2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

筛选
英文 中文
IoT Based Automated Weather Report Generation and Prediction Using Machine Learning 使用机器学习的基于物联网的自动天气报告生成和预测
Anubha Parashar
{"title":"IoT Based Automated Weather Report Generation and Prediction Using Machine Learning","authors":"Anubha Parashar","doi":"10.1109/ICCT46177.2019.8968782","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968782","url":null,"abstract":"The weather can have great impact on lives. Weather changes can influence wide range of human activities and affect agriculture and transportation. The main aim of this paper is to monitor and report weather conditions so that one is informed beforehand and necessary actions can be taken to reduce the damage by any calamity by forecasting it. Here we are using various sensors in order to collect the data and previous data is used in order to train the system and with current data collection we do the prediction. We will be analyzing temperature, pollutants, humidity and pressure and will predict the weather. Existing models are expensive in contrast to ours and hence it will make monitoring local area feasible as it will be cheaper.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Smart Forklift to Reduce Accidents 智能叉车减少事故
P. Patil, Vaishnavi D. Rajurkar, A. Salunke, A. Pljonkin
{"title":"Smart Forklift to Reduce Accidents","authors":"P. Patil, Vaishnavi D. Rajurkar, A. Salunke, A. Pljonkin","doi":"10.1109/ICCT46177.2019.8969024","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969024","url":null,"abstract":"This paper is to design a Smart Forklift model which reduces accident rates. Forklift is a powered industrial truck used to lift and move material over short distance. It is one of the most used machines employed for several types of tasks. Forklift is used on small as well as large scale on multiple locations. Various forklifts are available according to load capacity. Forklifts for general load purpose have capacity from 1 to 5 tons, and that of for heavier loads it has capacity of 50 tons. It has major drawback of severe accidents because of less safety features. To avoid these unwanted accidents, Smart Forklift is introduced, with arduino, gyro sensor, which decreases the rate of accidents and increases the safety of driver as well as vehicle. This design includes a small model which will detect problem whenever Forklift is in danger mode and a security threat indication is sent through a buzzer and light indication to driver.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124574154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effective Distribution of Local Intensity Gradient Technique for View Invariant Gait Recognition 局部强度梯度有效分布技术在视觉不变步态识别中的应用
Tejas.K. Rayangoudar, H. Nagaraj
{"title":"Effective Distribution of Local Intensity Gradient Technique for View Invariant Gait Recognition","authors":"Tejas.K. Rayangoudar, H. Nagaraj","doi":"10.1109/ICCT46177.2019.8968784","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968784","url":null,"abstract":"The proposed paper investigates the effectiveness of view invariance in gait recognition by implementing HOG behavioral feature extraction technique on CASIA-B and CMU MoBo gait database in which standard HOG (RHOG), circular HOG and MHOG are considered for feature extraction. The effectiveness of each feature is analyzed and compared using SVM based classifier on gait detection of the subject for changing view angle. 25 subjects are considered with 10 different view angles for each subject. Classification is done based on the influence of individual and combination of above mentioned features. In spatial domain, although the RHOG gives better precision in finding the gait with normal view angle, but when the view angles are changed with respect to binning angles of histograms, the CHOG feature gives up to 97% better and consistent classification rate against RHOG. Further MHOG feature analysis is considered to improve classification results up to 100%, thus addressing the rotational invariance problem. The work carried out shows better gait recognition results than the previous researchers for all the view angles.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121178310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approach to Reduce the Replication of Information and to Increase the Reliability of End to End Data Transmission in WSN 无线传感器网络中减少信息复制和提高端到端数据传输可靠性的新方法
Shilpa Choudhary, Lokesh Sharma, A. Kaushik, A. Mishra
