2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)最新文献

筛选
英文 中文
Impact of structural modification by spacer layer inclusion on AlGaN/GaN HEMT performance 嵌入间隔层修饰对AlGaN/GaN HEMT性能的影响
M. Hossain, Md. Mehedi Hassan, Md. Mohsinur Rahman Adnan
{"title":"Impact of structural modification by spacer layer inclusion on AlGaN/GaN HEMT performance","authors":"M. Hossain, Md. Mehedi Hassan, Md. Mohsinur Rahman Adnan","doi":"10.1109/ICICT4SD50815.2021.9396787","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396787","url":null,"abstract":"In this paper, Performances are analyzed of an AlGaN/GaN-based High Electron Mobility Transistor for different device structures. As the 2DEG well forms in the interface of two different bad gap material in HEMT is not infinite energy potential well. Thus there will be a probability of electron carriers appearing outside of the 2DEG well in the barrier layer where they scatter due to impurity. This scattering limits the performance of the HEMT device. Structural Change is based upon a new undoped AlGaN layer between channel and barrier layer in conventional HEMT to reduce the scattering. The impact of this structural change on AlGaN/GaN HEMT performances are compared with respect to the performance of conventional HEMT devices. For both devices, DC and RF performances are observed and results are considered for comparing their performance. Transconductance, drain current characteristics are the DC parameters of HEMT devices which significantly improved after adding the spacer layer. As well as transfer characteristics, output conductance increases significantly. For HEMT with a spacer layer, it is observed that the maximum cutoff frequency is 1.344 times of the HEMT device without a spacer layer. The maximum frequency of oscillation increases by 1.162 times with the addition of the spacer layer. At the same operating condition, the minimum noise figure of the HEMT device decreases after adding the spacer layer. These results prove that the RF performance of HEMT with spacer layer is much better than a HEMT without spacer layer & HEMT with this new device structure is more preferable for high-frequency operations.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Approach for Automatic Extractive Summarization 一种自动抽取摘要的混合方法
Md. Siam Ansary
{"title":"A Hybrid Approach for Automatic Extractive Summarization","authors":"Md. Siam Ansary","doi":"10.1109/ICICT4SD50815.2021.9396855","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396855","url":null,"abstract":"In recent times, there have been many works in automatic text summarization as it has become a very intriguing topic of natural language processing. A summary should be concise, delivering all the important facts of a document. State-of-the-art extractive text summarizers use sentence ranking in various ways to extract significant summary sentences. In this paper, a hybrid approach has been introduced for single document extractive summarization. A combination of approaches such as sentence-ranking based on key-phrases and sentiment analysis has been proposed. Moreover, the work combines another approach that picks summary sentences based on their interconnection with other sentences in the text for getting a better result. Through empirical experiments, the proposed approach has been found to generate better summaries than similar existing systems.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125765687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Impact of Sentiment Analysis in Fake Online Review Detection 情感分析在虚假在线评论检测中的影响
Rakibul Hassan, M. Islam
{"title":"Impact of Sentiment Analysis in Fake Online Review Detection","authors":"Rakibul Hassan, M. Islam","doi":"10.1109/ICICT4SD50815.2021.9396899","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396899","url":null,"abstract":"Online business is one of the rapidly growing business sectors of current world. Now-a-days people purchase a lot of things from online shopping sites. Sales of online products are most often review driven. Thus, detecting deceptive reviews is getting more importance day by day. Sentiment analysis has great importance in fake review detection system. This paper introduces a sentiment analysis model that can separate positive and negative sentimental reviews efficiently. It shows an analysis of sentiment distribution for fake and truthful reviews. Also, the proposed sentiment model is used to find the impact of probabilistic sentiment score in fake online review detection using a hotel review dataset.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"149 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Challenges of Radiation from Telecommunication Installations in Bangladesh 孟加拉国电信设施辐射的挑战
Md Mahfuzul Karim Majumder, K. A. Taher
