2017 7th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

筛选
英文 中文
Voltage harmonic reduction using passive filter shunt passive-active filters for non-linear load 采用无源滤波器并联无源滤波器对非线性负载进行电压谐波抑制
Rajeshwari, A. Bagwari
{"title":"Voltage harmonic reduction using passive filter shunt passive-active filters for non-linear load","authors":"Rajeshwari, A. Bagwari","doi":"10.1109/CSNT.2017.8418524","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418524","url":null,"abstract":"We know that the rise of harmonics is a major problem now days in non-linear loads. The universal use of non-linear loads like in power electronics equipment which amplified the harmonic-related difficulties in service and trade power systems this make an essential requirement of filter. The nonlinear loads be compensated & sometime we can identified but sometimes they include their own non characteristic harmonic portion & not ideal as it is actual in input & voltage sag occur so many times in a day. As increasing the harmonic magnitude component contribution of key problem also rises in industrial sector, so this is a very complex in power system, to overcome we using different methods to reduce this major problem. This paper is presents a proposed model of passive Alter & combination of shunt active & passive filter to reducing harmonic limits in single-phase system as tracked by IEEE std. 519-1992.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Predictive analytics in data science for business intelligence solutions 商业智能解决方案的数据科学预测分析
P. Wazurkar, R. S. Bhadoria, Dhananjai Bajpai
{"title":"Predictive analytics in data science for business intelligence solutions","authors":"P. Wazurkar, R. S. Bhadoria, Dhananjai Bajpai","doi":"10.1109/CSNT.2017.8418568","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418568","url":null,"abstract":"In modern era of computing, organizations are focusing on the better utilization of technology and surviving to gear-up with global business demand. Such competition is acting as a driving force for its business to cope-up the data which generated every second of minute. This data needs to figure out and segregated with information which is required for is business growth model. The Predictive Analytics (PA) uses various algorithms to find out different patterns in large data that might suggest the efficient behavior for business solution. This paper provides a conceptual decision making process for data using predictive analysis to maximize the success ratio for handling large dataset. Today, different technologies like cloud computing, SOA, are together transforming information technology but in turn, are imposing new complexities to the data computation. Due to such advances in technologies, and it requires rapid and dynamic data analysis for structured and unstructured data.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132105093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Data visualization through R and Azure for scaling machine training sets 通过R和Azure进行数据可视化,用于缩放机器训练集
R. Pandey, Nidhi Srivastava, Komal Verma
{"title":"Data visualization through R and Azure for scaling machine training sets","authors":"R. Pandey, Nidhi Srivastava, Komal Verma","doi":"10.1109/CSNT.2017.8418564","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418564","url":null,"abstract":"Data Visualization involves the creation and study of the visual representation of data. This paper involves the integration of R Studio with Microsoft Azure. It will be used to analyze the \"Adult Dataset (adult.csv)\", which consists of various attributes based on which graphs will be made for visual representation of dataset. Several inferences have been drawn from the analysis and graphical representation of the dataset.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114401722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
K-means clustering with adaptive threshold for segmentation of hand images 基于自适应阈值的k均值聚类手部图像分割
Sheifalee Trivedi, B. Nandwana, D. Khunteta, S. Narayan
{"title":"K-means clustering with adaptive threshold for segmentation of hand images","authors":"Sheifalee Trivedi, B. Nandwana, D. Khunteta, S. Narayan","doi":"10.1109/CSNT.2017.8418534","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418534","url":null,"abstract":"As we all know an image is an artifact that depicts visual perception. In order to extract information or modify those images we have to perform some operation on it. In this paper we present a methodology to segment hand images using modified k-means clustering with value of threshold and analysis of histogram. Experimental results show 97% accurate results so we can say proposed methodology is better then previous.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of numerical interleaver for IDMA scheme IDMA方案的数值交织分析
S. Srivastava, Shivani Dixit, M. Shukla
{"title":"Analysis of numerical interleaver for IDMA scheme","authors":"S. Srivastava, Shivani Dixit, M. Shukla","doi":"10.1109/CSNT.2017.8418502","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418502","url":null,"abstract":"This research work presents a novel numerical interleaver for generation of user specific interleaving sequences, for interleave-division multiple-access (IDMA) system. In general, all the interleaving sequences, used by users, need to be transferred to receiver side for extracting the user specific data with help of de-interleaving process. In the proposed interleaver, there is no need to transfer any interleaving sequences to the receiver. This interleaver eliminates the problem of high consumption of bandwidth as the interleaved sequences depend only on few parameters and it can be easily generated at the receiver if receiver system is aware of these parameters. To make comparison with other interleavers, the bit error rate (BER) performance analysis has been performed under Additive White Gaussian Noise (AWGN) channel conditions based on the computer MATLAB simulations. The simulation results demonstrate that the proposed numerical interleaver provides better BER performance since it allows the communication system to easily check for more orthogonal interleaving patterns by changing the values of few parameters.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tor traffic identification Tor 流量识别