{"title":"Novel Approach to Reduce the Replication of Information and to Increase the Reliability of End to End Data Transmission in WSN","authors":"Shilpa Choudhary, Lokesh Sharma, A. Kaushik, A. Mishra","doi":"10.1109/ICCT46177.2019.8968785","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8968785","url":null,"abstract":"Presently, WSN (Wireless Sensor Network) is the most standard administrations utilized in business and mechanical applications, due to its specialized advancement in a processor, correspondence, and low-control utilization of implanted registering gadgets. As of late a proficient plan of a Wireless Sensor Network has turned into a main zone of research. A Sensor is a gadget that reacts and recognizes some sort of contribution from both the physical or ecological conditions, for example, weight, heat, light, and so on. The output of the sensor nodes is commonly used as an electrical flag that is transmitted to a controller for further handling. Challenging task in WSN configuration is the means by which to spare node energy while keeping up the required network behavior. Any WSN can just satisfy its central goal as long as it is considered alive (till the sensor nodes are alive or battery control exhaustion) however not after that. Once any of the sensor nodes is declared dead, it will not involve in further data transmission process.In this paper a novel approach has been discussed to reduce the replication of information shared by the sensor nodes and to increase the reliability of end to end data transmission.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Sensor based Secured Health Monitoring and Alert Technique using IoMT 基于传感器的IoMT安全健康监测与报警技术
Surabhi Joshi, S. Joshi
{"title":"A Sensor based Secured Health Monitoring and Alert Technique using IoMT","authors":"Surabhi Joshi, S. Joshi","doi":"10.1109/ICCT46177.2019.8969047","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969047","url":null,"abstract":"A reliable health monitoring system essentially requires real time and continuous monitoring of critical health parameters of the patient and a prognostic approach to generate and send an alert during medical emergency. This paper proposes a sensor based health monitoring technique with adequate security features using Huffman Compression Coding and Rivest Shamir Adleman (RSA) encryption technique. Further, based on a prognostic approach an alert mechanism is developed with embedded software and internet of things. This proposed system is an improved version of existing systems and can be useful for patients on move or in intensive care unit.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130813534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Online CAPTCHA Replacement through Face Detection 通过人脸检测在线更换验证码
Rutwik Chinchole, Aditya Kakad, S. Bhirud, A. Raghunath, Ms. Snehal Mumbaikar
{"title":"Online CAPTCHA Replacement through Face Detection","authors":"Rutwik Chinchole, Aditya Kakad, S. Bhirud, A. Raghunath, Ms. Snehal Mumbaikar","doi":"10.1109/ICCT46177.2019.8969072","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969072","url":null,"abstract":"The sensitive information stored on the internet should not be easily accessible by any unauthorized personnel, it should be readily available only to the authorized people. Thus integrity, security and confidentiality need to be maintained. There needs to be a security check before any kind of access is granted to any kind of sensitive information. CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) is a popular way for authenticating a user. The main goal of any technique is to recognize whether it is a human who is accessing the content or a robot via some recognition techniques. The advancement in recognition technologies has enabled humans to develop bots which can now bypass common authentication techniques which have been in use for a long time. CAPTCHA has been in use since a very long time and has some serious drawbacks. Facial recognition alongside with artificial intelligence can overcome drawbacks like difficulty in solving, ambiguity, and sometimes easy prey for trained bots of CAPTCHA and can easily replace it.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Botnet in Cyber Security 僵尸网络在网络安全中的研究进展
Syeda Farjana Shetu, M. Saifuzzaman, Nazmun Nessa Moon, Fernaz Narin Nur
{"title":"A Survey of Botnet in Cyber Security","authors":"Syeda Farjana Shetu, M. Saifuzzaman, Nazmun Nessa Moon, Fernaz Narin Nur","doi":"10.1109/ICCT46177.2019.8969048","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969048","url":null,"abstract":"Botnets is one of the most critical cyber security threats that confronted by organizations day by day. Botnet has used distinctive strategies, topologies and communication protocol in specific levels in their life cycle. Identifying of botnets has emerged as a very challenging topic, particularly for the reason that they can improve their method at any time. Nowadays, most of the recent botnet detection techniques cannot locate modern botnets in an early stage. Mainly, botnets follow command and control infrastructure. Nowadays, botnet is an interesting and very vital research topic for researchers in our cyber security. This Paper represents a completely comprehensive evaluation that extensively discusses the botnet problem; this survey classifies all of the possible botnet detection methods, also summarizes previously published studies and recent works.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Analysis of Object Classification and Detection Methods to Mitigate Power Utilization 降低功耗的目标分类和检测方法分析
