2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

筛选
英文 中文
Novel Ranking Approach using Pattern Recognition for Ontology in Semantic Search Engine 基于模式识别的语义搜索引擎本体排序新方法
Neera Chaudhary, Suresh Kumar, Ashok Kumar Yadav, Sugandha Chakraverti
{"title":"Novel Ranking Approach using Pattern Recognition for Ontology in Semantic Search Engine","authors":"Neera Chaudhary, Suresh Kumar, Ashok Kumar Yadav, Sugandha Chakraverti","doi":"10.1109/ICICT46931.2019.8977705","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977705","url":null,"abstract":"As we know, World Wide Web (WWW) has been developing and it’s performance growth is increasing since last few years. So, it requires the need of fast and precise method to reach the information. Ranking is playing an important role to achieve the goal of receiving relevant information. Search Engines have an important component as ranking. It helps user to retrieve the pages that relates to his/her query. Semantic Web (SW) is the extension of WWW. It is a great technology, which helps search engines to retrieve most relevant pages. So, the concept of SW approach is satisfied, only if the results of retrieval are extremely related to user query. Than only, we can consider that due to best ranking schemes user expectations are increasing. Because by accurate result as per the query the scope of knowledge searching increases and make user to view the relevant need for query on top most.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Decade on Script Identification from Natural Images/Videos: A Review 自然影像/录像文字识别的十年回顾
Shilpa Mahajan, Rajneesh Rani
{"title":"A Decade on Script Identification from Natural Images/Videos: A Review","authors":"Shilpa Mahajan, Rajneesh Rani","doi":"10.1109/ICICT46931.2019.8977630","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977630","url":null,"abstract":"Text present in an image provides high level straight forward information about the image/ video in which it is present. Nowadays, analysis of script identification either in the natural image or document image facilitates benefits to the number of important applications. Automatic script identification is a highly challenging task due to various complexities of the text as well as the image. This paper presents a survey on script identification of different scripts across the world. From the survey, it is noted that research in this area is limited to the document images only. Natural images are yet to be explored for automatic script identification.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131539898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secret Key Agreement Schemes in IOT Based Wireless Body Area Network 基于物联网的无线体域网络密钥协议方案
S. Hussain, Manoj Kumar
{"title":"Secret Key Agreement Schemes in IOT Based Wireless Body Area Network","authors":"S. Hussain, Manoj Kumar","doi":"10.1109/ICICT46931.2019.8977632","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977632","url":null,"abstract":"Internet of Things (IOT) is one of the most emerging technologies that have engrossed a lot of opportunities these days. It offers a huge business scope for organizations and open new ventures for many existing sectors. Wireless Body Area Networks (WBAN) is one such emerging field that provides a remote mechanism to monitor and collect patient’s health related data using IOT based wearable bio-sensors. It has a huge potential to enhance health care delivery significantly by using remote monitoring, disease or performance tracking, and related medical procedures. The collected data is highly private in nature and must therefore be protected while being used by the healthcare professionals and during remote storage in Electronic Healthcare Repository (EHR). Traditional cryptographic techniques are highly greedy in terms of computation, storage, and energy consumption. Their implementations are found to be unsuitable in IOT devices which are highly resource constraints. This work is an effort to analyze security architecture of IOT based WBAN on the basis of security key agreement schemes.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"58 30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stockwell Transform Based Algorithm for Processing of Digital Communication Signals to Detect Superimposed Noise Disturbances 基于Stockwell变换的数字通信信号处理算法检测叠加噪声干扰
Monika Mathur, Vivek Upadhyaya, Rahul Srivastava
