2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

筛选
英文 中文
Analysis based on Different Optimization Algorithms for Landslide Detection 基于不同优化算法的滑坡检测分析
Lijesh L, G. Saroja
{"title":"Analysis based on Different Optimization Algorithms for Landslide Detection","authors":"Lijesh L, G. Saroja","doi":"10.1109/ICCT56969.2023.10075907","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075907","url":null,"abstract":"The discovery of landslides is essential process in hazard and risk studies and has acquired immense focus among scientists in upcoming years. Remote sensing is an economical solution for detecting landslides and updating classical landslide databases, but discovering landslides in remote sensing data is complex and needs enhancements. The current studies reveal that the deep models enhance the landslide mapping outcomes compared to classical machine learning models. This paper presents the comparative assessment of landslide detection using different optimization algorithms to examine and justify the efficiency of landslide detection. The deep residual network (DRN) is adapted in the process of landslide detection and evaluation will be performed with various optimization algorithms, such as Competitive swarm Optimizer (CSO), Tunicate Swarm Algorithm (TSA), Particle Swarm Optimization (PSO), Water cycle algorithm (WCA), Grey Wolf Optimizer (GWO). The WCPSO-based DRN outperformed with utmost accuracy of 0.964, sensitivity of 0.980 and specificity of 0.943.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State-Of- The-Art and Research Challenges in Task Scheduling and Resource Allocation Methods for Cloud-Fog Environment 云雾环境下任务调度与资源分配方法的研究现状与挑战
P. Mishra, A. Chaturvedi
{"title":"State-Of- The-Art and Research Challenges in Task Scheduling and Resource Allocation Methods for Cloud-Fog Environment","authors":"P. Mishra, A. Chaturvedi","doi":"10.1109/ICCT56969.2023.10076030","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076030","url":null,"abstract":"When numerous users require a variety of resources to be made available as a service over the internet, fog computing creates an extremely efficient computing environment. It is essential to consume the available resources in fruitful manner in such a way that time must be minimize to execute tasks. Task scheduling is the element of the fog computing environment that is most important and critical. In task scheduling, certain tasks are assigned to specific resources at specific times. To address the issues with task scheduling; various results are suggested. In a fog computing environment, several task scheduling strategies are examined in this paper. To provide a thorough summary of the task scheduling along with resource allocation research that has been done as well as outstanding problems that will be dealt with in the future. This study analyzes current research on task distribution in fog environment. Our paper presents the analysis of job scheduling approaches on the basis of type, categories, execution status & parameters used by numerous researchers.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124458200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Wireless Communication Protocols for use in Smart Farming Framework Development 用于智能农业框架开发的无线通信协议的比较研究
Sandeep Bhatia, Z. Jaffery, S. Mehfuz
{"title":"A Comparative Study of Wireless Communication Protocols for use in Smart Farming Framework Development","authors":"Sandeep Bhatia, Z. Jaffery, S. Mehfuz","doi":"10.1109/ICCT56969.2023.10075696","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075696","url":null,"abstract":"Over the last few years, the design and development of smart agriculture systems have been an important and emerging concept. Through various smart farming approaches, better crop yield can be achieved and output can be enhanced as well. Internet of things is an emerging concept that gives smart solutions for the implementation of various applications. Integration of IoT with WSN gives a cost-effective solution for increased productivity. IoT-enabled smart farming is a very efficient approach when compared with conventional techniques and methods IoT-WSN-based solutions are being used to monitor agricultural land with minimal human involvement. Many existing wireless protocols are already available, such as Wi-Fi, LoRa WAN, Wi-MAX, LR-WPAN, BLE (Bluetooth low energy), RFID, MQTT, Zigbee and Sigfox etc. This paper gives a review study of the comparison of existing wireless protocols and their effect on the IoT-WSN-enabled implementation of smart farming. It describes the primary components of the smart farming IoT-WSN model. It shows various features of different technologies implied in the IoT-based farming techniques. A rigorous analysis of existing wireless protocols used in IoT-WSN based smart farming has been presented and a detailed view of the role of relevant technologies and present protocols in smart farming is discussed in this paper. The Paper describes the representation of the basic energy consumption states for LoRa WAN, Zigbee, Sigfox, and NB-IoT end-device. This paper highlights the impact of energy-efficient LoRa WAN technology and the proposed WSN-IoT model for implementation.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122425799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Technique to Detect URL Phishing based on Feature Count 一种基于特征计数的URL钓鱼检测新技术
