2018 Conference on Information and Communication Technology (CICT)最新文献

筛选
英文 中文
Analysis of Crosstalk Performance and its Reduction Amount in Single-mode Homogeneous Trench-assisted Multicore Fiber 单模均质沟槽辅助多芯光纤串扰性能及其消减量分析
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722383
Dablu Kumar, Rakesh Ranjan
{"title":"Analysis of Crosstalk Performance and its Reduction Amount in Single-mode Homogeneous Trench-assisted Multicore Fiber","authors":"Dablu Kumar, Rakesh Ranjan","doi":"10.1109/INFOCOMTECH.2018.8722383","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722383","url":null,"abstract":"An investigation has been done in 7-core homogeneous trench-assisted multicore fiber for analysis of crosstalk performance under certain variations in refractive index profile of core, clad, and trench for fundamental mode. The crosstalk estimation and suppression technique has been discussed, in order to realize the fabrication and characterization of multicore fiber. The crosstalk reduction amount (in dB) has been observed with respect to the variation in relative refractive index difference of core-clad (Δ1), and that of clad-trench (Δ2), (i.e., the trench depth) along with the trench width. The result states that the crosstalk reduction amount (ΔXT) decreases as the Δ1 increase, and ΔXT increases as the Δ2 increase. Moreover, the XT behavior has been analyzed by varying the core diameter and transmission distance for step-index and trench-assisted cores. The ultra-low inter-core crosstalk can be obtained in MCF by using trench-assisted core at Δ1 of 0.70% and Δ2 of -0.70% for 100 Km long haul optical communication.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Vector-based EEG Signal Feature Extraction Technique for BCI Applications 基于向量的脑电信号特征提取技术在脑机接口中的应用
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722350
Abhineet Saxena, V. K. Siriah, Vandana Agarwal
{"title":"A Vector-based EEG Signal Feature Extraction Technique for BCI Applications","authors":"Abhineet Saxena, V. K. Siriah, Vandana Agarwal","doi":"10.1109/INFOCOMTECH.2018.8722350","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722350","url":null,"abstract":"Brain Computer Interface (BCI) systems offer the ability to effect actuations in the users environment, bypassing the neuro-muscular pathway. The optimal functioning of BCI systems is predicated on two important aspects of the analysis pipeline - informative feature extraction and accurate classification. We propose a simple yet distinct approach to perform the former using a vector-based treatment of signal data and covariance matrices. Our results show a comparable level of performance to certain variants of CSP algorithm. We also present the optimal classifier parameters obtained after parameter-tuning of certain standard classifier models over the BCI Competition III, data-set IVa.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132136975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STAR: rating of reviewS by exploiting variation in emoTions using trAnsfer leaRning framework STAR:利用迁移学习框架利用情绪变化对评论进行评级
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722356
Aditya Vijayvergia, Krishan Kumar
{"title":"STAR: rating of reviewS by exploiting variation in emoTions using trAnsfer leaRning framework","authors":"Aditya Vijayvergia, Krishan Kumar","doi":"10.1109/INFOCOMTECH.2018.8722356","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722356","url":null,"abstract":"In this digital era, it is a common practice to check reviews about a service or product before it buying. A five star rating scale system provides much easier interface to the consumers for checking the reviews about the corresponding service or product, instead of just classifying the reviews as good, neutral and bad. Moreover, it is very common for a single review which can praise the product and criticize it as well. Even if two reviews over all, show the same sentiment. However, the order in which they praise or criticize a product, can make their star rating quite different. We have considered such observations to deploy our proposed STAR model, which addresses the above concerns by involving the variation of sentiment in reviews, to greatly affect the star rating performance. This work highlights a two Phases based novel approach using transfer learning framework to analyze the reviews by exploiting the variation in human being emotions. The experimental analysis shows that the STAR model outperforms the state-of-the-art models.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124009866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Performance evaluation of an energy efficient clustering algorithm based on heterogeneous node deployment in a wireless sensor network 基于异构节点部署的无线传感器网络节能聚类算法性能评价
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722421
Somnath Gupta, S. Anand, Mohit Kumar, Sarah Asheer, Sanjeet Kumar
