2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
Iot Enabling of Vacuum Heat Treatment Chambers for Data Acquisition and Analytics 物联网实现真空热处理室的数据采集和分析
M. Haripriya, S. Saravanan, Rejul M
{"title":"Iot Enabling of Vacuum Heat Treatment Chambers for Data Acquisition and Analytics","authors":"M. Haripriya, S. Saravanan, Rejul M","doi":"10.1109/ICCMC.2019.8819829","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819829","url":null,"abstract":"The Industrial Internet of Things capitalize application of sensors in getting real time data through computers, cloud servers for transformational business outcomes for Industrial applications. Some of the key benefits of Industrial Internet of Things are to reduce human errors, manual labor work, costs, time & money. We also cannot forget the possible underpinnings of IIoT in quality control and maintenance. The heat treatment industry is at turning point, in which digital technology has the capacity to unlock new ways of managing process variables and enhance productivity in vacuum heat treatment operations. Vacuum heat treatment (VHT) plays an important role in capacitor production. During the heat treatment process the zinc element has to undergo certain process within VHT chamber for strengthening the element. The temperature should be maintained and controlled in a proper proportion during capacitor production. By monitoring the live temperature, errors like temperature increase and decrease can be identified and predictive maintenance can be done. In this work, we developed a system to monitor the temperature levels in VHT especially the coolant pipe which is directed to VHT. The developed system uses pt100 sensors to monitor the live temperature of the coolant pipe through a gateway using the PLC. This overall process is done in real time at Schneider Electric, Bangalore. The time taken to complete one process takes 72 hours. The temperature values collected during the process is stored in database created using MySql and then transferred to cloud for analysis to do predictive maintenances.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analysis of Li-Fi based Prevalent Automated Billing Systems in Shopping Malls 基于Li-Fi的购物中心流行自动计费系统分析
Himani Pangasa, Shipra Aggarwal
{"title":"An Analysis of Li-Fi based Prevalent Automated Billing Systems in Shopping Malls","authors":"Himani Pangasa, Shipra Aggarwal","doi":"10.1109/ICCMC.2019.8819693","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819693","url":null,"abstract":"At mega malls, for grocery shopping and purchase of daily needs artefacts, customers have to wait in extended queues for the billing leading to wastage of their precious time. In order to solve this problem, Different researchers have proposed automation in billing system. When patron picks up an artefact and drops it into the cart, the scanner scans the artefact’s distinctive code and its value, which is flaunted on the display screen of the trolley. After customer has consummate with the purchase, patron goes to the billing counter and pay the total bill which was shown on the display screen incorporated on the cart. In this paper, an attempt has been made to analyse the related works carried out by various researchers in this field based on the main components of smart cart like microcontroller, transmission medium and scanning system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121112760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation of Data Collection Algorithm based on TDA in WSN Mobile Elements 基于TDA的无线传感器网络移动单元数据采集算法的实现
Sadaf Anjum, S. Shrivastava
{"title":"Implementation of Data Collection Algorithm based on TDA in WSN Mobile Elements","authors":"Sadaf Anjum, S. Shrivastava","doi":"10.1109/ICCMC.2019.8819810","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819810","url":null,"abstract":"Sensor nodes transmit data packets from source to destination in wireless sensor network for that they utilize multi-hop routing. While sending data more energy is consumed. Hence for gathering data in interesting area mobile elements are instigate. Delay to transmit long data is major problem in numerous proposed data collection algorithm. Hence to resolve this problem proposed a data collection algorithm with mobile elements. Here for collecting event packets rely on moving window mechanism mobile elements are dispatched. Hence experimental result shows our proposed system can lower data delay.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Chaos based Image Encryption 基于混沌的图像加密技术综述
Kanika Suneja, Shelza Dua, M. Dua
{"title":"A Review of Chaos based Image Encryption","authors":"Kanika Suneja, Shelza Dua, M. Dua","doi":"10.1109/ICCMC.2019.8819860","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819860","url":null,"abstract":"In the current scenario of data transmissions, digital images constitute a major part of multimedia communication. Hence, their security is a great area of concern. In this paper, various chaotic maps, which are used in image encryption, are reviewed and their merits and demerits are discussed. The properties of chaotic maps like stochastic, ergodicity and highly sensitive to initial situations make them reliable for image encryption. Many of the earlier proposed image encryption techniques used low dimensional chaotic maps, which exhibit lowest level of security and have very less ability to handle brute force and statistical attacks. To solve this problem, researchers have established various high dimensional chaotic maps. In this review paper, an effort has been made to highlight the features and techniques of different chaotic maps used for image encryption.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123378355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Design and Implementation of an Image Classifier using CNN 基于CNN的图像分类器的设计与实现
Sarthak Haldar
{"title":"Design and Implementation of an Image Classifier using CNN","authors":"Sarthak Haldar","doi":"10.1109/ICCMC.2019.8819765","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819765","url":null,"abstract":"Surely there has been no time in history where the lived lives of people have changed more dramatically due to the emergence of Artificial Intelligence. Various research and development has taken place over the years on computer vision which is a branch of AI. AI disciplines like a vision system is applied in various fields like self driving cars, face detection by social media apps and law enforcement softwares, google lens and so on. This paper deals with design and implementation of an efficient way of training a GPU using python libraries to process and classify an image. The design is profoundly described along with its performance efficiency. The image processing techniques presented in this paper includes the concept of neural networks and deep learning.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116459229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Steganography Using the Fusion of Quantum Computation and Wavelet Transformation 基于量子计算和小波变换融合的图像隐写
Juned Ahmed Mazumder, K. Hemachandra
