2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)最新文献

筛选
英文 中文
A Multi-Resonant Microstrip Patch Antenna with Fractal Defected Ground Structure 具有分形缺陷接地结构的多谐振微带贴片天线
Sreepriya S, Nikhil George, S. Amit
{"title":"A Multi-Resonant Microstrip Patch Antenna with Fractal Defected Ground Structure","authors":"Sreepriya S, Nikhil George, S. Amit","doi":"10.1109/ICATIECE45860.2019.9063850","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063850","url":null,"abstract":"A microwave component with frequency selective structures enhances many of the antenna parameters gaining popularity among many techniques. A microstrip patch antenna parameter is studied and its performance is compared with defected ground plane. This paper presents a way in which we convert single resonant antenna to a multi-resonant antenna by adding a fractal defect in the ground plane. The number of resonant frequencies depends on the number of iterations of defect structure. Three resonant frequencies of 2.3GHz, 4GHz and 4.2GHz are achieved by considering two iterations in the fractal geometry. The designed antenna yields a peak gain of 3.04695dB. The antenna is validated for impedance matching with a return loss of < −20dB making it very suitable to integrate with other microwave devices. The 10dB return loss bandwidth is 300MHz (3.9GHz to 4.2GHz) and the gain of the antenna is 3.044dBi.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Driver Drowsiness Detection using Convoluted Neural Networks 基于卷积神经网络的驾驶员困倦检测
Nihal Antony, Rohit Kr, Shreya Patel, S. S, Namratha M
{"title":"Driver Drowsiness Detection using Convoluted Neural Networks","authors":"Nihal Antony, Rohit Kr, Shreya Patel, S. S, Namratha M","doi":"10.1109/ICATIECE45860.2019.9063837","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063837","url":null,"abstract":"Driver drowsiness is one of the leading causes of accidents among motorists today, therefore it is recognized as a serious problem that needs to be resolved. Although there have been many methods proposed in the past to tackle this issue, computer vision seems to be the most promising tool to detect driver drowsiness. Previous works have focused on particular features of the driver’s face and made used of handcrafted algorithms to detect drowsiness in an individual, this paper, however, aims to make use of a convoluted neural network to determine how features of the face give an indication of driver drowsiness.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel Approaches to Enhance Wireless Sensor Network Life time by Even Distribution of Cluster Heads and Avoiding Redundant Data 利用簇头均匀分布和避免冗余数据提高无线传感器网络寿命的新方法
Mohanaradhya, Sumithra Devi K.A
{"title":"Novel Approaches to Enhance Wireless Sensor Network Life time by Even Distribution of Cluster Heads and Avoiding Redundant Data","authors":"Mohanaradhya, Sumithra Devi K.A","doi":"10.1109/ICATIECE45860.2019.9063795","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063795","url":null,"abstract":"In cluster based Wireless Sensor Networks, lifetime of the network may be increased by conserving the energy spent by the cluster members and cluster heads. Energy consumption by cluster based WSN depends on the factors like number of data bits transmitted, received, aggregated by the nodes. In two hop cluster based networks member nodes acquires data and pushes to cluster heads (CH). Cluster Heads in WSN consumes more energy as they are affected by all the three factors. This paper proposes three different methods that cleverly selects the cluster heads, avoids unnecessary data transmission and balances the aggregation energy. The first method maintains threshold distance between the cluster heads for even distribution of cluster heads to avoid unnecessary CH. In the second approach, redundant data collected by the cluster member are curbed to save aggregation energy at CH. In the last method member nodes are distributed uniformly to balance the energy consumption.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125610438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nanostructured conductive polymeric modified exfoliated graphite paper based flexible battery for wearable electronics 可穿戴电子器件用纳米结构导电聚合物改性剥离石墨纸柔性电池
I. Pandey, Jai Deo Tiwari
