首页 > 最新文献

International Journal of Scientific Methods in Engineering and Management最新文献

英文 中文
A Review on low-Power VLSI CMOS and CNTFET Circuits 低功耗VLSI CMOS和CNTFET电路综述
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1205
Kiran Kumar Gopathoti, Shamili Srimani Pendyala
Nowadays, power consumption is one of the primary considerations in the design of VLSI (Very Large Scale Integration) circuits based on complementary metal oxide semiconductors (CMOS) and carbon nanotube field effect transistors (CNTFET). This is because of the present circumstance. The fundamental reason for this is that power utilisation has been raised to the status of a top priority due to the improvements in integration and scaling as well as the constant increases in operating frequency. Additional power consumption from circuits and designs makes them challenging to implement in portable devices. The quantity of power lost during operation has an immediate effect on the cost of packaging the IC and systems. A variety of power dissipation sources and low power VLSI design strategies for CMOS and CNTFET-based circuits are discussed in this article.
目前,功耗是基于互补金属氧化物半导体(CMOS)和碳纳米管场效应晶体管(CNTFET)的VLSI (Very Large Scale Integration)电路设计的主要考虑因素之一。这是因为目前的情况。其根本原因是,由于集成和缩放的改进以及工作频率的不断增加,功率利用率已提高到首要任务的地位。电路和设计的额外功耗使它们难以在便携式设备中实现。运行过程中功率损失的数量对集成电路和系统的封装成本有直接影响。本文讨论了CMOS和cntfet电路的各种功耗源和低功耗VLSI设计策略。
{"title":"A Review on low-Power VLSI CMOS and CNTFET Circuits","authors":"Kiran Kumar Gopathoti, Shamili Srimani Pendyala","doi":"10.58599/ijsmem.2023.1205","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1205","url":null,"abstract":"Nowadays, power consumption is one of the primary considerations in the design of VLSI (Very Large Scale Integration) circuits based on complementary metal oxide semiconductors (CMOS) and carbon nanotube field effect transistors (CNTFET). This is because of the present circumstance. The fundamental reason for this is that power utilisation has been raised to the status of a top priority due to the improvements in integration and scaling as well as the constant increases in operating frequency. Additional power consumption from circuits and designs makes them challenging to implement in portable devices. The quantity of power lost during operation has an immediate effect on the cost of packaging the IC and systems. A variety of power dissipation sources and low power VLSI design strategies for CMOS and CNTFET-based circuits are discussed in this article.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation of Heterogeneous Embedded CPU and GPU Architectures 异构嵌入式CPU和GPU架构的研究
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1303
G.Sunil Kumar, J. Kamal Vijetha, K. G. S. Venkatesan
Edge detection using the Canny method is popular. The Canny method’s calculation is too complex for traditional embedded systems, preventing real-time edge recognition. High-end embedded CPUs with GPGPUs can process more data (General Purpose Graphics Processing Units). This research proposes a distributed computing-friendly parallel canny technique.
使用Canny方法进行边缘检测是很受欢迎的。Canny方法的计算对于传统的嵌入式系统来说过于复杂,不利于实时的边缘识别。高端嵌入式cpu配备gpgpu,可以处理更多的数据(通用图形处理单元)。本研究提出了一种分布式计算友好的并行计算技术。
{"title":"An Investigation of Heterogeneous Embedded CPU and GPU Architectures","authors":"G.Sunil Kumar, J. Kamal Vijetha, K. G. S. Venkatesan","doi":"10.58599/ijsmem.2023.1303","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1303","url":null,"abstract":"Edge detection using the Canny method is popular. The Canny method’s calculation is too complex for traditional embedded systems, preventing real-time edge recognition. High-end embedded CPUs with GPGPUs can process more data (General Purpose Graphics Processing Units). This research proposes a distributed computing-friendly parallel canny technique.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Optimal Regions for a Single EEG Channel Biometric System 单脑通道生物识别系统的最优区域检测
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1702
K. Venkatesan, Kishore Kumar Mamidala, Swaroopa Rani B
