniques in cloud storage are analysed. The results indicate that the cloud computing allows the users to perform the limited outsourcing performance of computational task with extraordinary server. Our proposed deduplication scheme enhances to improve a secured connection for attribute-based encryption for an emerging source to use and it proved the secured against the application system.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"62 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84963048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extractive and Abstractive Summarization for Hindi Text using Hierarchical Clustering 基于层次聚类的印地语文本抽取与抽象摘要
Cheshta Kwatra, K. Gupta
Text Summarization is a widely researched and successful area of Natural Language Processing application. However, it remains limited to established languages such as English, French, etc. In this paper, we propose and compare extractive and abstractive summarization techniques for Hindi text documents. For either summarization, we first propose ward hierarchical agglomerative clustering. This is followed by the PageRank algorithm for extractive summarization while in abstractive summarization, we present an approach based on multi-sentence compression which only requires a POS tagger to generate Hindi text summaries.
文本摘要是自然语言处理应用中一个被广泛研究和成功的领域。然而,它仍然局限于已建立的语言,如英语、法语等。在本文中,我们提出并比较了印地语文本文档的抽取和抽象摘要技术。对于这两种总结,我们首先提出了分层聚类。其次是用于抽取摘要的PageRank算法,而在抽象摘要中,我们提出了一种基于多句压缩的方法,该方法只需要一个POS标记器就可以生成印地语文本摘要。
{"title":"Extractive and Abstractive Summarization for Hindi Text using Hierarchical Clustering","authors":"Cheshta Kwatra, K. Gupta","doi":"10.1109/ICSES52305.2021.9633789","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633789","url":null,"abstract":"Text Summarization is a widely researched and successful area of Natural Language Processing application. However, it remains limited to established languages such as English, French, etc. In this paper, we propose and compare extractive and abstractive summarization techniques for Hindi text documents. For either summarization, we first propose ward hierarchical agglomerative clustering. This is followed by the PageRank algorithm for extractive summarization while in abstractive summarization, we present an approach based on multi-sentence compression which only requires a POS tagger to generate Hindi text summaries.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88295084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid Resampling and Xgboost Prediction Using Patient's Details as Features for Parkinson's Disease Detection 以患者细节为特征的混合重采样和Xgboost预测用于帕金森病检测
A. Keller, Anukul Pandey
The recognition/diagnosis of Parkinson's disease must be highly accurate to reduce the severity of the disorder with timely treatment. It is often seen that handwriting of the patient diminishes because it is tough to hold the pen/pencil due to muscle rigidity as the disease progresses. Men and women are neurologically different and so are the young and aged and thus respond differently to Parkinson's manifestation. Additionally, there is a significant link between the dominant hand of the person and the side of the body where the initial manifestation of the disease begins. This lays the foundation for research-based on gender, age and handedness (lateralization) to predict the disease. The HandPD dataset used here is inherently imbalanced. This gives rise to the issue of prediction model biasedness. The true nature of such a model is not quite revealed by the conventional accuracy alone. Thus, balanced accuracy is used to evaluate true efficiency. The technique proposed here alleviates model bias using hybrid resampling and extreme gradient boosting. It also explores the impact of features like age, gender and handedness on the mode efficiency. Experimental results of the technique proposed here yield the highest accuracy of 98.24%, a balanced accuracy of 98.14% with 100% sensitivity and 96.29% specificity when the age of the person is taken into account along with features extracted from the handwritten images.