S. Talokar, Gajrajsingh Narde, Mohit Chaudhari
{"title":"Analysis of Object Classification and Detection Methods to Mitigate Power Utilization","authors":"S. Talokar, Gajrajsingh Narde, Mohit Chaudhari","doi":"10.1109/ICCT46177.2019.8969025","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969025","url":null,"abstract":"Now a day’s computing technology being grows rapidly so that object detection or identification is crucial in industry. The object detection is a technology related to computer perception and image processing for detecting samples of items to certain shapes in digital images and videos. The ultimate aim of object detection is segmenting the area of notified from a moving spot and to detecting of its motion, place and blockage. The Pattern recognition and classification introduced the pace for recognition of an object in sequence of images. This paper describes the different object detection, object classification methods including the analysis and comparative investigation of various methods and techniques useful for tracking the objects. Along with these the paper gives short idea about energy saving in industry by having application if image or video processing.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129212714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Design and Simulation Model of Coherent Optical DQPSK Modulation Technique for Long-Haul Communication 远距离通信相干光DQPSK调制技术的系统设计与仿真模型
Naresh Sothuku, V. A., Hemavathy Muthusamy
{"title":"System Design and Simulation Model of Coherent Optical DQPSK Modulation Technique for Long-Haul Communication","authors":"Naresh Sothuku, V. A., Hemavathy Muthusamy","doi":"10.1109/ICCT46177.2019.8969026","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969026","url":null,"abstract":"Coherent communication technologies extensively is used for high speed optical communications because it is tolerant to many dispersions like polarization mode dispersion (PMD) tolerance, chromatic dispersion (CD) mitigation, and provide high spectral efficiency. Coherent detection technique has the nature of preserving the phase information of the received optical signal. In DQPSK (Differential Quadrature Phase-Shift-Keying) format modulation, each symbol transmits 2 bits so that the symbol rate is half the bit rate, with reduced complexity of the system compared to QPSK. The biggest advantage of this coherent optical modulation DQPSK compared to QPSK is that it requires no optical phase lock loop at the receiver as the information is encoded in the differential phase. However, the transmitter requires an extra precoder component to map information in the differential phase. In this paper, the digital coherent DQPSK working principles and typical system design of optical communications is been explained and the simulation experiment shows the feasibility to transmit 20-Gb/s DQPSK signals with channel bandwidth of 10 GHz over more than 100 km. With that spectral efficiency improved by 2 bps/Hz. Also, this paper discusses about detailed simulation set up and various results of 20Gbps coherent DQPSK generated through simulation software.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"20 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Iris Recognition using Sobel Edge Detection for Secured Authentication 利用索贝尔边缘检测进行安全认证的生物特征虹膜识别
Nisha Vishwakarma, Vinod Patel
{"title":"Biometric Iris Recognition using Sobel Edge Detection for Secured Authentication","authors":"Nisha Vishwakarma, Vinod Patel","doi":"10.1109/ICCT46177.2019.8969040","DOIUrl":"https://doi.org/10.1109/ICCT46177.2019.8969040","url":null,"abstract":"Recognition of iris is basically a technique used by taking out the mathematical forms biometrically over any video-based images either of the eyes that consists of complex pattern which are exclusive and static in nature. Iris is a favoured biometric feature equated to supplementary biometrics due to its specificity and constancy characteristics. The first developed systems are often relied on bad edge recognition methods and filters. Various Recognition methods like Canny Edge Detection, Huff Transform, Gabor Filters, Dagman’s Operator Iris, are often utilized in the arena. There are some confines in the form of complex computational tactics, lack of precision for the images that contains complex noise, impediment due to lens, lashes of eyes and reflection observed in pre-work. The structure proposes a recognition of an iris or a validation system utilizing the method of Sobel Age Detection for the extraction of Iris feature. The tactic also evidences that the figurative depiction efficiently handles noise and declines, considering low resolutions, specular reflections and features that creates obstacle in the eye. The proposed system delivers improved safety results with the exact feature extraction here.","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124429126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信