Internet of Things (IoT) networks (IoT) are computer networks which have an acute IT protection problem and in particular a computer attack detection problem. In order to solve this issue, the paper recommends the com...
Internet of Things (IoT) networks (IoT) are computer networks which have an acute IT protection problem and in particular a computer attack detection problem. In order to solve this issue, the paper recommends the combination of machine learning approaches and concurrent data processing. The framework is developed and a new approach to the combination of the main classifiers intended for attacks on IoT networks. In which the accuracy ratio to the training time is the integral measure of efficacy, the problem classification statement is developed. We recommend the use of the data processing and multithreaded mode provided by Spark to accelerate the speed of training and testing. In addition, a technique is suggested for preprocessing data set, which results in a large reduction in the sample length. An experimental examination of the proposed approach reveals that the precision of IoT networks' attack detection is 100 percent and the processing speed of data sets increases proportionally to the number of parallel threads.
Wireless Sensor Network (WSN) is a fast evolving current technology which is being employed in various applications. Despite its wide usage, WSNs have a few challenges to overcome to be called as an ideal technology. ...
Wireless Sensor Network (WSN) is a fast evolving current technology which is being employed in various applications. Despite its wide usage, WSNs have a few challenges to overcome to be called as an ideal technology. Some of the challenges are battery life time, memory storage and deployment issues. Batteries are the primary source of power supply to WSN and one of the major challenges is the energy constraint. This paper aims to propose a few techniques to better the energy efficiency of the sensor networks by saving sensor energy using data compression methodology. In this paper, a modified chorological coded data compression methodology is proposed (MCDC). This algorithm deals with assigning the sequence value to the given input information. If the assigned sequence value is a double digit number, it is converted in to single digit number. Double digit numbers and single digit numbers are combined. Separate location tables are generated for all double digit and single digit numbers. This procedure continues until all the sequence values are changed in to single digit number. Then the final single digit is assign with an equivalent Sequence Code (SC). MCDC algorithm is compared with DELTA compression and RUNLENGTH compression and a better compression ratio was achieved when compared with DELTA compression and RUNLENGTH compression algorithms.
作者:
P SridharR R SathiyaAssistant Professor
Ece Sri Ramakrishna Engineering College Coimbatore Assistant Professor
Department of Computer Science and Engineering Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India
This work presents autonomous electrical fire-detection and localization using computer vision based techniques. The proposed work uses YOLO v2 to extract the electrical fire features more effectively than other conve...
This work presents autonomous electrical fire-detection and localization using computer vision based techniques. The proposed work uses YOLO v2 to extract the electrical fire features more effectively than other conventional and machine learning approaches. This working model is tested on commercial and residential building as well as indoor and outdoor environments. This framework has achieved high detection accuracy and low false alarm rate. Besides, the proposed frame work can be used for early real-time electrical fire detection in surveillance videos and we present experimental results for electrical fire localization in CCTV footage using the deep learning architecture proposed in this work.
作者:
P SridharR R SathiyaAssistant Professor
ECE Sri Ramakrishna Engineering College Coimbatore Assistant Professor
Department of Computer Science and Engineering Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India
This work presents autonomous electrical fire-detection and localization using computer vision based techniques. The proposed work uses YOLO v2 to extract the electrical fire features more effectively than other conve...
This work presents autonomous electrical fire-detection and localization using computer vision based techniques. The proposed work uses YOLO v2 to extract the electrical fire features more effectively than other conventional and machine learning approaches. This working model is tested on commercial and residential building as well as indoor and outdoor environments. This framework has achieved high detection accuracy and low false alarm rate. Besides, the proposed frame work can be used for early real-time electrical fire detection in surveillance videos and we present experimental results for electrical fire localization in CCTV footage using the deep learning architecture proposed in this work.
Retaining walls are used with tying with more than one wall at perpendicular joints to retain liquids, water storage and materials storages such as dyke walls and tanks. Retaining walls excessively used in culverts an...
