2019 4th International Conference on Information Systems and Computer Networks (ISCON)最新文献

筛选
英文 中文
Coalescing Artificial Intelligence with Augmented Reality to vitalize Smart-Glasses 结合人工智能与增强现实,激活智能眼镜
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036274
Naman Sharma, R. Bathla
{"title":"Coalescing Artificial Intelligence with Augmented Reality to vitalize Smart-Glasses","authors":"Naman Sharma, R. Bathla","doi":"10.1109/ISCON47742.2019.9036274","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036274","url":null,"abstract":"Over the last decade, artificial intelligence has become a core for success of Augmented Reality. This paper will discuss the rise of Artificial Intelligence, birth of Augmented Reality and the dwindling of Smart glasses. We will talk about what went right and what went wrong when the wave of smart glasses started in 2013 and how Artificial Intelligence and Augmented Reality; two of its major segments will enable it to flourish. Several other technologies have been discussed which have major impact on development of smart glasses. As well as a concept of smart glasses has been discussed, with this concept, we introduce about some new features which will be a major assistance to the further improvement of smart glasses in the future.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reconfigurable Antenna Design with Air Substrate for S and C bands S波段和C波段空气基板可重构天线设计
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036224
Farha, R. S. Yadav
{"title":"Reconfigurable Antenna Design with Air Substrate for S and C bands","authors":"Farha, R. S. Yadav","doi":"10.1109/ISCON47742.2019.9036224","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036224","url":null,"abstract":"A key shaped Microstrip patch reconfigurable antenna (100X70X3.8 mm3) with air substrate has been presented for 5G spectrum applications. The antenna exhibits circular as well as elliptical polarization and operates at 3.5 GHz, 6GHz, 7.7GHz, 7.8 GHz and 7.9 GHz with pattern diversity as per the ON and OFF conditions of the two PIN switches with high gain.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116735275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Umbrella based Cognitive Environment Map in Uplink Cellular Networks 基于伞形认知环境映射的上行蜂窝网络性能分析
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036191
Astha Sharma
{"title":"Performance Analysis of Umbrella based Cognitive Environment Map in Uplink Cellular Networks","authors":"Astha Sharma","doi":"10.1109/ISCON47742.2019.9036191","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036191","url":null,"abstract":"Future devices are envisioned to be ‘Super Smart’ empowered by convergence of diverse advanced hardware and software technologies such as Cloud Computing, Cognitive Radio, Big Data, Machine Learning and Artificial Intelligence. These devices armed with cognitive intelligence will use perception capability to interact and learn from the environment and make the decisions instantly. It is challenging to accurately determine spatial spectrum opportunities available in uplink bands of cellular network due to varied primary user locations. This paper has laid a framework for spectrum opportunity detection wherein the future devices embedded with cognitive intelligence will have a potential to build a ‘Cognitive Environment Map (CEM)’. A CEM that can be viewed as a sort of internal neural representation of the geographical space in which the device operates to effectively detect spectrum opportunities. The performance improvement provided by the CEM, constructed using an efficient computational geometry technique named ‘Umbrella-based algorithm’ over traditional circular ranges is analyzed in an uplink cellular network. Results show that CEM are able to solve the hidden and exposed nodes problem considerably and performance of the opportunity detector is analyzed. Further, the impact of varying detection range, interference ranges of primary and secondary users as well as effect of propagation environment in terms of operational SNR and SINR is also discussed.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116860498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spam SMS Filtering using Recurrent Neural Network and Long Short Term Memory 基于递归神经网络和长短期记忆的垃圾短信过滤
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036269
A. Chandra, S. Khatri
