2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)最新文献

筛选
英文 中文
Decision level fusion schemes for a Multimodal Biometric System using local and global wavelet features 基于局部和全局小波特征的多模态生物识别系统决策级融合方案
D. V. R. Devi, K. N. Rao
{"title":"Decision level fusion schemes for a Multimodal Biometric System using local and global wavelet features","authors":"D. V. R. Devi, K. N. Rao","doi":"10.1109/CONECCT50063.2020.9198547","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198547","url":null,"abstract":"Local and global features of biometric data play a vital role to improve the performance of a multimodal biometric system. In this paper, we propose three decision level fusion schemes - Local Decision Fusion (LDF), Global Decision Fusion (GDF) and Local-Global Decision Fusion (LGDF)- by exploiting local and global information. The proposed methods extract such information by utilizing low and high frequency wavelet sub-bands. Subsequently, the sub-bands are classified separately using nearest neighbor classifier, and the resulting classes are fused using weighted majority voting. The proposed LDF and GDF methods show an improvement in the average recognition rates to a maximum extent of 9.4%, 11%, 10.6% and 11.5% in comparison to unimodal LDF, GDF and two low frequency sub-band based methods respectively. Further, the proposed LGDF method is superior to feature-score hybrid fusion by a highest average recognition rate of 6.75%.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130781318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Verification of SDRAM controller using SystemVerilog 使用SystemVerilog验证SDRAM控制器
V. Vutukuri, Vijaya Bhaskar Adusumilli, Pavan Kumar Uppu, Swasthik Varsa, Ravi Kumar Thummala
{"title":"Verification of SDRAM controller using SystemVerilog","authors":"V. Vutukuri, Vijaya Bhaskar Adusumilli, Pavan Kumar Uppu, Swasthik Varsa, Ravi Kumar Thummala","doi":"10.1109/CONECCT50063.2020.9198440","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198440","url":null,"abstract":"Synchronous DRAM (SDRAM) has become memory of choice for desktop computers, laptops and embedded systems due to its significant features like high speed, burst access..etc. As SDRAM has many phases of operation like write phase, burst phase, active phase, precharge phase there is need for a memory controller to manage the memory. The main purpose of the SDRAM controller is to refresh the SDRAM cells periodically and control the flow of data to/from SDRAM. Efficient design and verification of the SDRAM controller is required to minimize the memory access latency and ensure the correct operation of SDRAM. In this paper we have verified the SDRAM controller using SystemVerilog test bench architecture. Our model has verified the SDRAM controller against most of the test cases provided by the specification sheet and also achieved 100 percent code coverage. The design was verified using Modelsim SE-64 10.5.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130995502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification of Fake News Using Machine Learning 利用机器学习识别假新闻
Rahul R Mandical, N. Mamatha, N. Shivakumar, R. Monica, A. Krishna
{"title":"Identification of Fake News Using Machine Learning","authors":"Rahul R Mandical, N. Mamatha, N. Shivakumar, R. Monica, A. Krishna","doi":"10.1109/CONECCT50063.2020.9198610","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198610","url":null,"abstract":"Fake news has been a problem ever since the internet boomed. The very network that allows us to know what is happening globally is the perfect breeding ground for malicious and fake news. Combating this fake news is important because the world's view is shaped by information. People not only make important decisions based on information but also form their own opinions. If this information is false it can have devastating consequences. Verifying each news one by one by a human being is completely unfeasible. This paper attempts to expedite the process of identification of fake news by proposing a system that can reliably classify fake news. Machine Learning algorithms such as Naive Bayes, Passive Aggressive Classifier and Deep Neural Networks have being used on eight different datasets acquired from various sources. The paper also includes the analysis and results of each model. The arduous task of detection of fake news can be made trivial with the usage of the right models with the right tools.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
SDN-based Machine Learning Powered Alarm Manager for Mitigating the Traffic Spikes at the IoT Gateways 基于sdn的机器学习告警管理器,用于缓解物联网网关的流量峰值
P. Thorat, Niraj Kumar Dubey