Innovative security systems are increasingly making use of biometric modalities as an authentication method. However, the biometric technology that is presently available on the market provides solutions to a significant number of these difficulties. The widespread use of bogus biometrics in today’s society is one of the most significant reasons for concern. The results of an electroencephalogram (EEG) can provide some interesting information on the matter. This is a highly challenging endeavour since reproduction calls for careful preparation on your part. Several different investigations have shown that the procedure may be trusted to provide accurate results. Nonetheless, the collecting of data necessitates a large expenditure of time in addition to the sensors. In this study, we provide a biometric technique that takes use of EO resting-state EEG recordings that were taken from a single-channel electrode placement on the scalp. These recordings were generated in order to determine the precision of the method. The electroencephalograms (EEGs) of all nine persons who were examined yielded a total of 45 different signals. The interval of time that passed between each EEG wave segment was under five seconds. This specific piece of study focused its attention on the
创新的安全系统越来越多地使用生物识别模式作为认证方法。然而,目前市场上可用的生物识别技术为这些困难中的许多问题提供了解决方案。在当今社会,伪造生物识别技术的广泛使用是令人担忧的最重要原因之一。脑电图(EEG)的结果可以提供有关该问题的一些有趣的信息。这是一项极具挑战性的工作,因为繁殖需要你的精心准备。几项不同的调查表明,该程序可以提供准确的结果。然而,除了传感器之外,数据的收集还需要花费大量的时间。在这项研究中,我们提供了一种生物识别技术,该技术利用了从放置在头皮上的单通道电极上获取的EO静息状态EEG记录。生成这些记录是为了确定该方法的精度。接受检查的9个人的脑电图(eeg)总共产生了45种不同的信号。每个脑电信号段之间的时间间隔小于5秒。这项研究的重点是
{"title":"Detecting Optimal Regions for a Single EEG Channel Biometric System","authors":"K. Venkatesan, Kishore Kumar Mamidala, Swaroopa Rani B","doi":"10.58599/ijsmem.2023.1702","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1702","url":null,"abstract":"Innovative security systems are increasingly making use of biometric modalities as an authentication method. However, the biometric technology that is presently available on the market provides solutions to a significant number of these difficulties. The widespread use of bogus biometrics in today’s society is one of the most significant reasons for concern. The results of an electroencephalogram (EEG) can provide some interesting information on the matter. This is a highly challenging endeavour since reproduction calls for careful preparation on your part. Several different investigations have shown that the procedure may be trusted to provide accurate results. Nonetheless, the collecting of data necessitates a large expenditure of time in addition to the sensors. In this study, we provide a biometric technique that takes use of EO resting-state EEG recordings that were taken from a single-channel electrode placement on the scalp. These recordings were generated in order to determine the precision of the method. The electroencephalograms (EEGs) of all nine persons who were examined yielded a total of 45 different signals. The interval of time that passed between each EEG wave segment was under five seconds. This specific piece of study focused its attention on the","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"PC-26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126678428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Transfer Learning to Convolutional Neural Network Models for Mango Leaf Disease Recognition 迁移学习在卷积神经网络模型中芒果叶片病害识别中的应用
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1505
E. Jyothi, M.Kranthi
It is vital to first determine whether or not plant illnesses are there, and then to make steps to restrict the spread of those diseases in order to maximize both the quality and quantity of the harvest. First, it is important to determine whether or not plant illnesses are present. There are a number of advantages to mechanizing plant diseases, one of which is reducing the amount of time spent manually examining crops in a big agricultural area that produces a significant amount of mango. As a result of the fact that leaves are in charge of the majority of a plant’s nutrition absorption, it is very important to diagnose leaf diseases in a timely and precise manner. In this particular research, we classified and identified the several illnesses that may be harmful to mango leaf by using CNN. We employ multiple CNN models that have been trained via transfer learning in order to increase the quality of the results obtained from the training set. These CNN models include DenseNet201, InceptionResNetV2, InceptionV3, ResNet50, ResNet152V2, and Xception. Acquiring pictures, segmenting those images, and deriving features from them are all stages that are included in the process of sickness diagnosis. The collection contains approximately a thousand photographs, all of which depict either healthy mango leaves or mango leaves affected by illness. According to the findings of our investigation into the overall performance matrices, the DenseNet201 model earned the highest level of accuracy (98.00%) compared to all of the other models.
