{"title":"Multi Dimension Fuzzy C-means Color Image Segmentation Based on Intelligent Analysis Algorithm","authors":"Caizeng Ye, Peng Wang, P. Pareek","doi":"10.1109/ICKECS56523.2022.10059660","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10059660","url":null,"abstract":"In our daily life, people often encounter some fuzzy problems, such as image segmentation, digital filtering, etc. Therefore, this paper studies the color scene information compression based on intelligent analysis algorithm. First, the combination of fuzzy clustering method and gray model hair preprocessing method is introduced. Then, the simulation experiment results of Matlab software prove that the average number of the intelligent analysis algorithm is slightly larger in terms of the average number of the multi-dimensional FCCI(FCCI) segmentation technique, indicating that the performance of the intelligent analysis algorithm has been improved, mainly because the algorithm uses the midpoint method to select the original initial clustering center in the early stage, The algorithm can effectively reduce the number of iterations in the iterative process, thus improving the performance of the algorithm. This also shows that the method can well suppress noise and improve the effect of edge region separation. Finally, an idea of combining color threshold to effectively extract image segmentation features is proposed, and to some extent, adding color threshold to the image provides a theoretical basis and practical guidance for its further promotion.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115809643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Miniaturized Four-Element Antenna with Defected Ground and High Isolation","authors":"Anubhav Kumar, Pragya Gupta, Manisha Bharti, Divya Saxena","doi":"10.1109/ICKECS56523.2022.10060312","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060312","url":null,"abstract":"This paper proposes a miniaturized four-element antenna with defected ground and high isolation. Four modified microstrip-fed with rectangular radiators on the top plane with modified ground structure provides a band from 4.35 GHz - 5.53 GHz and is also responsible for size miniaturization and compactness with the overall size of 32 mm x 32 mm. Orthogonal placement of antenna elements increases the isolation where tilted square-shaped stub in the center of ground further reduces the mutual coupling up to 21.7 dB by diminishing the coupling between the orthogonally placed antenna. The results of ECC, DG, CCL and TARC provides overall good pattern diversity performances which represent the antenna is suitable for wireless communications.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyze the Sintering Additives or Dopant Techniques to Y-TZP","authors":"Rahman Ashena, Jacqueline Lukose, Sudeep Suresh","doi":"10.1109/ICKECS56523.2022.10060072","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060072","url":null,"abstract":"The doping method generally can be defined as intentionally adding foreign or impurity particles to change the properties of the material (mechanical, electrical, or thermal properties) by modifying the micro or nanostructure of the materials. Transitional metal oxide become of the most popular material as additive compound to dope in YSZ. It served as a good sintering aid which greatly benefit on cost and energy saving. Besides that, the addition compound for the objectives of improving mechanical properties especially of hardness and fracture toughness. Through the review of YSZ application in bio-material industry, it showed that 3mol% yttria stabilizer to TZP (3Y-TZP) received a great welcoming and exhibited attractive mechanical properties and biocompatibility. However, to further improve the mechanical properties to widen the application of 3Y-TZP is always the the researchers is looking into. Numerous studies have demonstrated and documented how doping Y-TZP with transition metal oxides will improve and support the mechanical properties. Besides oxide elements as dopant, other non-oxide elements also played a role to enhance the mechanical properties of 3Y-TZP. However, these kinds of dopant displayed and exhibited slightly different outcome. Among all, alumina is one of the most popular be utilized to dope 3Y-TZP (or even other YSZ), and the outcome can be very interesting. Thus far, popular techniques of employing doping to 3Y-TZP generally can be divided into two types, one is single doping and co-doping. The aim of this section is to review the previous works and research on both techniques of their effect of transitional metal oxide as dopant to Y-TZP in term of sintering, densification, grain size development, mechanical properties, and other possible outcomes.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Low Power Transmission Line Clamp Temperature Measurement System Based on Lora Communication","authors":"Wang Guangyang, Xia Na, Xu Shun'an, Xie Yuhan","doi":"10.1109/ICKECS56523.2022.10060208","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060208","url":null,"abstract":"In order to monitor the temperature of the transmission line clamp, a low-power transmission line clamp temperature measurement system based on Lora communication is developed in this paper. The system uses lowpower STM32L446 as the main chip of the controller, SX1268 series low-power Lora chip, and PT100 temperature sensor. After the gateway collects and monitors the temperature, it is transmitted to the remote platform through the 4G network. The experimental test shows that the Lora transmission distance of the system is 150m. According to the set mode, the button battery can work for 5 years, the high temperature of 150°C can work normally for two hours, and the measurement accuracy is 0.5°C, which has the advantage of differentiation.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122092205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianfei Chen, Huijun Du, Zhonglong Wang, Nianming Xue, Jia Peng, Wenjing Li
