{"title":"A compact triple slotted Rectangular Microstrip Patch Antenna with Metamaterial ground for Sub-6 GHz/5G communication","authors":"M. Vinoth, R. Vallikannu","doi":"10.1109/ICRCICN50933.2020.9296184","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296184","url":null,"abstract":"Different RMPA architectures are proposed in this paper to realize an antenna to operate in sub-6 GHz for 5G communications. The antenna design is optimized in steps to achieve a compact antenna with high performance. A basic Rectangular Patch Antenna (RPA) structure is initially presented, which operates in 3.13 GHz. The initial structure is examined and optimized by adding a Metamaterial (MTM) ground. The modified RPA with MTM ground exhibits resonance at 3.27 GHz, 3.78 GHz and 3.92 GHz. RPA structure is again tuned by adding three slots at top right edge of antenna patch and a Triple Slotted Rectangular Microstrip Patch Antenna (TSRMPA) with MTM ground is finally realized. The presented antenna is tuned to operate at sub-6 GHz by modifying the structure without altering the dimension. The TSRMPA with MTM ground resonates at 3.5 GHz with good return loss performance of -30.77 dB and gain of 5 dB. The dimension of compact TSRMPA with MTM ground is 30.2 x 36.4 mm2. These antennas are investigated using High Frequency Structural Simulator (HFSS) software. Finally, good concurrence between simulated and tested result is presented to prove the functioning of proposed antenna design.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"17 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Recoloring and Copy-Move Forgery in Digital Images","authors":"Jijina M.T, Litty Koshy, Gayathry.S. Warrier","doi":"10.1109/ICRCICN50933.2020.9296173","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296173","url":null,"abstract":"Due to the availability of numerous image manipulation tools, fraud images can be generated very easily and effectively. These fraud images are quite difficult to recognize. A section of the image is copied and pasted at some other location on the same image in copy-move forgery to drop meaningful objects or to bring additional information which is not present actually in the image. Whereas, the image recoloring techniques normally change the images via a variety of mechanisms like contrast enhancement and colorization. In the proposed method, copy move forgery detection is based on similarities in the images and finding the forged part by using threshold and contouring techniques. Recolored image detection uses a convolution neural network with three layers which outputs the probability of recoloring. As the techniques for image forging are developing faster, the necessity of highly efficient and accurate image forgery detection also increases. Here, this proposed system focuses on both recoloring and copy-move forgery detection.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124050994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twitter Hate Speech Detection using Stacked Weighted Ensemble (SWE) Model","authors":"Sujatha Arun Kokatnoor, Balachandran Krishnan","doi":"10.1109/ICRCICN50933.2020.9296199","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296199","url":null,"abstract":"Online Social Media has expanded the freedom of expression in the internet, which has become a disturbing problem if it has an impact on the situation or the interest of a country. Hate speech refers to the use of hostile, abusive or offensive language, directed at a certain group of people who share common property, whether it is their gender, ethnicity or race (i.e. racism), faith and religion. Therefore, auto detection of hate speeches has an increased importance in Online Social Media for filtering any message that has hatred language before posting it to the network. In this paper, a Stacked Weighted Ensemble (SWE) model is proposed for the detection of hate speeches. The model ensembles five standalone classifiers: Linear Regression, Naïve Bayes’, Random Forest, Hard Voting and Soft Voting. The experimental results on a Twitter® dataset has shown an accuracy of 95.54% in binary classification of tweets into hateful speech and an improved performance is noted compared to the standalone classifiers.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"2 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113958134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GALB: Load Balancing Algorithm for CP-ABE Encryption Tasks in E-Health Environment","authors":"M. Taha, Rasel Chowdhury","doi":"10.1109/ICRCICN50933.2020.9295967","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9295967","url":null,"abstract":"Security of personal data in the e-healthcare has always been challenging issue. The embedded and wearable devices used to collect these personal and critical data of the patients and users are sensitive in nature. Attribute-Based Encryption is believed to provide access control along with data security for distributed data among multiple parties. These resources limited devices do have the capabilities to secure the data while sending to the cloud but instead it increases the overhead and latency of running the encryption algorithm. On the top of if confidentiality is required, which will add more latency. In order to reduce latency and overhead, we propose a new load balancing algorithm that will distribute the data to nearby devices with available resources to encrypt the data and send it to the cloud. In this article, we are proposing a load balancing algorithm for EHealth system called (GALB). Our algorithm is based on Genetic Algorithm (GA). Our algorithm (GALB) distribute the tasks that received to the main gateway between the devices on E-health environment. The distribution strategy is based on the available resources in the devices, the distance between the gateway and the those devices, and the complexity of the task (size) and CP-ABE encryption policy length. In order to evaluate our algorithm performance, we compare the near optimal solution proposed by GALB with the optimal solution proposed by LP.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131815256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Assessment of Cascaded Double Voltage Lift Boost Converter","authors":"S. Radhika, V. Margaret","doi":"10.1109/ICRCICN50933.2020.9296190","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296190","url":null,"abstract":"In several power conversion applications, dc-dc boost converters with voltage boost techniques are extensively used in order to meet the growing power demand. The main drawback of conventional dc-dc boost converter is obtaining high DC voltages, when operated at high duty ratio which causes switching losses and decreases overall efficiency because of the switch being used to be in ‘ON’ state for long time and voltage stresses across switch increases. The main objective of proposed converter is to obtain high voltage without extreme duty ratio. When input voltage of 15V DC is given, 201.1V DC output voltage is attained at duty ratio of 0.4 by the cascaded double voltage lift boost converter. To validate the performance of proposed converter, simulation is carried out in LTspice XVII and a comparative assessment of proposed converter with other converters at different duty ratio are realized.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132345224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sonjoy Rana, Shounak Sengupta, Sourav Jana, Rahul Dan, Mahamuda Sultana, D. Sengupta
