2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

筛选
英文 中文
Transfer Learning with L2 Norm Regularization for classifying static Two Hand Hindi Sign Language Gestures 基于L2范数正则化的印度语静态双手手势迁移学习
Mohita Jaiswal, Vaidehi Sharmay, Abhishek Sharmaz, Raghuvir Tomar
{"title":"Transfer Learning with L2 Norm Regularization for classifying static Two Hand Hindi Sign Language Gestures","authors":"Mohita Jaiswal, Vaidehi Sharmay, Abhishek Sharmaz, Raghuvir Tomar","doi":"10.1109/CSNT48778.2020.9115767","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115767","url":null,"abstract":"Vision Based hand sign language recognition has gained wide attention among the researchers [1], [2], [3]. This technique serves as a medium of communication for hearing-disabled and vocally-impaired people. In the domain of sign language recognition, some authors used hard code algorithms like edge detection[4] and some investigated the use of AI-based algorithms to improve performance of existing implementations.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122302844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Hardware Implementation of Cryptographic Algorithms Using Field Programmable Gate Array 基于现场可编程门阵列的加密算法硬件实现综述
K. Kumar, K. Ramkumar, Amanpreet Kaur, Somanshu Choudhary
{"title":"A Survey on Hardware Implementation of Cryptographic Algorithms Using Field Programmable Gate Array","authors":"K. Kumar, K. Ramkumar, Amanpreet Kaur, Somanshu Choudhary","doi":"10.1109/CSNT48778.2020.9115742","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115742","url":null,"abstract":"In the past recent years the idea towards secure data communication is increasing day by day. The secure communication is being achieved by applying various cryptographic algorithms on the data which is to be transferred over wireless networks. The different cryptographic algorithms that are generally practiced in the current cyber world are Advanced Encryption Standard (AES), Data Encryption Standard (DES), RSA algorithm, Message Digest 5 (MD5), Secure Hash Algorithm (SHA). All these algorithms are highly secured with sound and complex mathematical computations that makes the hacker tedious to breach the data which is protected by these algorithm. The hardware implementation of algorithms enhances the speed, efficiency and reliability of security standards. In this work the Field Programmable Gate Array (FPGA) implementation of various cryptographic algorithms is discussed in details. The main motivation behind the FPGA implementations of Security algorithms is to increase the speed and decrease delays of software implementations. There are millions of logic gates that are clustered in FPGA, this brings new innovations to existing algorithms. This paper surveyss the parameters such as throughput, operating frequency, number of slice registers used and number of clock cycles of FPGA that have the major role in execution process of cryptographic algorithms. Comparative analysis on hardware implementation of security algorithms on different FPGA’s is also done.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115208091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Microwave Imaging based Automatic Crack Detection System using Machine Learning for Columns 基于微波成像的圆柱裂纹自动检测系统
Prashanth Kannadaguli, Vidya Bhat
{"title":"Microwave Imaging based Automatic Crack Detection System using Machine Learning for Columns","authors":"Prashanth Kannadaguli, Vidya Bhat","doi":"10.1109/CSNT48778.2020.9115763","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115763","url":null,"abstract":"Buildings are exposed to damage and deterioration during their life cycle. So, damage assessment plays an important role in Structural stability. Cracks in the structures are of common occurrence, hence early detection of cracks is necessary. Damages like cracks can be detected using Microwave Imaging of the columns. Damages like Horizontal and vertical cracks are determined by training the Bayesian classifier and the Artificial Neural Networks. Both these approaches are required as Structural health to be monitored for predicting damages in columns. Crack detection system is built in columns of civil structures based on Artificial Neural Network and Bayesian Classifiers, which are constructed upon probabilistic pattern recognition and data modelling. The frequency data was collected from 12 microwave sensors for 30 positions of column and is required to train and test the mathematical models. Since, mean and covariance of the statistical data are well known features used in feature extraction. Finally, performance analysis of the models has been provided in terms of Crack Error Rate (CER) justifies that dynamic modelling using ANN yields better results than Bayesian Classifiers and this can also be used in developing Automatic Crack detection systems of civil structures.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130280267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Survey on Various Machine Learning Methods used for Intrusion Detection System 入侵检测系统中各种机器学习方法综述
A. Gupta, Jitendra Agrawal
