2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)最新文献

筛选
英文 中文
Internet of Vehicle: Effects of Target Tracking Cluster Routing in Vehicle Network 车联网:车辆网络中目标跟踪簇路由的影响
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074454
Sivakumar Kulanthaiyappan, Sivabalan Settu, Chandrasekar Chellaih
{"title":"Internet of Vehicle: Effects of Target Tracking Cluster Routing in Vehicle Network","authors":"Sivakumar Kulanthaiyappan, Sivabalan Settu, Chandrasekar Chellaih","doi":"10.1109/ICACCS48705.2020.9074454","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074454","url":null,"abstract":"Nowadays, the Internet of Vehicle around the road among the smart city's development. This platform relayed on the Internet of Things. The vehicle has a relationship to the primaries (Vehicle, RSU, Backhaul, and Cell tower), cloud, architecture, protocol, and macro connections. The proposed paper is VANET based target tracking clustering for significant topology changes in vehicle and vehicle affinities establishments. Numerous cluster lead can use to establish and maintains inter, intra-cluster connection for either local or global and both. Especially cluster gateways, heads, members can propagate data among themselves and maintains the affinity between the clusters.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improvement in Performance of OFC & Fusion Splice Loss OFC性能的改进与熔接损耗
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074239
Saurabh Soni, Shubham M. Nagpure, Arshiyan Shaikh, Dr. Jayant Nandwalkar, D. J. Pete
{"title":"Improvement in Performance of OFC & Fusion Splice Loss","authors":"Saurabh Soni, Shubham M. Nagpure, Arshiyan Shaikh, Dr. Jayant Nandwalkar, D. J. Pete","doi":"10.1109/ICACCS48705.2020.9074239","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074239","url":null,"abstract":"The improvement in optical technology over long distance communication has been regulated over past few decades, and it took drastic enhancement in one the major parameter for joining two OFC cable (fusion splicing) and use of new variant of optical fibers. The different experiments performed in order to bring about the result that use of different optical cables and splicing technique can give approximately 0dB splice loss and fast communication speed at lower cost. The objective of this paper is to determine how low splice loss can be obtain in joining two single mode or multimode optical fiber, such that long distance communication that required multiple infrastructure assembly for its operational unit can be made re-locatable as there is large investment and material and electronic circuitry is associated to it, therefore to reduce that cost we have sets of analysis that splicing loss can be reduced to 0dB for SMF-SMF end face connection, as the result of the tested experiment.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and analysis of kidney artifacts using ultrasound imaging 肾脏伪影的超声成像检测与分析
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074438
Kajal Rana, Anju Gupta, Anil Khatak
{"title":"Detection and analysis of kidney artifacts using ultrasound imaging","authors":"Kajal Rana, Anju Gupta, Anil Khatak","doi":"10.1109/ICACCS48705.2020.9074438","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074438","url":null,"abstract":"The ultrasound imaging is a non-invasive methodological technique which is frequently employed for diagnosing purpose in the medical domain. Study and analysing of an evolving foetus, heart, blood vessels, muscles, tendons, abdominal and pelvic organs done by employing ultrasound imaging. This paper provides an understanding of automation which could be embedded with the ultrasound system resulting in identifying artefacts during ultrasound imaging itself. The correct conclusion regarding the various artefacts & disorders present in the ultrasound image of the respective body region can be diagnosed easily & effectively by utilizing this algorithm. An accurate course of treatment for the removal of artefacts, disorders etc. can be recommended to the affected person after utilizing this algorithm. The algorithm is designed by employing the MATLAB image processing tool. Ultrasound images are then analysed through this algorithm which accurately detects the artefacts present in images. The percentage accuracy of the proposed algorithm is 83.33 per cent. The presence of multi artefacts in tiny regions makes the algorithm based detection vulnerable. The accuracy of artefacts detection and less complex procedure of operation makes this algorithm a prominent contender for various health applications related to ultrasound imaging.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116615173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economic Optimization of Shell and Tube Heat Exchanger using Adaptive Mutation Strategy Jaya Algorithm 基于自适应突变策略Jaya算法的管壳式换热器经济优化
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074270
Vinod R dept.of