Vedanti Dantwala, Rishi Lakhani, N. Shekokar
{"title":"A Novel Technique to Detect URL Phishing based on Feature Count","authors":"Vedanti Dantwala, Rishi Lakhani, N. Shekokar","doi":"10.1109/ICCT56969.2023.10075943","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075943","url":null,"abstract":"The advent of internet access to people across the globe, increasing levels of connectivity, remote employment, de-pendence on technology, and automation have presented a rapid rise in cybercrime. There are numerous methods of cybercrime that are frequently used, with phishing being the most significant. Various algorithms have been proposed to classify malicious and legitimate URLs, blacklisting and whitelisting algorithms being the oldest, used for computer security. But these algorithms are time-consuming and involve human labor. Hence, machine learning algorithms were incorporated to improve the effectiveness of classifying URLs. Recent research includes detecting phishing URLs using machine learning classifiers but the accurate classification is a long-term goal. This paper focuses on evaluating models for classifying URLs using different feature counts and deriving a specific model to provide good enough classification with less time complexity.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of GPS-GSM Based Intelligent Speed Assistance Systems: Development and Research Opportunities 基于GPS-GSM的智能速度辅助系统综述:发展与研究机遇
Abdulsalam Ya'u Gital, Mahmood Abdulhamid, M. Abdulhameed, F. Zambuk, Musa Nehemiah, Mustapha Abdulrahman Lawal, Zahraddeen Ismail Yakubu
{"title":"Review of GPS-GSM Based Intelligent Speed Assistance Systems: Development and Research Opportunities","authors":"Abdulsalam Ya'u Gital, Mahmood Abdulhamid, M. Abdulhameed, F. Zambuk, Musa Nehemiah, Mustapha Abdulrahman Lawal, Zahraddeen Ismail Yakubu","doi":"10.1109/ICCT56969.2023.10076115","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076115","url":null,"abstract":"About two billion passenger cars travel the roads of the world and this is projected to double by the year 2050. This calls for the need to create real time surveillance systems to manage the impending dangers of on-road traffic and to meet the objective of intelligent transport systems (ITS). Nowadays, speed control and monitoring is mostly handled using speed law enforcement measures, such as speed bumps, speed limits, signs, speed guns, road designs, speed cameras and intelligent speed assistance (ISA). Previous surveys have not given enough attention to the application of Global Positioning System (GPS) combined with Global System for Mobile Communication (GSM) based ISA systems with respect to their types. To fill this gap, this review aims to study the different development and applications of GPS and GSM based ISA systems with the focus on their types, technology and analysis environment. Although, the development of ISA systems is not recent, the full potentials of using ISA systems are still a persistent pursuit. The study concludes by highlighting limitations and research opportunities mined from the reviewed papers to enable improvements and novel researches from the ITS research community and vehicle manufacturers' companies.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124713522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Detailed Investigation of Wireless Sensor Network Energy Harvesting Schemes to Maximize Lifetime of Sensor Nodes 最大化传感器节点寿命的无线传感器网络能量收集方案详细研究
Hardeep Singh Dhillon, Kuldip Kumar, Paras Chawla
{"title":"A Detailed Investigation of Wireless Sensor Network Energy Harvesting Schemes to Maximize Lifetime of Sensor Nodes","authors":"Hardeep Singh Dhillon, Kuldip Kumar, Paras Chawla","doi":"10.1109/ICCT56969.2023.10075842","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075842","url":null,"abstract":"For many years, energy harvesting wireless sensor networks (EH-WSNs) development and implementation have been an important and emerging concept in developing technology, considering various EH techniques. This paper includes an investigation of EH-WSN schemes and discussion on various parameters like latency, network size, network density, distance, throughput, lifetime, power consumption, and efficiency related to different energy harvesting schemes. The proposed model demonstrates EH-WSN schemes using different techniques. This paper represents a comparison of various energy harvesting schemes in terms of nodes power consumption. This paper discusses the characteristics and attributes of energy harvesting wireless sensor networks (EH-WSNs). There are several methods to save energy in EH-WSN but they are based on static approach of sensor nodes so we use dynamic approach to minimize energy consumption of wireless sensor nodes. Our primary objective is to maximize lifetime of sensor nodes by minimize the average power consumption. We focus on maximum utilization of node battery, effective distribution of power from the energy harvester to reduce distance between cluster head and source of power. This paper is also highlights the challenges of EH-WSN and technical specifications of various energy harvesting systems. The proposed EH-WSN model replenished the sensor node battery recharging after they become out of service in an efficient way. For this purpose we will use mobile charger which travels to cluster head and provide energy. This article concludes on the compatible EH-WSNs scheme should be used to enhance system efficiency and focus on practical real-life applications of WSN based EH.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131598929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Beamforming for Intelligent Reflecting Surface Assisted MISO Wireless Communications 智能反射面辅助MISO无线通信的安全波束形成
