2018 Conference on Information and Communication Technology (CICT)最新文献

筛选
英文 中文
An Improved Illumination Invariant Face Recognition Based on Gabor Wavelet Transform 基于Gabor小波变换的改进光照不变人脸识别
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722408
Deepanshu Kathuria, Jyotsna Yadav
{"title":"An Improved Illumination Invariant Face Recognition Based on Gabor Wavelet Transform","authors":"Deepanshu Kathuria, Jyotsna Yadav","doi":"10.1109/INFOCOMTECH.2018.8722408","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722408","url":null,"abstract":"Face recognition under unconstrained surroundings have been a demanding task due to various constraints such as expression, illumination, pose, occlusion etc. Over the years, researchers have well recognized the deployment of wavelet transform for extracting robust features from facial images under such constraints. An improved illumination invariant approach based on Gabor wavelet transform (GWT) is presented for face recognition. Firstly, Gamma intensity correction (GIC) is applied to correct the total intensity of database images. Secondly, from these images, robust features are extracted using Gabor wavelet transform. Dimensions of these extracted features are reduced by applying dimensionality reduction approach such as principal component analysis (PCA). Lastly, K-nearest Neighbor approach is used for classification. Experimental result on Yale dataset indicates that the proposed approach enhances the recognition accuracy efficiently in contrast to other existing techniques, achieving recognition accuracy of 100%.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"31 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extraction of Maximum Secret Information Hidden in Approximate Band of Haar Wavelet Transform of an Image 图像Haar小波变换近似带中隐藏的最大秘密信息提取
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/infocomtech.2018.8722357
Shrikant P Mudnur, Satish Raj Goyal, K. Jariwala, Warish D. Patel, Bhupendra Ramani
{"title":"Extraction of Maximum Secret Information Hidden in Approximate Band of Haar Wavelet Transform of an Image","authors":"Shrikant P Mudnur, Satish Raj Goyal, K. Jariwala, Warish D. Patel, Bhupendra Ramani","doi":"10.1109/infocomtech.2018.8722357","DOIUrl":"https://doi.org/10.1109/infocomtech.2018.8722357","url":null,"abstract":"Steganography techniques are used to provide security to the sensitive data during transmission and storage by hiding the secret information in the cover media. By applying Haar wavelet transform on the original image the four sub bands (Approximate band (LL), Horizontal band (LH), Vertical band (HL), Diagonal band (HH)) can be obtained. As detailed bands (LH, HL, HH) have lesser information of the original image the more number of LSBs of the detailed bands can be used to embed the secret information. After inserting the secret information in the sub bands inverse haar discrete wavelet transform is applied on the four sub bands. The values obtained after applying Haar IDWT(Inverse Discrete wavelet transform) may have fraction part or negative values. When the fraction part is truncated or negative values are made zero to obtain the pixel values in 0-255 range, the hidden secret information cannot be obtained completely after applying Haar DWT on the received image. In this paper a novel odd-even method is proposed to decrease the number of dissimilar coefficient values of the approximate band and thus to maximize the extraction of secret information hidden in approximate and detailed bands. Total numbers of coefficient values having different values at sender and receiver side are found. Larger the number of dissimilar coefficient values lesser is the secret information extracted. Peak Signal to Noise Ratio (PSNR) value is computed to analyse the quality of the stego image.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"1218 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113994830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CICT 2018 Cover Page CICT 2018封面
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/infocomtech.2018.8722406
{"title":"CICT 2018 Cover Page","authors":"","doi":"10.1109/infocomtech.2018.8722406","DOIUrl":"https://doi.org/10.1109/infocomtech.2018.8722406","url":null,"abstract":"","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CHGR: Captcha generation using Hand Gesture Recognition CHGR:使用手势识别生成验证码
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722409
P. Panwar, Monika, Parveen Kumar, Ambalika Sharma