P. Mayank, A. K. Singh
{"title":"Tor traffic identification","authors":"P. Mayank, A. K. Singh","doi":"10.1109/CSNT.2017.8418516","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418516","url":null,"abstract":"Today anonymity and privacy are the major concerns of Internet users. There are several types and implementations of anonymizing services available on the Internet. Tor is one of the services among those services. Tor networks are based on onion routing concept, and is now very popular. Surprisingly, very few research has been done on such an anonymizing network. Activist, journalist and writers use this tool for their freedom of speech, but it is also mis-used by malware, distributed denial of service attacks, hidden services that sells illegal things, spams, and many more. This paper will explain Tor usage detection by analysing the TLS connection that is used to make the connection secure and using the characteristics found during analysis to detect and block the Tor traffic originated from Tor browser.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Emotion detection through fusion of complementary facial features 基于互补面部特征融合的情感检测
N. Rathee, Ashutosh Vaish, Sagar Gupta
{"title":"Emotion detection through fusion of complementary facial features","authors":"N. Rathee, Ashutosh Vaish, Sagar Gupta","doi":"10.1109/CSNT.2017.8418530","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418530","url":null,"abstract":"Facial Feature extraction is used in a number of applications including emotion detection. In the following approach various popular feature descriptors, including Gabor features, HOG, DWT were computed. We have fused features using Multiview Distance Metric Learning (MDML) which utilizes complementary features of the images to extract every known detail while eliminating the redundant features. Moreover MDML maps the features extracted from the dataset to higher discriminative space. The features belonging to the same class are brought closer and those that are from different classes are forced away by the MDML thereby increasing the accuracy of the classifier employed. CK+ Dataset has been used to conduct the experiments. Experimental results represent the efficacy of the method is 93.5% displaying the potential of the recommended manner.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancement in data security using cryptography and compression 使用加密和压缩增强数据安全性
Shariqua Izhar, Anchal Kaushal, Ramsha Fatima, M. Qadeer
{"title":"Enhancement in data security using cryptography and compression","authors":"Shariqua Izhar, Anchal Kaushal, Ramsha Fatima, M. Qadeer","doi":"10.1109/CSNT.2017.8418539","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418539","url":null,"abstract":"In today's scenario, where everything is internet based, there is a huge demand for data security. A large number of cryptographic techniques are available to handle this problem. To increase data security, data can first be compressed using compression techniques and then encryption techniques can be applied. In this paper, we are proposing two new algorithms for encryption in which we have incorporated the concept of diffusion and confusion. The algorithms are based on Transposition cipher, Substitution cipher and Symmetric Key Encryption. Brute force on these algorithms can't be done so easily. These can be applied along with data compression to get more security.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design of 60GHz broadband LNA for 5G cellular using 65nm CMOS technology 基于65nm CMOS技术的5G蜂窝60GHz宽带LNA设计
S. Pournamy, Navin Kumar
{"title":"Design of 60GHz broadband LNA for 5G cellular using 65nm CMOS technology","authors":"S. Pournamy, Navin Kumar","doi":"10.1109/CSNT.2017.8418559","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418559","url":null,"abstract":"In this paper, 60GHz millimeter wave (mmWave) two stage common source (CS) cascode low noise amplifier (LNA) with degenerative inductor is designed in 65nm CMOS technology. It has a wide band (57–64GHz) and highly stable characteristics. We have also proposed two different techniques to design the LNA unconditionally stable and increase its linearity without degrading other performancemetrics. Simulation results of a two stage LNA without the stability improvisation show a peak gain of 24.5dB at 61GHz, input return loss of −9.1dB, noise factor (NF) of 1.5dB, static power dissipation Pdc of 6.63mW and is conditionally stable. In one of the methods of designing LNA unconditionally stable is to reduce the gain to 19.5dB by incorporating an additional inductor at the source of second stage amplifier. Linearity is also increased to P1dB of −2.44dBm without degradation of other parameters. Another approach is to maintain the peak gain greater than 22dB by increasing the transconductance of the CMOS transistors. This increases the return loss to −14.5dB. Various obtained results are presented and discussed.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133096811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
All time tracking system for recovering stolen devices even in power-off state 所有的时间跟踪系统,恢复被盗设备,即使在断电状态
Mohd Aijaj Khan, Anubhav Tripathi, M. Dixit
{"title":"All time tracking system for recovering stolen devices even in power-off state","authors":"Mohd Aijaj Khan, Anubhav Tripathi, M. Dixit","doi":"10.1109/CSNT.2017.8418549","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418549","url":null,"abstract":"This concept is about tracking a smartphone using a GPS independent of state whether the smartphone is switched on or off. When the user makes a request to track, the receiver receives the request and then triggers the GPS to locate the device. Further, the GPS obtains location data in the form of geographical co-ordinates which is then processed by the chip and transmit the latest co-ordinates to the user. Since independent power supply is used, under any circumstances our smartphone can be easily tracked by the user.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信