2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)最新文献

筛选
英文 中文
A compact triple slotted Rectangular Microstrip Patch Antenna with Metamaterial ground for Sub-6 GHz/5G communication 一种紧凑的三开槽矩形微带贴片天线,具有超材料接地,用于Sub-6 GHz/5G通信
M. Vinoth, R. Vallikannu
{"title":"A compact triple slotted Rectangular Microstrip Patch Antenna with Metamaterial ground for Sub-6 GHz/5G communication","authors":"M. Vinoth, R. Vallikannu","doi":"10.1109/ICRCICN50933.2020.9296184","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296184","url":null,"abstract":"Different RMPA architectures are proposed in this paper to realize an antenna to operate in sub-6 GHz for 5G communications. The antenna design is optimized in steps to achieve a compact antenna with high performance. A basic Rectangular Patch Antenna (RPA) structure is initially presented, which operates in 3.13 GHz. The initial structure is examined and optimized by adding a Metamaterial (MTM) ground. The modified RPA with MTM ground exhibits resonance at 3.27 GHz, 3.78 GHz and 3.92 GHz. RPA structure is again tuned by adding three slots at top right edge of antenna patch and a Triple Slotted Rectangular Microstrip Patch Antenna (TSRMPA) with MTM ground is finally realized. The presented antenna is tuned to operate at sub-6 GHz by modifying the structure without altering the dimension. The TSRMPA with MTM ground resonates at 3.5 GHz with good return loss performance of -30.77 dB and gain of 5 dB. The dimension of compact TSRMPA with MTM ground is 30.2 x 36.4 mm2. These antennas are investigated using High Frequency Structural Simulator (HFSS) software. Finally, good concurrence between simulated and tested result is presented to prove the functioning of proposed antenna design.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"17 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Recoloring and Copy-Move Forgery in Digital Images 数字图像重着色和复制-移动伪造的检测
Jijina M.T, Litty Koshy, Gayathry.S. Warrier
{"title":"Detection of Recoloring and Copy-Move Forgery in Digital Images","authors":"Jijina M.T, Litty Koshy, Gayathry.S. Warrier","doi":"10.1109/ICRCICN50933.2020.9296173","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296173","url":null,"abstract":"Due to the availability of numerous image manipulation tools, fraud images can be generated very easily and effectively. These fraud images are quite difficult to recognize. A section of the image is copied and pasted at some other location on the same image in copy-move forgery to drop meaningful objects or to bring additional information which is not present actually in the image. Whereas, the image recoloring techniques normally change the images via a variety of mechanisms like contrast enhancement and colorization. In the proposed method, copy move forgery detection is based on similarities in the images and finding the forged part by using threshold and contouring techniques. Recolored image detection uses a convolution neural network with three layers which outputs the probability of recoloring. As the techniques for image forging are developing faster, the necessity of highly efficient and accurate image forgery detection also increases. Here, this proposed system focuses on both recoloring and copy-move forgery detection.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124050994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Twitter Hate Speech Detection using Stacked Weighted Ensemble (SWE) Model 基于堆叠加权集成(SWE)模型的Twitter仇恨语音检测
Sujatha Arun Kokatnoor, Balachandran Krishnan
{"title":"Twitter Hate Speech Detection using Stacked Weighted Ensemble (SWE) Model","authors":"Sujatha Arun Kokatnoor, Balachandran Krishnan","doi":"10.1109/ICRCICN50933.2020.9296199","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296199","url":null,"abstract":"Online Social Media has expanded the freedom of expression in the internet, which has become a disturbing problem if it has an impact on the situation or the interest of a country. Hate speech refers to the use of hostile, abusive or offensive language, directed at a certain group of people who share common property, whether it is their gender, ethnicity or race (i.e. racism), faith and religion. Therefore, auto detection of hate speeches has an increased importance in Online Social Media for filtering any message that has hatred language before posting it to the network. In this paper, a Stacked Weighted Ensemble (SWE) model is proposed for the detection of hate speeches. The model ensembles five standalone classifiers: Linear Regression, Naïve Bayes’, Random Forest, Hard Voting and Soft Voting. The experimental results on a Twitter® dataset has shown an accuracy of 95.54% in binary classification of tweets into hateful speech and an improved performance is noted compared to the standalone classifiers.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"2 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113958134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