{"title":"Stockwell Transform Based Algorithm for Processing of Digital Communication Signals to Detect Superimposed Noise Disturbances","authors":"Monika Mathur, Vivek Upadhyaya, Rahul Srivastava","doi":"10.1109/ICICT46931.2019.8977706","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977706","url":null,"abstract":"This research work presents a method using Stockwell transform which is aimed to process the communication signals to detect noise disturbances superimposed on the signals in the communication channel or at the transmitter or the receiver stations. The communication signals with noise disturbances are simulated with the help of mathematical relations. The communication signals with noise disturbance are decomposed with the help of Stockwell Transform and S-matrix is obtained. A summing of absolute values curve is proposed and calculated by summing of absolute values of each columns of S-matrix and plotted against time. A median curve is also proposed and calculated using median of absolute values of each columns of S- matrix. Proposed maximum absolute values plot is calculated using maximum values of absolute values of each columns of S- matrix. On comparing these plots of signal having noise disturbance with corresponding plots of pure sinusoidal communication signal, superimposed noise disturbances have been detected successfully. Proposed study is performed using the MATLAB software.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114067212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Skin Lesions by using Extended-Incremental Convolutional Neural Network 基于扩展增量卷积神经网络的皮肤病变分类
Ankit Chopade
{"title":"Classification of Skin Lesions by using Extended-Incremental Convolutional Neural Network","authors":"Ankit Chopade","doi":"10.1109/ICICT46931.2019.8977638","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977638","url":null,"abstract":"Order of skin sores in different dangerous sort assumes a pivotal job in diagnosing different, neighborhood and quality related, ailments in the field of therapeutic science. Grouping of these sores in a few carcinogenic sorts i.e Melanoma(MEL), Melanomic Neves(NV), Basal Cell Carcinoma(BCC), Actinic Keratosis(AKIEC), Benign Keratosis(BKL )Dermatofibroma(DF) and Vascular Lesion(VASC) gives some understanding about the infection. Skin malignancy is the most deadly kind of malignancy however in the event that these infections are recognized in beginning times, at that point patients can have a high recurrence of recuperation. A few ways to deal with programmed arrangement have been investigated by numerous creators, utilizing different systems and methodologies however this paper proposed an extended version of novel Incremental methodology for Convolution Neural Network on dermoscopy pictures for characterization of skin sores in different skin malignant growths. This is a summed up methodologym subsequently can be executed in different calculations for accomplishing higher exactness. Worldwide Skin Imaging Collaboration (ISIC) 2018 test dataset is utilized in this paper. The methodology utilized in this paper yields an accuracy of more than 95%.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Attacks, Requirements and Authentication Schemes in VANET VANET中的安全攻击、需求和认证方案
Amit kumar Goyal, Arun Kumar Tripathi, G. Agarwal
{"title":"Security Attacks, Requirements and Authentication Schemes in VANET","authors":"Amit kumar Goyal, Arun Kumar Tripathi, G. Agarwal","doi":"10.1109/ICICT46931.2019.8977656","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977656","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET), the promising technique, is getting attention for managing the traffic efficiently and making the road safe. The topographies and its vast applications varying from road safety, to the traffic management, payment service to infotainment. VANETs are characterized as a self-organized, distributed, highly mobile, dynamic topology, unconstrained power, computational and storage networks. The communication in VANET is performed in open-access environment which demands the security issues must be deal with utter importance. Security requirements includes authentication, availability, message confidentiality, message integrity, data availability, access control, privacy, message non-repudiation and real time guarantees of message delivery. In order to have a secure and efficient VANET infrastructure, an extensive overview of characteristics, challenges, security attacks and requirements must be dealt with. The prime objective of this paper is to provide a classification of security requirements, security characteristics and challenges.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Energy Analysis of University Department Building Using eQUEST Software 基于eQUEST软件的高校系楼能耗分析
Naman Garg, B. Saxena, Sanjeev Mishra
