2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)最新文献

筛选
英文 中文
Procedding Cover Procedding封面
{"title":"Procedding Cover","authors":"","doi":"10.1109/icetet-sip-2254415.2022.9791774","DOIUrl":"https://doi.org/10.1109/icetet-sip-2254415.2022.9791774","url":null,"abstract":"","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127464967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of CNN Architectures for Maize Crop Disease 玉米作物病害CNN架构的比较分析
Rakshit Agrawal, Vinay Singh, Mahendra Kumar Gourisaria, Ashish Sharma, Himansu Das
{"title":"Comparative Analysis of CNN Architectures for Maize Crop Disease","authors":"Rakshit Agrawal, Vinay Singh, Mahendra Kumar Gourisaria, Ashish Sharma, Himansu Das","doi":"10.1109/ICETET-SIP-2254415.2022.9791628","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791628","url":null,"abstract":"In the current scenario, the Agriculture industry is regarded as the leading industry for society, serving all the needs for the betterment of humanity. Plants are considered to be one of the primary sources of humanity's energy production concealed with nutrients, medicinal cures, etc. Any harm or disease due to exposure of pathogens, viruses, bacteria, etc. to the plants during agriculture leads to the downfall of productivity making it a crucial concern to prevent such diseases and take necessary steps to avoid them. Making accurate identification of such fatal diseases is an important step for the industry as well as for the farmers. In our study, we have implemented fifteen different Convolutional Neural Networks (CNN) which takes plant leaf image as an input source. These architectures have different layers, neurons per layer, optimizers, etc. Our goal is to provide a detailed comparative analysis between the various frameworks based on accuracy, precision, Least Validation Cross-Entropy Loss (LVCEL), etc. parameters in the most effective way. From the experimental results, we found the sixth architecture to be the most accurate model. With the modification of convolutional layers and the use of the correct optimizer, results can be improved to a great extends.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sentiment Analysis Using K Means Clustering on Microblogging Data Focused on Only the Important Sentiments 基于K均值聚类的微博数据情感分析
Agashini V. Kumar, K. Meera
{"title":"Sentiment Analysis Using K Means Clustering on Microblogging Data Focused on Only the Important Sentiments","authors":"Agashini V. Kumar, K. Meera","doi":"10.1109/ICETET-SIP-2254415.2022.9791723","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791723","url":null,"abstract":"The aim of this paper is to perform sentiment analysis on a microblogging data (Twitter data is taken for the experiment) using k means clustering algorithm. The main intention here is to study the conditions that may favor or not, sentiment analysis using k means clustering considering only two major sentiments as positive and negative. The other sentiments which are not of major interest are made into another cluster and the accuracy of the clusters thus formed is analyzed and meaningful conclusions from the same can be obtained.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129316390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Security Barrier (ISB): Hide valuable information in image using machine learning 图像安全屏障(ISB):利用机器学习隐藏图像中有价值的信息
Pranay Maske, Kunal Pardhi, Shubham Hatzade, Rakesh Sharma, Sampada S. Wazalwar
{"title":"Image Security Barrier (ISB): Hide valuable information in image using machine learning","authors":"Pranay Maske, Kunal Pardhi, Shubham Hatzade, Rakesh Sharma, Sampada S. Wazalwar","doi":"10.1109/ICETET-SIP-2254415.2022.9791749","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791749","url":null,"abstract":"People have a addictions of sharing their daily activities on story, posts, chatting or snap in form of an image on social media. Sometimes image content information includes the date of birth, addresses, phone no, Aadhar no, PAN no, or QR code.if someone shares too much information, then hackers can harvest this information and use it for illegal purposes and like government and Businesses secret information leak, due to lack of security or maliciously, causes big costs in money, a distinction of business, and national security. In this paper, we present software/tool for hiding such kind sensitive/private data of users while shearing on the world of internet. ISB is a software/tool that creates a barrier between hackers and public it recognizes our sensitive information from image/document and hide or encrypt them. An ISB provides secured image with 95.5% of accuracy The final output is completely secure for sharing anywhere on Internet/social media platforms.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on Power Allocation in PD-NOMA for 5G Wireless Communication Systems 5G无线通信系统PD-NOMA功率分配研究
Prasheel N. Thakre, S. Pokle
{"title":"A survey on Power Allocation in PD-NOMA for 5G Wireless Communication Systems","authors":"Prasheel N. Thakre, S. Pokle","doi":"10.1109/ICETET-SIP-2254415.2022.9791576","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791576","url":null,"abstract":"Non-Orthogonal Multiple Access (NOMA) is a proposed technology for 5G NR (New Radio) networks in the future to increase capacity, user fairness, spectrum efficiency, and mass connectivity. NOMA permits several users to share identical radio resources like time slots, subcarriers, or spreading code simultaneously. Therefore, in designing NOMA the main challenge is to select resource allocation algorithms since user pairing and power allocation go hand in hand. NOMA is a general framework that can be easily blended with several recently proposed 5G multiple access schemes. In this survey paper, the NOMA scheme is discussed and thereby provides an overview of the algorithms designed for optimizing power allocation in the power domain NOMA, considering three different parameters: Max-Min Fairness(MMF), maximizing Sum Rate, and maximizing Energy Efficiency in different radio networks.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121839601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid Approach to Enhance Security and Friendliness of Visual Secret Sharing Scheme 增强可视化秘密共享方案安全性和友好性的混合方法
V. Panchbhai, S. Varade