{"title":"Challenges of Radiation from Telecommunication Installations in Bangladesh","authors":"Md Mahfuzul Karim Majumder, K. A. Taher","doi":"10.1109/ICICT4SD50815.2021.9396880","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396880","url":null,"abstract":"This paper addresses the issue of electromagnetnetic radiation (EMR) from telecommunication installations in Bangladesh. Standard measurement techniques and equipment are used to measure EMR at randomly selected places throughout the country. The results show that the average EMR level is well below the reference level set by International Commission on Non-Ionizing Radiation Protection (ICNIRP). Specially, green- field and hospital areas show much lower value compared to other areas. Roof-top measurements in residential areas show comparatively higher values. Protective and regulatory policies are suggested to avoid possible adverse effect of EMR from telecommunication installations. It argues for the implement ICNIRP 2020 guidelines for protection against EMR adverse effect. This study shows that there is no rationale in restricting or removing BTS installations which are placed under an optimum and efficient network coverage.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132373065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of EEG Based Home Appliance Control System 基于脑电图的家电控制系统的设计与实现
Tafhim Bin Nasir, Md. Abdul Mukit Lalin, Kabir Niaz, Md. Razaul Karim
{"title":"Design and Implementation of EEG Based Home Appliance Control System","authors":"Tafhim Bin Nasir, Md. Abdul Mukit Lalin, Kabir Niaz, Md. Razaul Karim","doi":"10.1109/ICICT4SD50815.2021.9396982","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396982","url":null,"abstract":"This paper represents the design and implementation of the Home Appliance control system using the Human brain wave. Brain-computer interfacing (BCI) technology is followed for developing the system. Neurosky Mindwave Mobile 2 headset is used for collecting the desired brain data. This headset collects brain data and sends the data wirelessly to the main PCB circuit board using a Bluetooth module. The headset gives the output of attention level and number of eye blink based on EEG waves. According to the attention level and eye blinks, the system controlled Light, Fan, TV, Buzzer. This system has two controlling modes with four different attention levels. In the first mode, the system can control light, fan, television, and buzzer. In this mode, the user can only power on or Power off these Appliances. Whereas in the second mode, the system can control television volume and channel. This system is mainly designed to help Physically Challenged People who can not move their body parts and are incompetent in speaking. Simplicity in design architecture and cost-effectiveness makes this system very much applicable in real-life usage.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134226950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Coordinates Determination of Submerged Mobile Sensors for Non-parallel State using Cayley-Menger Determinant 基于Cayley-Menger行列式的水下移动传感器非并行状态坐标确定
Md. Mostafizur Rahman, Kowser Mahmud Tanim, Sumiya Akter Nisher
{"title":"Coordinates Determination of Submerged Mobile Sensors for Non-parallel State using Cayley-Menger Determinant","authors":"Md. Mostafizur Rahman, Kowser Mahmud Tanim, Sumiya Akter Nisher","doi":"10.1109/ICICT4SD50815.2021.9396837","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396837","url":null,"abstract":"In this paper the problem of localizing submerged sensors is observed and introduces a new method to ordain the coordinates of those sensors which are situated in underwater and they are mobile and only one beacon node is considered for the system. Collecting data of appropriate coordinate of the sensors in underwater wireless sensor networks (UWSN) is essential because the root contains confined value except the knowledge of real data. There is used trilateration technique to detect the submerged sensors and beacon is considered in six different positions. In this proposed model three sensors have been used. To find out the coordinates of the sensor nodes Cayley-Menger determinant is used for the proposed model. Here three mobile sensors and one beacon node that made six different volume tetrahedron shapes by making it in same volume through projection to apply Cayley-Menger determinant. Through enumerating of coordinates of sensors nodes, simulation results make out the proposed mathematical models with minimal errors.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133707001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generating Hydroelectricity using Recycled Water 利用循环水发电
Umama Farah, Sadia Yasmin
{"title":"Generating Hydroelectricity using Recycled Water","authors":"Umama Farah, Sadia Yasmin","doi":"10.1109/ICICT4SD50815.2021.9397032","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9397032","url":null,"abstract":"Renewable energy, such as solar, is one of the main reasons for changing the scope of the electricity sector. However, their availability depends on the climate so they cannot be a constant source of producing electricity. Considering all these aspects, water is considered a steady source for generating power. The main motive of the system, proposed in this paper, is to generate hydroelectricity by utilizing wastewater through the recycling process. Different chambers are provided with exclusive features to make the recycling process for getting reliable and sustainable energy. One motorized pump has been incorporated to maintain the constant water flow during the recycling process and this DC motor has been powered by the solar panel accordingly giving energy based on the utilization of sunlight. By utilizing this prototype device, a succeeding amount of electricity can be generated as an output with continuous recycling of water. Approximately, 119.3 mA of electricity and 12.69 volts DC controlled output can be measured after the proper implementation of the project. Therefore, 1.51 watts of power is possible to generate by utilizing this prototype device. Furthermore, one of the main utilizations of this project is to install it in the mosques where ablution water will be used as a flow of source as this water is not too much contaminated. Thus it can be a possible source for generating hydroelectricity.