2019 International Conference on Intelligent Computing and Control Systems (ICCS)最新文献

筛选
英文 中文
Identity Mapping using Cluster-based Certificate technique for Vehicular Ad-Hoc Networks 基于集群证书技术的车载Ad-Hoc网络身份映射
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065402
M. Naresh, K. Srinija, N. Varsha, M. Kalpana
{"title":"Identity Mapping using Cluster-based Certificate technique for Vehicular Ad-Hoc Networks","authors":"M. Naresh, K. Srinija, N. Varsha, M. Kalpana","doi":"10.1109/ICCS45141.2019.9065402","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065402","url":null,"abstract":"In this paper, we introduced a secure authentication technique for VANETs called Identity-Mapping using cluster-based revocation technique. In this technique, all the nodes are split into various clusters and Cluster Head is selected accordingly. The certificate authority is responsible for retracting and issuing certificates, upon the successful transmission of messages or identification of any harmful activities by any node, to the corresponding vehicles. From the simulations and comparative analysis provided in this paper, it is verified that the recommended method shows better performance when compared with the existing works.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121628187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authenticating Cryptography over Network in Data 在数据中验证网络加密
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065608
Priyanka Agarwal, Sloni Mittal, Ankita Tiwari, Ishu Gupta, Ashutosh Kumar Singh, Bharti Sharma
{"title":"Authenticating Cryptography over Network in Data","authors":"Priyanka Agarwal, Sloni Mittal, Ankita Tiwari, Ishu Gupta, Ashutosh Kumar Singh, Bharti Sharma","doi":"10.1109/ICCS45141.2019.9065608","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065608","url":null,"abstract":"The instantaneous growth for the world being digital is- \"Expeditious growth of a network system and high-speed internet\". This leads to both ease as well as security threats to the users. Network security issues can broadly be classified into two main categories: System security and Data security. The system security issue protects the system from unwanted attacks by malicious threats. Data security is protecting the leakage or modification of data from the unauthorized party in the network. The main goal and sole purpose of the network security are to achieve Authenticity, Integrity, Availability, and Confidentiality in the wireless network. This paper mainly instigates with all the network security issues and classify various encryption technologies, tools, and keys used in the network for ensuring Confidentiality and Integrity over the network.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121882041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Self-Driving Car Implementation using Computer Vision for Detection and Navigation 使用计算机视觉进行检测和导航的自动驾驶汽车实现
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065627
Bhaskar Barua, Clarence Gomes, Shubham Baghe, Jignesh Sisodia
{"title":"A Self-Driving Car Implementation using Computer Vision for Detection and Navigation","authors":"Bhaskar Barua, Clarence Gomes, Shubham Baghe, Jignesh Sisodia","doi":"10.1109/ICCS45141.2019.9065627","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065627","url":null,"abstract":"In recent years, lidar has been used as primary sensors for self-driving cars, however, due to their high expense, it becomes infeasible for mass production. Hence, we present the working of a self-driving car prototype that relies upon a cheaper alternative, viz. cameras. The primary objective of our prototype is to navigate safely, quickly, efficiently and comfortably through our virtual environment using computer vision. We have performed detection of lanes, traffic cars, obstacles, signals, etc. and have used the concept of stereo vision for depth calculation. Trajectory planning and steering control have also been implemented. Experimental results show that camera-based self-driving cars are viable and thus our paper can provide a foundation for all future real-world implementations.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
ICCS 2019 Author Index ICCS 2019作者索引
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/iccs45141.2019.9065392
{"title":"ICCS 2019 Author Index","authors":"","doi":"10.1109/iccs45141.2019.9065392","DOIUrl":"https://doi.org/10.1109/iccs45141.2019.9065392","url":null,"abstract":"","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124759377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted product Taxonomy for Mobile-Commerce site in Recommendation of Product based on Heuristic Approach 基于启发式方法的移动电子商务网站加权产品分类推荐
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065437
Shanti Verma, Kalyani Patel
{"title":"Weighted product Taxonomy for Mobile-Commerce site in Recommendation of Product based on Heuristic Approach","authors":"Shanti Verma, Kalyani Patel","doi":"10.1109/ICCS45141.2019.9065437","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065437","url":null,"abstract":"As we know number of smart phone users grows rapidly and Indian government survey said that there are 10+ billion smart phone users by 2020. We know that in metro cities people does not have time to purchase products of their daily needs. For this reason Online shopping using mobile phone is now in trend and survey also says that number of online shopping users grows exponentially. There are various types of factor plays important role in recommendation of product to customer. Product taxonomy, Customer behavioral and navigational factor are among them which are analyzed in this paper. Importance of weighted product taxonomy in fast recommendation of product is highlighted in this paper by authors. Authors proposed a greedy heuristic algorithm to search product in weighted product taxonomy. To proof the efficiency of proposed algorithm they use one tail independent sample‘t’ test with 5% level of significance and found that results are significant.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of Phishing Techniques Based on Machine Learning 基于机器学习的网络钓鱼技术评价
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065639
Merlin. V. Kunju, Esther Dainel, Heron Celestie Anthony, Sonali Bhelwa