{"title":"Spam SMS Filtering using Recurrent Neural Network and Long Short Term Memory","authors":"A. Chandra, S. Khatri","doi":"10.1109/ISCON47742.2019.9036269","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036269","url":null,"abstract":"SMS is the abbreviation for Short Messaging Service which uses standard protocols for mobile devices to exchange information via short text messages. Today SMS's are an easy, inexpensive and widely accepted way to communicate rather than phone calls. Spam can be described as random unsolicited messages sent at large without any authorization from the receiver. People still deal with spammer's misusing SMS's to advertise false claims and can gain access to private information of users. Emails, social media sites, review, and even Twitter has seen spammers trying to intrude everywhere with the advent of Internet. Spam appears in many forms like comments, emails, search results and personal messages where spammers tend to gain revenues. Various Machine Learning algorithms like Neural Networks have tried to detect spam messages and normal messages or ham from SMS's. These techniques can learn high level features automatically using raw data unlike traditional ways where features are selected after analysis for classification. In this research paper, we propose a new method utilizing Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM) using Keras models and Tensorflow backend to detect Spam and Ham from ‘SpamSMSCollection’ dataset available at UCI machine learning repository. Crucial preprocessing of dataset included tokenization, TF-IDF Vectorization and removal of stopwords. Overall accuracy of 98% is achieved and shows improvement from other machine learning algorithms for spam detection.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115628122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Employee Turnover Prediction System 员工离职预测系统
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036180
Mehul Jhaver, Yogesh Gupta, A. Mishra
{"title":"Employee Turnover Prediction System","authors":"Mehul Jhaver, Yogesh Gupta, A. Mishra","doi":"10.1109/ISCON47742.2019.9036180","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036180","url":null,"abstract":"Employee turnover has been recognized as a main problem for industries due to its contrary influence on work place throughput and long term development tactics. To resolve this issue, officialdoms use machine learning techniques to guess employee turnover. Precise predictions qualify administrations to take action for holding of employees. Nonetheless, the data for this type of issue comes from HR Information Systems. This leads to the supremacy of noise in the data that extracts predictive models disposed to over-fitting and hence imprecise. This is the main problem that is the motivation of this study, and one that has not been handled earlier. The innovative contribution of this study is to reconnoiter the application of Gradient Boosting technique which is more robust because of its regularization formulation. The global retailer data is used to compare Gradient Boosting against three traditionally used supervised classifiers like Logistic Regression, Support Vector Machine, Random Forest and reveal its suggestively higher accuracy for predicting employee turnover. In this study I have also implemented Artificial Neural Network to study how to the neural network helps in classification of different classes. This paper is aimed at developing models which can predict employee turnover and it can help the organization to take necessary steps to retain these employees.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122035259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Restrictions in Smart Home Devices for Safety of Children 智能家居设备对儿童安全的限制实施
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036218
Sparsh Sangal, R. Bathla
{"title":"Implementation of Restrictions in Smart Home Devices for Safety of Children","authors":"Sparsh Sangal, R. Bathla","doi":"10.1109/ISCON47742.2019.9036218","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036218","url":null,"abstract":"Children today have access to Smart home devices easily and regularly where they can openly communicate with these devices and these smart home devices can talk back to them in their normal matter regardless of having a better understanding of what should be said and what should not be said in front of young Children. This research paper analysis the Improved implementation of restrictions in smart home devices for safety of children, We'll be highlighting the role of Smart home devices in homes and how they affect different age groups of people mentally mainly Toddlers and how it can affect them for better or for worse and what security implementations can be implemented in the coming age of smart home devices like Alexa and Google home to make it more better and safer than it currently is so that there can be a controlled environment for its use and can be used by small children making sure that they stay away from the harmful stuff so that smart home devices like these won't affect the mentality of a small child for the worse","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115104669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Model to Implement and Secure Online Documentation using Blockchain 使用区块链实现和保护在线文档的模型
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036245
Paras Pant, R. Bathla, S. Khatri