{"title":"Hybrid Approach to Enhance Security and Friendliness of Visual Secret Sharing Scheme","authors":"V. Panchbhai, S. Varade","doi":"10.1109/ICETET-SIP-2254415.2022.9791815","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791815","url":null,"abstract":"In Block based Progressive Visual Secret Sharing (BPVSS) scheme, secret image will be recovered block by block from noise-like and meaningful shares. It is found that only meaningful shares are user-friendly. But the meaningful shares generated through BPVSS techniques show poor visual quality so it is suspicious to intruder while transmission over internet. Thus, this paper proposes a meaningful share generating strategy based on BPVSS and LSB-based steganography to solve the above-mentioned problem with less processing power and time. The proposed system delivers superior standard performance parameter readings and has various advantages, including (1) it is suited for grayscale as well as color secret images, (2) the contrast of the recovered image is the same as the original secret image, and (3) computational power and time required to recover secret image is very less.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130242689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Punjabi Speech Emotion Recognition using Prosodic, Spectral and Wavelet Features 基于韵律、谱和小波特征的旁遮普语语音情感识别
Chaitanya Singla, Sukhdev Singh
{"title":"Punjabi Speech Emotion Recognition using Prosodic, Spectral and Wavelet Features","authors":"Chaitanya Singla, Sukhdev Singh","doi":"10.1109/ICETET-SIP-2254415.2022.9791593","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791593","url":null,"abstract":"A rapid advancement can be seen in affective computing, speech emotion recognition (SER) and human computer interaction, SER has been getting more consideration. English, German and Indian are all popular languages that can be used for SER. Due to the lack of Punjabi speech emotion data, very few researchers have tried to implement Punjabi SER systems. Despite the fact that Punjabi is one of the most commonly spoken and understood languages over the web, there has not yet been a Punjabi speech emotion database. This work introduces a semi-natural Punjabi speech emotions database that was compiled from several TV series and Punjabi movies. This database contains utterances of male and female actors, and covers four emotions: happy, sad, neutral, and happy. The database is used to compute prosodic, wavelet and spectral features for emotion recognition. Wavelet parameters, in addition to the Mel frequency Cepstral (MFCC), which are widely used for SER, are also taken into account. The extracted features can also be used to classify emotions.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"139 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning based Distributed Dynamic Spectrum Access 基于机器学习的分布式动态频谱访问
Sonia, S. Singh
{"title":"Machine Learning based Distributed Dynamic Spectrum Access","authors":"Sonia, S. Singh","doi":"10.1109/ICETET-SIP-2254415.2022.9791818","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791818","url":null,"abstract":"With innovations in the field of wireless communication many advanced technologies are coming up keeping in point data rates and mobile traffic so that users can efficiently communicate. Different coexistence scenarios between Wi-Fi and long-term evolution technique as 4G-LTE, spectrum-sensing techniques and spectrum-access method have been studied, proved, and simulated so far. This paper is mainly focused on performing spectrum-access in dynamic and distributed manner. This can be achieved using deep-reinforcement-learning model. It gives us information about overall channel-utilization and response of model applying different policy methods. In the proposed methodology policy functions as Boltzmann distribution, epsilon greedy, upper confidence bound, and Thompson sampling are used to obtain a reward in learning algorithm. Results shows that Thompson sampling policy performs superior than others.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of E-healthcare data using DWT-SVD based Hybrid watermarking 使用基于DWT-SVD的混合水印实现电子医疗数据的安全性
K. Singh, Pushpanjali Singh, H. Singh
{"title":"Security of E-healthcare data using DWT-SVD based Hybrid watermarking","authors":"K. Singh, Pushpanjali Singh, H. Singh","doi":"10.1109/ICETET-SIP-2254415.2022.9791599","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791599","url":null,"abstract":"Due to advancement in technology nowadays, it is easy to manipulate and produce illegal multimedia data. As a consequent, different strategy of information security has been created by the researchers and specialists every day. Digital watermarking is one of the various techniques used these days to secure the data in efficient manner. In this data has been embedded using a suitable algorithm and watermark. Again at the receiving end watermark has been extracted for the reconstruction of original data. Watermarking can be done using spatial domain or transform domain. In this paper watermarking has been done using transform domain techniques on digital images. The proposed method includes DWT-SVD hybrid watermarking technique in addition to watermark generation. This method has been performed on medical images for securing the data. The original image is firstly processed by using DWT followed by SVD. The results have been tested by applying various attacks for the robustness of algorithm. The quality of an image can be evaluated by different parameters as PSNR, SNR and SSIM. The proposed method achieved a good value of PSNR and SSIM.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133105433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Three Stage Ku-Band GaN HEMT Power Amplifier 一种三级ku波段GaN HEMT功率放大器
Ravinder Kumar, Sukwinder Singh
{"title":"A Three Stage Ku-Band GaN HEMT Power Amplifier","authors":"Ravinder Kumar, Sukwinder Singh","doi":"10.1109/ICETET-SIP-2254415.2022.9791701","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791701","url":null,"abstract":"This paper describes the design of a Ku band power amplifier using GaN HEMTs. To obtain high efficiency, matching networks are incorporated into power amplifier. In order to design matching networks, the optimum source and load impedances are determined by the load pull analysis. As from single and two stage Ku band PAs do not provide the required gain for our requirement, a three stage Ku band PA is designed. At 13.63 GHz, the designed power amplifier provides more than 37.7dBm output power with large signal gain greater than 37dB and power added efficiency close to 40%.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信