2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)最新文献

筛选
英文 中文
Modified C-shape microstrip antenna for dual and broadband response 改进的c形微带天线,用于双频和宽带响应
A. Deshmukh, J. Joy, M. Bhat, Milind Jani, K. P. Ray
{"title":"Modified C-shape microstrip antenna for dual and broadband response","authors":"A. Deshmukh, J. Joy, M. Bhat, Milind Jani, K. P. Ray","doi":"10.1109/CSCITA.2017.8066551","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066551","url":null,"abstract":"Fundamental and higher order modes of C-shape patch are discussed and their comparison against the resonant modes of equivalent rectangular patch is presented. Resonant length formulation for C-shape patch at its higher order mode is proposed. The frequency calculated using the same closely agrees with the simulated frequency. A new configuration of C-shape microstrip antenna loaded with step width open circuit stub is proposed for broadband and multi-band response with dual polarization. The addition of open circuit stub modifies the resonance frequency of second order C-shape patch mode which together with fundamental patch mode yields bandwidth of around 32 MHz (∼4%) on thinner substrate. The stub modifies the surface current distribution at second order mode that gives broadside radiation pattern over the bandwidth. With respect to next higher order C-shape patch modes, stub loaded patch yields dual polarized multi-band frequency response with broadside radiation pattern at each of the frequencies. Bandwidth of nearly 2% is obtained at each of the multi-band frequencies.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modelling database server sizing for concurrent users using coloured Petri-nets 使用彩色petri网为并发用户建模数据库服务器规模
N. Gaur, Padmaja Joshi, Rajeev Srivastava
{"title":"Modelling database server sizing for concurrent users using coloured Petri-nets","authors":"N. Gaur, Padmaja Joshi, Rajeev Srivastava","doi":"10.1109/CSCITA.2017.8066530","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066530","url":null,"abstract":"Architecture of database servers is one of the important parameters in the performance of web applications. In this paper, a model is proposed for guiding Postgre SQL database server sizing for concurrent users. Coloured Petri-nets are chosen to represent the model that brings out need to change the deployment architecture when the current architecture may not suffice. The focus of the proposed model is mainly on identifying how the increase in number of concurrent users and type of query affects the performance of the database server. The model is based on the experience as well as experimentation. The model is demonstrated in PlPE-2 using different scenarios. The paper also covers analysis of the proposed model.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient and reliable routing in densely distributed WSN 密集分布WSN中节能可靠的路由
Sagargouda S. Patil, Anand Gudnavar, K. Chandan
{"title":"Energy efficient and reliable routing in densely distributed WSN","authors":"Sagargouda S. Patil, Anand Gudnavar, K. Chandan","doi":"10.1109/CSCITA.2017.8066563","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066563","url":null,"abstract":"Large number of Sensor nodes which are distributed over a geographical area and connected via Wireless medium is called Wireless Sensor Network. Low energy consumption is a major design constraint for battery operated embedded systems such as wireless sensor networks. In order to reduce energy consumption path selection plays a major role. The proposed system Parameter Based Reliable Routing (PBRR) algorithm, uses Hop count, Energy Level, Free Buffer Size, distance between nodes to finding parent nodes in hierarchical structure. Lifetime of network is defined as the duration of network until the first sensor node. Sleep-wake scheduling is an effective mechanism to prolong the lifetime of these energy-constrained wireless sensor networks. The proposed approach, find a short and reliable path between source and destination by reducing energy consumption, average delay and thus increase in packet delivery ratio.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"4 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy preserving speech, face and fingerprint based biometrie authentication system using secure signal processing 采用安全信号处理的基于语音、面部和指纹的生物识别认证系统
A. Dinesh, K. Bijoy
{"title":"Privacy preserving speech, face and fingerprint based biometrie authentication system using secure signal processing","authors":"A. Dinesh, K. Bijoy","doi":"10.1109/CSCITA.2017.8066546","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066546","url":null,"abstract":"Biometrics represents the identity of individuals. Physical characteristics like voice, face, fingerprint, etc. are used to recognize individuals. Biometrics are used as a promising method for authentication, but use of these raw biometric data results in some privacy concerns. In this paper, we propose a system model for privacy preserving biometric authentication system for speech, face and fingerprint authentication. Signal Processing in Encrypted Domain (SPED) is a domain in signal processing that deals with the processing of encrypted data which preserve users' privacy and maintains security. The secure primitives, Secure Inner Product (SIP) and Secure Log Sum (SLS) are used for as authentication protocols. The performance of the system is evaluated using False Acceptance Rate (FAR) and False Rejection Rate (FRR) measures. The simulation results provided, shows good accuracy.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"112 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129100069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of e-learning content for student guidance based on ILS and 4MAT theory 基于ILS和4MAT理论的学生辅导电子学习内容设计
T. Kaewkiriya
{"title":"Design of e-learning content for student guidance based on ILS and 4MAT theory","authors":"T. Kaewkiriya","doi":"10.1109/CSCITA.2017.8066561","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066561","url":null,"abstract":"The goal of this research is to design an e-learning content for student guidance based on 4MAT and ILS theory. This paper consists of seven parts as follows. Part one covers the learning activities. Part two is analysis of the learning activity. Part three is discussion of ILS and 4MAT. Part four is implementation of e-learning subjects. Part five is the search for experts to evaluate the learning activity. Part six is the matching of class activities to the aptitude based on ILS and 4MAT. The last part is e-learning output content. According to the experts' evaluation, the concept model received an average satisfaction level total of 4.00/5.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A hybrid scheme of information hiding incorporating steganography as well as watermarking in the speech signal using Quantization index modulation (QIM) 基于量化指数调制(QIM)的语音信号隐写和水印混合信息隐藏方案