{"title":"Method for Mining Security Vulnerabilities of Data Storage of Electric Power Internet of Things Based On Spark Framework and RASP Technology","authors":"Jianfei Chen, Huijun Du, Zhonglong Wang, Nianming Xue, Jia Peng, Wenjing Li","doi":"10.1109/ICKECS56523.2022.10059626","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10059626","url":null,"abstract":"The construction of power IoT (Internet of things) will greatly change the existing power business model and professional system, and will inevitably impact the data storage security of power IoT business. Due to the negligence or omission of the database designer in the process of designing and developing the database, there are a lot of security holes in the database, which makes the attacker successfully attack the database. In this paper, the research on data storage security vulnerability mining method of power IoT based on Spark framework and RASP technology is carried out. This paper puts forward a vulnerability mining methodology, which can be used to mine more potential vulnerabilities in Oracle more universally. In this way, the anonymous block is passed in as a parameter, and it is processed with the caller's permission instead of the definer's permission. Therefore, the attacker can only run the injected anonymous block with his own low permission, and can't achieve the attack purpose. The research results show that the algorithm designed in this paper will not be affected by memory space, so the mining efficiency of big data local frequent itemsets mining algorithm designed in this paper based on Spark framework will be much higher than that of traditional Apriori algorithm and FP-Growth algorithm. The mining performance of this method is better than that of the latter in three vulnerability types: injection vulnerability, XSS and CSRF.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu Xi, Li Yu, Bo Chen, Yumin Chen, Jiaxing Zhang, Wenhui Jiang
{"title":"Radio Frequency Identification Technology Based On Wireless Network in Temperature Measuring System of Switch Cabinet","authors":"Yu Xi, Li Yu, Bo Chen, Yumin Chen, Jiaxing Zhang, Wenhui Jiang","doi":"10.1109/ICKECS56523.2022.10060501","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060501","url":null,"abstract":"Temperature measurement of machines has been entered into the field of people's life, people's activities are inseparable from the support of temperature measurement system, along with the development of Chinese switch cabinet industry, the scale of temperature measuring machines is increasing, and the security, stability and reliability of temperature measuring system are more and more demanding. In order to solve the existing problems of the switch cabinet temperature measuring system, radio frequency identification technology based on wireless network is presented in this paper the basic working process and the energy transmission of the steps and switch cabinet temperature measurement is described on the basis of the characteristics, according to the contact between the two, the wireless radio frequency identification technology in the switch cabinet temperature measurement system design and application, finally through the concrete experiment tests have shown that Wireless network radio frequency technology has a high accuracy rate and small error in the temperature measurement system of the switch cabinet. The highest error value of the signal of radio frequency identification technology in the temperature measurement system of the switch cabinet is only 22, and the highest error value of the polychlorine in the temperature measurement system of the switch cabinet is only 22.6. Therefore, it can be concluded that the application effect of RFID technology in temperature measuring system of switch cabinet is better.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125155630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelization of Local Neighborhood Difference Pattern Feature Extraction using GPU","authors":"Arisetty Sree Ashish, Ashwath Rao B","doi":"10.1109/ICKECS56523.2022.10060766","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060766","url":null,"abstract":"One of the various techniques employed for image feature extraction is the Local Neighborhood Difference Pattern, also called as LNDP. LNDP considers the relationship between neighbors of a central pixel with its adjacent pixels and transforms this mutual relationship of all the neighboring pixels into a binary pattern. It has proven to be a powerful and effective descriptor for texture analysis. A parallel implementation of LNDP using Compute Unified Device Architecture (CUDA) has been proposed in this paper. A speedup of about 1000 times has been achieved through a shared memory parallel implementation for large images. Thus, an efficacious and efficient implementation has resulted in an increased execution speed and reduced execution time.