GALB: Load Balancing Algorithm for CP-ABE Encryption Tasks in E-Health Environment 电子卫生环境中CP-ABE加密任务的负载均衡算法
M. Taha, Rasel Chowdhury
{"title":"GALB: Load Balancing Algorithm for CP-ABE Encryption Tasks in E-Health Environment","authors":"M. Taha, Rasel Chowdhury","doi":"10.1109/ICRCICN50933.2020.9295967","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9295967","url":null,"abstract":"Security of personal data in the e-healthcare has always been challenging issue. The embedded and wearable devices used to collect these personal and critical data of the patients and users are sensitive in nature. Attribute-Based Encryption is believed to provide access control along with data security for distributed data among multiple parties. These resources limited devices do have the capabilities to secure the data while sending to the cloud but instead it increases the overhead and latency of running the encryption algorithm. On the top of if confidentiality is required, which will add more latency. In order to reduce latency and overhead, we propose a new load balancing algorithm that will distribute the data to nearby devices with available resources to encrypt the data and send it to the cloud. In this article, we are proposing a load balancing algorithm for EHealth system called (GALB). Our algorithm is based on Genetic Algorithm (GA). Our algorithm (GALB) distribute the tasks that received to the main gateway between the devices on E-health environment. The distribution strategy is based on the available resources in the devices, the distance between the gateway and the those devices, and the complexity of the task (size) and CP-ABE encryption policy length. In order to evaluate our algorithm performance, we compare the near optimal solution proposed by GALB with the optimal solution proposed by LP.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131815256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparative Assessment of Cascaded Double Voltage Lift Boost Converter 级联双电压升压变换器的比较评价
S. Radhika, V. Margaret
{"title":"A Comparative Assessment of Cascaded Double Voltage Lift Boost Converter","authors":"S. Radhika, V. Margaret","doi":"10.1109/ICRCICN50933.2020.9296190","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296190","url":null,"abstract":"In several power conversion applications, dc-dc boost converters with voltage boost techniques are extensively used in order to meet the growing power demand. The main drawback of conventional dc-dc boost converter is obtaining high DC voltages, when operated at high duty ratio which causes switching losses and decreases overall efficiency because of the switch being used to be in ‘ON’ state for long time and voltage stresses across switch increases. The main objective of proposed converter is to obtain high voltage without extreme duty ratio. When input voltage of 15V DC is given, 201.1V DC output voltage is attained at duty ratio of 0.4 by the cascaded double voltage lift boost converter. To validate the performance of proposed converter, simulation is carried out in LTspice XVII and a comparative assessment of proposed converter with other converters at different duty ratio are realized.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132345224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prototype Proposal for Quick Accident Detection and Response System 事故快速检测与响应系统原型方案
Sonjoy Rana, Shounak Sengupta, Sourav Jana, Rahul Dan, Mahamuda Sultana, D. Sengupta
{"title":"Prototype Proposal for Quick Accident Detection and Response System","authors":"Sonjoy Rana, Shounak Sengupta, Sourav Jana, Rahul Dan, Mahamuda Sultana, D. Sengupta","doi":"10.1109/ICRCICN50933.2020.9296153","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296153","url":null,"abstract":"Traffic accidents contribute to an annual death toll of 1.25 million marking one of the primary causes of fatality. The Post Accident Response for such an alarming Figure calls for an immediate and effective Emergency Care which takes into account a series of time critical procedures beginning with the activation of the Quick Accident Response System (QARS) proposed in this communication. The implementation of Internet of Things (IoT) in QARS helps to detect an accident using multi-functional accelerometer and ultrasonic/proximity sensors. The video recording of the accident along with the exact location of the accident site fetched using a GPS-GSM module, along with the driver details will be immediately notified via internet to the nearest Emergency Response Units (ERU) through the Emergency Services portal of a dedicated mobile application. Pedestrians can also use the Pedestrian portal in the application to send live image and video feed to the Emergency services. An offline feature, allows sending accident alert and exact accident location to the nearest ERUs/pre-saved emergency contact numbers in the form of a simple text message. The work in this paper provides an automated system for emergency support in case of accidents.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122378617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases 透明数据加密:Oracle数据库的比较分析与性能评价