{"title":"Evaluation of Phishing Techniques Based on Machine Learning","authors":"Merlin. V. Kunju, Esther Dainel, Heron Celestie Anthony, Sonali Bhelwa","doi":"10.1109/ICCS45141.2019.9065639","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065639","url":null,"abstract":"Phishing sites is the major problems for online security challenges because of large number of online transactions is done every day. The objective of the paper is to do survey about the phishing: A social attack and its detection and to make aware of the users who doesn’t know about this major attack as many of them are still falling in the trap. Most of the users are unaware about this problem; they unknowingly fill many forms that belong to phishing website which are hidden. This leads to the leaking of sensitive information of the victim. This study also gives brief knowledge about several machine learning techniques such as kNN Algorithm, Naïve Bayes, Decision Tree, Support Vector Machines, Neural Network and Random Forest algorithm for predicting phishing sites.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123231736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Novel 4-level Converter for Switched Reluctance Motor Drive in Plug-In HEVs 插电式混合动力汽车开关磁阻电机驱动的新型四电平变换器
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065527
Vaibhav S. Guntuk, Umesh V. Bakle, Vishal S. Lahare, Akash R. Bochare, Mohan P. Thakre
{"title":"A Novel 4-level Converter for Switched Reluctance Motor Drive in Plug-In HEVs","authors":"Vaibhav S. Guntuk, Umesh V. Bakle, Vishal S. Lahare, Akash R. Bochare, Mohan P. Thakre","doi":"10.1109/ICCS45141.2019.9065527","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065527","url":null,"abstract":"Switched Reluctance Motor (SRM) due to its advanced application, it is the best suited candidate for the propulsion system of the electric vehicles and hybrid vehicles. It can be used in any severe operating condition, is compact in design and is able to produce required torque and speed. Asymmetric bridge converter (i.e. two transistors per phase) is commonly used for SRM drives. The biggest disadvantage of using this type of converter is higher torque ripple in the motor output. In this paper, a 4-level converter is proposed for Switched Reluctance Motor in Plug-in HEV. The proposed converter (i.e. 4-level converter) has four current controlling modes that are able to produce additional 2 voltage levels. The high demagnetizing voltage developed by the converter can be used to decrease the demagnetization period which can minimize the torque ripples. The different modes of operation of the proposed 4-level converter are also described. The results of this 4 level converter are compared with commonly used 2 level converter in MatLab simulink.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126486321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Comparison on Hyper ledger Fabric and Hyper ledger Composer of Block Chain Technology 区块链技术中超级账本结构与超级账本编码器的比较
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065776
M. M S, V. Haritha, Swetha M S, Thungamani M
{"title":"Comparison on Hyper ledger Fabric and Hyper ledger Composer of Block Chain Technology","authors":"M. M S, V. Haritha, Swetha M S, Thungamani M","doi":"10.1109/ICCS45141.2019.9065776","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065776","url":null,"abstract":"The innovation that has had the best effect on our ways of life in the course of the most recent decade is Blockchain. The key feature of blockchain is the secure storage of data in encrypted block chains that have a distributed database that processes a growing list of transactions. This makes the blockchain incredibly impervious to unapproved changes to put away information. In this paper, the study to get a brief idea about the platforms of blockchain and explore what exactly is Hyperledger Fabric and also understand the steps of working with Hyperledger fabric and Hyperledger Composer. While hyperledger composer is a set of tools, APIs for modeling, building and distributing a blockchain corporate network. The Hyperledger fabric is an implementation of the blockchain framework for developing solutions with a modular architecture. The composer runs on hyperledger fabric. It is a framework to accelerate the development of applications based on Hyperledger Fabric.To create a Simple Commodity Blockchain with Hyperledger Composer.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart and Reliable Transportation System based on Message Queuing Telemetry Transport Protocol 基于消息队列遥测传输协议的智能可靠传输系统
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065789
M. Swarnamugi, Dr.Chinnaiyan R
{"title":"Smart and Reliable Transportation System based on Message Queuing Telemetry Transport Protocol","authors":"M. Swarnamugi, Dr.Chinnaiyan R","doi":"10.1109/ICCS45141.2019.9065789","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065789","url":null,"abstract":"With the advancement of IoT, the traditional transportation system be wrap up with intelligence to provide smart and quick services to user and be better informed on road safety and make safer and coordinated transportation medium. This intelligent transportation system ITS uses wired and wireless connectivity to communicate among objects connected. Whatever the application usage of ITS is, it’s development require more reliable and invulnerable communication among the objects connected and have to be free from connectivity problems like service outrages, signal loss, bandwidth issues, problems of high latency and loss of data communication. Considering all this, this paper addresses the use of MQTT, a light weight messaging protocol in the message transfer of ITS application. The effectiveness of MQTT in ITS is illustrated by discussing different use case scenarios.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121091906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
CNN based Traffic Sign Classification using Adam Optimizer 基于CNN的交通标志分类使用亚当优化器
2019 International Conference on Intelligent Computing and Control Systems (ICCS) Pub Date : 2019-05-01 DOI: 10.1109/ICCS45141.2019.9065537
S. Mehta, C. Paunwala, Bhaumik Vaidya
{"title":"CNN based Traffic Sign Classification using Adam Optimizer","authors":"S. Mehta, C. Paunwala, Bhaumik Vaidya","doi":"10.1109/ICCS45141.2019.9065537","DOIUrl":"https://doi.org/10.1109/ICCS45141.2019.9065537","url":null,"abstract":"An automatic detection and classification of traffic signs is an important task in Advanced Driver Assistance System (ADAS).Convolutional Neural Network (CNN) has surpassed the human performance and shown the great success in detection and classification of traffic signs. The paper proposes an approach based on the deep convolutional network for classifying traffic signs. The Belgium traffic sign dataset (BTSD) is used for evaluation and experiment results shows that the proposed method can achieve competitive results compared with state of the art approaches. Different activations and optimizers are used to evaluate the performance of proposed architecture and it is observed that Adam (Adaptive Moment Estimation) optimizer and softmax activation performs well.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信