2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)最新文献

筛选
英文 中文
A Low Cost IoT Based Remote Monitoring and Feedback Collection Mechanism for Exhibits 一种基于物联网的展品远程监控与反馈收集机制
Shatadal Ghosh, Nataraj Dasgupta, S. Saha
{"title":"A Low Cost IoT Based Remote Monitoring and Feedback Collection Mechanism for Exhibits","authors":"Shatadal Ghosh, Nataraj Dasgupta, S. Saha","doi":"10.1109/icecct52121.2021.9616856","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616856","url":null,"abstract":"Remote monitoring and feedback collection is an important task for various service industries. Monitoring helps to assure quality of service while Collection of unbiased feedback is always on the top priority for any service industry like museums. Museum being a visitor centric institute heavily works on this field. This work is mainly focused on assuring quality of the Mobile science Exhibition program run by National Council of Science Museums. This Mobile Science Exhibition (MSE) is a unique and prestigious and largest outreach program run by the National Council of Science Museums. The first bus was launched in the year 1965[3] by Birla Industrial and technological Museums (BITM). Since the first day it has been one of the most successful programs run by NCSM. Hence authority has always had a dedicated focus on this program and making it more successful. With the recent decision of expending the volume of the program to a greater extent has created some operational challenges like assuring the maximum popularization of this program while operating these MSE with the help of external agencies. In this paper we have proposed the use of advanced Internet of things (IoT) based technology to solve the corresponding challenges. In addition to solving the operational challenges, our proposal will provide very useful indirect feedback data that can be used for different kinds of analysis to improve the quality of the program. The cost and complexity of the proposed system is designed by considering its feasibility to adoption by a developing country.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124131552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Unsupervised Learning Approach for Visual Data Compression with Chaotic Encryption 一种混沌加密视觉数据压缩的无监督学习方法
Bharti Ahuja, R. Doriya
{"title":"An Unsupervised Learning Approach for Visual Data Compression with Chaotic Encryption","authors":"Bharti Ahuja, R. Doriya","doi":"10.1109/icecct52121.2021.9616827","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616827","url":null,"abstract":"The increased demand of multimedia leads to shortage of network bandwidth and memory capacity. As a result, image compression is more significant for decreasing data redundancy, saving storage space and bandwidth. Along with the compression the next major challenge in this field is to safeguard the compressed data further from the spy which are commonly known as hackers. It is evident that the major increments in the fields like communication, wireless sensor network, data science, cloud computing and machine learning not only eases the operations of the related field but also increases the challenges as well. This paper proposes a worthy composition for image compression encryption based on unsupervised learning i.e. k-means clustering for compression with logistic chaotic map for encryption. The main advantage of the above combination is to address the problem of data storage and the security of the visual data as well. The algorithm reduces the size of the input image and also gives the larger key space for encryption. The validity of the algorithm is testified with the PSNR, MSE, SSIM and Correlation coefficient.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131459583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime Prediction and Forecasting using Voting Classifier 基于投票分类器的犯罪预测与预测
D. M, Hasifa A S, Merin Meleet
{"title":"Crime Prediction and Forecasting using Voting Classifier","authors":"D. M, Hasifa A S, Merin Meleet","doi":"10.1109/icecct52121.2021.9616911","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616911","url":null,"abstract":"The creation of policing strategies and the implementation of crime prevention and control programmes rely heavily on crime prediction. In India, the number of cognizable offences are gradually rising. These offences include those that are covered by the Indian Penal Code as well as those covered by a variety of Special and Local Laws. In this study, various machine learning algorithms are used to analyze data related to crime which will give the behaviors in crime over an area, that might be helpful in crime prevention. Classification Algorithms such as KNN, Random Forest, Adaptive Boosting Classifier, Gradient Boosting Classifier, and Extra Trees Classifier were tested individually on a crime dataset based in South Bangalore. Later, these five algorithms were combined to achieve better results using Voting Classifier Technique in order to balance out their individual weaknesses.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131271319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review-and-Reviewer based approach for Fake Review Detection 一种基于评审和审稿人的虚假评论检测方法