{"title":"Economic Optimization of Shell and Tube Heat Exchanger using Adaptive Mutation Strategy Jaya Algorithm","authors":"Vinod R dept.of","doi":"10.1109/ICACCS48705.2020.9074270","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074270","url":null,"abstract":"Shell and Tube Heat Exchanger (STHE) is the important device in the many industries like power plant. The cost of the STHE is more and this in-turn requires economic optimization of the STHE design. This research aims to provide the economic optimization of the STHE with Adaptive Mutation Strategy (AMS) with Jaya algorithm. The Jaya algorithm has the considerable performance in the STHE design optimization. The AMS technique is applied in the Jaya algorithm to escape from the local optimum based on the operator. The proposed AMS-Jaya algorithm in design optimization is compared with other existing methods to investigate the performance. The capital cost of the design provided by the AMS-Jaya algorithm is $ 3891.02 and the capital cost of the Jaya algorithm design is $ 3986.92. The numerical analysis shows that the developed AMS-Jaya algorithm has more performance in economic optimization than existing methods.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131221990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Website Detection Based on Machine Learning: A Survey 基于机器学习的网络钓鱼网站检测研究
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074400
Charu Singh, Meenu
{"title":"Phishing Website Detection Based on Machine Learning: A Survey","authors":"Charu Singh, Meenu","doi":"10.1109/ICACCS48705.2020.9074400","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074400","url":null,"abstract":"Phishing attacks are cybercrime in today's world which are done by social engineering and malware based. It is one of the most dangerous threats that every individuals and organization faced. URLs are known as web links are by which users locate information on the internet. The review creates awareness of phishing attacks, detection of phishing attacks and encourages the practice of phishing prevention among the readers. In phishing, phishers use email or message, as a weapon to target individual or organization by send URL link to target people and to deceive them. With the huge number of phishing emails or messages received every day, companies or individuals are not able to detect all of them. Here, different reviews give for detection of phishing attack, by using machine learning. Here it is used for detecting the web links, i.e., either phishing or legitimate.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"27 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132334480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Secured Biometric Voting System Using RFID Linked with the Aadhar Database 使用RFID与Aadhar数据库连接的安全生物识别投票系统
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074281
P. Mansingh, T. Titus, V. Devi
{"title":"A Secured Biometric Voting System Using RFID Linked with the Aadhar Database","authors":"P. Mansingh, T. Titus, V. Devi","doi":"10.1109/ICACCS48705.2020.9074281","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074281","url":null,"abstract":"The Internet of Things (IoT) is a recent technology where electronic devices, software, sensors, vehicles, home appliances are interconnected with networks to transfer data without human or computer interaction. The problem in the existing system is, the electronic voting machines do not have any recent security measures by which the voter can verify their identity before casting the vote due to false voters can cast numerous duplicate or fake votes. So, the proposed system is Implemented using RFID and IoT (Internet of Things) to improvise the security mechanisms. Here, an active RFID tag is used in place of voter id where the system can scan the tag and matches with the fingerprints collected in the Aadhar database. The voter has to scan the RFID tag for the identification and further the voter has to confirm the identity with the fingerprints. It includes active reading equipment (reader) for reading data in RFID tag and finger print scanner is used in this voting machine for scanning finger prints. If the prints matched against the database gathered, the individuals can effectively cast their votes, if that's not the case, the buzzer will be alarmed to avoid casting of fake voters. A LCD is applicable in the process of displaying the corresponding information of the voter from the database, thus illegal voting or impersonating can be avoided since the finger prints is not the same for every individual. Due to the fact that the process of voting is connected with the Aadhar database, the system offers maximum security and efficiency. The system also transfers the configured data to the registered phone numbers from the voters' database.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132139654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Implementing Clustering Methodology by Obtaining Centroids of Sensor Nodes for Human Brain Functionality 获取人脑功能传感器节点质心的聚类方法
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074245
Syed Jamalullah.R, L. Gladence
{"title":"Implementing Clustering Methodology by Obtaining Centroids of Sensor Nodes for Human Brain Functionality","authors":"Syed Jamalullah.R, L. Gladence","doi":"10.1109/ICACCS48705.2020.9074245","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074245","url":null,"abstract":"The BCIs are normally designed at the assisting, restoring and expanding human sensor-vehicles and the cognitive elements through the availability of more direct information transfer routs. This form of communication is done between the human brain and the exterior devices. In the invasive BCI, sensors are incorporate in the brain, which is situated on the cerebrum surface. At this juncture, the invasive BCI that utilizes the wireless sensors have not been attained. The vital purpose of the sensor nodes is gathering the information from the various domains before processing them to the BS. In the BS, the applications are found. Nonetheless, by assuring a more direct form of information transfer, the pathways between the sensor and sinks are capable of draining the energy in the nodes. This is due to the high requirement of power in the transferring messages. In that case, it is necessary that the nodes collaborate with each other to make sure that information transfer is possible within the nodes comprising of the sinks. This research proposes WSN based brain functionality sensing. For the acquired EEG data, k means clustering is applied to form the group of sensor nodes with cluster head. Then the krill herd algorithm is applied to optimize the cluster heads. The krill herd algorithm technique is used to select the optimized cluster heads. Then based on the sensor nodes and cluster heads, the brain functionality is identified. After that, the data is transmitted to the base station.