2017 7th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

筛选
英文 中文
Advance morphological filtering, correlation and convolution method for gesture recognition 提出了形态学滤波、相关和卷积的手势识别方法
Poorva Gubrele, R. Prasad, P. Saurabh, B. Verma
{"title":"Advance morphological filtering, correlation and convolution method for gesture recognition","authors":"Poorva Gubrele, R. Prasad, P. Saurabh, B. Verma","doi":"10.1109/CSNT.2017.8418528","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418528","url":null,"abstract":"Hand gesture recognition system is employed to provide interface between computer and human using hand gesture. This paper presents a technique for human computer interface through common hand gesture that is efficient to commemorate 25 aspersion gestures from the American sign language hand alphabet. The prospect of this paper is to develop up an algorithm for hand gesture recognition with reasonable accuracy. This work uses a domain independent learning methodology to automatically stir low-level spatio-temporal descriptors for high-level cross recognition by Correlated variance programming. Feature extraction is the most important orientation for gesture recognition and is indeed important in terms of giving input to a classifier. In this work Canny edge detector algorithm is used to find edge of the segmented and morphological filtered image which yields boundary of hand gesture in the image then Correlated variance mean based programming applied for recognition of gesture. Experimental results very precisely indicate that the developed method outperforms the existing state of the art.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122062947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reviewing the security surveillance of AMI using big data analytics 利用大数据分析回顾AMI的安全监控
S. Lighari, D. Hussain
{"title":"Reviewing the security surveillance of AMI using big data analytics","authors":"S. Lighari, D. Hussain","doi":"10.1109/CSNT.2017.8418543","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418543","url":null,"abstract":"Advanced Metering Infrastructure (AMI) is a kind of communication infrastructure with millions of Smart Meters. The Smart Meters and other components of AMI generate data with high capacity and rate. In the result, data becomes hard to analyze with traditional methods, therefore, some advanced analytics like big data analytics can be very expedient here. There are two types of data passed by every communication system, they are actual and network data. Due to enormous size of AMI network, it produces both actual and network data in terabytes or even more. The actual data is collected from AMI at the AMI repository which can be applied for billing, energy forecasting and demand response applications. The network data controls the passage of actual data and can be a good source to examine the security of AMI system. The authors in the paper review the advanced analytics of the network data for detecting the anomalies in the AMI network. The AMI comprises of a firewall at the entrance of the data center which monitors ins and outs of the data based on security rules. In order to increase the efficiency of the firewall, it is proposed to use the big data analytics for advanced surveillance. There are many tools available for big data analytics. Among those, the apache spark is getting popularity because of its fast in memory cluster computing. It features processing of both batch and streamed data. The inclusion of apache spark as the surveillance tool will make the firewall stream processing more efficient. We also propose the use of machine learning algorithms by AMI firewall for better prediction of anomalies. The machine learning libraries are also well supported by apache spark.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121706497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Searching made easy: A multithreading based desktop search engine 搜索变得简单:一个基于多线程的桌面搜索引擎
Prakhar Gupta, R. Negi, S. Shekhar
{"title":"Searching made easy: A multithreading based desktop search engine","authors":"Prakhar Gupta, R. Negi, S. Shekhar","doi":"10.1109/CSNT.2017.8418570","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418570","url":null,"abstract":"This paper proposes the faster version of the searching tool used in desktops. The searching tool normally used is based on sequential search i.e. the drives are searched in a sequential manner one after the other which is time consuming. In this paper we have proposed a version based on the multithreading approach, the number of threads equal to the number of drives in the desktop are created. Since multiple threads can be executed simultaneously so all the drives are searched simultaneously rather than sequentially. The searching results are displayed to the user. The proposed version is checked multiple times on different desktops and results are obtained in the less time than the normal searching tool. The version is totally implemented in java, efficient and fast searching tool.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123909389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A mechanism for operation level role based access control in web services web服务中基于操作级别角色的访问控制机制
R. Patel, Urjita Thakar, V. Tewari
{"title":"A mechanism for operation level role based access control in web services","authors":"R. Patel, Urjita Thakar, V. Tewari","doi":"10.1109/CSNT.2017.8418571","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418571","url":null,"abstract":"Many online businesses offer their functionality as web services. Due to the ubiquitous presence of web services security, especially the service access control is becoming a serious issue. Traditionally, access control was applied on a complete web service which contains a number of operations where each operation offers some special functionality. If access is to be given to a user for few selected operations then separate web services need to be offered corresponding to these operations. Due to this, large number of web services with small functionalities need to be deployed. Since these large number of services need to be published in the UDDI registry, it becomes bulky. Also, for each operation, separate invocation of each service is to be made. Existing most of the access control systems are identity based in which decision is taken on the basis of subject identity. With the increase in number of users, Role Based Access Control (RBAC) is useful as it provides access control to a group instead of individual users and is also easy to scale. In this work, a method has been proposed to provide more fine grained access control on web services at operations level based on roles by extending XACML policy specifications.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127467657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security in cloud computing 云计算中的安全
V. Sharma, S. Agarwai, S. Moin, M. Qadeer