{"title":"Prototype Proposal for Quick Accident Detection and Response System","authors":"Sonjoy Rana, Shounak Sengupta, Sourav Jana, Rahul Dan, Mahamuda Sultana, D. Sengupta","doi":"10.1109/ICRCICN50933.2020.9296153","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296153","url":null,"abstract":"Traffic accidents contribute to an annual death toll of 1.25 million marking one of the primary causes of fatality. The Post Accident Response for such an alarming Figure calls for an immediate and effective Emergency Care which takes into account a series of time critical procedures beginning with the activation of the Quick Accident Response System (QARS) proposed in this communication. The implementation of Internet of Things (IoT) in QARS helps to detect an accident using multi-functional accelerometer and ultrasonic/proximity sensors. The video recording of the accident along with the exact location of the accident site fetched using a GPS-GSM module, along with the driver details will be immediately notified via internet to the nearest Emergency Response Units (ERU) through the Emergency Services portal of a dedicated mobile application. Pedestrians can also use the Pedestrian portal in the application to send live image and video feed to the Emergency services. An offline feature, allows sending accident alert and exact accident location to the nearest ERUs/pre-saved emergency contact numbers in the form of a simple text message. The work in this paper provides an automated system for emergency support in case of accidents.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122378617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases","authors":"K. Natarajan, Vaheedbasha Shaik","doi":"10.1109/ICRCICN50933.2020.9296168","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296168","url":null,"abstract":"This Transparent Data Encryption (TDE) can provide enormous benefits to the Relational Databases in the aspects of Data Security, Cryptographic Encryption, and Compliances. For every transaction, the stored data must be decrypted before applying the updates as well as should be encrypted before permanently storing back at the storage level. By adding this extra functionality to the database, the general thinking denotes that the Database (DB) going to hit some performance overhead at the CPU and storage level. However, The Oracle Corporation has adversely claimed that their latest Oracle DB version 19c TDE feature can provide significant improvement in the optimization of CPU and no overhead at the storage level for data processing. Impressively, it is true. the results of this paper prove too. Most interestingly the results also revealed about highly impacted components in the servers which are not yet disclosed in any of the previous research work. This paper completely concentrates on CPU, IO, and RAM performance analysis and identifying the bottlenecks along with possible solutions.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICRCICN 2020 List Reviewer Page","authors":"","doi":"10.1109/icrcicn50933.2020.9296165","DOIUrl":"https://doi.org/10.1109/icrcicn50933.2020.9296165","url":null,"abstract":"","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122482269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resiliency Analysis of ONOS and Opendaylight SDN Controllers Against Switch and Link Failures","authors":"M. Dagli, Selcuk Keskin, Yagmur Yigit, Adem Kose","doi":"10.1109/ICRCICN50933.2020.9296200","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296200","url":null,"abstract":"Video conference applications require a high quality of service (QoS) from the point of latency, jitter, and bandwidth. As the QoS parameters seriously suffer from instant congestions and network failures, resiliency mechanisms utilized at network level have a direct impact on the experienced video quality. In addition to the solutions offered under traditional networking, software defined networking (SDN) paradigm also offers various solutions to keep quality of experience (QoE) at certain levels even in instant network failure situations. Different types of SDN controllers provide different resiliency mechanisms to recover from failures. Recovery time is an important parameter to keep video conference experience at satisfactory levels as longer recovery time causes frozen streams, streaming delays and even drops in video conferencing. This study gives a comparative analysis of the recovery time on ONOS and Opendaylight SDN controllers in case of the link and switch failures.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115734351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OBSC:Osmotic BlockChain based framework for Smart City Environment","authors":"Sourav Hati, D. De","doi":"10.1109/ICRCICN50933.2020.9296170","DOIUrl":"https://doi.org/10.1109/ICRCICN50933.2020.9296170","url":null,"abstract":"Osmotic computing gives a novel worldview in brilliant city design. Numerous analysts have performed to create and to made sure about shrewd city engineering of the internet of-things (IoT) worldview. Security is the fundamental worry of the present exploration. In this situation, BlockChain starts in the time of the IoT worldview. In this proposed work, the creators concentrate on the information security, administration inertness and force utilization of the framework. The proposed feasible smart city technology has ordered into three unique levels, for example, physical level, edge level, and cloud level. Where the edge level is acquainted with the neighborhood BlockChain application and the cloud is utilized for worldwide and computational reason. BlockChain application is structured on the Amazon web administrations interface. The smart city engineering is ready to lessen error just as force utilization is diminished utilizing BlockChain applications. AWS CloudWatch observing apparatus and it additionally shows the status of the worldwide BlockChain database.","PeriodicalId":138966,"journal":{"name":"2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127044752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}