{"title":"A Comprehensive Survey on Various Machine Learning Methods used for Intrusion Detection System","authors":"A. Gupta, Jitendra Agrawal","doi":"10.1109/CSNT48778.2020.9115764","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115764","url":null,"abstract":"With the advance in technology, now a day’s cyber-attack is more sophisticated which is not easily detected by the any intrusion detection system (IDS). Since most of the user store their private and sensitive information into the computer or any other digital media so providing security to these computers from the attacker is the essential requirement of each user. As number of intrusion detection system have been proposed in the last few decades. These IDS are mainly classified in two different types named signature based intrusion detection system and anomaly based intrusion detection system. The main objective of this paper is to compare various existing IDS with their strength and weakness. This paper will also discuss various machine learning approach and data sets which are used to detect intrusion. This paper will also discuss various challenges which makes IDS design more challenging.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Welcome from CSNT 2020 General Chair 欢迎来自CSNT 2020的总主席
{"title":"Welcome from CSNT 2020 General Chair","authors":"","doi":"10.1109/csnt48778.2020.9115743","DOIUrl":"https://doi.org/10.1109/csnt48778.2020.9115743","url":null,"abstract":"","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128791407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying and Anticipating Graduate School Admissions using Machine Learning Algorithms 使用机器学习算法揭开和预测研究生入学的神秘面纱
Mohd Aijaj Khan, M. Dixit, Aaradhya Dixit
{"title":"Demystifying and Anticipating Graduate School Admissions using Machine Learning Algorithms","authors":"Mohd Aijaj Khan, M. Dixit, Aaradhya Dixit","doi":"10.1109/CSNT48778.2020.9115788","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115788","url":null,"abstract":"One of the many aspirations of undergraduate students in India is going for further graduate studies. Unfortunately, many students spend months and years of preparation focusing on things that unfortunately won’t improve their chances of getting into a good graduate school. This paper evaluates the chances of applicants to get into a particular graduate program using various classification and regression approaches of Machine Learning. Various algorithms have been pitted against each other and also the most important features have been extracted which are useful to get into a graduate school program. Using unsupervised approach, this paper finds various categories of students and pool them together to find if they are perfect fit for admission or not. A novel approach of predicting the chances for admission in graduate school is introduced in this paper.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Case for Dynamic Parallelisation using Learning Techniques 使用学习技术实现动态并行化的案例
Karthik Gurunathan, K. Kartikey, T. Sudarshan, KN Divyaprabha
{"title":"Case for Dynamic Parallelisation using Learning Techniques","authors":"Karthik Gurunathan, K. Kartikey, T. Sudarshan, KN Divyaprabha","doi":"10.1109/CSNT48778.2020.9115757","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115757","url":null,"abstract":"Parallelisation involves dividing computational tasks statically or dynamically. Static analyses and studies on evolution of compilation approaches show how different techniques are employed to distribute the computational load from the main CPU (Central Processing Unit) to associated GPUs (Graphical Processing Units), and other pre-defined set of accelerators. This load sharing is often done before deployment of hardware for its core computational task. Several learning techniques have evolved to optimise such load sharing. The purpose of this paper is to provide an insight into how dynamic parallelisation can be accomplished. This work takes inspiration from current learning techniques in static systems, which continue to grow more scalable, more efficient and offer better memory access and extends these in the field of dynamic load sharing, which is a fledgling field that has not used learning techniques in its fullest, yet. As a precursor, existing static parallelisation techniques are surveyed to provide a compelling case for the above. Learning techniques help evolve a robust data parallelism scheme, that allows any parallelising tool to learn incrementally.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122757922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Underwater Images Enhancement Techniques 水下图像增强技术综述
Om Kumari Soni, J. S. Kumare
{"title":"A Survey on Underwater Images Enhancement Techniques","authors":"Om Kumari Soni, J. S. Kumare","doi":"10.1109/CSNT48778.2020.9115732","DOIUrl":"https://doi.org/10.1109/CSNT48778.2020.9115732","url":null,"abstract":"The primary objective of underwater image enhancement is to recover the quality that has been degraded due to scatters and amalgamation within the underwater environment. These images suffer from strong absorption, low contrast, noise, and poor visibility. Thus to avoid aforementioned problems of the underwater images, enhancement is required. This paper discusses various image enhancement techniques like Histogram equalization, Adaptive Histogram Equalization(AHE), CLAHE, Histogram slicing, Contrast stretching, Dark Channel Prior, etc.","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132362025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
CSNT 2020 Author Index CSNT 2020作者索引
{"title":"CSNT 2020 Author Index","authors":"","doi":"10.1109/csnt48778.2020.9115747","DOIUrl":"https://doi.org/10.1109/csnt48778.2020.9115747","url":null,"abstract":"","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134375993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSNT 2020 Committees CSNT 2020委员会
{"title":"CSNT 2020 Committees","authors":"","doi":"10.1109/csnt48778.2020.9115756","DOIUrl":"https://doi.org/10.1109/csnt48778.2020.9115756","url":null,"abstract":"","PeriodicalId":131745,"journal":{"name":"2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132105250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信