Retaining walls are used with tying with more than one wall at perpendicular joints to retain liquids, water storage and materials storages such as dyke walls and tanks. Retaining walls excessively used in culverts and as well as in the bridges i.e., construction of abutments, wing walls supposed to resist soil pressures, applied perpendicular to the axis of the walls. Due to in-sufficient land and based on the present construction scenario followed in the construction of retaining structures, the wall height is often increased, thereby increasing the cost of construction of sub structure. The values of the bending moment at the base increases due to the increase in the height of the wall resulting in higher sections which is uneconomical. The need of having safe and economical section shall be achieved by transforming the structural system of retaining wall i.e., by introducing supports to the vertical wall thus decreasing the thickness of stem. The design of rigid retaining wall either Cantilever or Counterfort or Buttress retaining wall is based on pressure exerted by the retaining material, wall slope, height, ease of construction and stability. When the retaining wall height is more than 8 m, the selection of extra supports i.e., either counterforts or buttresses is based upon the designer's experience. By conducting comparative study on resisting forces for varying heights, the behaviour of these supports on retaining wall can be depicted. The depiction of forces can be achieved by running an analysis in *** with preliminary dimensions and soil parameters respectively. Resisting forces from counterfort and buttress supports on retaining wall are equal when the height is in between 9 m to 24 m but buttress support has shown less resisting forces when the height is less than 9 m.
Disposal of Plastic waste was turning to be a serious problem for Environment as well as human life. A new generation material can be produced by recycling this waste plastic called as Virgin Plastic. This can be effe...
Disposal of Plastic waste was turning to be a serious problem for Environment as well as human life. A new generation material can be produced by recycling this waste plastic called as Virgin Plastic. This can be effectively used in the production of Building materials such as Bricks etc., Bottom Ash is another material which comes from the coal burning power plants as a by-product. In this Experimental Investigation both Virgin Plastic and Bottom ash are used in the production of Bricks in the proportion of 1:6. Here in Place of Fine Aggregate, Manufactured Sand (Crusher Sand) was used and it is replaced with Bottom Ash at 5%, 10%, 15% and 20%. Along with bottom ash Virgin plastic has been used at a percentage of 2%, 4%, 6% and 8%. For Economy point of view and to reduce cement usage, GGBS and Gypsum are used in place of cement at 50% and 5%. Different trial mixes are prepared by varying both Virgin plastic and bottom ash. Properties like Water Absorption and Compressive strength are investigated. Based on test results, water absorption is in decreasing manner while Percentage of Plastic is increasing. In compressive strength the trials with 5% Bottom Ash i.e., Trial 1 and with 5% BA, 2% Virgin plastic i.e., Trial 5 have shown better results.
作者:
Ashritha R MurthyK M Anil KumarAssistant Professor
Department of Computer Science and Engineering Sri Jayachamarajendra College of Engineering JSS Science and Technology University Associate Professor
Department of Computer Science and Engineering Sri Jayachamarajendra College of Engineering JSS Science and Technology University
Emotion detection and analysis is one of the challenging and emerging issues in the field of natural language processing (NLP). Detecting an individual's emotional state from textual data is an active area of stud...
Emotion detection and analysis is one of the challenging and emerging issues in the field of natural language processing (NLP). Detecting an individual's emotional state from textual data is an active area of study, along with identifying emotions from facial and audio records. The study of emotions can benefit from many applications in various fields, including neuroscience, data mining, psychology, human-computer interaction, e-learning, information filtering systems and cognitive science. The rich source of text available in the Social media, blogs, customer review, news articles can be a useful resource to explore various insights in text mining, including emotions. The purpose of this study is to provide a survey of existing approaches, models, datasets, lexicons, metrics and their limitations in the detection of emotions from the text useful for researchers in carrying out emotion detection activities.
