2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)最新文献

筛选
英文 中文
Deep Learning to Detect Plant Diseases 深度学习检测植物病害
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609389
Rajiv Kumar
{"title":"Deep Learning to Detect Plant Diseases","authors":"Rajiv Kumar","doi":"10.1109/ISPCC53510.2021.9609389","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609389","url":null,"abstract":"Economy of any nation shares a major part with the agriculture and crop production. Good yield is badly impacted by the diseases in plants and crops. Due to involvement of manual inspection on majority, poses a challenge to identify the plant diseases and in turn the crop yield is reduced, or quality is affected. Monitoring plants and crops spread over a large area is tedious task for the farmers or cultivators. Sometimes, the disease may not be known to the farmer. The present paper presents a system involving a standard smartphone to predict the plant diseases using machine learning approach. The proposed system collects data, as plant disease images, and that dataset is used to detect various diseases of plants and crop. It potentially benefits the cultivators as it is capable to detect the diseases without minimal human intervention with prompt results. Further, the proposed technique helps in detecting diseases during its early stage to safeguard the yield. Neural network-based model is trained to detect plant diseases and the crop types. During test results, the model achieves an accuracy of 96.78% in detecting diseases which is of significant use to the cultivators. Further, the system recommends the possible pesticides to use in every category of the disease.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"76 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114036703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Temporal Feature Aggregation of Audio-Video Signals for Human Emotion Recognition 一种用于人类情感识别的音频-视频信号的有效时间特征聚合
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609528
Lovejit Singh, Sarbjeet Singh, N. Aggarwal, Ranjit Singh, Gagan Singla
{"title":"An Efficient Temporal Feature Aggregation of Audio-Video Signals for Human Emotion Recognition","authors":"Lovejit Singh, Sarbjeet Singh, N. Aggarwal, Ranjit Singh, Gagan Singla","doi":"10.1109/ISPCC53510.2021.9609528","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609528","url":null,"abstract":"Due to the significance of human behavioral intelligence in computing devices, this work focused on the facial expressions and speech of humans for their emotion recognition in multimodal (audio-video) signals. The audio-video signals consist of frames to represent the temporal activities of facial expressions and speech of humans. It become challenging to determine the efficient method to construct a spatial and temporal feature vector from the frame-wise spatial feature descriptor to describe the facial expressions and speech temporal information in audio-video signals. In this paper, an efficient temporal feature aggregation method is presented for human emotion recognition in audio-video signals. The Local Binary Pattern (LBP) feature of facial expressions and Mel Frequency Cepstral Coefficients (MFCCs) and its $Delta+DeltaDelta$ of speech are computed from each frame. The experiment analysis is performed to decide the efficient method for temporal feature aggregation, i.e., sum normalization or statistical functions, to construct a spatial and temporal feature vector. The multiclass Support Vector Machine (SVM) classification model is trained and tested to evaluate the performance of temporal feature aggregation method with LBP features and MFCCs and its $Delta+DeltaDelta$ features. The Bayesian optimization (BO) method determines the optimal hyper-parameters of the multiclass SVM classifier for emotion detection. The experiment analysis of proposed work is performed on publicly accessible and challenging Crowd-sourced Emotional Multimodal Actors-Dataset (CREMA-D) and compared with existing work.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114873680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Comparative analysis of Mux Tree using Different Low Power Design Techniques 采用不同低功耗设计技术的复用树设计与比较分析
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609494
Kanika Sharma, Ashwni Kumar
{"title":"Design and Comparative analysis of Mux Tree using Different Low Power Design Techniques","authors":"Kanika Sharma, Ashwni Kumar","doi":"10.1109/ISPCC53510.2021.9609494","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609494","url":null,"abstract":"The work present in this paper depicts the design and thorough comparative analysis of a digital circuit namely, 4X1 mux tree (data selector) using different Low Power design techniques i.e., Standard body bias technique, DTMOS, FGMOS, Quasi-FGMOS(QFGMOS). Ultra-Low power, High Speed and Low voltage is the need of the hour in the VLSI industry. So, this paper further investigates the performance characteristics and scrutiny of each technique described above to ensure the tradeoff between various parameters in best possible way as per the requirement. The simulations in the proposed paper are carried out in LTSPICE using TSMC 180nm technology by keeping all the design parameters such as aspect ratio, input voltage, bias voltage same. Power dissipated, Output voltage, delay, PDP and EDP are also calculated for each technique based circuitry.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122869668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Clustering in WSN: Optimization Techniques and Future Research Challenges 无线传感器网络聚类研究综述:优化技术与未来研究挑战
