2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)最新文献

筛选
英文 中文
Efficient Task Allocation Using Intelligent Bacterial Foraging Optimization (IBFO) Algorithm in Cloud 云环境下基于智能细菌觅食优化(IBFO)算法的高效任务分配
T. Vishrutha, P. Chitra
{"title":"Efficient Task Allocation Using Intelligent Bacterial Foraging Optimization (IBFO) Algorithm in Cloud","authors":"T. Vishrutha, P. Chitra","doi":"10.1109/ICIICT1.2019.8741422","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741422","url":null,"abstract":"Cloud usage increases with increase in computational demands. The number of tasks for execution in cloud increases which ends up in complexity of scheduling tasks to resources in an energy efficient manner and with reduction of computation time. To resolve this issue Bacterial Foraging Optimization (BFO) algorithm proves to handle energy and time consumption efficiently. Though Bacterial Foraging Optimization (BFO) is one of the widely known and robust algorithm for handling multi-objective optimization problems, the algorithm is basically static and is run for a fixed number of iterations. Due to the inflexibility of the algorithm, there exists a need for the improvement of the existing Bacterial Foraging Optimization (BFO) algorithm. This paper rolls out an improved version of Bacterial Foraging Optimization (BFO) called Intelligent Bacterial Foraging Optimization (IBFO) algorithm that is dynamic based on the problem. Intelligent Bacterial Foraging Optimization (IBFO) algorithm is found to be more efficient than the existing Bacterial Foraging Optimization (BFO) algorithm in task scheduling in cloud environment.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133185449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Credit Card Fraud Identification Using Machine Learning Approaches 使用机器学习方法识别信用卡欺诈
P. Kumar, Fahad Iqbal
{"title":"Credit Card Fraud Identification Using Machine Learning Approaches","authors":"P. Kumar, Fahad Iqbal","doi":"10.1109/ICIICT1.2019.8741490","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741490","url":null,"abstract":"Due to rapid growth of internet, online buying product is an important part of everyone’s lifestyle most of the time MasterCard is employed to pay online for products. It's a straightforward thanks to looking, people will get their required product on your visual display unit or on sensible phone. For online purchase use of MasterCard will increase dramatically however still there's some loop holes in system of online looking that causes online frauds or credit card frauds. Thus, fraud detection systems became essential for all MasterCard supply banks to attenuate their losses. The foremost normally used fraud detection strategies are Neural Network (NN), rule-induction techniques, fuzzy system, call trees, Support Vector Machines (SVM), Logistic Regression, Local Outlier Factor (LOF), Isolation Forest, K-Nearest Neighbor, Genetic algorithms. These techniques are often used alone or unitedly mistreatment ensemble or meta-learning techniques to make classifiers. This paper presents a survey of various techniques utilized in MasterCard fraud detection and evaluates every methodology supported bound criterion","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132137884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Spectrum Sensing in a VSAT Network Using Cognitive Radio Technology 基于认知无线电技术的VSAT网络频谱感知
S. Ushaa, N. Sangeetha, E. Murugavalli, P. Velmurugan, M. Suresh
{"title":"Spectrum Sensing in a VSAT Network Using Cognitive Radio Technology","authors":"S. Ushaa, N. Sangeetha, E. Murugavalli, P. Velmurugan, M. Suresh","doi":"10.1109/ICIICT1.2019.8741424","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741424","url":null,"abstract":"Satellite Spectrum is a very scarce and costly natural resource. The rapid development in satellite communications has increased the number of users, which in turn, created a demand for more spectral resources. Also due to the ever-increasing demand for bandwidth resulted from high data rate requirements, one of the main challenges for satellite communication is to continuously improve the utilization efficiency of the limited exclusive satellite spectrum (Ku-band). However, the available spectrum is also not utilized efficiently, which leads to spectrum under-utilization. Cognitive Radio (CR) technology has proved to be a promising option to address the spectrum scarcity. In CR, when a primary user (PU) is not utilizing the spectrum, the secondary users (SUs) are allowed to access the spectrum. This paper discusses the Spectrum Sensing in a Very Small Aperture Terminal (VSAT) network by using CR technology which is a new approach in this area. Also, this work will serve as a forerunner for future developments in this domain. VSATs are terminals that communicate with one another through satellite. Applying CR technology in VSATs, spectrum sensing can be performed to detect the spectrum holes where SUs can be accommodated. The spectrum holes are identified in the spectral domain using Fast Fourier Transform (FFT). The simulation results show the retrieved indices of spectrum holes, where SUs are to be accommodated.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121823568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development, Analysis and Evaluation of Arsenic (III) Sensor 砷(III)传感器的研制、分析与评价