{"title":"Performance evaluation of an energy efficient clustering algorithm based on heterogeneous node deployment in a wireless sensor network","authors":"Somnath Gupta, S. Anand, Mohit Kumar, Sarah Asheer, Sanjeet Kumar","doi":"10.1109/INFOCOMTECH.2018.8722421","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722421","url":null,"abstract":"Clustering is one of the proven technique of energy conservation in a Wireless Sensor Network. In this paper, we have proposed a Deployment Based Clustering (DBC) algorithm and its performance is compared with Low Energy Adaptive Clustering Hierarchy (LEACH). In LEACH, nodes are normally deployed in a random manner. In random deployment scenario, node deployment may be fast but holes may be present which adversely affects the performance of the network. Introducing uniform deployment can be one of the options to eliminate the holes present in network. But this can be time consuming as the nodes are deployed manually in an ordered manner for uniform distribution. So we reach a covenant between random and uniform deployment to get the benefits of both. So, we have introduced DBC, where the advanced nodes are deployed in uniform manner and the remaining nodes are deployed randomly around the advanced nodes to form several clusters. In this deployment the node density is kept uniform throughout the network. In LEACH, cluster formation is done after cluster head selection, while in DBC, cluster formation is done before cluster head selection. We have observed a significant gain in the proposed DBC performance in comparison to the LEACH protocol. The performance of DBC is examined in terms of ‘Number of Nodes Alive’ and ‘Lifetime of the Network’. The simulations show that the DBC gives 60% better performance than LEACH.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115972207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of facial parts in kinship verification based on edge information 基于边缘信息的亲属关系验证中面部部位的检测
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/infocomtech.2018.8722377
Aarti Goyal, T. Meenpal
{"title":"Detection of facial parts in kinship verification based on edge information","authors":"Aarti Goyal, T. Meenpal","doi":"10.1109/infocomtech.2018.8722377","DOIUrl":"https://doi.org/10.1109/infocomtech.2018.8722377","url":null,"abstract":"Kinship verification using facial images is gaining substantial attention by different researchers in the field of computer vision, pattern recognition and image processing. Kinship verification via facial images is motivated by the findings that individuals with some genetic relations have certain similarities in their facial appearance. These similarities in facial appearance is a result of inherited facial features from one generation to next generation. Most of the papers based on kinship verification focus on complete facial appearance of kinship image pairs for finding kinship relations. Rather, researchers should focus on salient facial parts of kinship image pairs. In this paper, we present a relevant and effective method to detect and extract different facial parts in kinship image pairs. A detailed output is shown for father-son image pair and performance accuracy is evaluated for different kinship datasets for robustness of the proposed work. The experimental results show that proposed method effectively detect and extract different facial parts in kinship image pairs and would work as a novel algorithm for kinship verification.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127363582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Drowsiness Detection using Instantaneous Frequency based Rhythms Separation for EEG Signals 基于瞬时频率节律分离的脑电信号睡意检测
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722429
S. Taran, V. Bajaj
{"title":"Drowsiness Detection using Instantaneous Frequency based Rhythms Separation for EEG Signals","authors":"S. Taran, V. Bajaj","doi":"10.1109/INFOCOMTECH.2018.8722429","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722429","url":null,"abstract":"Drowsiness is the major cause of road accidents because it reduces the conscious level of the drowsy driver. The road accidents can be avoided by automatic detection of drowsiness state. In this paper, the electroencephalogram (EEG) rhythms-based features are proposed for the identification of drowsiness state. The Hilbert Huang transform computed instantaneous frequency is used for separation of rhythms from the empirical mode decomposition (EMD) provided intrinsic mode functions (IMFs). The separated EEG rhythms are used for the computation of time domain features namely mean, average amplitude change, coefficient of variation, trimean, activity, complexity, and neg-entropy. These features are tested on the variants of ensemble classifier for the classification of drowsiness and alertness states. In ensemble classifier variants, the bagged tree ensemble classification model provides best classification results as compared to other same dataset methods.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An improved Binary Particle Swarm Optimization (iBPSO) for Gene Selection and Cancer Classification using DNA Microarrays 基于DNA微阵列的基因选择和肿瘤分类的改进双粒子群优化方法
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722351
Indu Jain, V. Jain, R. Jain