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132319186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mechanical Properties and Bond Strength of Concreteat High Temperature under Steady-state Conditions 稳态条件下高温混凝土的力学性能和粘结强度
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074254
N. Parthasarathi, K. Satyanarayanan
{"title":"Mechanical Properties and Bond Strength of Concreteat High Temperature under Steady-state Conditions","authors":"N. Parthasarathi, K. Satyanarayanan","doi":"10.1109/ICACCS48705.2020.9074254","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074254","url":null,"abstract":"High temperature causes serious damage to reinforced concrete structures on both nano scales and mesoscales. This damage shows a generalized mechanical property of concrete due to a sudden temperature of the structural effect due to the spalling of concrete, and the reinforcement bar tends toelongateinsuchhigh-temperaturecases. Duetothepertinenceofconcretematerialathightemperatureandinfl ame, numerousexaminations have been performed. Recently, there search was performed on cementitious materials at the level of heat by changing the pertinent measures. Inside this area, this research studies the effect of temperature on compressive strength, the stress-strain relationship for applying a load at a temperature in a steady-state condition in the oven and compares the results with the specimen at an elevated temperature of concrete. In addition, the bond slip of steel in concrete is also investigated. Among the goals of the paper, the methodology in this research enhances the concrete mechanical properties in the steady state at a high temperature. Also, the impact of the test modalities on the mechanical properties of concrete at high temperature is a lsodiscussed in the paper.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127698113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Progressive Collapse Behavior Of 2d Reinforced Concrete frame under Intermediate Floor 中间楼盖下二维钢筋混凝土框架的连续倒塌行为
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074462
M. Prakash, K. Satyanarayanan, V. Thamilarasu
{"title":"Progressive Collapse Behavior Of 2d Reinforced Concrete frame under Intermediate Floor","authors":"M. Prakash, K. Satyanarayanan, V. Thamilarasu","doi":"10.1109/ICACCS48705.2020.9074462","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074462","url":null,"abstract":"The current examination investigates a 2-D, two-inlet - five-storey fortified cement uncovered structure in use. Direct static is done and two-section evacuation situations in the particular corner and center segment expulsion situations on the third floor (Intermediate Floor) are considered. Right now, three Configurations (CF-I, CF-II, and CF-III) are concentrated with a differing range length of 3m, 2m, and 1.5m. Right now three cases bare edge without divider load, Bare edge with divider burden and Infilled Frame, Linear Static Analysis is done and Demand Capacity Ratio (DCR) was found. Setup - I show more DCR Value and it shows inclined to progressive collapse.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128660881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Integration in ETL Using TALEND 使用TALEND的ETL数据集成
2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS) Pub Date : 2020-03-01 DOI: 10.1109/ICACCS48705.2020.9074186
Sreemathy J, Infant Joseph V, N. S, C. I, Gokula Rm
{"title":"Data Integration in ETL Using TALEND","authors":"Sreemathy J, Infant Joseph V, N. S, C. I, Gokula Rm","doi":"10.1109/ICACCS48705.2020.9074186","DOIUrl":"https://doi.org/10.1109/ICACCS48705.2020.9074186","url":null,"abstract":"Data Integration is the process of combining data from different sources to support Data Analytics in organizations. The best definition of data integration is given by IBM, stating “Data Integration is the combination of technical processes and business processes used to combine data from disparate sources into valuable and meaningful information.” The important terms here are “combine data… into valuable and meaningful data” where it's about making the data more organized and useful. There are various methods of combining data into an integrated view. This paper describes the various steps involved in integrating data from various sources using the ETL process - The Extract, Transform and Load process, how the Talend Open Studio acting as a Data Integration and ETL tool helps in transforming heterogeneous data into homogeneous data for easy analysis and how all the integrated data is stored in a Data Warehouse to provide Business Intelligence users with suitable data for easy analysis.","PeriodicalId":439003,"journal":{"name":"2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128408576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信