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"13 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning-Based Approach for Edible, Inedible and Poisonous Mushroom Classification 一种基于深度学习的可食用、不可食用和有毒蘑菇分类方法
N. Zahan, Md. Zahid Hasan, M. A. Malek, Sanjida Sultana Reya
{"title":"A Deep Learning-Based Approach for Edible, Inedible and Poisonous Mushroom Classification","authors":"N. Zahan, Md. Zahid Hasan, M. A. Malek, Sanjida Sultana Reya","doi":"10.1109/ICICT4SD50815.2021.9396845","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396845","url":null,"abstract":"Mushroom is one of the fungi types' food that has the most powerful nutrients on the plant. Nevertheless, the identification of edible, inedible and poisonous mushrooms among its existing species is a must due to its high demand for peoples' everyday meal and major advantage on medical science. For this purpose, deep learning approaches like InceptionV3, VGG16 and Resnet50 has been applied to identify the mushrooms based on their category on 8190 mushrooms images where the ratio of training and testing data was 8:2. Contrast limited adaptive histogram equalization (CLAHE) method has been used along with InceptionV3 to obtain the highest test accuracy. A comparison has been evaluated between contrast-enhanced and without contrast-enhanced method. Finally, InceptionV3 has achieved 88.40% accuracy which is the highest among the rest implemented algorithms.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"82 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131138482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Privacy Preserving Serial Publication of Trajectory Data 保护隐私的轨迹数据串行发布
Md. Muktar Hossain, A. S. Sattar, Farah Wahida
{"title":"Privacy Preserving Serial Publication of Trajectory Data","authors":"Md. Muktar Hossain, A. S. Sattar, Farah Wahida","doi":"10.1109/ICICT4SD50815.2021.9396989","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396989","url":null,"abstract":"Sharing trajectory data with researchers or any organization is very challenging due to individual privacy risk. Specially it becomes more challenging when trajectory data have to share serially after a specific interval. All the existing methods are not applicable for serial publication. Methods for serial publication is required because of dynamic behaviour of trajectory data. In a serial publication of trajectory data, two types of privacy guards must be provided. Firstly, privacy guards is to be used in each release. Secondly, there must be a privacy guard between two releases, so that individual trajectory is not identified. To fulfill these two objectives, we propose a model that consists of space shifting and spatiotemporal points clustering. In our model, two types of clustering approaches have been used. Each cluster meets the concept of k-anonymity that prevent record linkage attack in each release. After applying different clustering algorithm in each release, experimental result shows that our propose approach is able to mitigate intersection attack.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Anti-Pattern Detection Technique Using Machine Learning to Improve Code Quality 利用机器学习提高代码质量的反模式检测技术
Nazneen Akhter, Shanto Rahman, K. A. Taher
{"title":"An Anti-Pattern Detection Technique Using Machine Learning to Improve Code Quality","authors":"Nazneen Akhter, Shanto Rahman, K. A. Taher","doi":"10.1109/ICICT4SD50815.2021.9396937","DOIUrl":"https://doi.org/10.1109/ICICT4SD50815.2021.9396937","url":null,"abstract":"Poor software design and coding tend the software programs to be buggy at a massive rate. To enhance the code quality this paper proposes an automatic anti-pattern detection technique, which identifies anti-patterns from source code using Machine Learning (ML) classifiers. Here, four anti-patterns are considered such as Blob, Feature Decomposition (FD), Swiss Army Knife (SAK) and Spaghetti Code (SC) from three open-source Java projects namely ArgoUML, Azureus and Xerces. To improve the accuracy, a data pre-processing technique namely SMOTE is adopted. To locate these anti-patterns, four ML classifiers have been used which are Support Vector Machine (SVM), Naive Bayes (NB), Random Forest (RF) and Decision Tree (DT). The proposed technique shows a better performance in terms of three evaluation metrics such as precision, recall, f-measure. SVM with SMOTE performs better in terms of precision and recall that are respectively 96.42% and 96.18%.","PeriodicalId":239251,"journal":{"name":"2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114700847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信