{"title":"Energy Analysis of University Department Building Using eQUEST Software","authors":"Naman Garg, B. Saxena, Sanjeev Mishra","doi":"10.1109/ICICT46931.2019.8977663","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977663","url":null,"abstract":"Buildings are one of the major contributors to the consumption of electrical energy generated by power plants. Taking the context of India, out of total generated energy 30% is consumed by building sectors. Therefore, this paper focuses on reducing the total energy demand for a building by applying several improvements like reducing loads, applying insulation, etc. Optimum demand of a department of University is estimated using eQUEST software version 3.65.7175 in this research and comparative results are obtained. The present research focuses on only connected load and improvement methods have been suggested which can save a total of about Rs. 31,507/-. An estimated payback period of 7.9 year is also calculated for the replacement of new equipment’s with the present one.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of MORTO:Multi-objective Regression test optimization MORTO分析:多目标回归检验优化
Neha Gupta, Arun Sharma, M. K. Pachariya
{"title":"Analysis of MORTO:Multi-objective Regression test optimization","authors":"Neha Gupta, Arun Sharma, M. K. Pachariya","doi":"10.1109/ICICT46931.2019.8977675","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977675","url":null,"abstract":"Whenever a change is done in software, regression testing is done to check that a recent change in code has not created any unwanted defects in the system. As size of regression test suite is very large, optimization algorithms help in selecting, minimizing and prioritizing test suites. Main aim is maximize fault detection ability with less number of test cases. Optimization techniques of various types are available but Multiobjective algorithms are the best choice to use as testing is dependent on many adequacy criteria or surrogates. In this paper, authors have carried out study on research papers where multi-objective algorithms are used in regression testing. Then comparison of performance of multi-objective algorithms is done to identify the best suitable multi-objective algorithm for regression testing.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127153348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Light Weighted Mutual Authentication and Dynamic Key Encryption for IoT Devices Applications 物联网设备应用的轻量级相互认证和动态密钥加密
Anuj Sachan, D. N. Kumar, Adwiteeya Adwiteeya
{"title":"Light Weighted Mutual Authentication and Dynamic Key Encryption for IoT Devices Applications","authors":"Anuj Sachan, D. N. Kumar, Adwiteeya Adwiteeya","doi":"10.1109/ICICT46931.2019.8977672","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977672","url":null,"abstract":"The unambiguous and unseamed integration of mixed and non-identical end systems are offered by the Internet of Things (IoT). It has been greatly used in many applications such as network automobile, micro-controller, smart farming, smart retail, wearable devices, and industrial internet. In these applications, a substantial number of IoT devices are established that can sense, actuate, evaluate and publicize. There could be a possible violation of the IoT devices also by capturing the servers or the sensors that is, an intruder may affect the sensor and record false data, or an intruder may capture the servers and incorrectly actuate sensors. Therefore, there is significant need of an strong but light weighted mutual authentication scheme. Following this, authentication is done before the data exchange among sensors and the server. Moreover, due to limited capacity of batteries in IoT devices, the mutual authentication protocol is expected to be light weighted. This work proposed an authentication scheme by using the dynamic cipher along with the existing public key encryption, where the client generates the key dynamically, which can only be solved by brute force. The key which is dynamically generated using random function is used for encryption and decryption. Further, an enhancement to the security is proposed by introducing dynamic cipher based authentication. The proposed scheme is evaluated in software environments i.e., IPv6 over low-power wireless personal area networks (6LoWPAN) which is widely used for IoT applications.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Various Classification Methods 各种分类方法分析
Vidushi, Manisha Agarwal, Rekha Rajoria
{"title":"Analysis of Various Classification Methods","authors":"Vidushi, Manisha Agarwal, Rekha Rajoria","doi":"10.1109/ICICT46931.2019.8977688","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977688","url":null,"abstract":"The process of gaining knowledge from enormous amount of data is called data mining. This paper uses the Weka tool to compare different types of classification methods. Decision tree, Multilayer perceptron, Naïve Bayes, J48 algorithms are used for classification analysis in terms of correctly and incorrectly classified instances and Area of ROC curve. Test option selected is cross validation with 10 folds. Datasets used breast cancer, diabetes from health care industry. In health care industry huge data is available but not so much knowledge extracted.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127275558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信