{"title":"Security in cloud computing","authors":"V. Sharma, S. Agarwai, S. Moin, M. Qadeer","doi":"10.1109/CSNT.2017.8418544","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418544","url":null,"abstract":"Cloud computing has manifold advantages and thus it is now considered as the best computing environment nowadays. It provides a plethora of benefits such as pay per use services, infrastructure etc. Cloud computing paradigm offers scalability. Along with this, it also provides flexibility, ease of computing, economic benefits and what not. the main thing holding the cloud back from being a boom advancement is the security issues related with its deployment models as the information and data uploaded onto the cloud may be classified and is easily accessible by hackers by some sophisticated methods This paper deals with some of these security concerns, some previous ways to mitigate those threats and some new proposed solutions to deal with these security concerns and secure the cloud to the fullest.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fuzzification on rain and temperature data in Indian terrain 印度地形降雨和温度数据的模糊化
M. Sheikh, Sovan Samanta
{"title":"Fuzzification on rain and temperature data in Indian terrain","authors":"M. Sheikh, Sovan Samanta","doi":"10.1109/CSNT.2017.8418556","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418556","url":null,"abstract":"Climate of everywhere is changing due to global warming. Therefore, durations of seasons are also being changed for a particular place. In general, weather depends on three major parameters as temperature, humidity and rainfall. In this paper, the data of rainfall and temperature are taken from few places of India and summarized them. These are represented as fuzzy sets for temperature and rainfall on unit scale. By using cut-set, weather of those places are shown during different time periods. This study will assure to re-define the existing seasons and forecasting of weather.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129731810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of discontinuous sliding mode observers for unmanned aircraft system 无人机系统不连续滑模观测器研究
Dilip Kumar Malav, Rajashree Taparia
{"title":"Study of discontinuous sliding mode observers for unmanned aircraft system","authors":"Dilip Kumar Malav, Rajashree Taparia","doi":"10.1109/CSNT.2017.8418522","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418522","url":null,"abstract":"Identification, observation and control of systems under uncertainties/perturbations is a major research topic in modern control engineering. In a control system where no measurement noise or no uncertainties are present, continuous observers are able to converge asymptotically to the actual state. If uncertainties are present, they do not converge. To achieve exact and finite time convergence in the presence of uncertainties we design discontinuous sliding mode observers. In this paper four types of observers are discussed for unmanned aircraft system namely linear observer (LO), sliding mode observer (SMO), super twisting observer (STO) and generalized super twisting observer (GSTO).","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117224985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A parallel spectrum sensing technique for cognitive radio 一种面向认知无线电的并行频谱感知技术
Jyotshana Kanti, G. Tomar, A. Bagwari
{"title":"A parallel spectrum sensing technique for cognitive radio","authors":"Jyotshana Kanti, G. Tomar, A. Bagwari","doi":"10.1109/CSNT.2017.8418504","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418504","url":null,"abstract":"In this paper, the projected parallel spectrum sensing technique decreases sensing failure problem as well as improves reliability. The offered scheme takes two detectors, both works together. One detector is conventional energy detector considering single adaptive threshold known as ED-SAT, and another takes two adaptive thresholds called ED-TAT. The simulation results, in terms of detection probability, confirm that the projected parallel sensing scheme beats current sensing schemes and requires minor observation time. The work is based on various previous results and has been validated.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121415388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on multiple sequence alignment using metaheuristics 基于元启发式的多序列比对研究综述
A. Dey, Indrajit Saha, U. Maulik
{"title":"A survey on multiple sequence alignment using metaheuristics","authors":"A. Dey, Indrajit Saha, U. Maulik","doi":"10.1109/CSNT.2017.8418552","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418552","url":null,"abstract":"Over the past two decades, various research works have been going on Multiple Sequence Alignment (MSA) and it becomes an important domain in bioinformatics. This is an NPhard problem. For this purpose, various traditional, heuristics and metaheuristic methods have been applied. Among these methods, metaheuristics show an effective output to overcome the bottleneck of MSA problem. Different metaheuristic methods and software have been developed to overcome the speed and accuracy problem of MSA, while the number of sequences increases. In this article, we have surveyed widely used metaheuristic methods and alignment tools applied for solving MSA problem. However, after reviewing we can conclude that the time complexity is still a big challenge for MSA problem.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122799034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of modular approach based Ku-band telemetry transmitter for geostationary satellites 基于模块化方法的地球静止卫星ku波段遥测发射机设计
B. Himani, Khan Afzaal, K. S. Malleswar, Sirshendu Das, R. Ranjan, M. Neelavathy
{"title":"Design of modular approach based Ku-band telemetry transmitter for geostationary satellites","authors":"B. Himani, Khan Afzaal, K. S. Malleswar, Sirshendu Das, R. Ranjan, M. Neelavathy","doi":"10.1109/CSNT.2017.8418505","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418505","url":null,"abstract":"The Telemetry, Tracking and Command system is critical to the success of a satellite mission. Telemetry transmitter is a part of TT&C RF subsystem for telemetry downlink and ranging operations. Optimal utilization of frequency bands is of fundamental importance to communications systems. With the growing number of satellites, the frequency band allocated for space applications in S-band and C-band is becoming increasingly crowded. Therefore, in future, all communication satellites will have to use Ku-band or Ka-band for TT&C operations. A modular approach based Ku-band telemetry transmitter has been designed to cater this need. Telemetry transmitter downlinks telemetry data and ranging tones to ground station in phase modulated format on a carrier frequency chosen in the Kuband. It consists of a PLL synthesizer based highly stable carrier generator, a varactor diode based phase modulator, BJT and MESFET based active frequency multipliers and a MMIC based low power amplifier.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信