H. R, S. M.
{"title":"Development, Analysis and Evaluation of Arsenic (III) Sensor","authors":"H. R, S. M.","doi":"10.1109/ICIICT1.2019.8741476","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741476","url":null,"abstract":"Pollution or contamination plays a major part in dreadful health hazards. Water, the most essential entity for life is being consumed without the knowledge of contaminants. Arsenic (As III) above 10µg/L is regarded to be poisonous to life and causes lung or skin cancer and cardiovascular geotaxis, mutagenic &carcinogenicc effects. Contamination of As may not only occurs in under or drinking water but also in sea water which may be a health threat to aquatic lives. Arsenic decontamination need to be strictly adopted upon any form of water purification. A special technique for the determination by express sensing of arsenic ionic level in water was examined on a Smooth or Glassy carbon electrode (GCE) with nano Gold transformation in 0.5 M H2SO4. The nano Gold was setup using a cycling potential continuously ranging from 0.619 to-0.481 V (vs. HAuCl4.3H2O) Chloro Auric Acid in 0.5 M H2SO4 solution. The Gold nano particles are electro-deposited on GCE. The electrode was examined by Differential Pulse Voltammetry (DPV), Anodic Stripping Voltammetry (ASV), Linear Sweep Voltammetry (LSV) and cyclic Voltammetry (CV). After optimization, a LOD (Level Of Detection) of 0.9 parts per billion (ppb) was achieved with a 60s transformation at −0.94 V in 0.5 M H2SO4whereas the WHO’s (World Health Organization) maximum allowable arsenic level is 10 ppb, in drinking water. Mercury Mercurious Sulphate (MMS) was used as standard reference electrode. The developed sensor was evaluated for copper ion interference and was found to have no interfering effect due to ionic copper which is the most potential obstructing ionic species in ionic arsenic determination.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reforming Cyber Security with Coding 用编码改革网络安全
M. Shilpa, Er. Rahul Sharma, Ms. Sonam, Mr. Sartaj Singh
{"title":"Reforming Cyber Security with Coding","authors":"M. Shilpa, Er. Rahul Sharma, Ms. Sonam, Mr. Sartaj Singh","doi":"10.1109/ICIICT1.2019.8741407","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741407","url":null,"abstract":"Today, a large number of transactions and data exchanged over internet through different data transaction layers among network. There is need to put a security or some patches to private data among military, commercial or financial sector. A number of cryptographic methods have recently proposed and implemented because of strong demand for encryption and decryption process against cyber-attacks. Most recent encrypting or encoding methods include many iterations and substitution processes to encounter some issues such as lack of robustness and valuable amount of time. In our proposed research, we introduce method based upon idea of encoding with programming to achieve cyber security. We use ASCII to build an encoding table with different way to enhance security and save cost and time.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on Breast Cancer Based on Extreme Learning Machine Features 基于极限学习机特征的乳腺癌调查
Zhiqiong Wangi, Hanyu Jiang
{"title":"Survey on Breast Cancer Based on Extreme Learning Machine Features","authors":"Zhiqiong Wangi, Hanyu Jiang","doi":"10.1109/ICIICT1.2019.8741497","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741497","url":null,"abstract":"Extreme Learning Machine algorithm which it is an optimization based learning framework for compression, feature, clustering, regression and classification. It is an artificial hidden nodes and proposed to overcome these issues and offer better generalization performance by Unique minimum solution. In this paper Computer-aided diagnosis (CAD) based on Convolutional Neural Network (CNN) feature and they are based on deep, morphological, texture and density features. Mammography concept is been more used and to detect early stage of breast cancer and can helps out whether they are Malignant or Benign in CAD system they are classified by normal or abnormal tissue with the help of mammography images. The main objective of this paper is to detect the stage of breast cancer tissue is harmful or not in this algorithm.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"5 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Compact-Circular Monopole UWB Antenna with Dual Notch Bands 双陷波带紧凑圆形单极超宽带天线的设计
P. S, M. C, Esther Florence S
{"title":"Design of Compact-Circular Monopole UWB Antenna with Dual Notch Bands","authors":"P. S, M. C, Esther Florence S","doi":"10.1109/ICIICT1.2019.8741500","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741500","url":null,"abstract":"A current UWB antenna with compact-circular monopole UWB antenna support by a microstrip line with a semi-rectangular ground plane is given in this paper to realize an operating bandwidth from 3.3GHz to 12GHz. Low-cost FR4-lossy material with a dimension of 12mm×18mm×1.6mm has taken place used to design the antenna. The proposed antenna is incorporated with L-shape complimentary slots with discontinuities. The I-shape slots are placed in such that the discontinuities face in the feed line and it will generate a static resonance which is the reason for the dual notch bands covering the frequency ranges of WiMAX and WLAN.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Garbage Monitoring System 基于物联网的垃圾监控系统