K. Natarajan, Vaheedbasha Shaik
{"title":"Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases","authors":"K. Natarajan, Vaheedbasha Shaik","doi":"10.1109/ICRCICN50933.2020.9296168","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296168","url":null,"abstract":"This Transparent Data Encryption (TDE) can provide enormous benefits to the Relational Databases in the aspects of Data Security, Cryptographic Encryption, and Compliances. For every transaction, the stored data must be decrypted before applying the updates as well as should be encrypted before permanently storing back at the storage level. By adding this extra functionality to the database, the general thinking denotes that the Database (DB) going to hit some performance overhead at the CPU and storage level. However, The Oracle Corporation has adversely claimed that their latest Oracle DB version 19c TDE feature can provide significant improvement in the optimization of CPU and no overhead at the storage level for data processing. Impressively, it is true. the results of this paper prove too. Most interestingly the results also revealed about highly impacted components in the servers which are not yet disclosed in any of the previous research work. This paper completely concentrates on CPU, IO, and RAM performance analysis and identifying the bottlenecks along with possible solutions.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ICRCICN 2020 List Reviewer Page ICRCICN 2020列表审核页面
{"title":"ICRCICN 2020 List Reviewer Page","authors":"","doi":"10.1109/icrcicn50933.2020.9296165","DOIUrl":"https://doi.org/10.1109/icrcicn50933.2020.9296165","url":null,"abstract":"","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122482269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resiliency Analysis of ONOS and Opendaylight SDN Controllers Against Switch and Link Failures ONOS和Opendaylight SDN控制器对交换机和链路故障的弹性分析
M. Dagli, Selcuk Keskin, Yagmur Yigit, Adem Kose
{"title":"Resiliency Analysis of ONOS and Opendaylight SDN Controllers Against Switch and Link Failures","authors":"M. Dagli, Selcuk Keskin, Yagmur Yigit, Adem Kose","doi":"10.1109/ICRCICN50933.2020.9296200","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296200","url":null,"abstract":"Video conference applications require a high quality of service (QoS) from the point of latency, jitter, and bandwidth. As the QoS parameters seriously suffer from instant congestions and network failures, resiliency mechanisms utilized at network level have a direct impact on the experienced video quality. In addition to the solutions offered under traditional networking, software defined networking (SDN) paradigm also offers various solutions to keep quality of experience (QoE) at certain levels even in instant network failure situations. Different types of SDN controllers provide different resiliency mechanisms to recover from failures. Recovery time is an important parameter to keep video conference experience at satisfactory levels as longer recovery time causes frozen streams, streaming delays and even drops in video conferencing. This study gives a comparative analysis of the recovery time on ONOS and Opendaylight SDN controllers in case of the link and switch failures.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115734351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OBSC:Osmotic BlockChain based framework for Smart City Environment OBSC:基于区块链的智能城市环境框架
Sourav Hati, D. De
{"title":"OBSC:Osmotic BlockChain based framework for Smart City Environment","authors":"Sourav Hati, D. De","doi":"10.1109/ICRCICN50933.2020.9296170","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296170","url":null,"abstract":"Osmotic computing gives a novel worldview in brilliant city design. Numerous analysts have performed to create and to made sure about shrewd city engineering of the internet of-things (IoT) worldview. Security is the fundamental worry of the present exploration. In this situation, BlockChain starts in the time of the IoT worldview. In this proposed work, the creators concentrate on the information security, administration inertness and force utilization of the framework. The proposed feasible smart city technology has ordered into three unique levels, for example, physical level, edge level, and cloud level. Where the edge level is acquainted with the neighborhood BlockChain application and the cloud is utilized for worldwide and computational reason. BlockChain application is structured on the Amazon web administrations interface. The smart city engineering is ready to lessen error just as force utilization is diminished utilizing BlockChain applications. AWS CloudWatch observing apparatus and it additionally shows the status of the worldwide BlockChain database.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127044752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信