{"title":"Nanostructured conductive polymeric modified exfoliated graphite paper based flexible battery for wearable electronics","authors":"I. Pandey, Jai Deo Tiwari","doi":"10.1109/ICATIECE45860.2019.9063787","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063787","url":null,"abstract":"Worldwide electronic waste is one of the emerging problems which can adversely affect the human and environment. The paper based flexible eco-friendly, disposable electronics battery is the excellent way to come up with the above mentioned challenge. In this work we reported the development and optimization of a cost, disposable, biodegradable, miniaturized and lightweight conductive polymer coated exfoliated graphite paper battery. Here, anode contains aluminium foil and cathode is made using electrochemically deposited anthraquinone conductive polymers on exfoliated graphite paper with a concentrated sodium chloride salt, as electrolyte. The battery shows a electrochemical response on by applying 40–50 μL of water and produces a maximum capacity of 235 mAh g−1 along with a superior cyclability of up to 500 cycles at 200.0 mA cm−2 current density. The proposed 3–4 battery connected in series powers a LED during approximately 60–90 seconds. Still continuous effort is going on for battery performance improvement. Obtained results allow to planning potential uses to low power consumptions microelectronics such as pacemakers, cosmetics, wearable biomedical devices, and electronics.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133361686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey on Multi Object Tracking Under Occlusion in Aerial Image Sequences 航空图像序列遮挡下多目标跟踪的综合研究
A. Shravya, K. Monika, Vindhya P. Malagi, R. Krishnan
{"title":"A Comprehensive Survey on Multi Object Tracking Under Occlusion in Aerial Image Sequences","authors":"A. Shravya, K. Monika, Vindhya P. Malagi, R. Krishnan","doi":"10.1109/ICATIECE45860.2019.9063778","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063778","url":null,"abstract":"Object detection and tracking is a one of the major research topics in the field of computer vision. It is a major component in applications like video surveillance, people monitoring, traffic monitoring etc. Object tracking algorithms typically estimate the location of the target in each frame in a sequence, given initial location of the target as a bounding box. In spite of extensive research reported on tracking, object tracking under occlusion remains a challenge still. There are many practical challenges in object tracking that have to be addressed. This survey paper aims to compile the various techniques available for object tracking under occlusion. Details about the various performance measures available to evaluate the tracking performance under occlusion is also discussed. This paper also points to a list of publicly available datasets that are used to test the tracking algorithms.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Load Balancing Algorithm for Heterogeneous Hadoop Cluster 异构Hadoop集群的动态负载均衡算法
D. Vinutha, G. Raju
{"title":"Dynamic Load Balancing Algorithm for Heterogeneous Hadoop Cluster","authors":"D. Vinutha, G. Raju","doi":"10.1109/ICATIECE45860.2019.9063832","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063832","url":null,"abstract":"Hadoop is a MapReduce open source implementation [1]. In homogeneous environment MapReduce can complete the parallel computing without major obstacles. load imbalance in the cluster is caused by heterogeneous nodes. We propose a dynamic load balancing model for heterogeneous clusters in this paper. In this a monitoring module is used to collect the real time information of each node. Load balancing is achieved by allocating the data dynamically based on computing capability and current load of a node. The results indicate the proposed algorithm reduced the execution time and balancing the load in the nodes of a cluster is achieved.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124521389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity Solutions for Verification using Blockchain Technology 使用区块链技术的身份验证解决方案
Dipti Ashok Belurgikar, J. Kanak Kshirsagar, K. Dhananjaya, N. Vineeth
{"title":"Identity Solutions for Verification using Blockchain Technology","authors":"Dipti Ashok Belurgikar, J. Kanak Kshirsagar, K. Dhananjaya, N. Vineeth","doi":"10.1109/ICATIECE45860.2019.9063802","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063802","url":null,"abstract":"Students and other individuals who want to create, share and send certificates that contain private or sensitive information, like academic transcripts or digital badges, can do so with an added layer of security. In this paper, we have proposed a system which is focused on verification of personal portfolio using the trending blockchain technology. This is a decentralized system which can be expanded to any professional domain where your personal identity attributes and certificates are mandatory. We aim to create a nation-wide coherent, simple, and universal atmosphere to provide a standardized platform for identity management in a permanent, transparent and secure way.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fuzzified Multi-Objective Transportation Problem: A Real coded Genetic Algorithm approach to the Compromised near-to-Optimal solution 模糊多目标运输问题:折衷近最优解的实编码遗传算法
Ravi Kumar R, Radha Gupta, Karthiyayini O, Ravinder Singh Kuntal, Vatsala G A
