2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)最新文献

筛选
英文 中文
Richter's Predictor: Modelling Earthquake Damage Using Multi-class Classification Models 里氏预测器:用多等级分类模型模拟地震损害
Aishwarya Kumaraswamy, B. N. Reddy, Rithvik Kolla
{"title":"Richter's Predictor: Modelling Earthquake Damage Using Multi-class Classification Models","authors":"Aishwarya Kumaraswamy, B. N. Reddy, Rithvik Kolla","doi":"10.1109/ICAECC50550.2020.9339484","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339484","url":null,"abstract":"Natural calamities like earthquakes cause damage to life and property. Estimation of damage grade to buildings is essential for post-calamity response and recovery, elimination of the tedious process of manual validation and authentication of property damage before granting relief funds to people. By considering basic aspects like building location, age of the building, construction details and it's secondary uses, taken from the Gorkha earthquake dataset, this paper explores various multi-class classification machine learning models and techniques for predicting the damage grade of structures. The proposed architecture of the model involves three major steps, Feature Selection, XGBoost Classifier, and Parameter Tuning. The paper presents the results of the experiments with feature engineering, training variations and ensemble learning. The paper delves into the analysis of each model, to understand the reason behind their performance. This paper also infers the agents that play a major role in deciding the seismic vulnerabilities of the buildings. The proposed classifier in the paper provides significant input to understanding earthquake damage and also provides a paradigm to model other natural disaster damage.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125173580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning at Resource Constraint Edge Device Using Bonsai Algorithm 基于盆景算法的资源约束边缘设备机器学习
Soumyalatha Naveen, Manjunath R. Kounte
{"title":"Machine Learning at Resource Constraint Edge Device Using Bonsai Algorithm","authors":"Soumyalatha Naveen, Manjunath R. Kounte","doi":"10.1109/ICAECC50550.2020.9339514","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339514","url":null,"abstract":"In the worldwide billions of devices connected each other to interact with the surrounding environment to collect the data based on the context. Using machine learning algorithm intelligence can be incorporated in these Internet of Things (IoT) devices to get valuable insights from these data for accurate predictions. Machine learning model is deployed onto the devices for making the decisions locally. This enables fast, accurate prediction within few milliseconds by evading data transmission to the cloud and makes perfectly applicable for real time applications. In this paper, the experiment is conducted with publicly available dataset with Bonsai algorithm. This algorithm is implemented in Linux environment with core is processor in python 2.7 and achieved 92% accuracy with model size of 6.25KB, which can be easily deployed on resource constraint IoT devices.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Image Encryption and Decryption Using Key Sequence of Triple Logistic Map for Medical Applications 基于三重逻辑映射密钥序列的图像加解密医学应用
S. Rohith, L. Jahnavi, S. Bhuvaneshwari, S. Supreeth, B. Sujatha
{"title":"Image Encryption and Decryption Using Key Sequence of Triple Logistic Map for Medical Applications","authors":"S. Rohith, L. Jahnavi, S. Bhuvaneshwari, S. Supreeth, B. Sujatha","doi":"10.1109/ICAECC50550.2020.9339529","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339529","url":null,"abstract":"In the present world scenario, security of medical images from unauthorized access is one of the key challenges. This paper provides one of the solutions to solve the security of medical images. The proposed scheme uses a combination of key sequences of Triple Logistic Map (TLM) for the encryption process. To generate the key sequence Logistic function is used with initial value X<inf>0</inf>and r. The three key sequences{X <sup>11</sup>}, {X<inf>2i</inf>and {X<inf>3i</inf>} with different initial value are used (X<inf>10</inf>:/ X<inf>20</inf> :/ X<inf>30</inf>) with r=3.99. The key sequences {X<inf>li</inf>}‘ {X<inf>2i</inf>} and {X<inf>3i</inf>} are converted into discrete key sequence {K<inf>li</inf>}, {K<inf>2i</inf>} and {K<inf>3i</inf>} in the range of 0 to 255. The combined key sequence {K<inf>i</inf>} is obtained using bit by bit logical XOR operation between {K<inf>li</inf>}, {K<inf>2i</inf>}, and {K<inf>3i</inf>}. The resultant Key sequence {Ki} is used forthe encryption process of the medical image. To evaluate the performance of the proposed scheme different grayscale images are chosen. The proposed TLM based image encryption scheme is compared with the encryption scheme using (i) Logistic Map (LM) alone ii) Double Logistic Map (DLM). To evaluate the proposed scheme parameters such as (i) Visual analysis (ii) Histogram plot (iii) Mean Square Error (MSE) iv) Correlation (v) Entropyis used. The simulation result shows that the proposed TLM based scheme provides better performance and immune to statistical attacks.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132455968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Harvesting Techniques for Monitoring Devices in Smart Grid Application 智能电网中监测设备的能量收集技术
H. Pavana, Rohini Deshpande