{"title":"CHGR: Captcha generation using Hand Gesture Recognition","authors":"P. Panwar, Monika, Parveen Kumar, Ambalika Sharma","doi":"10.1109/INFOCOMTECH.2018.8722409","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722409","url":null,"abstract":"In today’s world, the advanced technology is deployed in almost every field, it is therefore important to put efforts in security as well. CAPTCHAs were invented to ensure the security by confirming that the user using a machine is human or not. CAPTCHA is simply a test that tells human and the computer program apart. It is one of the important components that almost every commercial website include to determine whether the one using website is actually a human or not. Till date, most used CAPTCHAs are usually alphabets or numbers or combination of two. CAPTCHA can be solved by human beings only and not by bots and thus helps in stopping hackers and especially their crawlers also called spiders from acceding un-perplexed areas of the net. CAPTCHAs used till date have now become time-consuming and need more human efforts so that program could not crack it and this has become a major issue to consider as lead to time wastage. This paper has proposed a better model to generate CAPTCHA with the help of hand gesture recognition techniques which is more efficient than the traditional CAPTCHAs. In this method, a form has been displayed containing one CAPTCHA image showing some hand gesture from the database with a message displayed for ‘the user to copy the same gesture, the user then with his/her conscience has made some gesture in front of the camera of the system and then the model has verified the gesture made by the user is same as that shown or not. Following this method will surely ensure the identity of the user as it is not possible for the robot to understand by own how to copy the same gesture as shown in the image. These CAPTCHAs can be used in future by the websites to check whether the one using the website is a human being or a robot fulfilling the requirement of less human efforts and time. The experiments give satisfactory results of the proposed model.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"585 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design strategies for two-core uncoupled multicore fiber for crosstalk analysis 用于串扰分析的双芯非耦合多芯光纤设计策略
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722422
Rakesh Ranjan, Dablu Kumar
{"title":"Design strategies for two-core uncoupled multicore fiber for crosstalk analysis","authors":"Rakesh Ranjan, Dablu Kumar","doi":"10.1109/INFOCOMTECH.2018.8722422","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722422","url":null,"abstract":"In order to achieve the low-crosstalk behavior in uncoupled homogeneous multicore fibers, the design strategies for two cores have been discussed. The relationships between inter-core crosstalk and fiber parameters, such as core radius, core pitch, relative refractive index difference, etc. have been explored in order to maintain the single mode propagation through the cores of uncoupled multicore fiber.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122348851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Localization of sensors in WSN during Emergency Services (LSWES) 应急服务(LSWES)中WSN传感器定位
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722423
R. Vikram, Ditipriya Sinha, Rina Kumari, Rajib Ghosh
{"title":"Localization of sensors in WSN during Emergency Services (LSWES)","authors":"R. Vikram, Ditipriya Sinha, Rina Kumari, Rajib Ghosh","doi":"10.1109/INFOCOMTECH.2018.8722423","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722423","url":null,"abstract":"In wireless sensor network (WSN) sensor nodes are deployed in the physical environment such as forest area and other remote places and transmit the sensed data to the base station. Localization of sensor nodes play important role during data transmission from source to destination. Nodes which are connected with global positioning system(GPS) can be localized easily. But deployment cost is high in this case. On the other hand, if sensors are deployed in the physical environment such as dense forest area, localization of sensors is not always possible even with the help of GPS. Locating the sensor nodes which are not connected with GPS is the challenging task. Previously, various localization techniques have already been proposed. Some are range based localization and some are range free localization. However, there are some limitations of these approaches and localization error is high for most of the approaches. This paper proposed a novel localization technique in which nodes which are not connected with GPS can be able to detect its location with the help of Support Vector Machine (SVM). Proposed approach gives better result comparatively other existing approaches.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125510888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Title page] (标题页)
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/infocomtech.2018.8722365
{"title":"[Title page]","authors":"","doi":"10.1109/infocomtech.2018.8722365","DOIUrl":"https://doi.org/10.1109/infocomtech.2018.8722365","url":null,"abstract":"","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130320422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Coupling Effect in Coupled SOI Rib Waveguide for Different Polarization Mode 不同极化模式下SOI肋波导耦合效应分析