Janhavi Bhopale, Rugved Bhise, Arthav Mane, K. Talele
{"title":"A Review-and-Reviewer based approach for Fake Review Detection","authors":"Janhavi Bhopale, Rugved Bhise, Arthav Mane, K. Talele","doi":"10.1109/icecct52121.2021.9616697","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616697","url":null,"abstract":"This paper presents an approach to fake review detection, essentially for online hotel reviews, by combining the review-based approach and reviewer-based approach. Different Natural Language Processing techniques such as tokenization, lemmatization, vectorization, etc. are used to extract insightful features from the review text data. After text mining, the data is used to train different classification models using machine learning algorithms that detect fake reviews. After evaluating the models, a comparison is made based on the performance metrics. Furthermore, a web based user interface is created to provide a platform that combines the knowledge of the input user information with the chosen machine learning model to perform fake review detection on the input data.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130457231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Construction of Reverse Logistics Network of Waste Electrical Appliances 废旧电器逆向物流网络的构建
Lida Hu, Amit R. Yadav, Hong Liu, M. Hassan, Swarnali Mollick
{"title":"Construction of Reverse Logistics Network of Waste Electrical Appliances","authors":"Lida Hu, Amit R. Yadav, Hong Liu, M. Hassan, Swarnali Mollick","doi":"10.1109/ICECCT52121.2021.9616694","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616694","url":null,"abstract":"Taking waste household appliances as the research object, this paper constructs a multi-level single-category single-cycle independent waste household appliances reverse logistics network. In the design model, carbon emissions are used as indicators of negative environmental effects, and the carbon emissions are converted from qualitative analysis. For quantitative calculation, a multi-objective mixed integer programming model based on carbon emission cost and operating cost minimization as the objective function was constructed, and a genetic algorithm for site selection decision and flow allocation was designed to solve the model, and the effectiveness of the model was verified through practical cases.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Black Widow Optimization with Signcryption based Image Encryption Technique 基于签名加密的图像加密技术的高效黑寡妇优化
S. Kaliswaran, M. Parvees
{"title":"An Efficient Black Widow Optimization with Signcryption based Image Encryption Technique","authors":"S. Kaliswaran, M. Parvees","doi":"10.1109/icecct52121.2021.9616816","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616816","url":null,"abstract":"In last decades, Internet plays a vital medium to transfer sensitive data and the security of the communicated data needs to be high. To accomplish security, image steganography has become a major technique of data hiding which assures the security of the transmitted data. Besides, the images possess maximum capacity and the occurrence of images on the Internet is abundant. With this motivation, this paper presents an efficient black widow optimization (BWO) with signcryption technique called BWO-ST for image steganography. The proposed model involves a multi-level discrete wavelet transform (DWT) transformation is employed. Besides, the optimum pixel selection process takes place using the BWO algorithm and the encryption process is performed using the signcryption technique. In addition, the encrypted image was embedding into the selected pixel point of the cover image. A detailed series of simulation analyses are performed and the results are evaluated under different dimensions. The obtained results showcased the supremacy of the BWO-ST approach compared to other techniques.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tunable Low Voltage Low Power Operational Transconductance Amplifier For Biomedical Application 用于生物医学的可调谐低电压低功率操作跨导放大器
G. Shankar, G. Soni, Bijesh Kumar Singh, B. Jain
{"title":"Tunable Low Voltage Low Power Operational Transconductance Amplifier For Biomedical Application","authors":"G. Shankar, G. Soni, Bijesh Kumar Singh, B. Jain","doi":"10.1109/ICECCT52121.2021.9616627","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616627","url":null,"abstract":"The operational transconductance amplifier (OTA) is a mostly used analog processing block. In recent years, the development of OTA with very low conductivity, low power, low voltage, improved linearity has been mainly used in biomedical applications. This paper presents a tunable operational transconductance amplifier using CMOS technology which frequency is tunable by varying the control voltage. By tuning the frequency of the OTA, the OTA is used for various biomedical applications Such as ECG, EEG, and ERG applications with respectively frequency 250Hz, 200Hz and 100Hz. The design of the proposed OTA has done in 90nm CMOS environment with a supply voltage of ±0.35V.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"27 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120998575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Defects Detection and Prevention Through Virtualization 基于虚拟化的软件缺陷检测与预防
