2018 Second International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
Differential Analysis of Microbial Community grown with different DO levels Using R Package 利用R Package分析不同DO水平下生长的微生物群落差异
Snehal V. Bhange, S. S. Dongre, H. Tikariha, H. Purohit
{"title":"Differential Analysis of Microbial Community grown with different DO levels Using R Package","authors":"Snehal V. Bhange, S. S. Dongre, H. Tikariha, H. Purohit","doi":"10.1109/ICCMC.2018.8488014","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488014","url":null,"abstract":"The microbial communities play a salient role in natural ecosystems and have a greater impact on animal and human health. To understand this entangled system and unlock its potential benefit there is need to study these community structures and function both analytically and statistically. This article briefs about the microbial community analysis R packages which are developed in R programming language, to assist researchers for creating abundance and functional profile from raw data and performs analyses specific to their needs. The analysis of biological data and information related to microbial community are known together to be the central issues within the space. Therefore several R packages are planned to perform a collective and complete interpretation of data using R modules in this area. In this paper we tend to present a bio-informative R package which can analyze the abundance of the species and determine the one way variance which is used as fdANOVA R package. The idea provides the straightforward categorical grouping, is custom-made to check the status of evolving microbes in a community and is appropriate and reliable as well.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"52 1","pages":"1078-1080"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86686697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DETECTION OF COMPROMISED ACCOUNTS IN ONLINE SOCIAL NETWORK 在线社交网络中受损账户的检测
S. Rane, Megha Ainapurkar, Amey Wadekar
{"title":"DETECTION OF COMPROMISED ACCOUNTS IN ONLINE SOCIAL NETWORK","authors":"S. Rane, Megha Ainapurkar, Amey Wadekar","doi":"10.1109/ICCMC.2018.8487486","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487486","url":null,"abstract":"Compromised accounts are of a severe risk to the social network users. People now a days are mostly dependent on Online Social Networks. While some persistent spams feat the relationship between the users by spreading spams. Therefore time to time detection of the compromised accounts is a necessity. In this paper, we will study different social user behaviour and detect the compromised accounts and spam users. Spam behaviour in social networks has a wide range of illegal activities. Such activities need to be evaluated and effect of spam users needs to be reduced. To reduce such effects, we require proper detection strategy. We validate the effectiveness of these behaviour by collecting the clickstream data on a social network website. Social behaviour reflects the users behaviour online. While an legitimate user coordinates its social behaviour carefully, it is hard for the fake users to pretend to be affected. Different studies are performed in spam behaviour analysis and define a structure for spam account detection.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"45 1","pages":"612-614"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89509065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dual-band High-gain Metamaterial Based Resonant Cavity Antenna 双频高增益超材料谐振腔天线
Sourav Ghosh, S. Sahu
{"title":"Dual-band High-gain Metamaterial Based Resonant Cavity Antenna","authors":"Sourav Ghosh, S. Sahu","doi":"10.1109/ICCMC.2018.8487528","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487528","url":null,"abstract":"A technique is presented to design dual-band, high-gain metamaterial based resonant cavity antenna using frequency selective surface (FSS) layer. The radiating dielectric resonator (DR) is connected by a microstrip line and a rectangular slot is cut from the ground surface. Cylindrical dielectric resonator antenna (CDRA) is used as an elementary radiator. CDRA is excited by the microstrip line through the rectangular slot and it is radiating in the broadside direction at two adjacent frequency bands (S and C bands). Antenna simulation results confirmed it resonates in two adjacent bands centered at 3.9 GHz and 7.1 GHz. The gain of the DRA at these two bands are 2.43 dBi and 4.32 dBi respectively. With a single layer 5 × 5 array superstrate the gain of the proposed antenna increased by 8.02 dBi from 3.6 to 4.1 GHz frequency band and 1.05 dBi from 6.7 to 7.5 GHz frequency band. This high-gain dual-band DRA can be used for millimeter wave wireless communication, small satellite communication terminals.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"14 1","pages":"794-797"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88015896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of physical exercise intensity by using facial expression analysis 基于面部表情分析的体育锻炼强度分类
Salik Ram Khanal, J. Barroso, Jaime Sampaio, V. Filipe
