2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

筛选
英文 中文
Rectangular Ring Monopole Antenna using Defected Ground Structure for Television White Space Application 基于缺陷接地结构的矩形环形单极天线在电视空白空间中的应用
Sonali J. Shedge, Vijaya Kamble
{"title":"Rectangular Ring Monopole Antenna using Defected Ground Structure for Television White Space Application","authors":"Sonali J. Shedge, Vijaya Kamble","doi":"10.1109/CSNT48778.2020.9115781","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115781","url":null,"abstract":"The television white space is the unused frequency spectrum in the UHF band used for television transmission. The paper presents the design of wide band antenna to utilize the range of frequencies in the television white space (TVWS) and to avoid the spectrum crunch. A rectangular ring monopole antenna with symmetrical rectangular defected ground structure is projected having a generous bandwidth of 677 MHz. The use of DGS is for enhancement of bandwidth also the ring patch improves the bandwidth and the reflection coefficient. The total dimension of the antenna is 150 mm X 200 mm. FR4 epoxy is used to reduce the cost and its height is 1.6 mm. The application of this unused TVWS spectrum is in Wi-Fi services.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Based CNC Machine Condition Monitoring System Using Machine Learning Techniques 使用机器学习技术的基于物联网的数控机床状态监测系统
M. K, Prashanth Kannadaguli
{"title":"IoT Based CNC Machine Condition Monitoring System Using Machine Learning Techniques","authors":"M. K, Prashanth Kannadaguli","doi":"10.1109/CSNT48778.2020.9115762","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115762","url":null,"abstract":"We developed a CNC machine’s condition monitoring system based on Artificial Neural Network (ANN) and correlate the same with the real-time CNC machine data. The classification of the condition of a CNC machine was done by deciding whether it is a fresh machine or worn machine using machine learning techniques. In consideration of real time data loaded from a CNC machine we built a database and then modelled an ANN. Based on this approach of machine learning which implements pattern recognition and probabilistic modelling of the CNC machine data, classification of the condition of a CNC machine was done successfully. Finally, performance analysis of this machine model prevail in terms of Machine Error Rate (MER) upholds the impressive fact that modeling using the ANN yields better results over another alternative modeling techniques and can be used for developing Automatic CNC machine condition monitoring and recognition system.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Multiband Antenna for WLAN and WiMAX Wireless Applications 用于WLAN和WiMAX无线应用的多波段天线
R. Parashar, Yogesh Bhomia, Devendra Soni, R. Saraswat
{"title":"A Multiband Antenna for WLAN and WiMAX Wireless Applications","authors":"R. Parashar, Yogesh Bhomia, Devendra Soni, R. Saraswat","doi":"10.1109/CSNT48778.2020.9115790","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115790","url":null,"abstract":"This article shows the designing of slotted multiband antenna with metamaterial loading. Such design is using for wireless communication applications. Antenna is cover the wireless communication modes such as WLAN, WiMAX, X and KU Band. Proposed antenna is fabricated on low cost (FR-4) substrate with compact size of 35 × 34 × 0.8 mm3. It is consist microstrip feedline and slotted ground plane. The SRR, CSRR and parallel stubs are introduced with patch to achieve the wireless communication bands. Antenna design has appropriate gain and efficiency, and stable E and H radiation patterns. In such compact size by introducing SRR and CSRR structure, proposed antenna achieved seven bands which covers WLAN, WiMAX, X and KU wireless communication bands. In proposed antenna by introducing two parallel stubs it achieve three bands and after introducing with CSRR and SRR and defected ground structure, seven bands with improved reflection coefficient achieved.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115920381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accelerated Computer Vision Inference with AI on the Edge 基于边缘AI的加速计算机视觉推理
Varnit Mittal, B. Bhushan
