Priyanka Singh, Vikrant Varshney, Ankur Kumar, R. Nagaria
{"title":"Electronically Tunable First Order Universal Filter based on CCDDCCTA","authors":"Priyanka Singh, Vikrant Varshney, Ankur Kumar, R. Nagaria","doi":"10.1109/CICT48419.2019.9066264","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066264","url":null,"abstract":"In this paper a new voltage mode universal filter configuration is introduced. This filter circuit configuration consists of analog block CCDDCCTA (current controlled differential difference current conveyor transconductance amplifier). To implement proposed filter single active element CCDDCCTA is employed. Only one passive component that is capacitor is used to realize transfer functions of the proposed filter. All first order filters can be determined using same circuit topology. To obtain transfer functions of filter two input voltage signals are required and output is obtained at single terminal by appropriate selection of input signals. Proposed filter is electronically tunable and tuning characteristics can be obtained with bias current of active block CCDDCCTA. Filter circuit is designed and simulated in SPECTRE simulator of CADENCE VIRTUOSO using UMC $0.18mu mathrm{m}$ CMOS technology process parameters.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swarup Padhy, Juhi Tiwari, S. Rathore, Neetesh Kumar
{"title":"Emergency Signal Classification for the Hearing Impaired using Multi-channel Convolutional Neural Network Architecture","authors":"Swarup Padhy, Juhi Tiwari, S. Rathore, Neetesh Kumar","doi":"10.1109/CICT48419.2019.9066252","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066252","url":null,"abstract":"Hearing impaired people have to tackle a lot of challenges, particularly during emergencies, making them dependent on others. The presence of emergency situations is mostly comprehended through auditory means. This raises a need for developing such systems that sense emergency sounds and communicate it to the deaf effectively. The present study is conducted to differentiate emergency audio signals from non-emergency situations using Multi-Channel Convolutional Neural Networks (CNN). Various data augmentation techniques have been explored, with particular attention to the method of Mixup, in order to improve the performance of the model. The experimental results showed a cross-validation accuracy of 88.28 % and testing accuracy of 88.09 %. To put the model into practical lives of the hearing impaired an android application was developed that made the phone vibrate every time there was an emergency sound. The app could be connected to an android wear device such as a smartwatch that will be with the wearer every time, effectively making them aware of emergency situations.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124740971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Workplaces Testing Method on Accordance with the Technical Task","authors":"N. Voit, S. Bochkov, S. Kirillov","doi":"10.1109/CICT48419.2019.9066128","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066128","url":null,"abstract":"Virtual industrial computer simulators have significant advantages in training employees. At the same time, conformity of modelled workplaces with a real workplace organized in accordance with the technological process is of great importance. Traditional methods of software checking - manual and automatic unit testing - are not always able to fully cover simulator functionality and test it as soon as possible. Virtual simulators verification method is proposed. It is based on the structural and parametric analysis. To determine level of compliance between virtual and real workplaces the method uses data from the industrial product life cycle management (PLM) system.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123141316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Layer Security in Intervehicular Cognitive Relaying Communication Systems","authors":"Anshul Pandey, S. Yadav","doi":"10.1109/CICT48419.2019.9066185","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066185","url":null,"abstract":"This paper investigates the secrecy performance of an intervehicular cognitive relaying network. We assume that the primary receiver (PU) in the primary network is fixed, whereas the secondary source, secondary relay, secondary destination, and eavesdropper are moving vehicles. Considering such scenario, the channel between fixed node and vehicle node is modeled as Rayleigh fading, while the vehicle-to-vehicle channels are modeled as double-Rayleigh fading. In order to analyze the impact of eavesdropper channel and maximum tolerable interference level at PU, we firstly derive the tight closed-form expression of the secrecy outage probability (SOP) for the considered system. Moreover, to extract further insights, the asymptotic SOP expression in the high signal-to-noise ratio (SNR) regime is also deduced, which reveals that the eavesdropper has detrimental effect on the system secrecy performance and even reduces the system secrecy diversity order to zero. Lastly, we validate our analytical finding via simulations.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130520027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks","authors":"Aida Akbarzadeh, Pankaj Pandey, S. Katsikas","doi":"10.1109/CICT48419.2019.9066188","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066188","url":null,"abstract":"Realizing the importance of the concept of “smart city” and its impact on the quality of life, many infrastructures, such as power plants, began their digital transformation process by leveraging modern computing and advanced communication technologies. Unfortunately, by increasing the number of connections, power plants become more and more vulnerable and also an attractive target for cyber-physical attacks. The analysis of interdependencies among system components reveals interdependent connections, and facilitates the identification of those among them that are in need of special protection. In this paper, we review the recent literature which utilizes graph-based models and network-based models to study these interdependencies. A comprehensive overview, based on the main features of the systems including communication direction, control parameters, research target, scalability, security and safety, is presented. We also assess the computational complexity associated with the approaches presented in the reviewed papers, and we use this metric to assess the scalability of the approaches.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131485401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepak Gupta, Gopal Sharma, T. B. Kumar, A. Johar, D. Boolchandani