Nikunj Tahilramani, N. Bhatt
{"title":"A hybrid scheme of information hiding incorporating steganography as well as watermarking in the speech signal using Quantization index modulation (QIM)","authors":"Nikunj Tahilramani, N. Bhatt","doi":"10.1109/CSCITA.2017.8066559","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066559","url":null,"abstract":"This paper presents a new approach for digital Speech Steganography and watermarking in the speech signal. In the proposed approach, Quantization index modulation is applied on one of the speech signal feature called as line spectral frequency to indicate the pattern of watermark in each frame of the speech signal. Steganographic data or watermarked information is conveyed through the silence part of the speech signal. The pattern generated using QIM in line spectral frequency (LSF) of the speech gives the information about the existence of steganography or watermarking in the silence part of the speech signal. The blind detection technique is used at the receiver to detect the pattern generated at the transmitter side to identify steganography or authenticity in the speech signal. Various subjective and objective analysis are carried out on a dither modulated speech to evaluate its performance and also the robustness of the same is verified by applying a different types of communication attacks on it. The performance measures are shown in terms of set of tables and graphs. It is observed from the obtained results that, the results of different speech quality assessment parameter as well as the parameters denoting the hiding capacity of each wave file of different speakers are quite good and satisfactory.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"476 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116167198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved fraud detection in e-commerce transactions 改进电子商务交易中的欺诈检测
J. Shaji, Dakshata M. Panchal
{"title":"Improved fraud detection in e-commerce transactions","authors":"J. Shaji, Dakshata M. Panchal","doi":"10.1109/CSCITA.2017.8066537","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066537","url":null,"abstract":"Online transactions have gained popularity in the recent years with an impact of increasing fraud cases associated with it. Fraud increases as new technologies and weaknesses are found, resulting in tremendous losses each year. Since the transactions associated with e-commerce are large in number, the dataset associated with them is also large; therefore, it requires fast and efficient algorithms to identify fraudulent transactions. Most of the methods used for fraud detection are rule-based or are systems that require re-training when newer patterns of fraud occurs. Detecting fraud as it is happening or within a short time span is not easy and requires advanced techniques. As the demand has arisen for self-learning predictive systems, the main objective is to detect the fraudulent transactions by using Adaptive Neuro-Fuzzy Inference System, which is a hybrid of neural networks along with fuzzy inference, wherein the system can adapt to newer instances of fraud.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130468012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Prediction of visual perception from BOLD fMRI 从BOLD fMRI预测视觉感知
Ajay Halthor, K. Kumar
{"title":"Prediction of visual perception from BOLD fMRI","authors":"Ajay Halthor, K. Kumar","doi":"10.1109/CSCITA.2017.8066528","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066528","url":null,"abstract":"The goal of this paper is to determine the object a person visually perceives by analyzing BOLD fMRI data. We use an fMRI dataset and analyze the effects of univariate and multivariate feature selection techniques. By performing dimensionality reduction with Principal Component Analysis (PCA), training with a Support Vector Classifier without a kernel and appropriate smoothing, we obtained a 93.16% accuracy: higher than the state of the art 92%.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134471299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assess autism level while playing games 在玩游戏时评估自闭症程度
Sridari Iyer, Rupesh Mishra, Snehal P. Kulkami, D. Kalbande
{"title":"Assess autism level while playing games","authors":"Sridari Iyer, Rupesh Mishra, Snehal P. Kulkami, D. Kalbande","doi":"10.1109/CSCITA.2017.8066573","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066573","url":null,"abstract":"Autism is a learning disorder falling in the ADHD (Attention Deficit Hyperactivity Disorder) spectrum, varying from being slightly autistic to severe. The level of autism is judged by a special educator after close examination of the child's activities. This paper presents an algorithm that can automate this assessing procedure. While a game is being played the activity pattern of the player is captured in the background. This is interpreted into parameters that define the player's motor skills, cognitive power and anxiety level. Together they are analyzed and the player's level of autism is calculated using fuzzy logic. These parameters can be refined using an unsupervised learning algorithm to render more accurate results.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130944716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SRC analysis of EEG signal for activity detection 脑电信号的SRC分析用于活动检测
S. Patnaik
{"title":"SRC analysis of EEG signal for activity detection","authors":"S. Patnaik","doi":"10.1109/CSCITA.2017.8066540","DOIUrl":"https://doi.org/10.1109/CSCITA.2017.8066540","url":null,"abstract":"In recent years, SRC has received many attentions for classification and identification tasks. This paper attempts to introduce a sparse representation based classification of EEG signal features and identification of associated activities or tasks. It uses wavelet and ICA processing of EEG signal for feature selection and dictionary training. Multiple dictionaries are trained and used for EEG signal encoding. Similar features are extracted from the test EEG signal and attempted to be approximated by using the atoms of trained dictionaries. Desicion is made in favour of the task corresponding to the dictionary from which maximum number of atoms are used in representing the features of test signal. On the basis of the results, we find that the proposed multi-dictionary scheme shows acceptable classification accuracy.","PeriodicalId":299147,"journal":{"name":"2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116621407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信