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609420
Abha Sharma, Prasenjit Das, R. B. Patel
{"title":"A Comprehensive Review on Clustering in WSN: Optimization Techniques and Future Research Challenges","authors":"Abha Sharma, Prasenjit Das, R. B. Patel","doi":"10.1109/ISPCC53510.2021.9609420","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609420","url":null,"abstract":"Wireless Sensor Networks (WSNs) has become an attraction for various academic researchers and technical communities in these modern times. The aim is to work upon key issues like better data communication, maintain network load, reliability, scalability, and augment security issues. Clustering has its own significance in WSN as it plays a vital role in energy utilization, which is one of the key concerns in any kind of network. A cluster is formed by set of nodes, the formed cluster is responsible for improving the routing structure that reduces network delay and create a network with better efficiency. Nodes in a cluster come together on the basis of fitness function. The proposed review focuses on clustering aspects like objectives that are facilitated, characteristics, taxonomy for cluster formation and classification of the optimization techniques used to enhance the clustering process in WSNs which have been proposed in previous years.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Encryption Algorithms based on Security in IoT (Internet of Things) 物联网中基于安全的加密算法
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609495
Amanpreet Kaur, Gurpreet Singh
{"title":"Encryption Algorithms based on Security in IoT (Internet of Things)","authors":"Amanpreet Kaur, Gurpreet Singh","doi":"10.1109/ISPCC53510.2021.9609495","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609495","url":null,"abstract":"The Internet is evolving everywhere and expanding its entity globally. The IoT(Internet of things) is a new and interesting concept introduced in this world of internet. Generally it is interconnected computing device which can be embedded in our daily routine objects through which we can send and receive data. It is beyond connecting computers and laptops only although it can connect billion of devices. It can be described as reliable method of communication that also make use of other technologies like wireless sensor, QR code etc. IoT (Internet of Things) is making everything smart with use of technology like smart homes, smart cities, smart watches. In this chapter, we will study the security algorithms in IoT (Internet of Things) which can be achieved with encryption process. In the world of IoT, data is more vulnerable to threats. So as to protect data integrity, data confidentiality, we have Light weight Encryption Algorithms like symmetric key cryptography and public key cryptography for secure IoT (Internet of Things) named as Secure IoT. Because it is not convenient to use full encryption algorithms that require large memory size, large program code and larger execution time. Light weight algorithms meet all resource constraints of small memory size, less execution time and efficiency. The algorithms can be measured in terms of key size, no of blocks and algorithm structure, chip size and energy consumption. Light Weight Techniques provides security to smart object networks and also provides efficiency. In Symmetric Key Cryptography, two parties can have identical keys but has some practical difficulty. Public Key Cryptography uses both private and public key which are related to each other. Public key is known to everyone while private key is kept secret. Public Key cryptography method is based on mathematical problems. So, to implement this method, one should have a great expertise.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of TCP Queues: Effect of Buffer Size and Round Trip Time TCP队列的性能分析:缓冲区大小和往返时间的影响
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609523
Lokesh Bommisetty
{"title":"Performance Analysis of TCP Queues: Effect of Buffer Size and Round Trip Time","authors":"Lokesh Bommisetty","doi":"10.1109/ISPCC53510.2021.9609523","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609523","url":null,"abstract":"In this paper, we demonstrate the effect of buffer size and the round trip time (RTT) on the statistical, dynamical properties of the transport control protocol (TCP) flows. We analyze the queue metrics like link utilization, queue size and packets lost with respect to buffer sizes and RTT. To analyze the network performance, we consider three buffer regimes: large buffer, intermediate buffer, and small buffer. In large buffer regime, we consider the delay bandwidth product gives that buffer size. The intermediate buffer size is determined by scaling the size of large buffer with the square root of the TCP flows using that link. In small buffer regime, fixed length buffer is considered. We study the aggregate traffic flow behaviour of multiple TCP flows and the compound TCP models of traffic flows. The behaviour of fluid models of traffic flows is studied to analyze the dependency of stability, goodput and the magnitude of oscillations when the model is unstable. We perform the packet level simulations of single bottleneck and two bottle neck queues to study the performance parameters like queue size, dropped packets and link utilisation for different buffer sizes and RTTs. We suggest that the buffer sizes can be much smaller than the buffer sizes recommended currently with the support of statistical and control theoretical analysis.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of Data Analysis in Higher Education 数据分析在高等教育中的作用