{"title":"A Model to Implement and Secure Online Documentation using Blockchain","authors":"Paras Pant, R. Bathla, S. Khatri","doi":"10.1109/ISCON47742.2019.9036245","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036245","url":null,"abstract":"The past decade has seen a tremendous rise in the use of blockchains for facilitating a trust based decentralized financial framework, in hope of eliminating dependency on core institutions such as banks. A blockchain stores a chronological record for a document detailing all the alterations that have been made to it since its inception. This data contained within this document may be anything, e.g. a lease document, personal files, etc. Smart documents can be used everywhere within the industry or an enterprise. Although blockchain based structures are much less eco-friendly in comparison to the ones with a database-based approach. Inter Planetary File System can be used to remotely store massive quantities of statistical data that may be involved in a blockchain transaction and address it in the actual chain by an absolute, everlasting link. Each report and all the blocks in a chain are assigned a unique fingerprint known as a cryptographic hash. This virtual cryptographic signature is used to verify legitimacy of each block. In this paper with the help of IPFS, along with other encryption methods we propose a secure and tamper proof model for blockchain based financial transactions.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126702807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intruder Monitoring System for Improving the Network Security 一种提高网络安全的入侵者监控系统
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036195
Sourav Thapliyal, Himanshu Gupta, S. Khatri
{"title":"An Intruder Monitoring System for Improving the Network Security","authors":"Sourav Thapliyal, Himanshu Gupta, S. Khatri","doi":"10.1109/ISCON47742.2019.9036195","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036195","url":null,"abstract":"As the new technologies are emerging and rapidly growing the security advisors have the focus on developing the complex solutions for monitoring and detection of the intruder. This paper proposes a model which will provide the intruder monitoring system for improving the security. The model will check for the vulnerabilities of the network and then provide the best solution to it. Based on open source software and using various networking techniques the model will be constructed to run on low – cost hardware, on demand for intruder scanning, and alerting the owner by giving alerts in case of the intrusion.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122063134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of target detection techniques for hyperspectral images 高光谱图像目标检测技术的比较
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036193
Dharambhai Shah, Madhumita Tripathy, T. Zaveri
{"title":"Comparison of target detection techniques for hyperspectral images","authors":"Dharambhai Shah, Madhumita Tripathy, T. Zaveri","doi":"10.1109/ISCON47742.2019.9036193","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036193","url":null,"abstract":"Target detection is a challenge to detect and classify objects in hyperspectral images. In this paper, a total of six algorithms broadly classified in type I and type II are used to detect targets such as metal, roof, and dirt. Type I algorithm differs from type II as in type II algorithm both target spectra and non-background spectra are used whereas in type I algorithm only target spectra is used as an external input. Vertex Component Analysis (VCA) is used to generate background spectra in type II algorithm. Two different hyperspectral data set such as Pavia and Urban are used for target detection. Detailed analysis of the output of the six methods shows that the wide range of output score plays an important role in the determination of threshold to detect any target. One of the type II method Orthogonal Subspace Projection (OSP) gives the best wide dynamic range compared to other techniques.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Approach for Classification of Microblog Tweets 一种新的微博Tweets分类方法
2019 4th International Conference on Information Systems and Computer Networks (ISCON) Pub Date : 2019-11-01 DOI: 10.1109/ISCON47742.2019.9036264
Varsha Tiwari, Himani Sikarwar
{"title":"A Novel Approach for Classification of Microblog Tweets","authors":"Varsha Tiwari, Himani Sikarwar","doi":"10.1109/ISCON47742.2019.9036264","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036264","url":null,"abstract":"Nowadays, if something happens, then many tweets are posted. Peoples are generally influences what everyone else are saying. A person observes a thing according to their natures, whether they are positive or negative kind of person. When these persons tweet other persons influenced by their thoughts. These tweets contain the situational and non-situational information. Situational tweets may have attributes such as helpline number etc. While non-situational tweets may have the information about the charity etc. Therefore, the classification of tweets into these two categories are much required to extract the meaningful information. In this paper, a new methodology is proposed and implemented to classify situational and non-situational tweets. The present work is based on POS tagger, weighted parameter normalization and normalization of tweets. A comparative study is also presented in this paper in terms of F-measure. The results are satisfactory.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信