帕金森病的识别/诊断必须高度准确,以减少疾病的严重程度并及时治疗。随着病情的发展,由于肌肉僵硬,很难握住钢笔/铅笔,因此经常可以看到患者的笔迹减少。男性和女性的神经系统不同,年轻人和老年人也不同,因此对帕金森症的反应也不同。此外,患者的惯用手与疾病最初表现开始的身体一侧之间存在显著联系。这为基于性别、年龄和偏手性(侧化)来预测疾病的研究奠定了基础。这里使用的HandPD数据集本身就是不平衡的。这就产生了预测模型偏差的问题。这种模型的真实性质仅凭传统的准确性并不能完全揭示出来。因此,平衡精度是用来评估真正的效率。本文提出的方法通过混合重采样和极端梯度增强来减轻模型偏差。本文还探讨了年龄、性别和惯用手等特征对模式效率的影响。实验结果表明,当考虑人的年龄以及从手写图像中提取的特征时,该技术的最高准确率为98.24%,平衡准确率为98.14%,灵敏度为100%,特异性为96.29%。
{"title":"Hybrid Resampling and Xgboost Prediction Using Patient's Details as Features for Parkinson's Disease Detection","authors":"A. Keller, Anukul Pandey","doi":"10.1109/ICSES52305.2021.9633831","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633831","url":null,"abstract":"The recognition/diagnosis of Parkinson's disease must be highly accurate to reduce the severity of the disorder with timely treatment. It is often seen that handwriting of the patient diminishes because it is tough to hold the pen/pencil due to muscle rigidity as the disease progresses. Men and women are neurologically different and so are the young and aged and thus respond differently to Parkinson's manifestation. Additionally, there is a significant link between the dominant hand of the person and the side of the body where the initial manifestation of the disease begins. This lays the foundation for research-based on gender, age and handedness (lateralization) to predict the disease. The HandPD dataset used here is inherently imbalanced. This gives rise to the issue of prediction model biasedness. The true nature of such a model is not quite revealed by the conventional accuracy alone. Thus, balanced accuracy is used to evaluate true efficiency. The technique proposed here alleviates model bias using hybrid resampling and extreme gradient boosting. It also explores the impact of features like age, gender and handedness on the mode efficiency. Experimental results of the technique proposed here yield the highest accuracy of 98.24%, a balanced accuracy of 98.14% with 100% sensitivity and 96.29% specificity when the age of the person is taken into account along with features extracted from the handwritten images.","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"4 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90105250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Different Lossy Image Compression Techniques 不同有损图像压缩技术的比较
Y. L. Prasanna, Y. Tarakaram, Y. Mounika, R. Subramani
Recently, the use of large volumes of image data in many applications like internet has been increasing rapidly. So, to make an effective use of storage space and also bandwidth of the network, image compression is required. We have two kinds of image compression - one is lossy and other is lossless image compression. Lossy image compression produces a compressed image where quality of the image is maintained with some data loss. Lossy compression is widely used compared to lossless compression. Here, three lossy image compression techniques - Discrete Cosine Transform(DCT), Singular Value Decomposition (SVD) and Discrete Wavelet Transform(DWT) are used to perform image compression. These techniques are compared using some performance measures such as Peak Signal-to- Noise Ratio(PSNR), Compression Ratio(CR), Structural Similarity Index Measure(SSIM) and Mean Square Error(MSE).
近年来,大量图像数据在互联网等应用程序中的使用迅速增加。因此,为了有效地利用网络的存储空间和带宽,就需要对图像进行压缩。我们有两种图像压缩——一种是有损图像压缩,另一种是无损图像压缩。有损图像压缩产生一种压缩图像,其中图像的质量保持在一些数据丢失的情况下。与无损压缩相比,有损压缩得到了广泛的应用。在这里,使用三种有损图像压缩技术-离散余弦变换(DCT),奇异值分解(SVD)和离散小波变换(DWT)进行图像压缩。使用峰值信噪比(PSNR)、压缩比(CR)、结构相似指数测量(SSIM)和均方误差(MSE)等性能指标对这些技术进行了比较。
{"title":"Comparison of Different Lossy Image Compression Techniques","authors":"Y. L. Prasanna, Y. Tarakaram, Y. Mounika, R. Subramani","doi":"10.1109/ICSES52305.2021.9633800","DOIUrl":"https://doi.org/10.1109/ICSES52305.2021.9633800","url":null,"abstract":"Recently, the use of large volumes of image data in many applications like internet has been increasing rapidly. So, to make an effective use of storage space and also bandwidth of the network, image compression is required. We have two kinds of image compression - one is lossy and other is lossless image compression. Lossy image compression produces a compressed image where quality of the image is maintained with some data loss. Lossy compression is widely used compared to lossless compression. Here, three lossy image compression techniques - Discrete Cosine Transform(DCT), Singular Value Decomposition (SVD) and Discrete Wavelet Transform(DWT) are used to perform image compression. These techniques are compared using some performance measures such as Peak Signal-to- Noise Ratio(PSNR), Compression Ratio(CR), Structural Similarity Index Measure(SSIM) and Mean Square Error(MSE).","PeriodicalId":6777,"journal":{"name":"2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)","volume":"74 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86296354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1