2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)最新文献

筛选
英文 中文
Fiber Network Implementation by Using Standard Routing Techniques 使用标准路由技术实现光纤网络
M. Harish, C. Singh
{"title":"Fiber Network Implementation by Using Standard Routing Techniques","authors":"M. Harish, C. Singh","doi":"10.1109/ICEECCOT43722.2018.9001359","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001359","url":null,"abstract":"Network Survivability is important concept when it comes to fault detection and fault recovery, it also plays a very important role in detecting the shortest path and to route the data in that data path. Due to increase in industries and consumers, demand for the high data rate and also fast service also increases and to fulfill the demands the concept called Traffic Demand Distribution (TDD) arises. Here the data is sensitive if the system fails to maintain the data because of path fault it may incur huge lose in communication field and also leads to poor service at end users. In keeping this situation in mind, survivability techniques to serve the data to pass through desired data path is implemented. This paper further describes the TDD and survivability techniques to overcome failure.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130902972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Bipolar Sentiment Assessment of Text Reviews 文本评论的非双极性情绪评估
Keerthana B. Chigateri, Rekha Bhandarkar
{"title":"Non-Bipolar Sentiment Assessment of Text Reviews","authors":"Keerthana B. Chigateri, Rekha Bhandarkar","doi":"10.1109/ICEECCOT43722.2018.9001649","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001649","url":null,"abstract":"With the evolution and blooming of Internet, an indeterminately great number of mankind devote their time profusely for browsing, especially on social media. Public share their perspective in the form of opinions about various entities like ongoing affairs or a particular locality or their shopping experience etc. in internet. In the early stages, individuals practiced writing mode for this motive. But gradually accounting the headway made by technology the channel broadened from text to other diverse modes to convey their opinions like images, audio, video. These means were well received and prevailed so far. Because simple movements of face and pictures convey treasure of information. The voice tune changes along with the change in opinion. Thus these mediums are more descriptive than text. These feelings and conceptions exhibit their sentiments which shape the public opinion. Opinions are usually based on knowledge or experience. It is more concrete whereas Sentiments are feelings one feels about something. An Opinion is composed of Sentiment(s). A particular or group of sentiments leads to a concrete Opinion. Though these two terms are used interchangeably, these two terms are very close but slightly differ in their meanings. People express their held sentiments about an entity socially. A general opinion can be derived or extracted from these sentiments. These Sentiments collectively shape a particular Opinion like positive, negative or neutral which in turn impact and aids other customers, traders, or society in deciding their deals. Additionally, many trends keep recreating dynamically. With this rate of advancement, people keep refreshing their approaches and practices. Hence their sentiments. Thus, these sentiments propagate to others via social media. In the meantime, the pertinent authority can adapt to these changes before the change signals the call and grow wider every day and thus stay connected with customers. Apart from customers, they must be knowledgeable globally with surfacing trends and challenges, new needs and envision the demands. Accordingly, the sentiments circulate swiftly in online system]. But the exiting work on social network sentiment is just to distinguish the sentiment polarity of public opinion i.e., Positive or Negative which can be termed as Bipolarity. Bi-means two and Polarity means two opposite poles or opinions. Current research is confined to bipolar assessment of an opinion and multi-modal sentiment analysis is expecting more attention. This paper mainly presents a survey on these two areas.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Simulation of a Capless Low Drop Out Voltage Regulator 无盖低降稳压器的设计与仿真
Sujatha Kotabagi, Gautami Karkun, P. S. Bhat
{"title":"Design and Simulation of a Capless Low Drop Out Voltage Regulator","authors":"Sujatha Kotabagi, Gautami Karkun, P. S. Bhat","doi":"10.1109/ICEECCOT43722.2018.9001436","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001436","url":null,"abstract":"The changing requirements of the industry is directing towards the full integration of SoC. This requires the power management block to have the Low Drop Out(LDO) regulator with reduced external capacitor. This paper proposes the study of behavior of the LDO voltage regulator with an external capacitor and capless low drop out voltage regulator. The regulated voltage of 1.8V is obtained using the typical power supply of 2.2V. The total quiescent current used in the circuit is less than 30uA with the load current variation of 0 to 20mA. The capless LDO architecture is verified in the UMC 180nm technology. The architecture provides a stable regulated voltage of 1.8V with both line and load variations and also for the transient variations. The stability issues are overcome using the compensation techniques which uses a current amplifier and a capacitor in the differentiator configuration. The current amplifier implemented uses current mirror with current copying ratio of unity.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133508103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy Efficient FCM and CAT Swarm Optimization based Data Gathering in WSN 基于高效FCM和CAT群优化的WSN数据采集
R. N. Sree, A. Ananth, L. Reddy