{"title":"SDN-based Machine Learning Powered Alarm Manager for Mitigating the Traffic Spikes at the IoT Gateways","authors":"P. Thorat, Niraj Kumar Dubey","doi":"10.1109/CONECCT50063.2020.9198356","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198356","url":null,"abstract":"As the adoption of the Internet of Things (IoT) is gaining momentum so are the possibilities of misusing it to hamper the service provided by the IoT applications. IoT devices can be hacked to launch denial of service (DoS) or distributed DoS (DDoS) attack to overwhelm the IoT network right from the IoT gateway (IoT-G) at the edge to the IoT application server from serving the legitimate flows. Monitoring at the IoT-G is required to identify the unusual spikes in the traffic and in response, unified actions are required to provide faster and effective resilience against such attacks. To address these challenges, in this paper, we propose software-defined networking (SDN) based alarm manager design for mitigating the immediate traffic burst at the IoT-G. Our machine learning-powered alarm manager identifies the attack in the network using the historical interpretation of the traffic and generates an alarm to block the attack from overwhelming the IoT network. Based on the results, our solution is capable of detecting the security attack with around 98% precision and then mitigating it.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fuzzy based Improved Incremental Conductance MPPT algorithm in PV System 基于模糊的改进增量电导PV系统MPPT算法
Nagaraja Kumari.CH, V.S.V Kaumudi Pravallika
{"title":"Fuzzy based Improved Incremental Conductance MPPT algorithm in PV System","authors":"Nagaraja Kumari.CH, V.S.V Kaumudi Pravallika","doi":"10.1109/CONECCT50063.2020.9198384","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198384","url":null,"abstract":"The Maximum Power Point Tracking (MPPT) is one of the significant techniques and furthermore the precise option that helps in acquiring power from the solar photovoltaic system under differing climatic conditions. This paper aims to apply an improved incremental conductance MPPT algorithm with the fuzzy logic Controller to track the Maximum Power Point (MPP) effectively. The Fuzzy controller indicates its effective viability in reducing oscillations in output with fast response under distinct temperature and irradiation conditions. In this paper, a comparative evaluation between Improved Incremental Conductance algorithm imposed fuzzy controller with that to an improved incremental conductance algorithm with PI controller, Perturb and Observe MPPT method and Incremental conductance MPPT methods can be observed under MATLAB/Simulink program environment and the proposed method shows its prominent effectiveness under various atmospheric conditions.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emerging Low-Cost Air Quality Monitoring Techniques for Smart Cities with UAV 新兴的无人机智能城市低成本空气质量监测技术
Piyush Yadav, Tejas Porwal, Vedanta Jha, S. Indu
{"title":"Emerging Low-Cost Air Quality Monitoring Techniques for Smart Cities with UAV","authors":"Piyush Yadav, Tejas Porwal, Vedanta Jha, S. Indu","doi":"10.1109/CONECCT50063.2020.9198487","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198487","url":null,"abstract":"Air quality is a local phenomenon, that is, it changes in a significant manner from point to point, thus making air quality mapping from scarce static air quality sensors, practically insignificant. Thus, air quality monitoring using mobile sources holds enormous potential as it gives us the ability to perform spatiotemporal pollution mapping of a geographically wide region using just a few mobile sensors and at a cost that is almost negligible to ground-based static sensors. Drone technology has emerged as a very important platform to do sensing of various physical phenomena around us and by integrating low-cost and light-weight air quality sensors on a UAV, it is possible to get fine-grained spatiotemporal air quality data to have a better overview of the pollution variation and locate its source of origin. In this study, we have designed and manufactured a fixed-wing solar-powered UAV, with potential to perform perpetual flight using solar power and generate air quality data in real-time. Fixed-wing UAV design was chosen for this study due to less propeller wash on sensor readings and more flight time possible than a quadcopter. This UAV system was successfully field-tested at a low altitude and air quality data was generated on the ground, collecting, storing and transmitting data through a data fusion module consisting of low-cost OPC R1 sensor, Raspberry Pi and Pixhawk Flight controller. We do spatiotemporal analysis of the generated PM 2.5 data from the system, which could be very useful to identify pollution hotspots in urban areas, industrial region, smart cities and locate stubble burning sites.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115833612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach 基于区块链方法的物联网皮肤监测系统的隐私和安全
S. Juyal, Sachin Sharma, Aditya Harbola, A. Shukla
{"title":"Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach","authors":"S. Juyal, Sachin Sharma, Aditya Harbola, A. Shukla","doi":"10.1109/CONECCT50063.2020.9198409","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198409","url":null,"abstract":"Remote patient monitoring is a system that focuses on patients care and attention with the advent of the Internet of Things (IoT). The technology makes it easier to track distance, but also to diagnose and provide critical attention and service on demand so that billions of people are safer and more safe. Skincare monitoring is one of the growing fields of medical care which requires IoT monitoring, because there is an increasing number of patients, but cures are restricted to the number of available dermatologists. The IoT-based skin monitoring system produces and store volumes of private medical data at the cloud from which the skin experts can access it at remote locations. Such large-scale data are highly vulnerable and otherwise have catastrophic results for