{"title":"Accelerated Computer Vision Inference with AI on the Edge","authors":"Varnit Mittal, B. Bhushan","doi":"10.1109/CSNT48778.2020.9115770","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115770","url":null,"abstract":"Computer vision is not just about breaking down images or videos into constituent pixels, but also about making sense of those pixels and comprehending what they represent. Researchers have developed some brilliant neural networks and algorithms for modern computer vision. Tremendous developments have been observed in deep learning as computational power is getting cheaper. But data-driven deep learning and cloud computing based systems face some serious limitations at edge devices in real-world scenarios. Since we cannot bring edge devices to the data-centers, so we bring AI to the edge devices with AI on the Edge. OpenVINO toolkit is a powerful tool that facilitates deployment of high-performance computer vision applications to the edge devices. It converts existing applications into hardwarefriendly and inference-optimized deployable runtime packages that operate seamlessly at the edge. The goals of this paper are to describe an in-depth survey of problems faced in existing computer vision applications and to present AI on the Edge along with OpenVINO toolkit as the solution to those problems. We redefine the workflow for deploying computer vision systems and provide an efficient approach for development and deployment of edge applications. Furthermore, we summarize the possible works and applications of AI on the Edge in future in regard to security and privacy.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Phishing Detection Using Significant Feature Selection 使用显著特征选择的网络钓鱼检测
D. Goswami, Manali Shukla, A. Chaturvedi
{"title":"Phishing Detection Using Significant Feature Selection","authors":"D. Goswami, Manali Shukla, A. Chaturvedi","doi":"10.1109/CSNT48778.2020.9115782","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115782","url":null,"abstract":"Growth of cyber attacks is rapidly increasing in the entire world. To provide prevention from these attacks is a great challenge for the experts. Intruders are keep on adapting new methods and techniques to carry out their malicious goals. Phishing plays a dominant role in the field of web attacks and it has been used as a weapon by the attackers. In this paper we have given two algorithmic approaches to the problem of Phishing identification with reduced number of attributes. It makes this approach simple yet efficient. The first algorithm assigns weight to all attributes with respect to uniform resource locators. We have employed various analysis mechanism to identify significant role of selected attributes for the purpose of Phishing identification. The second approach takes former’s output as input and classifies the uniform resource locators labeling as phishing or non phishing. The experimental work verifies that the approach for phishing detection proposed in this paper can attain a high accuracy in comparison to existing algorithms.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PWM Techniques to Power Converters of the Wind Energy Conversion System 风能转换系统电源变换器的PWM技术
M. Kumar, K. Latha Shenoy, G. B. Praveen
{"title":"PWM Techniques to Power Converters of the Wind Energy Conversion System","authors":"M. Kumar, K. Latha Shenoy, G. B. Praveen","doi":"10.1109/CSNT48778.2020.9115754","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115754","url":null,"abstract":"the modern type-3 wind energy conversion system consists of wind turbine, doubly fed induction generator and advanced AC/DC/AC power converters connected to the grid. To study the dynamic issues of the wind energy conversion system the dynamic model is necessary. To perform the stability analysis of the grid connected with the use of back to back converter, the various power converter topologies used in grid integration of are to be known. This paper presents the detailed study on sinusoidal pulse width modulation and space vector modulation techniques, its basic operation, circuit design, configurations and overview of control structure of the back to back converter applicable for wind power conversion systems.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT based Smart home: Security Aspects and security architecture 基于物联网的智能家居:安全方面和安全架构
A. K. Ray, A. Bagwari
{"title":"IoT based Smart home: Security Aspects and security architecture","authors":"A. K. Ray, A. Bagwari","doi":"10.1109/CSNT48778.2020.9115737","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115737","url":null,"abstract":"Internet of Things (IoT) in general sense refers as the world of connected devices and physical objects which contains sensors, microcontrollers, software components to connect, store, actuate and shared his own date on different machines. IoT enabled home appliances plays an important role in day-to-day life and when these devices become connected and controlled remotely or with single click thorough web enabled application along with other services they form a smart home network. This kind of networking of physical objects or non-electronic home’s objects can interconnect through IoT. In Smart home communication security is major concern while device communication or stored sensitive data to maintain the privacy of the data. A hacker or intruder can easily attack on smart home