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609509
Sidharth Gautam
{"title":"Role of Data Analysis in Higher Education","authors":"Sidharth Gautam","doi":"10.1109/ISPCC53510.2021.9609509","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609509","url":null,"abstract":"The reason and worth of higher education is changing. Innovation is reinforcing the capacities of foundations to confront the new difficulties. Advanced education approaches domains of information which can be utilized to further develop dynamic. The utilization of Big Data and investigation in advanced education is generally new region. The pertinence of examination is significantly seen in numerous spaces and advanced education is the same. This paper inspects the job of Big Data and examination in advanced education. In this paper an attempt has been made to discuss the role of techniques of data analysis in higher education system.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127249138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Challenges and Issues in IoT 物联网中的安全挑战和问题
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609486
Sanjeev Kumar, Sukhvinder Singh Deora
{"title":"Security Challenges and Issues in IoT","authors":"Sanjeev Kumar, Sukhvinder Singh Deora","doi":"10.1109/ISPCC53510.2021.9609486","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609486","url":null,"abstract":"Internet of Things (IoT) is sometimes called the internet of devices. In IoT, environment devices are connected with the help of gateways. All required information can be accessed by a device with the help of internet gateways from any network. So, it is very challenging to transfer data in open surroundings where the security of data is very problematic. In this paper architecture of IoT, security challenges, security requirements, and future security challenges of IoT have been discussed in detail, after that, a comparative analysis of different security techniques has been presented. At last literature review on different papers of security in IoT has been presented with pros and cons.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126678587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Communication Technologies for Internet of Things and Precision Agriculture: A Review 物联网与精准农业无线通信技术综述
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609421
D. Singh, R. Sobti
{"title":"Wireless Communication Technologies for Internet of Things and Precision Agriculture: A Review","authors":"D. Singh, R. Sobti","doi":"10.1109/ISPCC53510.2021.9609421","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609421","url":null,"abstract":"Precision Agriculture is an important application of the Internet of Things (IoT). Precision Agriculture is the solution to the food shortage that may hit the world due to the large population, about 9.5 billion by 2050, and other environmental impacts like water scarcity due to conventional agricultural practices. IoT provided field and weather information to farmers and relies on communication technologies for the sharing of information. Wireless communication technologies provide the means to transmit the collected information in an IoT network. ZigBee, RFID, NFC, Bluetooth, BLE, LTE, 6LoPWAN, Sigfox, and LoRa are the major technologies deployed in IoT for agriculture. Wireless communication technologies differ in their data communication range and power efficiency. Some are suitable for short-distance monitoring while few offer the long communication range for monitoring and control. Various available wireless communication technologies are revied in this article for their technical specifications and their applicability in Precision Agriculture.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Review on Encryption based Open Source Cyber Security Tools 基于加密的开源网络安全工具综述
2021 6th International Conference on Signal Processing, Computing and Control (ISPCC) Pub Date : 2021-10-07 DOI: 10.1109/ISPCC53510.2021.9609369
Ritika Sharma, Sarishma Dangi, P. Mishra
{"title":"A Comprehensive Review on Encryption based Open Source Cyber Security Tools","authors":"Ritika Sharma, Sarishma Dangi, P. Mishra","doi":"10.1109/ISPCC53510.2021.9609369","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609369","url":null,"abstract":"With the worldwide migration of workloads on internet and doud based platforms, maintaining security has become a major bottleneck in business workflows. Open source security tools are widely available for maintaining network security, endpoint security, system security etc. However, there exists a gap in adoption of these tools amidst end users. In This work, we have reviewed encryption based open source cybersecurity tools for a detailed study and comparison under different categories. Numerous open source tools are investigated which can be used by cyber security industries, academia, hackers and business institutions across the world. A comprehensive review of the tools is provided so as to guide anyone who wants to explore encryption based tools in today’s rapidly evolving digital world.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134053158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信