privacy and security mechanisms. Medical organizations currently do not concentrate much on maintaining safety and privacy, which are of major importance in the field. This paper provides an IoT based skin surveillance system based on a blockchain data protection and safety mechanism. A secure data transmission mechanism for IoT devices used in a distributed architecture is proposed. Privacy is assured through a unique key to identify each user when he registers. The principle of blockchain also addresses security issues through the generation of hash functions on every transaction variable. We use blockchain consortiums that meet our criteria in a decentralized environment for controlled access. The solutions proposed allow IoT based skin surveillance systems to privately and securely store and share medical data over the network without disturbance.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114897039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Automated Computer Vision based Weed Removal Bot 基于计算机视觉的自动除草机器人
G. Sethia, Harish Kumar S Guragol, S. Sandhya, Shruthi J, Rashmi N
{"title":"Automated Computer Vision based Weed Removal Bot","authors":"G. Sethia, Harish Kumar S Guragol, S. Sandhya, Shruthi J, Rashmi N","doi":"10.1109/CONECCT50063.2020.9198515","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198515","url":null,"abstract":"Weeds are a dangerous factor for a good yield of crops. The conventional method of removing weeds was either plucking manually or spraying herbicides uniformly all over the field. Spraying herbicides not only contaminates crops but also gives rise to many health-related issues. The purpose of the paper is to develop a mobile model that can detect weeds in real- time with their position coordinates and scrape them off. The model first scans the specific area for leaf detection and classifies it as weed or crop with a prediction accuracy of 99.5%. If the classified leaf is a weed, the coordinates are found and the robotic arm removes them with the help of a high-speed rotating blade, without harming the crops and environment. The left outs can further be utilized as fertilizer and no harmful chemicals have been used.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multistress Ageing Studies on Polymeric Housed Surge Arresters 聚合物外壳避雷器的多应力老化研究
K. Shreyas, S. Reddy B.
{"title":"Multistress Ageing Studies on Polymeric Housed Surge Arresters","authors":"K. Shreyas, S. Reddy B.","doi":"10.1109/CONECCT50063.2020.9198354","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198354","url":null,"abstract":"Metal oxide surge arresters (MOSA) are extensively used for protection of electrical equipment against surges. The surge arrester blocks are generally housed inside ceramic housing; however, recently polymeric housing is being extensively used due to their multiple advantages. It is reported that environmental stresses normally cause ageing and degradation of the polymeric housing which may lead to failures. Thus, a study on the effects of ageing on polymeric housed metal oxide surge arresters is presently envisaged. Exhaustive experimental investigations are in progress on a 9kV polymeric housed MOSA samples obtained from various manufacturers in the country. The samples are subjected to various multiple cyclic stresses like voltage, humidity, temperature and UV for nearly 1000 hrs simulating field conditions. Analysis of leakage current behaviour and material surface characterization would be undertaken to estimate the degradation on the polymeric housing surface.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124083068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pre-provisioning Protection for Faster Failure Recovery in Service Function Chaining 预发放保护,实现业务功能链中更快的故障恢复
P. Thorat, Niraj Kumar Dubey
{"title":"Pre-provisioning Protection for Faster Failure Recovery in Service Function Chaining","authors":"P. Thorat, Niraj Kumar Dubey","doi":"10.1109/CONECCT50063.2020.9198654","DOIUrl":"https://doi.org/10.1109/CONECCT50063.2020.9198654","url":null,"abstract":"Service function chaining (SFC) enables the traffic to be sequentially processed by the service functions (SFs) based on its service requirement. Any failure on the service function path (SFP) of the SFC needs to be rapidly recovered for continued end-to-end service delivery. A local detouring approach could achieve rapid recovery. However, providing local protection to each component on an SFP could consume memory of the switch to store alternate path flow rules. In addition, the efforts required for per-flow detouring in local detouring could overburden the software-defined networking controller (SDNC). In order to reduce the complexity associated with the recovery process, we propose the segment-based SFP protection (SSP) approach. Our proposed SSP approach divides the SFP into a set of service segments (SSes). Our proposed SSP approach employs the flow-grouping strategy to group the flows that share the common SS to enable local detouring via a single point of change in action and thus minimizes the effort required for per-flow detouring. Additionally, the SSP approach conserves the switch memory consumption for configuring SFP and its protection.","PeriodicalId":261794,"journal":{"name":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126136140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信