2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)最新文献

筛选
英文 中文
A Review on Clustering Protocols with Energy heterogeneity in Wireless Sensor Networks 无线传感器网络中能量异构聚类协议研究进展
G. K. Reddy, L. Devi
{"title":"A Review on Clustering Protocols with Energy heterogeneity in Wireless Sensor Networks","authors":"G. K. Reddy, L. Devi","doi":"10.1109/IC3IOT.2018.8668186","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668186","url":null,"abstract":"In the field of wireless sensor networks (WSNs), several researchers have motivated in the past couple of years because of their potential applications and related challenges, which contain numerous sensor nodes deployed randomly within the field of significance having power constrained. These sensors report data which is sensed from the deployed field to the sink that necessitie high energy usage. The efficient usage of the network energy may be gone by arranging the sensors into sets, called clusters. Cluster Head (CH) and several members of sensor nodes are present in each Cluster but it is more appropriate and economical only when sensor nodes with different energy levels are used. In this paper, we discriminate DEEC, DDEEC, EDEEC, TDEEC, BEENISH, Level-5 and Level-6 protocols on the basis of stability period, network lifetime and throughput of nodes alive during in various level heterogeneous networks.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"468 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Change in IT world with the evolution of social media using Big Data 随着社交媒体使用大数据的演变,IT世界发生了变化
S. Rawat, Shivam Jindal, Ram Shankar Moorti, Yash Mangal, N. Saxena
{"title":"Change in IT world with the evolution of social media using Big Data","authors":"S. Rawat, Shivam Jindal, Ram Shankar Moorti, Yash Mangal, N. Saxena","doi":"10.1109/IC3IOT.2018.8668165","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668165","url":null,"abstract":"Social media has come to change the way we perceived digital marketing, CRM, SEO and various other fields of IT. From hiring policies to crowd-sourcing campaigns, social media has become very influential. Corporates have also shown keen interest in using social media to achieve their business objectives, since it saves a lot of time, money, manpower and training and resources to handle consumer relations. This paper aims at optimizing the use of social media and analyze the recent trends to recommend the best course of action to manage social media and to use it to achieve corporate goals involving customer interaction.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Biometric based Anonymous User Authentication Technique in Wireless Body Area Networks 基于生物特征的无线体域网络匿名用户认证技术
Gitanjali Behera, Saroj Kumar Panigrahy, A. K. Turuk
{"title":"A Biometric based Anonymous User Authentication Technique in Wireless Body Area Networks","authors":"Gitanjali Behera, Saroj Kumar Panigrahy, A. K. Turuk","doi":"10.1109/IC3IOT.2018.8668193","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668193","url":null,"abstract":"The sensor nodes used in wireless body area networks are resource constrained, having limited battery power and memory capacity. Hence, they are not capable of running more complex algorithm to ensure the security. Therefore, designing a light-weight protocol for wireless body area networks which aims to provide maximum security with resource-constrained devices is a tough challenge. In this paper, we propose a light weight biometric-based anonymous authentication technique between the user and the application server in WBAN which preserves the patient’s privacy as well as achieves mutual authentication. In addition, we have given an informal cryptanalysis which ensures that the proposed technique resists different well known attacks.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134196805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Use of Firefly Algorithm for Optimizing Hexagonal Antenna Arrays 萤火虫算法在六边形天线阵列优化中的应用
K. Kundu, N. Pathak
{"title":"Use of Firefly Algorithm for Optimizing Hexagonal Antenna Arrays","authors":"K. Kundu, N. Pathak","doi":"10.1109/IC3IOT.2018.8668124","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668124","url":null,"abstract":"The main motive of this paper is to describe the performance of Hexagonal Array (HA) made of isotropic antennas which are uniformly excited and generates directive beam that is of lowest side lobe level (SLL). The firefly algorithm provides an efficient method of optimizing the composite signal of an antenna array. In the present paper algorithm named firefly algorithm is utilized to find best possible excitation in 12-element & 18 element hexagonal array with uniformly distributed antenna elements, such that side-lobe levels (SLL) and first null bandwidth (FNBW) are minimized compared to an antenna configuration with uniform excitation.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Conformal Antenna for Wireless Capsule 无线胶囊共形天线设计
S. Preethiba, S. Brindha
{"title":"Design of Conformal Antenna for Wireless Capsule","authors":"S. Preethiba, S. Brindha","doi":"10.1109/IC3IOT.2018.8668181","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668181","url":null,"abstract":"Ingestible antenna wireless capsule endoscopy is one of the painless, efficient, diagnostic technologies for inspecting the gastrointestinal tract for diagnosing various diseases such as gastrointestinal bleeding, tumors, cancer etc. This wireless capsule can provide a better solution for diagnosing the above diseases. wireless capsule shaped conformal ingestible antenna is designed and simulated. The antenna characteristics such as return loss, gain and directivity with operating at frequency of 2.4GHz has been studied.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133979404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Irrigation System for Agriculture 高效的农业灌溉系统
S. Rajendrakumar, V. Parvati, Rajashekarappa