{"title":"Energy Harvesting Techniques for Monitoring Devices in Smart Grid Application","authors":"H. Pavana, Rohini Deshpande","doi":"10.1109/ICAECC50550.2020.9339526","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339526","url":null,"abstract":"Energy harvesting is a process of capturing, storing and conditioning ambient and residual energies for future use. The amount of residual energy captured is very small and can be used for low power load such as wireless sensor nodes. Wireless sensor nodes are used to monitor physical parameters at diverse locations. They find extensive applications in military, health care industries, environmental monitoring and smart grids. One of the major constraints of Wireless sensor node is battery lifetime as battery gets depleted over a period of time. Energy harvesting techniques can be used to overcome this constraint and has the ability to make wireless sensor node self sustainable. This paper provides an overview of energy harvesting techniques used for wireless sensor nodes in smart grid application.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124213909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Speaker Recognition in Emotional Environment using Excitation Features 情绪环境下基于激励特征的说话人识别
T. Thomas, S. V, N. Sobhana, S. Koolagudi
{"title":"Speaker Recognition in Emotional Environment using Excitation Features","authors":"T. Thomas, S. V, N. Sobhana, S. Koolagudi","doi":"10.1109/ICAECC50550.2020.9339501","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339501","url":null,"abstract":"Speaker Recognition is known as the task of recognizing the person speaking from his/her speech. Speaker recognition has many applications including transaction authentication, access control, voice dialing, web services, etc. Emotive speaker recognition is important because in real life, human beings extensively express emotions during conversations, and emotions alter the human voice. A text-independent speaker recognition system is proposed in the work. The system designed is for emotional environment. The proposed system in this work is trained using the speech samples recorded in neutral environment and the system evaluation is performed in an emotional environment. Here, excitation source features are used to represent speaker-specific details contained in speech signal. The excitation source signal is obtained after separating the segmental level features from the voice samples. The excitation source signal is almost considered as a noise so identifying a speaker in an emotive environment is a challenging task. Excitation features include Linear Prediction (LP) residual, Glottal Closure Instance (GCI), LP residual phase, residual cepstrum, Residual Mel-Frequency Cepstral Coefficient (R-MFCC), etc. A decrease in performance is observed when the system is trained with neutral speech samples and tested with emotional speech samples. Different emotions considered for emotional speaker identification are happy, sad, anger, fear, neutral, surprise, disgust, and sarcastic For the classification of speakers the algorithms used are Gaussian Mixture Model (GMM), Support Vector Machine (SVM), K-Nearest Neighbor(KNN), Random Forest and Naive Bayes.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Estimation of Evapotranspiration for Seasonal Water Usage Analysis 季节水分利用分析中的蒸散发估算
B. N. Aryalekshmi, R. C. Biradar, J. Mohammed Ahamed, K. Chandrasekar
{"title":"Estimation of Evapotranspiration for Seasonal Water Usage Analysis","authors":"B. N. Aryalekshmi, R. C. Biradar, J. Mohammed Ahamed, K. Chandrasekar","doi":"10.1109/ICAECC50550.2020.9339527","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339527","url":null,"abstract":"This paper focuses on estimating Evapotranspiration over the Cauveri river basin in Mandya District of Karnataka, India (12° 31'N, 76°53'E), using LANDSAT-8 satellite data. ET will indicate the amount of water loss from that particular land surface, and in turn, this can be used for water budget analysis. Accurate estimation of evapotranspiration (ET) is essential for the proper water usage analysis. Evapotranspiration estimation using hydrological methods, micro-meteorological methods can only be considered as point measurements for smaller areas. Extrapolation of ET rates over a larger area using point data has limited accuracy. Airborne or satellite images using remote sensing techniques are practical method for developing ET spatial variation at a regional scale. In this paper, we provide an analysis of ET estimation using Landsat-8 data during Jan & Feb 2018 for the identified study area. The reason for choosing this area is that a significant part of the land cover of Mandya district is under agricultural use. We propose Mapping EvapoTranspiration at high Resolution with Internalized Calibration (METRIC) - a satellite-based image-processing model for calculating ET as a residual of the surface energy balance. The study indicated that the Normalized Vegetation Index (NDVI) and Land Surface Temperature (LST) are inversely proportional to each other, indicates that as temperature increases, vegetation index decreases.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116335151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toxic Comment Detection using LSTM 使用LSTM检测有毒注释
K. Dubey, Rahul Nair, Mohd. Usman Khan, Prof. Sanober Shaikh