作者:
S. Mahaboob BashaA. ArunT. D. SubhaV. BhuvaneswariD. KalaiSelviJ. Navin Sankar1Assistant Professor
Department of Electronics and Communication Engineering R.M.K. Engineering College R.S.M Nagar Kavaraipettai Tamil Nadu India 2Assistant Professor
Department of Computer Science and Engineering SRM Institute of Science and Technology SRM Nagar Kattankulathur Kanchipuram Chennai Tamil Nadu India 3Assistant Professor
Department of Electronics and Communication Engineering R.M.K. Engineering College R.S.M Nagar Kavaraipettai Tamil Nadu India 4Assistant Professor
Department of Electronics and Communication Engineering SRM Institute of Science and Technology City Campus Vadapalani Chennai Tamil Nadu India 5AP
Department of Electronics and Instrumentation Engineering R.M.D. Engineering College R.S.M Nagar Kavaraipettai Tamil Nadu India 6Application Engineer
Entuple Technologies Pvt Ltd Bangalore Karnataka India
The main aim of this work is to make the passengers to reach the station in the particular time. The microcontroller is used for prediction alert purpose. Nowadays frequently, during night time people are sleeping in ...
The main aim of this work is to make the passengers to reach the station in the particular time. The microcontroller is used for prediction alert purpose. Nowadays frequently, during night time people are sleeping in trains and miss their destination station are occurred. Hence, the valuable time is absent. Therefore, using AT89C52 microcontroller, RF controller and RF receiver module the project was designed to avoid such mistakes to alert the passengers and to wake up at the correct station by getting vibration automatically. The objective of this project is to use 89C52 microcontroller to alert the passengers about the station which he/she want to reach mechanically, using RF modules. In front of, 5Km ahead of the station may have transmitter tag to transmit the zone computing by RF signals. A receiver module placed in the seat to get the zone information, by fixing a watch which is to be used to alert the passenger with small vibration to awake.
Watermarking has been used frequently to authenticate the accuracy and security of the image and video files. In the world of computer technology, several watermarking strategies have developed during the past 20 year...
Watermarking has been used frequently to authenticate the accuracy and security of the image and video files. In the world of computer technology, several watermarking strategies have developed during the past 20 years. Integrate a picture of identity that is not always concealed, such that no detail is not possible to delete. A monitoring code can also be used to deter unauthorized recording equipment. Another application is the watermark copyright control, which works at stopping the creator of the image from stealing photos unlawfully. A watermark is a promising option for the copyright transcendence of multi-media files, as embedded messages are still included. Due to the limits of fidelity, a watermark may be implemented in a small multimedia data space. There is no proof that Automated Watermarking technologies will fulfil the ultimate purpose of the cleaners of all sorts of copyright security operations to gather knowledge from the data they obtain. Relevant situations may be deemed more fairly expected with the usage of automated copyright marking technologies. A perfect device will not be able to add a digital watermark without the limit, which does not supply the whole object with details. In this work, a modern technique for watermarking includes injecting two or more messages or photographs into a single picture for protection purposes and repeating a similar procedure for N-frames for authentication in the film.
Intrusion Exposure Solutions in wireless can be categorized into Outlier Intrusion Detection and Exploitation Intrusion Detection. Outlier Intrusion Detection consider the unusual identified wireless attacks. Misuse I...
Intrusion Exposure Solutions in wireless can be categorized into Outlier Intrusion Detection and Exploitation Intrusion Detection. Outlier Intrusion Detection consider the unusual identified wireless attacks. Misuse Intrusion Detection method is the identification of the known attacks. In this proposed solution, present a half breed wireless intrusion Exposure Model. To execute the wireless intrusion Exposure Model, we planned a straightforward lightweight operator. The proposed specialist identifies the most decimating and genuine assaults; Man The Middle and Denial of Provision; with the base chosen highlight set. To assess our proposed Exposure and its operator, we gather a total informational index utilizing open source assault generator virtual products. In the proposed system features are analyzed manually; it extracts the features from the raw dataset. The proposed system utilizes the LSTM systems to deal with the successive idea of the PC organize information. We dole out an edge esteem dependent on cross-approval to order whether the approaching system information succession is irregular or not. In addition, the proposed system can chip away at both stable and adjustable length information arrangement and works productively for unexpected and capricious system assaults. We at that point additionally utilize the unaided rendition of the Long Short Term Memory and Neural Networks.
暂无评论