2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

筛选
英文 中文
Emotion Classification on Twitter Data Using Word Embedding and Lexicon Based Approach 基于词嵌入和词典的Twitter数据情感分类
R. Raj, Prasanjeet Das, P. Sahu
{"title":"Emotion Classification on Twitter Data Using Word Embedding and Lexicon Based Approach","authors":"R. Raj, Prasanjeet Das, P. Sahu","doi":"10.1109/CSNT48778.2020.9115750","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115750","url":null,"abstract":"Twitter is one of the leading social media platforms for its users for tweeting 280 characters in a single tweet. Social media influence the users to share data, promoting advertisement and posting useful information to the followers. The social media data helps the individuals and business personals to take decision based on the analysis with the data. Twitter sentimental analysis is important for identifying the similar text patterns present in the given input text. The analysis further classified with emotional, positive and negative tweets. Existing approaches limited in accuracy, therefore, the word embedding and lexicon based approach has been introduced for increasing the accuracy. The twitter data stream is taken as an input and preprocessed by removing stop words, hash tags and urls. Further, the data is tokenized and applied with the word embedding method to detect the location and lexicon based approach to segregate the sentimental and emotional tweets. The system has been tested with the live data set as well as offline dataset, and the result shows very promising.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129523175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
COMPASS: IPS-based Navigation System for Visually Impaired Students COMPASS:基于ips的视障学生导航系统
Munira AlZamil, Reema AlBugmi, Shatha AlOtaibi, Ghadeer AlAnazi, Loay Alzubaidi, A. Bashar
{"title":"COMPASS: IPS-based Navigation System for Visually Impaired Students","authors":"Munira AlZamil, Reema AlBugmi, Shatha AlOtaibi, Ghadeer AlAnazi, Loay Alzubaidi, A. Bashar","doi":"10.1109/CSNT48778.2020.9115792","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115792","url":null,"abstract":"Computer Vision coupled with Positioning Systems Technology has contributed significantly in assisting visually impaired people to independently perform their daily routine tasks. This paper proposes COMPASS, an Indoor Positioning System (IPS) based solution for visually impaired students to move around the university campus independently. COMPASS is a navigation system for the visually impaired students at PMU that consists of three important components which are: an android application running on a smartphone, smart bracelet, and smart shoes. The android application is used to upload student’s class schedule to help them navigate (through Bluetooth based beacons) to and from classes and around the campus. Also, it allows them to call university administrators by simply clicking on a button embedded in the mobile app. The Raspberry Pi based smart bracelet serves as a verification tool (using Tesseract enabled image detection) to ensure that the student arrives at the right class at the right time. As for the smart shoes, it ensures the safety of the student while walking around the campus by detecting obstacles (using ultrasonic sensors) along the way. COMPASS has been extensively tested in a university environment for navigating visually impaired students. COMPASS is economical, small-sized, accurate and uses open source software tools. It can be potentially used for both educational and commercial applications.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128591107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Machine Learning Technique for Identification of Yoga Poses 瑜伽姿势识别的机器学习技术实现
Yash Agrawal, Yash Shah, Abhishek Sharma
{"title":"Implementation of Machine Learning Technique for Identification of Yoga Poses","authors":"Yash Agrawal, Yash Shah, Abhishek Sharma","doi":"10.1109/CSNT48778.2020.9115758","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115758","url":null,"abstract":"In recent years, yoga has become part of life for many people across the world. Due to this there is the need of scientific analysis of y postures. It has been observed that pose detection techniques can be used to identify the postures and also to assist the people to perform yoga more accurately. Recognition of posture is a challenging task due to the lack availability of dataset and also to detect posture on real-time bases. To overcome this problem a large dataset has been created which contain at least 5500 images of ten different yoga pose and used a tf-pose estimation Algorithm which draws a skeleton of a human body on the real-time bases. Angles of the joints in the human body are extracted using the tf-pose skeleton and used them as a feature to implement various machine learning models. 80% of the dataset has been used for training purpose and 20% of the dataset has been used for testing. This dataset is tested on different Machine learning classification models and achieves an accuracy of 99.04% by using a Random Forest Classifier.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131467721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Precedence & Issues of IoT based on Edge Computing 基于边缘计算的物联网优先级及问题
Sukriti Goyal, Nikhil Sharma, I. Kaushik, B. Bhushan, Abhijeet Kumar