{"title":"An improved Binary Particle Swarm Optimization (iBPSO) for Gene Selection and Cancer Classification using DNA Microarrays","authors":"Indu Jain, V. Jain, R. Jain","doi":"10.1109/INFOCOMTECH.2018.8722351","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722351","url":null,"abstract":"DNA Microarrays enable the detection of genetic changes attributable to cancer by simultaneously analyzing the expression of thousands of genes. However, the identification of most relevant genes from thousands of gene expressions available in each biological sample, for cancer classification pose a great challenge. Although researchers have applied BPSO based wrapper approaches to get most relevant genes prior to cancer classification, these approaches didn’t achieve good classification accuracy due to the premature convergence caused by local stagnation problem. This paper proposes an improved Binary Particle Swarm Optimization (iBPSO) to tackle these issues. The proposed iBPSO based wrapper is examined using Naive-Bayes (NB), k-Nearest Neighbor (kNN), and Support Vector Machines (SVM) classifiers with stratified 5-fold cross-validation. The proposed iBPSO exhibited its efficacy in terms of classification accuracy and the number of selected genes in comparison to standard BPSO on six benchmark cancer microarray datasets. Our proposed iBPSO also effectively escapes from local minima stagnation.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123676746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A blind and secured image watermarking method using DWT-DCT techniques 一种基于DWT-DCT技术的盲安全图像水印方法
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722400
Rishi Sinhal, I. Ansari
{"title":"A blind and secured image watermarking method using DWT-DCT techniques","authors":"Rishi Sinhal, I. Ansari","doi":"10.1109/INFOCOMTECH.2018.8722400","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722400","url":null,"abstract":"This paper proposes a blind image watermarking algorithm based on the transform domain approach. The insertion of watermark is done by replacing the coefficients of DWT-DCT (Discrete Wavelet & Discrete Cosine Transform) transformed host image. Secret keys are used in this method to make it secure against any unauthentic access of watermark as the keys must be known to the user before watermark extractions. The method provides good imperceptibility and also helps to attain good results against various attacks. In this study, peak signal to noise ratio (PSNR) and cross correlation coefficient (CC) are measured to analyse the effect of different attacks on watermarked image signal as well as watermarking quality. Transform domain approach helps this scheme to achieve good robustness against attacks and key based insertion makes this approach secured towards unauthentic access. Proposed method can be used for such image watermarking applications, where good robustness, blindness and security are the prime objectives.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122187721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SOD-CHIEF: Salient Object Detection using Convex Hull with multI-scale Energy Functions 基于多尺度能量函数的凸包显著目标检测
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722394
Maheep Singh, Mahesh Chandra Govil, E. Pilli
{"title":"SOD-CHIEF: Salient Object Detection using Convex Hull with multI-scale Energy Functions","authors":"Maheep Singh, Mahesh Chandra Govil, E. Pilli","doi":"10.1109/INFOCOMTECH.2018.8722394","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722394","url":null,"abstract":"In the era of multimedia, the process of detection of salient object has emerged as an interesting research area in the field of image processing and computer vision. However, the existing SOD models are unable to make the strike balance in the trade-off between the accuracy of object detection and the computational time required by humans, In this work the authors addresses the above concerns and focuses to improve the SOD accuracy by considering the requirement of less computation time using the Convex Hull with multi-scale energy functions. Experimental analysis of the proposed technique has been done with the measurement parameters of computational time, F-measure, recall and precision on three publicly available image datasets. The computation time of the SOD-CHIEF model is comparatively less than most of the existing techniques with better accuracy for detecting the Salient object.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126312361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physical Layer Security for Cooperative Vehicular Amplify-and-Forward Relay Networks 协同车载放大转发中继网络的物理层安全
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722346
Anshul Pandey, S. Yadav
{"title":"Physical Layer Security for Cooperative Vehicular Amplify-and-Forward Relay Networks","authors":"Anshul Pandey, S. Yadav","doi":"10.1109/INFOCOMTECH.2018.8722346","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722346","url":null,"abstract":"This paper investigates the secrecy performance of a cooperative vehicular relaying network consisting of a fixed source node, a fixed destination node, an amplify-and-forward (AF) relay vehicle, and a passive eavesdropper vehicle, with the constraints of physical-layer security. We assume that the source-to-relay and relay-to-destination channels are modeled as Rayleigh fading, whereas the relay vehicle-to-eavesdropper vehicle channel is modeled as double-Rayleigh fading. In particular, we derive the tight closed-form expressions for the secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) of the considered system. We also provide an analysis of achievable effective secrecy diversity order. The numerical and simulation results corroborate our analytical findings. Our results demonstrate the impact of channel conditions, and relay and eavesdropper locations on the SOP and ESC performances.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信