Router, gateway or IoT enabled nodes to get access of data because IoT devices contain a little or no built in security mechanism available on board. There several attacks reported through in year 2016 and 2018 base on Mirai dubbed botnet and VPNFilter malware respectively to get access of smart home data. This paper proposed a secure smart home architecture with cloud, secure fog with firewall, security analysis engine. The firewall system is in between of internet and fog layer to protect the unauthorized data access and internet threats. The security analysis engine monitor the device communication and transmission of data and keeping log the same and also generate alerts for any kind of misuse or suspected communication between nodes. This security system will enhance the consumer trust to implement smart homes technology.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126162255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
IOT Based Wireless Sensor Network for Air Pollution Monitoring 基于物联网的空气污染监测无线传感器网络
A. Chaturvedi, L. Shrivastava
{"title":"IOT Based Wireless Sensor Network for Air Pollution Monitoring","authors":"A. Chaturvedi, L. Shrivastava","doi":"10.1109/CSNT48778.2020.9115733","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115733","url":null,"abstract":"Wireless sensor network is one of the important areas where a lot of work is being done. The work is not limited to fire detection and propagation of fire, air pollution, water or gas leakage detection but many more. If WSN is used in conjunction with Internet of Things (IOT), the shared information will be more useful. Internet of things is nothing but a combination of sensor and software with the embedded electronics. The data collected in a local area can be sent at any distance where it can be seen and further controlling action may be initiated if required. The WSN based air monitoring system collects the data from the area where the sensors are deployed and the data can be displayed on the computer screen. The computer data can be sent to any terminal which is connected to Internet. Hence by using IOT, the long distance transmission of the data can be done. The monitoring is limited to area but the information can be forwarded to any control station. Hence by using IOT, the air pollution level of the campus even cities can be monitored and necessary advisory can be issued if required.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart Contract Definition for Land Registry in Blockchain b区块链土地注册处智能合约定义
Archana Sahai, R. Pandey
{"title":"Smart Contract Definition for Land Registry in Blockchain","authors":"Archana Sahai, R. Pandey","doi":"10.1109/CSNT48778.2020.9115752","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115752","url":null,"abstract":"Land Registry System in India is a very time-consuming process involving many middlemen, thus increasing the fraudulent cases. These problems can be eliminated by the usage of Blockchain Technology for Land Registry Management in India. This paper highlights issues, such as minimal transparency, accountability, incoherent data sets with different Government Departments relating to the same portion of land and delays in the current Land registry management process. The paper describes the current process of land records maintenance and land registration in the country. It emphasizes on the importance of smart contract for land registry applying the Blockchain.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130468378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Video Transmission Over Next Generation Emergency Services 下一代应急服务的视频传输
Abubkr Elmnsi, Fahad Mira
{"title":"Video Transmission Over Next Generation Emergency Services","authors":"Abubkr Elmnsi, Fahad Mira","doi":"10.1109/CSNT48778.2020.9115787","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115787","url":null,"abstract":"The delivery of multimedia services such as video streaming over 4G/LTE is becoming ever more realistic due to the High Efficiency Video Coding (HEVC) standard. However, streaming of video is bandwidth expensive. The quality of encoded video is hugely influenced by initial codec setting and dependent on the varying network quality of service. Understanding the impact that the encoding process of any codec has on video quality and the impact that network impairment has on delivered quality is paramount. This paper presents experimental results of the investigation of the impact of HEVC encoding and codec settings has on video quality and of the impact of LTE network quality degradation has on video quality. Results show that both the encoding and streaming are highly sensitive to codec setting as well as to the video content and suggest that the impact should be jointly considered.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信