{"title":"Classification of physical exercise intensity by using facial expression analysis","authors":"Salik Ram Khanal, J. Barroso, Jaime Sampaio, V. Filipe","doi":"10.1109/ICCMC.2018.8488080","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488080","url":null,"abstract":"Facial expression analysis has a wide area of applications including health, psychology, sports etc. In this study, we explored different methods of automatic classification of exercise intensities using facial image processing of a subject performing exercise on a cycloergometer during an incremental standardized protocol. The method can be implemented in real time using facial video analysis. The experiments were done with images extracted from a 12 min HD video collected in laboratorial normalized settings (TechSport from the University of Trás-os-Montes e Alto Douro) with a static camera (90° angle with face and camera). The time slot for video to extract images for a particular class of exercise intensity is correspondence to the incremental heart rate. The facial expression recognition has been performed mainly in two steps: facial landmark detection and classification using the facial landmarks. Luxand application was used to detect 70 landmarks were detect using the adaptation of code available in Luxand application and we applied machine learning classification algorithms including discriminant analysis, KNN and SVM to classify the exercise intensities from the facial images. KNN algorithms presents up to 100% accuracy in classification into 2 and 3 classes. The distances between a lowermost landmark of the faces, which is indicated in landmark number 11 in the Luxand application, and the 26 landmarks around mouth were calculated and considered as features vector to train and test the classifier. Separate experiments were done for classification into two, three, and four classes and the accuracy of each algorithm was analyzed. From the overall results, classification into two and three classes was easy and resulted in very good classification performance whereas the classification with four classes had poor classification performance in each algorithm. Preliminary results suggest that distinguishing more levels of exertion, might require additional feature variables.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"196 1","pages":"765-770"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86830179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoT Based Vigilance Robot using Gesture Control 使用手势控制的基于物联网的警戒机器人
S. Srividhya, G. D. Kumar, J. Manivannan, V. A. MOHAMED WASIF RIHFATH, K. Ragunathan
{"title":"IoT Based Vigilance Robot using Gesture Control","authors":"S. Srividhya, G. D. Kumar, J. Manivannan, V. A. MOHAMED WASIF RIHFATH, K. Ragunathan","doi":"10.1109/iccmc.2018.8488072","DOIUrl":"https://doi.org/10.1109/iccmc.2018.8488072","url":null,"abstract":"This paper described about a robot used for vigilance purpose. The robot can be controlled via wireless controls. It can be moved in all directions and gets a live stream on android platform using Raspberry Pi. The signals generated from Android app are sent to Raspberry Pi. These received signals are processed by the commands and the robot is directed with used directive. Existing system is CCTV camera which is fixed one. But robot is movable and it is very easy to cover all the directions. So the issues of existing system is solved. The video clarity is very good in the proposed system.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"12 1","pages":"1065-1072"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87405296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of Image Fusion Techniques 图像融合技术综述
Karishma C Bhataria, Bhumika Shah
{"title":"A Review of Image Fusion Techniques","authors":"Karishma C Bhataria, Bhumika Shah","doi":"10.1109/ICCMC.2018.8487686","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487686","url":null,"abstract":"The technique of blending two images or more than two images which produces outcome as the composite fused image. The obtained fused image is the upgraded version of original images because it has all the salient information. The present applications makes majority usage of this fused image to speed up their processing tasks in their respective fields. Recent real-time applications which require image fusion are remote sensing applications, medical applications, surveillance application, photography applications etc. The broad categorization of image fusion techniques are Non-transform domain or spatial domain and Transform domain or frequency domain. This paper initiates with the introduction of image fusion. In the second section it explains the levels of fusion. The third section explains generic image fusion strategy. Further sections elaborates the taxonomy of image fusion techniques and their comparative tables lists all the merits and demerits of the same.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"44 1","pages":"114-123"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80090575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
IoT Based Distributed Control System Using CAN 基于物联网的CAN分布式控制系统
A. Niveditha, M. Nivetha, K. Priyadharshini, K. Punithavathy
{"title":"IoT Based Distributed Control System Using CAN","authors":"A. Niveditha, M. Nivetha, K. Priyadharshini, K. Punithavathy","doi":"10.1109/ICCMC.2018.8488003","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488003","url":null,"abstract":"Industrial automation systems play a crucial role in controlling several process- related operations. Due to the implementation of a wide variety of industrial networks with their geographical distribution over industry, the floor data transferring and controlling capability has become more sophisticated and the need for a reliable, fast, high level communication network arises which can be satisfied by Controller Area Network. Our proposed system implements the CAN protocol in Industrial Automation. In this system, a single node consists of various sensors which monitors and provides process variables to ATmega328 Microcontroller. This is then connected to a CAN controller which exchanges data with ATmega328 Microcontrollers using serial peripheral interface. CAN controller does the process of control, error management and bit stream conversion. This serial data is connected to the CAN transceiver for the CAN bus establishment. Many such nodes are connected to the CAN bus. On the other end of the bus, the master NXPlpc1768 which has inbuilt CAN ports receive and control the datas and process variables from the nodes by using CAN protocol. This master NXPlpc1768 is improvised with the inclusion of IoT which uses internet connectivity by using ethernet shield that sends datas and process variables from the remote location of the industry to the user at any geographical area.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"967-971"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76401756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Hybrid Computing Model for Intelligent Transportation System (ITS) 面向智能交通系统的物联网混合计算模型