R. Kaur, Bajrang Bansal
{"title":"Secure Beamforming for Intelligent Reflecting Surface Assisted MISO Wireless Communications","authors":"R. Kaur, Bajrang Bansal","doi":"10.1109/ICCT56969.2023.10075734","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075734","url":null,"abstract":"This paper provides a method to provide physical layer security (PLS) between the source and the authorised user in the event that a direct line-of-sight (LoS) path is not feasible by using an intelligent reflecting surface (IRS). A new beamforming solution is proposed that can offer maximum gain at the intended user without any information leakage to eavesdropper when multiple-antenna base station (BS) with single antenna at legitimate user and eavesdropper (i.e., multiple-input-single-output, or MISO) is taken into consideration. In the absence of LoS, the proposed IRS-assisted approach can establish a communication link between the BS and the authorised user by combining maximum ratio transmission (MRT) with traditional zero-forcing (ZF) beamforming. The suggested approach is compared to other beamforming methods like MRT and traditional ZF in terms of performance metrics like channel capacity and secrecy capacity for the Rayleigh dispersed channel. The proposed approach outperforms the other techniques, it is concluded. In the end, the performance of secrecy is also examined in relation to many parameters, such as IRS elements or transmit antennas, and it is concluded that the provided method exhibits the most suitable performance.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About ICCT '23 关于ICCT '23
{"title":"About ICCT '23","authors":"","doi":"10.1109/icct56969.2023.10075825","DOIUrl":"https://doi.org/10.1109/icct56969.2023.10075825","url":null,"abstract":"","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rapport of Counterfeit Profiles in Social Networking using Machine Learning Techniques 使用机器学习技术在社交网络中伪造个人资料
M. A. Jyothi, T. Sridevi, KV Rajani, Ugranada Channabasava, Srikanth Bethu
{"title":"Rapport of Counterfeit Profiles in Social Networking using Machine Learning Techniques","authors":"M. A. Jyothi, T. Sridevi, KV Rajani, Ugranada Channabasava, Srikanth Bethu","doi":"10.1109/ICCT56969.2023.10076017","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076017","url":null,"abstract":"Day-By-Day the number is been increasing of individuals who clench accounts on the platform named social media but they conceal their identity for the motives of malevolent. Regrettably, we have done a small investigation to date to determine fake identifications that are been designed by the individuals mainly on social media. In the contradistinction, huge samples are subsisted in the form of cases as the fake accounts are been generated by automation or personal computers and these are dug out by utilizing the models of machine learning techniques. In the case of automation, models of machine learning are depending on the attributes of the engineered employing as the proportion of companion to followers. These attributes are brought out from the features like the count of the companion and the count of the follower that is straightly obtainable in the profiles of the social media. The investigation debated in this paper appeals to the similar attributes for the fake accounts so there will be some desire of proceeding the fake profiles detection which are been generated by individuals on the medial platform.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122310241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voice-Based Interaction for an Aging Population: A Systematic Review 基于语音的人口老龄化互动:系统综述
S. Pednekar, Palka Dhirawani, Richa N Shah, N. Shekokar, K. Ghag
{"title":"Voice-Based Interaction for an Aging Population: A Systematic Review","authors":"S. Pednekar, Palka Dhirawani, Richa N Shah, N. Shekokar, K. Ghag","doi":"10.1109/ICCT56969.2023.10075801","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075801","url":null,"abstract":"In the past twenty years, voice-based systems have emerged as a technology with high usability and accessibility. Research in the field of Human-Computer Interaction (HCI) has investigated this trend and how these systems can bridge the gap in technology use across all generations, specifically for older adults. This study aims to conduct a systematic literature review of research on voice-based systems for older adults published in the past twenty years. These articles were obtained from reputed databases, filtered out based on specific eligibility criteria, and perused by the authors of this study. This study answers questions concerning the research methodologies often employed for this particular topic and the trends in existing voice-based systems studied in research experiments. It discusses the benefits of voice technologies for the elderly, their challenges, and how to address them.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信