{"title":"Image Steganography Using the Fusion of Quantum Computation and Wavelet Transformation","authors":"Juned Ahmed Mazumder, K. Hemachandra","doi":"10.1109/ICCMC.2019.8819681","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819681","url":null,"abstract":"In the advancement of information technology the role of security of information is very significant. Many organization including research and educational institute, IT companies exploring the area of quantum computation due to which the field is advancing very quickly. The mechanism of quantum computer provides greater security for quantum data. So in this research we present a new high security steganography system using hybridization of quantum computation and wavelet transformation. The proposed algorithm provides dual security for the embedded data as we transform the normal signal of the high frequency information of wavelet transformation into quantum signal before embedding the secret information. The message extraction process depends on the corresponding coefficient value of low frequency information which acts as a pseudo random key. To assess the accomplishment of our proposed algorithm we have used three parameters MSE, PSNR and RS for different image formats. All these metrics showed that there is very less distortion of the original image.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133995284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Background-modelling techniques for foreground detection and Tracking using Gaussian Mixture Model 基于高斯混合模型的前景检测与跟踪的背景建模技术
Meghana R K, Yojan Chitkara, A. Mohana
{"title":"Background-modelling techniques for foreground detection and Tracking using Gaussian Mixture Model","authors":"Meghana R K, Yojan Chitkara, A. Mohana","doi":"10.1109/ICCMC.2019.8819825","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819825","url":null,"abstract":"Background Modelling and Foreground detection in sports has been achieved by cleverly developing a model of a background from a video by deducing knowledge from frames and comparing this model to every subsequent frame and subtracting the background region from it, hence leaving the foreground detected. This output from GMM background subtraction is fed into the feature extraction algorithm, which segregates the players based on teams. By extracting information of primary colors from each frame, the design of the algorithm based on the color of preference is done. Tracking algorithms Kalman and extended Kalman Filters help to predict and correct the location of players and in correctly estimating their trajectory on the field. Challenges such as shadowing, occlusions and illumination changes are addressed. The designed algorithms are tested against a set of performance parameters for the following datasets (Norway and FIFA) using MATLAB (2017b) and the inferences are respectively made. Object detection, motion detection and Kalman filter algorithms are implemented and the observed results are 100%, 84% and 100% accuracy respectively. With the results quantification and performance analysis, it is observed that with the decrease in contrast between player jerseys a decrease in detection accuracy occurs and with players crowded regions on the field and occluded players a decrease in tracking accuracy was observed.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132217151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Designing a Sales Prediction Model in Tourism Industry and Hotel Recommendation Based on Hybrid Recommendation 基于混合推荐的旅游行业及酒店销售预测模型设计
Piyush Anil Bodhankar, Rajesh K. Nasare, G. Yenurkar
{"title":"Designing a Sales Prediction Model in Tourism Industry and Hotel Recommendation Based on Hybrid Recommendation","authors":"Piyush Anil Bodhankar, Rajesh K. Nasare, G. Yenurkar","doi":"10.1109/ICCMC.2019.8819792","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819792","url":null,"abstract":"As the trend of e-commerce and online shopping is increasing day by day, we need a method which can be helpful to decide whether to buy the product or not. Here the opinions of the other customers and rating for that product can be used as a considerably good parameter for designing such a system. With the development of new technologies we have a possible solution in the form of recommendation system. Recommendation system gives an important help in providing the necessary information to user based on personalized and practical services. The most vital technique in this field is which plays a crucial role is Collaborative filtering. In this paper we present a recommendations system for tourism and hotel based on enhanced Collaborative filtering approach.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Providing Cyber Security using Artificial Intelligence – A survey 利用人工智能提供网络安全-一项调查
Sagar B.S, N. S, Nithin Kashyap, Sachin D.N
{"title":"Providing Cyber Security using Artificial Intelligence – A survey","authors":"Sagar B.S, N. S, Nithin Kashyap, Sachin D.N","doi":"10.1109/ICCMC.2019.8819719","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819719","url":null,"abstract":"Artificial intelligence is really a kind of computerized version of human intelligence. The way artificial intelligence works is like learning iteratively again and again, just like humans. In this generation, the threat of landscape is unquestionably evolving. The cyber attackers are entirely focused on financial rewards. But the department has found a new way to prevent attacks before they occur, as the old traditional way can no longer be relied upon. This paper introduces the need for the development of cybersecurity skills and how artificial intelligence can be implied to improve skills through the use of artificial neural networks and machine learning algorithms.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"728 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133596840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Extension of the Lexicon Algorithm for Sarcasm Detection 反讽检测词典算法的扩展
Joseph Herve Balanke, H. V
{"title":"Extension of the Lexicon Algorithm for Sarcasm Detection","authors":"Joseph Herve Balanke, H. V","doi":"10.1109/ICCMC.2019.8819845","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819845","url":null,"abstract":"Lexicon algorithm is used to determine the sentiment expressed by a textual content. This sentiment might be negative, neutral or positive. It is possible to be sarcastic using only positive or neutral sentiment textual contents. Hence, lexicon algorithm can be useful but yet insufficient for sarcasm detection. It is necessary to extend the lexicon algorithm in order to come out with systems that would be proven efficient for sarcasm detection on neutral and positive sentiment textual contents. In this paper, two sarcasm analysis systems both obtained from the extension of the lexicon algorithm have been proposed for that sake. The first system consists of the combination of a lexicon algorithm and a pure sarcasm analysis algorithm. The second system consists of the combination of a lexicon algorithm and a sentiment prediction algorithm.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"55 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114119740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信