M. Swarnamugi, Dr.Chinnaiyan R
{"title":"IoT Hybrid Computing Model for Intelligent Transportation System (ITS)","authors":"M. Swarnamugi, Dr.Chinnaiyan R","doi":"10.1109/ICCMC.2018.8487843","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487843","url":null,"abstract":"IoT – a new proliferation in the technological advancement, changed the way object is perceived and used. It enables connecting smart objects to the internet and aims to develop new promising future to Intelligent Transportation System (ITS). ITS uses techniques such as wireless communication, computational technologies, GPS, and sensor technologies to provide smart and quick services to users and to be better informed and make safer, more coordinated, and 'smarter' use of transportation medium. As number of objects connected to ITS application increases, the amount of data generated also increases and they are send to cloud for data analysis and knowledge discovery. However, sending and retrieving of data across cloud is less useful due to delay latency and others. An alternative to cloud is fog (edge) model that overcomes the weakness of cloud by analyzing and discovering knowledge at the edge. However, the fog computing model has limited computational capability. For an IoT enabled Intelligent Transportation System with enormous number of objects connected, neither cloud nor fog computing model addresses the issues alone. This paper focuses on presenting an IoT hybrid model for Intelligent Transportation System (ITS). We also address the effectiveness of the model by discussing use case scenarios.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"550 1","pages":"802-806"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77445663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Analysis of Multicarrier Switching Techniques for Nine Level Inverter 九电平逆变器多载波开关技术分析
Kamlesh D. Wanjari, P. Salodkar, M. Waghmare
{"title":"Analysis of Multicarrier Switching Techniques for Nine Level Inverter","authors":"Kamlesh D. Wanjari, P. Salodkar, M. Waghmare","doi":"10.1109/ICCMC.2018.8487776","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487776","url":null,"abstract":"The demand for multilevel inverter have increased over time due to the high total harmonic distortion and unsatisfactory operation of conventional inverter. Cascaded H-bridge (CHB) multilevel inverter is simple, requiring fewer power components and more reliable than other types of topology so it is more preferable. But to increase the level of inverter output more number of components are required which makes more switching losses. So we are going toward asymmetrical topology which helps to get more number of levels with less number of power components. In this paper nine-level asymmetric CHB inverter is presented with eight power switches and two dc voltage sources of 1:3 proportion. The analysis is done for carrier scheme, amplitude index, and modulation index. Results are obtained with MATLAB Simulink software.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"59 1","pages":"577-581"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87646970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
APRIGUARD: The Automatic and Eficient Method for Privacy Violations Detection in OSNs (Online Social Networks aprigard:在线社交网络中隐私侵犯的自动高效检测方法
Karuna Sonone, V. Barkade
{"title":"APRIGUARD: The Automatic and Eficient Method for Privacy Violations Detection in OSNs (Online Social Networks","authors":"Karuna Sonone, V. Barkade","doi":"10.1109/ICCMC.2018.8487824","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487824","url":null,"abstract":"The users from the social networks like Facebook, Twitter etc. expecting that social networks can able to preserve their privacy. To address this, recently PRIGUARD framework introduced in which meta model and description logic used for describing the social network commitments and domain in order to specify the privacy needs of end users. This approach is able to detect the violations of privacy in both sound and complete. However the still there is scope of improvement in PRIGUARD method and limitations. One such limitation of PRIGUARD does not supporting the proactive violations of its commitments whenever its required to pro-vide the context dependent privacy management. In this paper we are presenting the Automated PRIGUARD (APRI-GUARD) which is based on existing PRIGUARD method. APRIGUARD method not only supports the functionality of existing PRIGUARD but also enabling the approach of proactively violates its commitments. This achieves more efficiency and security to end users privacy. The proposed approach will be used before taking a particular action for checking whether it will lead violation and hence it will results in its prevention before it happens. Antithesis, it will be utilized to do sporadic checks on the system to see if any violations have occurred.)","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"82 1","pages":"945-949"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87046865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信