{"title":"Fuzzified Multi-Objective Transportation Problem: A Real coded Genetic Algorithm approach to the Compromised near-to-Optimal solution","authors":"Ravi Kumar R, Radha Gupta, Karthiyayini O, Ravinder Singh Kuntal, Vatsala G A","doi":"10.1109/ICATIECE45860.2019.9063620","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063620","url":null,"abstract":"In this article a comparative study on the effectiveness of Real-coded Genetic Algorithm (RGA) approach in finding the compromised near-to-optimal solution and to by-pass the allocation rule of (m+n−1) for a Fuzzified Multi-Objective Transportation Problem (FMOTP) is discussed. For this purpose, some benchmark problems with well-defined membership function were considered and several changes have been made in the execution of Genetic Algorithm with real codes. The performance of the RGA Approach in obtaining the compromised near-to-optimal solution is compared with the traditional methods, namely as Interactive approach and Fuzzy programming approach. The obtained results reveal that, the applied RGA technique is more advantageous and effective after incorporating some changes according to the problem statement. This approach gives more than one compromised near-to-optimal solutions as well as bypasses the allocation rule of (m +n − 1), which is a great advantage in solving FMOTP. Two numerical examples have been considered and discussed to demonstrate this advent.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Resource Estimation Policy Selection for Ecommerce Applications in Cloud 云环境下电子商务应用的最优资源估计策略选择
Poornima Anand Bommannavar, R. Krishnan, S. Shahedha
{"title":"Optimal Resource Estimation Policy Selection for Ecommerce Applications in Cloud","authors":"Poornima Anand Bommannavar, R. Krishnan, S. Shahedha","doi":"10.1109/ICATIECE45860.2019.9063825","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063825","url":null,"abstract":"Cloud Computing is growing exponentially across organizations in various domains and it has a vast impact on the way software gets developed and tested. The web based applications these days have configuration settings different from deployment requirements. The main focus of Cloud Computing is to deliver reliable, secured, fault-tolerant and elastic infrastructures for hosting an E-Commerce application. Scheduling policies and allocation policies for resources which affect the performance and utilization of cloud infrastructure (i.e. hardware, software services) for various E-Commerce application under varying load and system size is highly challenging problem to deal with. Performance analysis and optimal resource management policies allows cloud service providers to improve their Quality of Service (QOS). This work focuses on the process of selecting the best resource estimation policy for a given workload from various policies such as, Maximum Log-Likelihood, Maximum Product of Spacing Estimator, and Probability Weighted Movements. Detailed experimentation has been carried out for using the Amazon Web Service(AWS) public cloud, mimicking it on the cloudsim simulator. The modeling of workload is quiet challenging due to the unavailability of trace logs for analysis. Hence, in this paper, workload is generated based on application model for E-commerce application considering varying user behavior relating to different user profiles. The amount of resources consumed is closely monitored and a resource usage model has been developed and validated to choose the best estimation policy.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126766202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Verification of AMBA AHB AMBA AHB的设计与验证
Perumalla Giridhar, Dr Priyanka Choudhury
{"title":"Design and Verification of AMBA AHB","authors":"Perumalla Giridhar, Dr Priyanka Choudhury","doi":"10.1109/ICATIECE45860.2019.9063856","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063856","url":null,"abstract":"The AHB (Advanced High-performance Bus) is a high-performance bus in AMBA (Advanced Microcontroller Bus Architecture) family. It is a standard for intercommunication of modules in a system. AHB standards are defined by ARM and supports the communication of on-chip memories processors and interfaces of off-chip external memory. In this paper we present, design and perform verification of AHB which support one master and four slaves. In this work, the design of the AHB Protocol is developed comprising of the basic blocks such as Master, Slave, decoder and multiplexers. This AMBA-AHB protocol can be used in any application provided the design should be an AHB compliant. The building blocks of the design master, slaves, decoder and multiplexers are developed in Verilog. The verification environment is developed in system Verilog (SV). QuestaSim (Advanced verification tool from Mentor Graphics) is used to simulate and verify the design and calculate code and functional coverages.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信