Jean Paul Turikumwe, Cheruiyot Wilson, Ann Kibe
{"title":"Software Defects Detection and Prevention Through Virtualization","authors":"Jean Paul Turikumwe, Cheruiyot Wilson, Ann Kibe","doi":"10.1109/ICECCT52121.2021.9616861","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616861","url":null,"abstract":"With more and more digital machines consolidated on fewer and fewer cloud servers, the software running in those servers needs safety. Virtualization poses unique software defects which must be detected and prevented specific software requirements designed for virtualization environments. In this research thesis, software virtualization technology became used to transparently record the allocation and release of memory resources implemented to a database connection on a virtual machine in the cloud, and these records provided the information to detect memory leaks hiding in the code. Memory leaks account for lack of a self-adaptive handy cloud computing structure due to consistent use ordinary static and dynamic memory leak analysis tools. Most of the available tools for defects detection do not provide for consistency of memory leak prevention. The main intention of the research developed a self-adaptive virtualization model for software defects detection and prevention of software Memory Leaks Using Deep Learning and Machine Learning Methods. Data sampling used was code-based sampling based on Low-Density Parity Checks which avoided overestimating false positives for the variables used. There were a total population of 35 variables for the study, out of these; seven variables were selected as a sample. The sample objects, classes and class loaders access for the 4-database test connection used a minimum 0.1% sampling rate which had 4 database connection references out of every 7 variables used. The approach used gave an accuracy of 98% security rate when compared with other existing methods like Long Short-Term Memory which achieved 82.3%, Self-organizing Maps was 85.5% and Boltzmann Approach was 93.5%.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-Performance Analysis of Recessed Gate AlN/β-Ga2O3 HEMT 凹槽栅AlN/β-Ga2O3 HEMT的高性能分析
Tushar Shivam, B. Saini, R. K. Sunkaria, Ravi Ranjan
{"title":"High-Performance Analysis of Recessed Gate AlN/β-Ga2O3 HEMT","authors":"Tushar Shivam, B. Saini, R. K. Sunkaria, Ravi Ranjan","doi":"10.1109/ICECCT52121.2021.9616693","DOIUrl":"https://doi.org/10.1109/ICECCT52121.2021.9616693","url":null,"abstract":"Normally-OFF HEMT is used for power electronics application. The proposed Recessed gate AlN/β-Ga<inf>2</inf>O<inf>3</inf> HEMT (RG-AlN/β-Ga<inf>2</inf>O<inf>3</inf> HEMT) is enhance the performance of device. In this paper analog performance of the RG-AlN/β-Ga<inf>2</inf>O<inf>3</inf> HEMT is analysis. Due to larger bandgap of β-Ga<inf>2</inf>O<inf>3</inf>, the proposed device will work for larger breakdown voltage. Two-dimensional electron gas (2DEG) is formed at the top of β-Ga<inf>2</inf>O<inf>3</inf> with polarization induced field in AlN layer. No any doping is required in any layer to generate 2DEG. Dual layer of dielectric is used for enhance the analog performance and also interface quality of proposed device. Drain current (Ids), transconductance (g<inf>m</inf>), total gate capacitance (C<inf>gg</inf>) and cutoff frequency(f<inf>T</inf>) are analysis.","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of C band Patch Antenna for WLAN and Satellite Applications using Metamaterial 无线局域网和卫星用超材料C波段贴片天线的研制
Priyal Doshi, M. Shah, Khyati Chavda
{"title":"Development of C band Patch Antenna for WLAN and Satellite Applications using Metamaterial","authors":"Priyal Doshi, M. Shah, Khyati Chavda","doi":"10.1109/icecct52121.2021.9616863","DOIUrl":"https://doi.org/10.1109/icecct52121.2021.9616863","url":null,"abstract":"The Microstrip patch antenna with metamaterial is proposed. The use of metamaterial in the antenna reduces the size of antenna and also improves other antenna parameters such as improving the return loss and efficiency. The complementary split ring resonator (CSRR) is loaded on the radiating patch antenna due to which multifrequency response is also obtained. Flame Retardant (FR4) epoxy substrate is used. The proposed antenna operates at 4.1GHz, 5.27GHz and 7.6GHz having bandwidths of 6.7%, 10.3% and 8.15%. The structure is simulated using High Frequency Structure Simulator (HFSS).","PeriodicalId":155129,"journal":{"name":"2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134573568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信