{"title":"Precedence & Issues of IoT based on Edge Computing","authors":"Sukriti Goyal, Nikhil Sharma, I. Kaushik, B. Bhushan, Abhijeet Kumar","doi":"10.1109/CSNT48778.2020.9115789","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115789","url":null,"abstract":"In the network of IoT, a huge amount of data is frequently generated, major messages through complicated networks serving device-to-device communications are swapped and also, sensitive smart world frameworks are controlled and monitored by thousands of gadgets and sensors. To extenuate the acceleration of overcrowding of resources in the network, as an approach edge computing, has risen as a modern approach to resolve requirements of confined computing as well as IoT. In this paper, a brief introduction of Internet of Things and edge computing is discussed which consists of general concepts of IoT and its components, basic introduction of edge computing, and structure of edge computing. After that, fundamental concepts of cloud computing, edge computing and IoT are introduced by comparing their features with each other and a structure of IoT based on edge computing is also illustrated with a slight introduction of the architecture of both the edge computing and IoT. Moreover, the advantages of using the technology of edge computing to assist the technology of IoT are provided as well as the efficiency of integrating these two technologies together is demonstrated. Then, the issues like security and privacy, advanced communication etc. related to combination of IoT and edge computing system are discussed and finally, the conclusion of the paper is presented. So, basically, in this paper, an extensive survey is conducted to analyze how the usage of edge computing progresses the performance of systems of IoT. The performance of edge computing is studied by comparing delay of network, occupation of bandwidth, power utilization, and many other characteristics.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Performance Using Fuzzy Possibilistic C-Means Clustering Algorithm in Wireless Sensor Network 基于模糊可能性c均值聚类算法的无线传感器网络性能改进
Shweta Kushwaha, K. S. Jadon
{"title":"Improved Performance Using Fuzzy Possibilistic C-Means Clustering Algorithm in Wireless Sensor Network","authors":"Shweta Kushwaha, K. S. Jadon","doi":"10.1109/CSNT48778.2020.9115740","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115740","url":null,"abstract":"Small wireless sensors are equipped with micromechanical systems, & wireless communication technologies, digital systems. A Sensor Node understands the limited area for given functionality. In order to gather information on a large area, data centers need to be collected in cooperation with a center sensor node. These co-operative functional sensors create a wireless sensor network.In the previous work, they used K-Medoids Algorithm to form the clusters and Cluster heads for databroadcast towards the base station from the source node. K-Medoid algorithms are primarily disadvantageous because they are not ideal for clustering arbitrary groups of objects. It is that they use compactness as clustering parameters, in short, rather than connectivity, to minimize differences among non-medoid objects or medoids (cluster center). The drawback, even though the first k medoids are selected randomly, can produce different results on different runs in the same dataset. These drawbacks are overcome in Fuzzy Probabilistic C-Means Algorithm & increasethe performance of the network. Simulation is performed on MATLAB tool & results show the effectiveness of the proposed work.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129052837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective Framework for Underwater Image Enhancement using Multi-Fusion Technique 基于多融合技术的水下图像增强有效框架
Aashi Singh Bhadouria, K. Agarwal
{"title":"Effective Framework for Underwater Image Enhancement using Multi-Fusion Technique","authors":"Aashi Singh Bhadouria, K. Agarwal","doi":"10.1109/CSNT48778.2020.9115777","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115777","url":null,"abstract":"Underwater environments are totally different from the atmospheric environments as the environments in underwater are often complicated and shortage of light due to its physical properties. Special cameras are used for underwater imaging are mainly used for observing the deep sea ground there exist many problems, the images are underexposed as the light transportation characteristic of water makes it difficult, the underwater images suffer by various effects and the images look hazy & blurred, they reduce clarity of image. In this paper, we present an efficient algorithm for underwater images enhancement by applying the enhancement technique in the original hazy underwater image and then calculating the white-balance and contrast enhancement technique and then calculate the weight-maps on both techniques and then finally fuse the images by fusion technique.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on IOT enabled cloud platforms 支持物联网的云平台调查
Ranjana Sikarwar, P. Yadav, Aditya Dubey
{"title":"A Survey on IOT enabled cloud platforms","authors":"Ranjana Sikarwar, P. Yadav, Aditya Dubey","doi":"10.1109/CSNT48778.2020.9115735","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115735","url":null,"abstract":"IOT is a mainstream technology of today’s technology world and has transformed recently with a significant potential for modernizing the lifestyle of modern societies today. Since the term IOT was devised in the year 1999 by Kevin Ashton there is a tremendous increase in the countable devices bridged to the internet in the last few decades. This paper provides a literature survey on various cloud services used in integration with IOT and a study about fog computing used in various application areas. Due to seamless data exchange between IOT devices and sensors, there was a need of platforms for data management, storage, and analysis. Thus cloud computing and fog computing are often used interchangeably for providing high storage capacities and processing capabilities. Different types of IOT based cloud platforms are discussed in this paper depending on their applicability along with their pros and cons precisely.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134029035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secured Multi-Tier Mutual Authentication Protocol for Secure IoT System 面向安全物联网系统的安全多层相互认证协议