{"title":"Toxic Comment Detection using LSTM","authors":"K. Dubey, Rahul Nair, Mohd. Usman Khan, Prof. Sanober Shaikh","doi":"10.1109/ICAECC50550.2020.9339521","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339521","url":null,"abstract":"While online communication media acts as a platform for people to connect, collaborate and discuss, overcoming the barriers for communication, some take it as a medium to direct hateful and abusive comments that may prejudice an individual's emotional and mental well being. Explosion of online communication makes it virtually impossible for filtering out the hateful tweets manually, and hence there is a need for a method to filter out the hate-speech and make social media cleaner and safer to use. The paper aims to achieve the same by text mining and making use of deep learning models constructed using LSTM neural networks that can near accurately identify and classify hate-speech and filter it out for us. The model that we have developed is able to classify given comments as toxic or nontoxic with 94.49% precision, 92.79% recall and 94.94% Accuracy score.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Investigations and Compression of Genomic Data 基因组数据的调查与压缩
Raveendra Gudodagi, R. Venkata Siva Reddy, M. Riyaz Ahmed
{"title":"Investigations and Compression of Genomic Data","authors":"Raveendra Gudodagi, R. Venkata Siva Reddy, M. Riyaz Ahmed","doi":"10.1109/icaecc50550.2020.9339492","DOIUrl":"https://doi.org/10.1109/icaecc50550.2020.9339492","url":null,"abstract":"Because of the considerable amount of human genome sequence data files (from 30 GB to 200 GB subjected to exposure) Genomic data compression has received huge momentum and one of the major problems faced by genomics laboratories is storage costs. This situation calls for a new data compression technique, which not only reduces the storage but makes the process efficient. Few attempts have been made in this regard to solve this problem from both hardware and software domains independently. In this review we advocate the need of a tailor-made hardware and software ecosystem which will exploit the current stand-alone solutions to the fullest. It is only when the sophisticated software runs on a state-of-the-art hardware, the indispensable problem of huge storage can be solved. The three major steps of genomic data compression are extraction of data, storage of data, and retrieval of the data. Hence, we propose a novel scheme based on computational optimization techniques which will be efficient in all the three stages of data compression.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Fixed Point FIR Filter Architectures 定点FIR滤波器结构的性能分析
P. Sreesh, L. Kumar
{"title":"Performance Analysis of Fixed Point FIR Filter Architectures","authors":"P. Sreesh, L. Kumar","doi":"10.1109/ICAECC50550.2020.9339519","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339519","url":null,"abstract":"In digital signal processing and communication systems, FIR filters have important role. One of the main challenges in Very Large Scale Integration(VLSI) signal processing is the FIR filter structure with optimized parameters. These filters made up of many adders and multipliers. In FIR filter, multiplier consumes high amount of power. The most important three areas in VLSI are power, area, and delay. This paper compares different types of fixed point FIR filter architectures and analyze the different perfomance parameters such as area, hardware utlization and delay. Different FIR filter architectures such as the conventional method, systolic architecture, associativity transformation and combination of systolic and associativity transformation architectures are considerd. We implemened a 4, 8 and 16 tap filters using the above mentioned architecures and compared their perfomance characteristics.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectral Features for Emotional Speaker Recognition 情感说话人识别的频谱特征
P. Sandhya, V. Spoorthy, S. Koolagudi, N. Sobhana
{"title":"Spectral Features for Emotional Speaker Recognition","authors":"P. Sandhya, V. Spoorthy, S. Koolagudi, N. Sobhana","doi":"10.1109/ICAECC50550.2020.9339502","DOIUrl":"https://doi.org/10.1109/ICAECC50550.2020.9339502","url":null,"abstract":"Speaker recognition in an emotive environment is a bit challenging task because of influence of emotions in a speech. Identifying the speaker from the speech can be done by analyzing the features of the speech signal. In normal conditions, identifying a speaker is not a tedious task. Whereas, identifying the speaker in an emotional environment such as happy, sad, anger, surprise, sarcastic, fear etc. is really challenging, since speech becomes altered under emotions and noise. The spectral features of speech signal include Mel Frequency Cepstral Co-efficients(MFCC), Shifted Delta Cepstral Coefficients (SDCC), spectral centroid, spectral roll off, spectral flatness, spectral contrast, spectral bandwidth, chroma-stft, zero crossing rate, root mean square energy, Linear Prediction Cepstral Coefficients (LPCC), spectral subband centroid, Teager energy based MFCC, line spectral frequencies, single frequency cepstral coefficients, formant frequencies, Power Normalized Cepstral Coefficients (PNCC), etc. The features that are extracted from the speech signal are classified using classifiers. Support Vector Machine(SVM), Gaussian Mixture Model, Gaussian Naive Bayes, K-Nearest Neighbour, Random Forest and a simple Neural Network using Keras is used for classification. The important application include security systems in which a person can be identified by biometrics that is voice of the person. The work aims to identify the speaker in an emotional environment using spectral features and classify using any of the classification techniques and to achieve a high speaker recognition rate. Feature combinations can also be used to improve accuracy. The proposed model performed better than most of the state-of-the-art methods.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信