S. Chandra, G. Sravanthi, B. Prasanthi, V. R
{"title":"IoT Based Garbage Monitoring System","authors":"S. Chandra, G. Sravanthi, B. Prasanthi, V. R","doi":"10.1109/ICIICT1.2019.8741414","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741414","url":null,"abstract":"In the recent spans of years, Urbanization has inflated terribly nice in size and there's a rise in waste production. Waste management has been a typical issue to be thought of. during this paper, sensible bin is constructed with ARM microcontroller that is interfaced With UART and IR sensors. IR sensors square measure placed at each ends of trash bin. They work under AND operation. When the dust bin is filled message will be sent to the respective mobile displaying \"Garbage is filled\". It ceaselessly alerts the specified authority till the rubbish within the garbage can is press. Once the garbage can is press, individuals will recycle the garbage can. Once these dustbins are enforced on an outsized scale, by substitution ancient bins, waste will be re-used expeditiously and avoids gratuitous lumping of wastes on road aspect. Foul smell from these rotten wastes that remained untreated for while, because of neglectfulness of authorities and public could cause sturdy issues. Breeding of insects and mosquitoes will produce nuisance around promoting unclean atmosphere. this might even cause dreadful diseases.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124898452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced Performance of Cryptographic Mechanism using Randomized Generation Technique for Secure Transmission of Data 利用随机生成技术提高数据安全传输的加密机制性能
Pallab Banerjee, Vijendra Kumar, R. Raj
{"title":"Enhanced Performance of Cryptographic Mechanism using Randomized Generation Technique for Secure Transmission of Data","authors":"Pallab Banerjee, Vijendra Kumar, R. Raj","doi":"10.1109/ICIICT1.2019.8741408","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741408","url":null,"abstract":"The rapid growth of electronic devices depending on the internet has solved many problems that the humans were facing. The major challenge is “To transmit secure data over the network and to assure its confidentiality, integrity and availability”. The solution is to transfer encrypted data over the network to prevent its unauthorized identification, modification, destruction etc. A new proposed encryption and decryption algorithm has been designed in this paper, in which the data is mathematically scrambled to a form such that the original data is surrounded by a set of randomly generated alphabets. The encrypted format is based on the collection of ASCII codes. This form is used to transfer the data over the insecure network channels.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128360394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Recommendation System Based on Human Interest 基于人类兴趣的视频推荐系统
Shainee Jain, Tejaswi Pawar, Heth Shah, Omkar Morye, B. Patil
{"title":"Video Recommendation System Based on Human Interest","authors":"Shainee Jain, Tejaswi Pawar, Heth Shah, Omkar Morye, B. Patil","doi":"10.1109/ICIICT1.2019.8741428","DOIUrl":"https://doi.org/10.1109/ICIICT1.2019.8741428","url":null,"abstract":"In today’s world watching online videos have become a popular trend and a daily habit of our new generation. Videos are a reliable source for gaining knowledge and it is easier to grasp information through videos than reading. The internet is flooded with billions of videos hence it is a time consuming task for user to find a relevant video. So to save time as well as efforts there is a necessity to build a strong, efficient and accurate recommendation system which will display appropriate videos for the users. Video recommendation system saves users from browsing lots of videos to choose the appropriate ones, and on the other hand, it also brings the video websites more network traffic and user stickiness. The main task of the system is to provide personalized recommendations using Web Crawler, Rating Factor Neural Network, Slope one, and Slope one based Map Reduce of two types, one is Content-based filtering, and the other is Collaborative Filtering. Presentation of recommendations is an important part of the overall user experience. Video recommendation algorithm is the core of the system. The proposed paper is about the system which allows user to search for their favorite videos and the system recommends videos relevant to their choice.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130566049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信