R. Vairagade, Dr. Brahmananda S. H
{"title":"Secured Multi-Tier Mutual Authentication Protocol for Secure IoT System","authors":"R. Vairagade, Dr. Brahmananda S. H","doi":"10.1109/CSNT48778.2020.9115786","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115786","url":null,"abstract":"In the last few years lots of advancements has been done in various emerging trends in communication & data science technology, which led the exposure of IoT (Internet of things) that enables a lots of communication devices, data, and things altogether, hence provides a different way to interact with each other and changes the thinking power of the human being. This IoT entice a various communication based hands- on real time applications such as smart communication based city system, intelligent home communication system, grid based communication system, small and large industry communication system, intelligent retail shop system, intelligent agricultural system, intelligent healthcare application, intelligent and interactive farming system etc. As it is an emerging & fast growing trend all over the world, lots of expectation is there for providing solution on the above areas we had discussed above. It is more vulnerable to cloning attacks or physical channel destruction because of its comparatively small physical size, service offered by them, its low cost and fixed number of resources. It enhances the various end-to end services and hands-on applications hence required much reliable communication device authentication, authorization and strict security and secure environment for its overall structure that includes data security, device security and structure security too. Although small cost IOT application with less number of resources, faces lots of problems in maintaining the advanced cryptographic security protocols, resulting in lot of malfunctioning and threats in IoT application. In our research paper we are trying to focus on the deep study on IOT, various framework used in IoT structure, in the various authentications protocols that can provide the best secure environment for the IoT based application. After doing the survey we are trying to propose our multilevel authentication protocols which help an IoT system having a secure environment for the transferring of data between the various communication devices that can be applicable in any of Hands-on real time IoT system.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"32 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113962061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CSNT 2020 Table of Contents CSNT 2020目录
M. Dixit, Aaradhya Dixit
{"title":"CSNT 2020 Table of Contents","authors":"M. Dixit, Aaradhya Dixit","doi":"10.1109/csnt48778.2020.9115729","DOIUrl":"https://doi.org/10.1109/csnt48778.2020.9115729","url":null,"abstract":"Track-A: Microwave Components, Antenna and Propagation A Multiband Antenna for WLAN and WiMAX Wireless Applications ....................................... 01 Rishi Parashar; Yogesh Bhomia, Devendra Soni, Ritesh Kumar Saraswat Microwave Imaging Based Automatic Crack Detection System Using Machine Learning For Columns ................................................................................................................... 05 Prashanth Kannadaguli, Vidya Bhat Rectangular Ring Monopole Antenna using Defected Ground Structure for Television White Space Application ....................................................................................................... 09 Sonali Jayant Shedge; Vijaya N. Kamble Polarization Independent Super Thin Metamaterial Microwave Broadband Absorber for X-Band Application ...................................................................................................... 13 Gaurav Chaitanya; Ankit Chandachoriya","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116688643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Different Techniques for Identification of a Bone Fracture in Analysis of Medical Image 医学图像分析中骨折识别的不同技术
Rinisha Bagaria, S. Wadhwani, A. Wadhwani
{"title":"Different Techniques for Identification of a Bone Fracture in Analysis of Medical Image","authors":"Rinisha Bagaria, S. Wadhwani, A. Wadhwani","doi":"10.1109/CSNT48778.2020.9115760","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115760","url":null,"abstract":"Medical Imaging is the practice used to promote body images for medical uses to pinpoint diseases. There are many different techniques available for the identification of fractures in different types of bones. This paper reviews the major techniques appropriate to a search of medical image and compiles over 50 additions to the field, most of which came in the last year. This survey uses different fracture identifying techniques for image segmentation, image classification, fracture detection and other assignments. An analysis is contributed to the study on application area: Flat bone, Short bone, Long bone, Irregular bone, Sesamoid bone. A summary of this is ending with a demanding discussion of directions, test and open challenges for prospect research.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信