2017 International Conference on Information Communication and Embedded Systems (ICICES)最新文献

筛选
英文 中文
A survey on personal identification of left and right palmprint images 左右掌纹图像的个人识别研究
B. Sam, Devina, Shalini, S. Sterlin
{"title":"A survey on personal identification of left and right palmprint images","authors":"B. Sam, Devina, Shalini, S. Sterlin","doi":"10.1109/ICICES.2017.8070738","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070738","url":null,"abstract":"Biometrics is the art of setting up the character of an individual in view of the physical, concoction or behavioral properties of the individual. Palm Print recognizable proof is an imperative individual ID innovation and it has pulled in much consideration. The palm print contains standard bends and wrinkles as well as rich surface and miniscule focuses, so the palm print ID can accomplish a high exactness. In this paper, we provide an overview of biometric and multibiometric, review of work is based on palm print technology, mulltibiometric technology and Similarity between the Left and Right palm prints and also discussed about biometric system concepts.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120846415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on medical image denoising using optimisation technique and classification 基于优化技术和分类的医学图像去噪研究综述
D. Priya, B. Sam, S. Lavanya, A. Sajin
{"title":"A survey on medical image denoising using optimisation technique and classification","authors":"D. Priya, B. Sam, S. Lavanya, A. Sajin","doi":"10.1109/ICICES.2017.8070729","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070729","url":null,"abstract":"In the field of medical science and technology, Image is often subjected to various types of noise distortion during the process of collection, acquisition, and transmission. The images plays an vital role in examining the patients trouble. While examining, the image comprises of more noises. These noises are the major factor affecting the quality of the image which has greatly impeded people from extracting the useful information from the image. In order to overcome this kind of obstacle we apply image denoising. The main intension of image denoising is to restore the original image without noise from the noising image and also the same time to maintain the detailed information of the image as much as possible. In this paper, we provide the combination of cuckoo search algorithm and artificial neural network where the noise in the image can be filtered and removed effectively using adaptive non-linear Zernike filter. The simulation result shows that the algorithm proposed in this paper can maintain the edges of the images and other important features while removing the noise, so as to obtain better denoising affect. The quality of the resultant image is being measured by using Peak Signal to Noise Ratio (PSNR) and Root Mean Square Error (RMSE).","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127284270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Effective spectrum resource sharing with dynamic handoff process in cognitive radio networks 认知无线电网络中基于动态切换过程的有效频谱资源共享
N. Suganthi, S. Meenakshi
{"title":"Effective spectrum resource sharing with dynamic handoff process in cognitive radio networks","authors":"N. Suganthi, S. Meenakshi","doi":"10.1109/ICICES.2017.8070732","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070732","url":null,"abstract":"With rapid development in wireless applications, there arises a demand for available spectrum. Cognitive radio technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the spectrum in an opportunistic manner. Since unlicensed users are temporary visitors to the licensed spectrum, they are required to vacate the spectrum when a licensed user reclaims it. Due to the randomness of the appearance of licensed users, disruptions to both licensed and unlicensed communications are often difficult to prevent, which may lead to low throughput of both licensed and unlicensed communications. This paper avoids the congestion and reduces the waiting time of the secondary user by implementing Channel Allocation Algorithm for Primary and Secondary Users separately in Cognitive Radio Networks.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121563241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using wide area monitoring WSN 采用广域监控WSN
Sonar Padwal, Ashwini Holkar, Shubhangi Khote, Prajakta Maral, Vidya Kadam
{"title":"Using wide area monitoring WSN","authors":"Sonar Padwal, Ashwini Holkar, Shubhangi Khote, Prajakta Maral, Vidya Kadam","doi":"10.1109/ICICES.2017.8070736","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070736","url":null,"abstract":"The advent of ultra technological devices in our day to day lives has made us smart and efficient. Such a transformation is required for any developing city for efficient management of citywide activities and Become a smart city. By the use of wireless sensor nodes, various types of data can be collected like weather conditions, sound and air quality and data of high priority structures. Such data would also be useful monitoring and surveillance. We propose a sample integrated system that can be used as per requirement for monitoring of weather conditions like temperature, humidity and rain and air quality for detection of hazardous gasses. Also, to prevent accidents or structural disasters of flyovers and bridges, we include a load cell to present continuous monitoring of these structures. The city administration can benefit from this data for all important planning and decision making and users would use it for managing their day-wide activities.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127969943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent gateway for real time train tracking and railway crossing including emergency path using D2D communication 采用D2D通信的实时列车跟踪和铁路交叉口包括应急通道的智能网关
G. H. Kumar, G. Ramesh
{"title":"Intelligent gateway for real time train tracking and railway crossing including emergency path using D2D communication","authors":"G. H. Kumar, G. Ramesh","doi":"10.1109/ICICES.2017.8070779","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070779","url":null,"abstract":"Human development is directly related to the transport facility. India has been starting its transport through railways since 19th century. The Indian railway system is very big and very complicated. When generation moves forward, the technology and complexity are also moves to its higher levels. Now days, there is no exact communication between Indian railways and passengers. When the passenger wants to know the exact position of the train he may not get it because we didn't have any tracking equipment. When the train leaves the station then the station master immediately gives the information to the Gate man and next station. The gate man doesn't know any details regarding the exact position. If the train gets any internal or external issues then it creates a traffic issue at gate. In this project we will solve the traffic issue and provides the exact position of the train by using GPS. The communication between the train and passenger made through SMS. The second objective of this project is to provide an automatic spike control at a level crossing replacing the gates operated by the gatekeeper. It deals with two things. Firstly, it deals with the reduction of time for which the gate is being kept closed. Secondly, to reduce the traffic at the crossing and also provides emergency path for ambulance.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A survey paper on big data analytics 一份关于大数据分析的调查报告