{"title":"An Efficient Irrigation System for Agriculture","authors":"S. Rajendrakumar, V. Parvati, Rajashekarappa","doi":"10.1109/ic3iot.2018.8668206","DOIUrl":"https://doi.org/10.1109/ic3iot.2018.8668206","url":null,"abstract":"The wastage of water without proper knowledge of having irrigation to the crops or plants then we need infrastructure to carry water and even money is also wasted. Automated agricultural watering system saves water by delivering quantity of water requires for the area to irrigate. It also helps to keep the plants in a healthy manner without wastage of water which also saves money. The proposed method helps to protect our community water supply for future generation by using water in an efficient way. In this paper the efforts is to minimize the drawback of traditional agriculture, and to get advanced with the technology which utilizes the water for the production of the crops. To save the important resource which is water, Automated Agricultural Irrigation method is developed using IOT principles. This system makes an attempt to save budget of a farmer by using low cost sensors. The great advantage of smart irrigation is it minimizes the needs for infrastructure which is used for storage to carry water.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"29 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient Combined Approach for Sentiment Analysis using SVM and HARN Algorithms 一种基于支持向量机和HARN算法的情感分析方法
V. N. D. Duvvuri, Venkata Rajini Kanth Thatiparti, Mounika Kakollu, Sowjanya Swathi Nambhatla, Ravi Vemagiri, Girish Varma Vegesna
{"title":"An Efficient Combined Approach for Sentiment Analysis using SVM and HARN Algorithms","authors":"V. N. D. Duvvuri, Venkata Rajini Kanth Thatiparti, Mounika Kakollu, Sowjanya Swathi Nambhatla, Ravi Vemagiri, Girish Varma Vegesna","doi":"10.1109/IC3IOT.2018.8668196","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668196","url":null,"abstract":"In olden days only MNC companies used to formulate the data and make use of it. But nowadays each and every individual is creating a bulk amount of data and using such a huge data. For example, we have numerous products available in one of the reputed websites viz. Amazon website in which most of the people are buying a vast amount of products and readily provide their esteemed reviews on that particular product. Data is generated as explained above. Google will produce more than 20PB of data, while Facebook generates more than 5PB of messages and so on. Analyzing that huge amount of data is troublesome to humans. To solve this challenging task, sentiment analysis comes into consideration. In our analysis, we have developed an innovative way for finding sentiment analysis at document level by using SVM and HARN’s algorithm. It is proved to be one of the best ways to analyze customer’s opinion on a product at the document level.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Way of Vehicle Theft Detection in Parking Facilities by Identifying Moving Vehicles in CCTV Video Stream 基于CCTV视频流中移动车辆识别的停车场车辆盗窃自动检测方法
Sayma Shammi, Sayeed Islam, Hafiz Abdur Rahman, Hasan U. Zaman
{"title":"An Automated Way of Vehicle Theft Detection in Parking Facilities by Identifying Moving Vehicles in CCTV Video Stream","authors":"Sayma Shammi, Sayeed Islam, Hafiz Abdur Rahman, Hasan U. Zaman","doi":"10.1109/IC3IOT.2018.8668135","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668135","url":null,"abstract":"Security of parked cars against theft is a long existing concern where image and video processing can offer solutions. The car owners or parking lot operators are worried about having the vehicles stolen from parking lots, so they use CCTV cameras in parking lots to detect theft. The increased use of CCTV and video surveillance indicates their success as theft deterrents but a major drawback of the system is that non-automated human monitoring of vehicles can have human errors or lapses due to human fatigue. This paper presents an automated way of detecting vehicle theft as it happens. This procedure is based on moving object detection using Canny Edge Detection method and eventually notifying the security personnel or the parking lot operator about the movement. The first step is to detect the edges through Canny method and then finding the edge change ratio to finally determine a movement. Canny is one of the modern Edge detection techniques and choosing this one over other methods is because of the double thresholding and its better performance, which makes the method described in this paper efficient and useful. This paper proves the effectiveness of the described method.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Energy Optimization in Wireless Sensor Network based on Magneto Tactic Bacteria Optimization Algorithm 基于磁致战术细菌优化算法的无线传感器网络能量优化
E. S. RajaRajeswari, B. Kalpana
{"title":"Energy Optimization in Wireless Sensor Network based on Magneto Tactic Bacteria Optimization Algorithm","authors":"E. S. RajaRajeswari, B. Kalpana","doi":"10.1109/IC3IOT.2018.8668126","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668126","url":null,"abstract":"Recent years has witnessed a great development in the application of Wireless Sensor Networks in various sectors. In spite of the numerous advantages exhibited by Wireless Sensor Networks, there are limitations due to the low processing power and limited lifetime. The major challenge is related to the energy expended by sensor nodes. Therefore, energy optimization is a key challenge in this area. In this paper, the Magnetotactic Bacteria Algorithm is used to regulate the cell moment and thereby keep the energy consumption at a minimum in the wireless sensor networks. Experimental results show that such an optimization applied to the routing algorithm results in the better performance when compared with other techniques.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twitter Sentiment for Analysing Different Types of Crimes 推特情绪分析不同类型的犯罪
B. Prathap, K. Ramesha
{"title":"Twitter Sentiment for Analysing Different Types of Crimes","authors":"B. Prathap, K. Ramesha","doi":"10.1109/IC3IOT.2018.8668140","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668140","url":null,"abstract":"Online social media like a twitter play a vital role as it helps to track the Spatial-temporal on social media data with respect crime rate. With the very fast evolving of users in social media, sentimental analysis has become an excellent source of information in decision making. Twitter is one of the most popular social networking site for communication and a primary source of information. More than 150 million users publish above 500 million 140 character TWEETS each day. Tweets have become a basis for product recommendation using sentimental analysis. This paper explains the approach for analyzing the sentiments of the users about a particular crime event tweets posted by the active users. The results so obtained will let you know about the change in the public opinion about the crime events whether it’s positive or negative and to find out emotions on different types of crimes.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115906346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信