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"194 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DynaMalDroid: Dynamic Analysis-Based Detection Framework for Android Malware Using Machine Learning Techniques","authors":"Hashida Haidros Rahima Manzil, Manohar Naik S","doi":"10.1109/ICKECS56523.2022.10060106","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060106","url":null,"abstract":"Android malware is continuously evolving at an alarming rate due to the growing vulnerabilities. This demands more effective malware detection methods. This paper presents DynaMalDroid, a dynamic analysis-based framework to detect malicious applications in the Android platform. The proposed framework contains three modules: dynamic analysis, feature engineering, and detection. We utilized the well-known CICMalDroid2020 dataset, and the system calls of apps are extracted through dynamic analysis. We trained our proposed model to recognize malware by selecting features obtained through the feature engineering module. Further, with these selected features, the detection module applies different Machine Learning classifiers like Random Forest, Decision Tree, Logistic Regression, Support Vector Machine, Naïve-Bayes, K-Nearest Neighbour, and AdaBoost, to recognize whether an application is malicious or not. The experiments have shown that several classifiers have demonstrated excellent performance and have an accuracy of up to 99%. The models with Support Vector Machine and AdaBoost classifiers have provided better detection accuracy of 99.3% and 99.5%, respectively.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125574180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajesh Singh, A. Gehlot, Finney Daniel Shadrach, S. Prabu, R. Nirmalan, V. Sunil Kumar
{"title":"Handling Data and Model Drift for World Application using Big Data","authors":"Rajesh Singh, A. Gehlot, Finney Daniel Shadrach, S. Prabu, R. Nirmalan, V. Sunil Kumar","doi":"10.1109/ICKECS56523.2022.10060693","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060693","url":null,"abstract":"It's still unclear how to effectively extract the information concealed inside vast and massive amounts of data. The problem of “idea drift” in stream data flows is one of the difficulties. Random walk is a common issue in data analytics where the statistical features of the characteristics and the categories they are intended for change with time, decreasing the accuracy of the trained model. There are numerous approaches that have been put out for bulk data mining. A new generation of data mining methods called stream mining updates the model in a single pass whenever fresh data is received. Because of its inherent adaptability, this one-pass mechanism may be properly capable than its predecessors of coping with idea drift in data streams. In this study, we assess a group of algorithms for mining the data streams using decision trees. The collection of rules which can be derived from the induced model is the benefit of decision tree learning. The predicate logics that represent the extracted rules can then be applied in a variety of decision-supporting applications. Even in the face of concept drift, the induced decision tree has to be precise and condensed. When dealing with concept-drift data, we evaluate how well three common incremental decision tree methods (random forest, isolation forest, and forest tree) perform. In the experiment, drift data from both synthetic and actual environments are employed. It is discovered that optimization method with big data technique i.e., MapReduce yields better outcomes.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126243490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jayaprada Hiremath, Shantala S. Hiremath, Sujith Kumar, Elukoti Hebbare, Shantakumar B. Patil, Mrutyunjaya S. Hiremath
{"title":"Age Detection based on Facial Features Using Support Vector Machine","authors":"Jayaprada Hiremath, Shantala S. Hiremath, Sujith Kumar, Elukoti Hebbare, Shantakumar B. Patil, Mrutyunjaya S. Hiremath","doi":"10.1109/ICKECS56523.2022.10060119","DOIUrl":"https://doi.org/10.1109/ICKECS56523.2022.10060119","url":null,"abstract":"Face aging has been studied for decades. Determining age from a facial shot is key to our technique for diagnosing abnormal behavior. Security monitoring, forensics, biometrics, and Human-Computer Interface (HCI) use facial age estimates. We only look at adults 1–75 in the UTK Face database, which covers 0 to 116 years. The database contains 23,708 face photos with age, gender, and ethnicity annotations. In work, preprocessing, feature extraction, feature selection, and age categorization are involved. Preprocessing adjusts images. Computer vision uses Local Binary Pattern (LBP) and Histogram of Oriented Gradient (HOG) as visual descriptors, whereas fscmrmr is utilized for classification. Support Vector Machines (SVM) improve classification accuracy in highdimensional areas. The chosen characteristics are concatenated and passed to a multiclass SVM classifier to classify the images with 95.69% success.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126280342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}