{"title":"An Energy Efficient FCM and CAT Swarm Optimization based Data Gathering in WSN","authors":"R. N. Sree, A. Ananth, L. Reddy","doi":"10.1109/ICEECCOT43722.2018.9001375","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001375","url":null,"abstract":"The collection of information from sensor nodes (SN) used for transmitting the data towards the sink node is said to be data aggregation. In data aggregation the nearest node will receives the information about the nodes which send information to the sink. From now, the sink overloaded and energy loss will occur because of loss of information. In this paper Fuzzy C-Means (FCM) based technique is used for selecting the rendezvous points (RP). Now the main intention is to transmit the nodes/points based on the weightage. Here, the nodes with uppermost weight of RP is selected and transmitted. The outstanding RP were utilized by preserving energy. Finally, CAT swarm optimization (CSO) is used for optimal path selection of mobile sink. The proposed methodology is implemented in the working platform of NS2 and the results were evaluated by using Network lifetime, delay and delivery ratio metrics.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Pre Processing Approach for Accurate Identification of Plant Diseases in leaves 一种准确识别植物叶片病害的预处理方法
Deepa
{"title":"A Pre Processing Approach for Accurate Identification of Plant Diseases in leaves","authors":"Deepa","doi":"10.1109/ICEECCOT43722.2018.9001616","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001616","url":null,"abstract":"Detection of diseases in plant leaves is very crucial in agriculture. If the diseases in leaves are not identified at the initial stage it may affect the productivity. Pre processing the images is an important step in any image processing applications. Several algorithms are used to detect the diseases in plant leaves. But, when these algorithms are used for the noisy images or images taken under poor light conditions, they do not tend to generate expected result. Pre processing of these images becomes necessary because of noise, difference in illumination, camera orientation. Pre processing of images assists the further processing steps. In the proposed method the image is initially sharpened, and then Median filter is applied for denoising. The image is then segmented using k-means clustering. Combining these methods, better quality image was obtained.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117220277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Literature Review on Big Data Analytics and Demand Modeling in Supply Chain 供应链中大数据分析与需求建模的文献综述
Puneeth Kumar T, M. N, R. Hegadi
{"title":"Literature Review on Big Data Analytics and Demand Modeling in Supply Chain","authors":"Puneeth Kumar T, M. N, R. Hegadi","doi":"10.1109/ICEECCOT43722.2018.9001513","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001513","url":null,"abstract":"New digital technologies have been introduced into our business and social environments, causing a major change that is recognized as the digital transformation in recent years. While environmental shifts suggest that most of the organization starts using advanced technologies such as Internet of Things(IoT), Mobile applications, Blackchain, Intelligence Things, catboats and many more in their supply chain planning to gain an early competitive advantage and these technologies generates enormous amount of data that the traditional business intelligence system difficult to handle processing of vast data in real-time or nearly real time causes abstraction to the insight discovery, demand modeling and supply chain optimization, Big Data initiatives for demand modeling and supply chain optimization promise to answer these challenges by incorporating various services, methods and tools for more agile and adaptably analytics and decision making, there by this paper focus on reviewing the level of analytics and the forecasting methods being used in the supply chain, understating the fundamentals of supply chain and role of demand modeling, there by proposing a high level framework for supply chain analytics in the context of big data with the knowledge of data science, artificial intelligence, big data echo system and supply chain.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"36 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124512345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparative Study of Binary Classification Methods for Pulsar Detection 脉冲星探测二元分类方法的比较研究
V. Priyanka, B. Anil, B. R. Dinakar
{"title":"A Comparative Study of Binary Classification Methods for Pulsar Detection","authors":"V. Priyanka, B. Anil, B. R. Dinakar","doi":"10.1109/ICEECCOT43722.2018.9001517","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001517","url":null,"abstract":"Pulsars are fast spinning neutron stars which on observing, emit pulsed appearance of radio waves and other electromagnetic radiation with very high pulse rate. The study of these dense neutron stars provides key insights on various physical occurrences like the plasma behavior in highly dense environments, behaviors of binary system consisting of a pulsar and a black hole and general relativity for the same. This requires a very elaborate dataset of pulsars and their statistical data for both repeatability and experimental accuracy. For this to be implemented, many large-scale pulsar surveys are conducted from time to time. During the process of the survey, manual classification of the data thus obtained, introduces bottleneck both in terms of labor needed and accuracy of classification. Hence statistical learning approaches can be used for the same for autonomous detection of pulsars. The raw dataset obtained for sampling is usually highly unbalanced and this study explores the comparison between the methods for diminishing the effects of unbalanced training datasets on different supervised classifiers to increase the accuracy of classification.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125025443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced RSA Algorithm using Fake Modulus and Fake Public Key Exponent 基于假模数和假公钥指数的增强RSA算法