{"title":"Comparison of Multi Chopper Amplifiers for Capacitive MEMS Transducer","authors":"Deepak Gupta, Gopal Sharma, T. B. Kumar, A. Johar, D. Boolchandani","doi":"10.1109/CICT48419.2019.9066253","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066253","url":null,"abstract":"This paper reports the analysis and comparison of various multi chopper amplifier architectures that are used in capacitive MEMS transducer. The power consumption, Noise density and signal to noise ratio of the chopper amplifiers are the primary focus of this work. These architectures have been implemented in the 130nm technology and the power consumption of these architectures are less than 20μW and input referred noise are less than 20nv/✓***check pdf***Hz. The reported bandwidths of these architectures are between DC to few KHz. The present work also reports the simulated value of CMRR and PSRR for the Dual chopper amplifier that has been implemented in 180nm technology and use the dummy based chopper for reducing the filtering requirement.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124800152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weapon Classification using Deep Convolutional Neural Network","authors":"Neelam Dwivedi, D. Singh, D. S. Kushwaha","doi":"10.1109/CICT48419.2019.9066227","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066227","url":null,"abstract":"Increasing crimes in public nowadays pose a serious need of active surveillance systems to overcome such happenings. Type of weapon used in the crime determines its seriousness and nature of crime. An active surveillance with weapon classification can help deciding the course of action while identifying the possibilities of any crime happening. This paper presents a novel approach for weapon classification using Deep Convolutional Neural Networks (DCNN). That is based on the VGGNet architecture. VGGNet is the most recognized CNN architecture which got its place in ImageNet competition 2014, organized for image classification problems. Thus, weights of pre-trained VGG 16 model are taken as the initial weights of convolutional layers for the proposed architecture, where three classes: knife, gun and no-weapon are used to train the classifier. To fine tune the weights of the proposed DCNN, it is trained on the images of these classes downloaded from internet and other captured in the lab. Experiments are performed on Nvidia GeForce GTX1050 Ti G PU to achieve faster and exhaustive training on a large image set. A higher accuracy level of 98.41 % is achieved for weapon classification.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125301495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Tracking and Monitoring in Surveillance Video","authors":"Ashish Singh Patel, O. Vyas, Muneendra Ojha","doi":"10.1109/CICT48419.2019.9066256","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066256","url":null,"abstract":"A video surveillance system has become an integral part of the smart city infrastructure. However, it still lacks its utilization to the full potential. In this work, we present a case study in which a storage center surveillance data has been used to extract useful information automatically. A surveillance camera records the movement of trucks passing through a storage center gate where a clerk registers the truck-related data. This process is prone to suffer from inaccuracy, fraud, and loss. The challenge is to automate the data entry process through video such that the warehouse achieves a seamless and errorfree record-keeping. In this paper, we present a framework to use the surveillance video to extract useful information such as detection of trucks, their registration number/ownership identification, count of incoming and outgoing trucks, and count of loaded or empty trucks. We tested the work presented in this paper at the paddy storage centers in Chhattisgarh, India, and the results were very encouraging.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125162901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FIR Filter Realization Under the Trade-Off Between Implementation Complexity and Computation Rate","authors":"Abhishek Kumar, S. Yadav, N. Purohit","doi":"10.1109/CICT48419.2019.9066232","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066232","url":null,"abstract":"We propose a flexible finite impulse response (FIR) filter structure which can avail the benefits of trade-off between computation units and clock rate. For designing such flexible FIR filter, we first present two supporting structures viz., Structure I and Structure II. Structure I realizes the FIR filter via single multiplier, single adder, and $N$ delays, where all units operate at the rate of $Nf_{in}$ (i.e., high clock rate), and $N$ and $f_{mathrm{i}n}$ denote the order of FIR filter and input sampling frequency, respectively, whereas Structure II implements the FIR filter using NM multipliers, M N - M2 adders, and M N - M2 delays in the filter unit with clock rate $displaystyle frac{f_{in}}{M}$ (i.e., computationally low-speed realization), and $M-1$ adders and delays at the output unit operate at $f_{in}$, where 2 $leq M leq N$ and $M$ denotes the upsampler/downsampler. Then, we propose Structure III via Structures I & II, which provides the flexible realization of FIR filters under the trade-off between computational units and clock rate. We also analyze the performance of these structures in terms of number of multipliers $(C_{M})$, number of adders $(C_{A})$, number of delays $(C_{D})$, and operating frequency $(F_{opt})$ with the help of numerical example in comparison of the direct form FIR filter.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126177501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability Discovery Modelling With Vulnerability Severity","authors":"Ankur Shukla, Basel Katt, Livinus Obiora Nweke","doi":"10.1109/CICT48419.2019.9066187","DOIUrl":"https://doi.org/10.1109/CICT48419.2019.9066187","url":null,"abstract":"Web browsers are primary targets of attacks because of their extensive uses and the fact that they interact with sensitive data. Vulnerabilities present in a web browser can pose serious risk to millions of users. Thus, it is pertinent to address these vulnerabilities to provide adequate protection for personally identifiable information. Research done in the past has showed that few vulnerability discovery models (VDMs) highlight the characterization of vulnerability discovery process. In these models, severity which is one of the most crucial properties has not been considered. Vulnerabilities can be categorized into different levels based on their severity. The discovery process of each kind of vulnerabilities is different from the other. Hence, it is essential to incorporate the severity of the vulnerabilities during the modelling of the vulnerability discovery process. This paper proposes a model to assess the vulnerabilities present in the software quantitatively with consideration for the severity of the vulnerabilities. It is possible to apply the proposed model to approximate the number of vulnerabilities along with vulnerability discovery rate, future occurrence of vulnerabilities, risk analysis, etc. Vulnerability data obtained from one of the major web browsers (Google Chrome) is deployed to examine goodness-of-fit and predictive capability of the proposed model. Experimental results justify the fact that the model proposed herein can estimate the required information better than the existing VDMs.","PeriodicalId":234540,"journal":{"name":"2019 IEEE Conference on Information and Communication Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127902189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}