M. Praveena, Dr. B. Bharathi
{"title":"A survey paper on big data analytics","authors":"M. Praveena, Dr. B. Bharathi","doi":"10.1109/ICICES.2017.8070723","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070723","url":null,"abstract":"In recent years, the internet application and communication have seen a lot of development and reputation in the field of Information Technology. These internet applications and communication are continually generating the large size, different variety and with some genuine difficult multifaceted structure data called big data. As a consequence, we are now in the era of massive automatic data collection, systematically obtaining many measurements, not knowing which one will be relevant to the phenomenon of interest. For example, E-commerce transactions include activities such as online buying, selling or investing. Thus they generate the data which are high in dimensional and complex in structure. The traditional data storage techniques are not adequate to store and analyses those huge volume of data. Many researchers are doing their research in dimensionality reduction of the big data for effective and better analytics report and data visualization. Hence, the aim of the survey paper is to provide the overview of the big data analytics, issues, challenges and various technologies related with Big Data.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133949712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Stealthy DDoS detecting mechanism for cloud resilience system 云弹性系统的DDoS隐身检测机制
G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai
{"title":"Stealthy DDoS detecting mechanism for cloud resilience system","authors":"G. Sophia, Meera Gandhi, Jeppiar Nagar, Gandhi Salai","doi":"10.1109/ICICES.2017.8070740","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070740","url":null,"abstract":"Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the infrastructure that is need to develop a small scale industry. Instead the developer can make use of the resources provided but the cloud and can pay only for the services which they are using. The main functionality of Cloud is to provide multiple resources to the users. Storing the data in the Cloud one of the major advantage. The hacker or the Botmaster will try to access or try to gain information of the data which is stored in the Cloud, by sending multiple request to the system. When the number of request exceeds the servers limit, the server will not be able to process the incoming request and the server may crash. The main aim of the paper is to create a framework for Cloud resilience system, which have the ability to provide the service for the clients even when the system is flooded with multiple request. When the incoming request exceeds the limit then the server will not be able to process the request and may crash. Inorder to prevent the server from crashing, a Stealthy DDos Detection Mechanism has been introduced. In this mechanism, the server monitors the number of incoming request given by each individual user. The server is initially given a limited amount of capacity to process the request of a single IP address. When the server load increases it checks all the request given by each user, if the request given by an individual user exceeds the servers limit then all the request from that particular IP address is blocked and all the services which are provided to that IP address is also denied.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An intelligent digital system for visually impaired person (vip's) 视障人士(vip)智能数字系统
M. Preetha, K. Elavarasi, K. Ramyadevi
{"title":"An intelligent digital system for visually impaired person (vip's)","authors":"M. Preetha, K. Elavarasi, K. Ramyadevi","doi":"10.1109/ICICES.2017.8070769","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070769","url":null,"abstract":"This paper bring the decision about the problem facing by the visual impaired person. Here, We designed the device to system for the visually impaired person to handle problem in the environment. They face difficulties in independent accessing public transport since they cannot read the route number and unsure about the physical location of the bus, identifying the person, and also they find difficulty in crossing the road. We focus on presenting the main advantages and limitations of each technique in effort to inform the scientific community about the progress in the area of system and also offer users a review about the capabilities of each system.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graphical passwords implies on tolerance password, image choice, and puzzle login security 图形密码意味着对密码的容错性、图像选择和谜题登录安全性
L. Gunaseeli, R. Canessane
{"title":"Graphical passwords implies on tolerance password, image choice, and puzzle login security","authors":"L. Gunaseeli, R. Canessane","doi":"10.1109/ICICES.2017.8070758","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070758","url":null,"abstract":"In this proposed scheme, we presenting a new-fangled security primordial using on firm AI harms click spell, It may nothing only tries equal to progress together and make it to defence as well as using of puzzle. The aims it may to develop the security of puzzle IMAGE. Click spell, Stab to do these different goals like security-Puzzle Login using bubble sort; This may use-to develops the login of passing the test values; to afford a dictionary function for abusers to learn with reference to the importance and the spelling of alphabet words. In the addition, the user & password can be placed on the top of Image Selection. Security-Image puzzles solving using AES algorithm and OTP Generation. Security primordial is based on firm AI harms. A fundamental user & password security is to create Image Selection. Using Image Captcha and verification using Bitmap pattern, verification using images as convert into Binary.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of multi-port converter under various modulation indices 多端口变换器在不同调制指标下的比较分析
C. Kishore, G. Ramesh
{"title":"Comparative analysis of multi-port converter under various modulation indices","authors":"C. Kishore, G. Ramesh","doi":"10.1109/ICICES.2017.8070781","DOIUrl":"https://doi.org/10.1109/ICICES.2017.8070781","url":null,"abstract":"Multi Port Converter with PV and the Wind Energy Conversion System presented. The proposed work consists of the operation of the proposed converter system under low wind power generation by which the excess of energy extracted from PV System. It can be achieved by changing the modulation indices of the Control Switch Sw1, while the complexity of the entire system is reduced. The Proposed system with varying modulation indices can improve the operating capability of the multi-port converter system, which can be utilised for balancing the Loads where High Voltage is required with low wind speeds. The improvements in the output voltage, power and Peak Diode Current across the Diode are validated using MATLAB/Simulink Software.","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信