K. R. Raghunandhan, Surendra Shetty, Ganesh Aithal, N. Rakshith
{"title":"Enhanced RSA Algorithm using Fake Modulus and Fake Public Key Exponent","authors":"K. R. Raghunandhan, Surendra Shetty, Ganesh Aithal, N. Rakshith","doi":"10.1109/ICEECCOT43722.2018.9001351","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001351","url":null,"abstract":"In cryptography Public key cryptography plays an important role in the field of data communication. Public key uses two different keys where keys are associated in such a way that, the public key can use to encrypt the data and private key is used to decrypt. RSA is considered as one of the efficient algorithm in public key cryptography. Efficiency of RSA Algorithm mainly depends on how effectively public key components is shared i.e. modulus $n$ and public key exponent e. If these components compromised using mathematical attack, obtaining private key becomes easier job for the intruder. In this paper an enhanced RSA algorithm is proposed to increase the factoring complexity of the public keys, we use fake public key exponent $f$ instead of $e$ and modulus $X$ instead of ‘n’. Results of our scheme overcome the limitations of Integer factorization attack. Paper also gives comparative analysis of the proposed work using standard metrics.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cross Layer and Management Plane Integration Approach for Detection and Prevention of Malicious Activities in WSN WSN中恶意活动检测与预防的跨层与管理平面集成方法
B. M. Devaraju, G. Raju
{"title":"Cross Layer and Management Plane Integration Approach for Detection and Prevention of Malicious Activities in WSN","authors":"B. M. Devaraju, G. Raju","doi":"10.1109/ICEECCOT43722.2018.9001301","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001301","url":null,"abstract":"Wireless Sensor Networks (WSNs) are the next generation envision and have several applications in military, infrastructure monitoring, healthcare, environment monitoring, manufacturing and Internet of Things (IoT) applications. WSN is basically a collection of sensor nodes that are deployed without infrastructure deployed anywhere, anytime, without administrator and every node works as host and router. Sensor nodes are more susceptible to failure because they are deployed in open areas, may be tampered by intruders. Malicious attacks like, Denial of Service (DoS), Sybil attack, Blackhole/Sinkhole attack, Hello Flood attack, Wormhole attacks may modify sensitive information results in performance degradation. The next emerging technology is WSN with IoT, wherein billions of devices are connected with internet and every day millions of new hackers and malicious activities are identified. Hence it has become essential to propose different approaches and different measurements to identify malicious activities and to avoid them is big challenge in WSN. Several researchers have proposed cross layer design to improve QoS by reducing latency and computation overhead. But these proposed ideas have not been standardized in global level networking. So there is a need for designing security models for various devices and conform National Information Security Framework (NISF) policies. One way to detect and identify malicious activities is through analyzing nodes activities pattern in the network. This paper proposes a cross layer and management plane integration approach for detection and prevention of malicious activities in Wireless Sensor Networks","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Wireless fNIRS Patch with Short-Channel Regression to Improve Detection of Hemodynamic Response of Brain 短通道回归无线fNIRS贴片改善脑血流动力学反应检测
M. Saikia, K. Mankodiya
{"title":"A Wireless fNIRS Patch with Short-Channel Regression to Improve Detection of Hemodynamic Response of Brain","authors":"M. Saikia, K. Mankodiya","doi":"10.1109/ICEECCOT43722.2018.9001342","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001342","url":null,"abstract":"The functional near-infrared spectroscopy (fNIRS) utilizes near-infrared (NIR) light sources and light detectors to non-invasively image hemodynamic responses of the brain. The unique advantages of fNIRS over the other existing brain imaging technologies led to widespread adoption of fNIRS in various brain research studies including neurology, neuroscience, clinical psychology, and psychiatry. The fNIRS systems are portable, inexpensive and provide higher temporal resolution for scanning a brain. In this paper, we present a wireless wearable fNIRS patch that has the capability of short channel regression to improve the detection of hemodynamic responses of the brain. The patch has two targeted fNIRS channels and a short-channel. The short-channel measures the background hemodynamic responses explicitly from the extracerebral region. Then it performs a regression process to eliminate background interferences from the targeted fNIRS channels to reduce the influence of the interferences. We have interfaced the patch with our laboratory-developed portable fNIRS controller. The patch and the controller are wearable. The controller is wirelessly connected to a host computer to receive commands from it and to wirelessly transmit measurement data to the host computer for the data processing and visualization. The graphical user interface (GUI) in the host computer helps the user to record and visualize fNIRS data. The experimental results of imaging prefrontal cortex of the brain using the fNIRS patch show that the patch has the potential to reduce unrelated hemodynamic activity from the targeted fNIRS channels.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132599442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信