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722395
Divakar Kumar, Dablu Kumar, Rakesh Ranjan
{"title":"Analysis of Coupling Effect in Coupled SOI Rib Waveguide for Different Polarization Mode","authors":"Divakar Kumar, Dablu Kumar, Rakesh Ranjan","doi":"10.1109/INFOCOMTECH.2018.8722395","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722395","url":null,"abstract":"Parallel coupled Rib waveguide based on silicon-on-insulator (SOI) has been explored to analyze the coupling effect on different polarization mode using the simulation approach based on the finite element method and the semi-vector finite difference beam propagation method. The minimum coupling effect has been analyzed with respect to variation of geometry parameter and comparison of different polarization modes ($E_{11}^x$ and $E_{11}^y$) in parallel Rib waveguide. The coupling effect has been observed with respect to the variation in waveguide spacing (S) for some fixed value of ratio of slab height to total Rib height (i.e., r = h/H), such as 0.6, 0.7, and 0.8 under single mode propagation constraint at operating wavelength of 1.55 µm. However, the coupled Rib waveguide with r = 0.6 at the different waveguide spacing is most suitable for the minimum coupling effect and for the enhancing the data transmission capacity.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130407272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of 32 bit Asynchronous RISC CPU Using Micropipeline 基于微流水线的32位异步RISC CPU设计
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722367
Pranjal Srivastva, P. Yadav, Prasanna Kumar Misra
{"title":"Design of 32 bit Asynchronous RISC CPU Using Micropipeline","authors":"Pranjal Srivastva, P. Yadav, Prasanna Kumar Misra","doi":"10.1109/INFOCOMTECH.2018.8722367","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722367","url":null,"abstract":"In this work, the 5-stage pipeline 32-bit Asynchronous RISC CPU has been designed. The asynchronous CPU was synthesized using the standard cells of SCL 180 nm CMOS technology. The performance parameters were obtained through simulation. The interconnect power, area and delay were estimated by comparing the simulation results of pre-layout and post-layout of the design. The results were compared with the synchronous CPU. The power calculated for the asynchronous RISC CPU is 117 mw which is 69 % less than synchronous CPU. Further, the effective switching capacitance of asynchronous CPU is reduced by 69 % compared to the synchronous CPU. The figure of merit shows that asynchronous CPU can be used for low power IoT chip.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115822596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECTX-CoAP : An Enhanced Context-Aware CoAP Extension for Smart Objects Discovery in Internet of Things 面向物联网智能对象发现的增强上下文感知CoAP扩展
2018 Conference on Information and Communication Technology (CICT) Pub Date : 2018-10-01 DOI: 10.1109/INFOCOMTECH.2018.8722425
Shruti Kajwadkar, V. Jain
{"title":"ECTX-CoAP : An Enhanced Context-Aware CoAP Extension for Smart Objects Discovery in Internet of Things","authors":"Shruti Kajwadkar, V. Jain","doi":"10.1109/INFOCOMTECH.2018.8722425","DOIUrl":"https://doi.org/10.1109/INFOCOMTECH.2018.8722425","url":null,"abstract":"The Internet of Things(IoT) can be defined as the network of physical objects, which may be anything like physical devices, automobiles, appliances, animals or even people, all connected directly or indirectly with each other, able to share and exchange data [6]. These physical objects after getting connected to the Internet can provide smart services and are therefore known as smart objects. For the realization of IoT, it is necessary for the smart objects to discover and interact each other without human intervention. The number of smart objects connected to IoT are increasing at a rapid rate, creating an overhead for the users of controlling these many smart objects. One smart solution to this problem is the use of Context-Aware Communication. This work aims to propose Enhanced Context-Aware CoAP Extension for smart objects discovery in Internet of Things (IoT), namely ECTX-CoAP, which is enhancement of CoAP-CTX [2]. CoAP-CTX is able to do Context-Aware discovery of smart objects but at the cost of discovery response time. The enhancement to CoAP-CTX is made by first, reducing discovery response time, comparable to CoAP and second, by adding the concept of Group Communication functionality to it other than multi-casting. The proposed ECTX-CoAP is implemented in Contiki using Cooja simulator. The experimental results show that the proposed enhancement has successfully reduced the discovery time and number of messages exchanged, also allowing users to access a group of smart objects efficiently.","PeriodicalId":175757,"journal":{"name":"2018 Conference on Information and Communication Technology (CICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信