至关重要的是,首先要确定是否存在植物疾病,然后采取措施限制这些疾病的传播,以最大限度地提高收成的质量和数量。首先,确定是否存在植物病害是很重要的。机械化处理植物病害有很多好处,其中之一是减少了在生产大量芒果的大型农业地区人工检查作物的时间。由于叶片负责植物的大部分营养吸收,因此及时准确地诊断叶片疾病是非常重要的。在这个特殊的研究中,我们使用CNN对芒果叶可能有害的几种疾病进行了分类和识别。我们使用了多个通过迁移学习训练的CNN模型,以提高从训练集获得的结果的质量。这些CNN模型包括DenseNet201、InceptionResNetV2、InceptionV3、ResNet50、ResNet152V2和Xception。获取图像,分割这些图像,并从中提取特征是疾病诊断过程中包含的所有阶段。该系列包含大约一千张照片,所有照片都描绘了健康的芒果叶或患病的芒果叶。根据我们对整体性能矩阵的调查结果,与所有其他模型相比,DenseNet201模型获得了最高水平的准确性(98.00%)。
{"title":"Application of Transfer Learning to Convolutional Neural Network Models for Mango Leaf Disease Recognition","authors":"E. Jyothi, M.Kranthi","doi":"10.58599/ijsmem.2023.1505","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1505","url":null,"abstract":"It is vital to first determine whether or not plant illnesses are there, and then to make steps to restrict the spread of those diseases in order to maximize both the quality and quantity of the harvest. First, it is important to determine whether or not plant illnesses are present. There are a number of advantages to mechanizing plant diseases, one of which is reducing the amount of time spent manually examining crops in a big agricultural area that produces a significant amount of mango. As a result of the fact that leaves are in charge of the majority of a plant’s nutrition absorption, it is very important to diagnose leaf diseases in a timely and precise manner. In this particular research, we classified and identified the several illnesses that may be harmful to mango leaf by using CNN. We employ multiple CNN models that have been trained via transfer learning in order to increase the quality of the results obtained from the training set. These CNN models include DenseNet201, InceptionResNetV2, InceptionV3, ResNet50, ResNet152V2, and Xception. Acquiring pictures, segmenting those images, and deriving features from them are all stages that are included in the process of sickness diagnosis. The collection contains approximately a thousand photographs, all of which depict either healthy mango leaves or mango leaves affected by illness. According to the findings of our investigation into the overall performance matrices, the DenseNet201 model earned the highest level of accuracy (98.00%) compared to all of the other models.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115721084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering Techniques for Person Authentication from Online Intelligence Data Inspired by Nature 基于自然的在线智能数据的身份认证聚类技术
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1404
Pankaj K. Kawadkar, B.Rebecca, Puppala Krupa Sagar
Image processing is essential for the success of image-based authentication. Included in multiple ”Multimodal image classification” subheadings. In this research, we will investigate three methods that have been shown to improve the precision of image classification. Pre-processing refers to the subsequent phase of extracting and classifying features. Gaussian filters are used for the pre-processing step, while the PSO algorithm is responsible for the feature extraction. Incorporating categorization algorithms is made possible by employing the ECNN. Finally, we evaluate our proposal by contrasting it with state-of-the-art scientific findings.
图像处理对于基于图像的身份验证的成功至关重要。包含在多个“多模态图像分类”小标题中。在本研究中,我们将研究三种已经被证明可以提高图像分类精度的方法。预处理是指提取和分类特征的后续阶段。高斯滤波用于预处理,粒子群算法用于特征提取。采用ECNN使合并分类算法成为可能。最后,我们通过对比最先进的科学发现来评估我们的建议。
{"title":"Clustering Techniques for Person Authentication from Online Intelligence Data Inspired by Nature","authors":"Pankaj K. Kawadkar, B.Rebecca, Puppala Krupa Sagar","doi":"10.58599/ijsmem.2023.1404","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1404","url":null,"abstract":"Image processing is essential for the success of image-based authentication. Included in multiple ”Multimodal image classification” subheadings. In this research, we will investigate three methods that have been shown to improve the precision of image classification. Pre-processing refers to the subsequent phase of extracting and classifying features. Gaussian filters are used for the pre-processing step, while the PSO algorithm is responsible for the feature extraction. Incorporating categorization algorithms is made possible by employing the ECNN. Finally, we evaluate our proposal by contrasting it with state-of-the-art scientific findings.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126074352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilayer Perceptron Learning for Decreasing the Resistance of Graphene Oxide Thin Films 多层感知器学习降低氧化石墨烯薄膜电阻
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1504
G. Rao, V.Dhanakodi, M.Gayathri
The capability of the classifier to differentiate between the similarities and differences in the resistance of thin films of reduced Graphene Oxide (rGO) is put to the test via a process known as multilayer Perceptron optimisation. In particular, for the purpose of this research, we used the learning methods of scaled conjugate gradient, levenberg-marquardt, and robust back propagation. As the dataset for this investigation, the sheet resistance of rGO thin films that was given by MIMOS Bhd was used. In order for us to carry out this test, we had to gather data from several sheets of rGO thin film, each of which included a unique combination of thickness and resistance. Normalisation, randomization, and splitting were the three types of pre-processing that were applied to both the input and the output data. There was a thirty-seven percent split between the data used for training, fifteen percent split between the data used for validation, and fifteen percent split between the data used for testing. Different numbers of hidden neurons, ranging from one to ten, were used in MLP in order to enhance the effectiveness of the learning procedures. Because to their hard work, the most cutting-edge learning algorithms that have ever been built for finding MLP in rGO sheet resistance uniformity have been produced. Measurements were taken of everything from mean squared errors (MSE) to accuracy throughout all of the training, validation, and testing datasets, as well as overall performance. The whole investigation was dependent on using the MATLAB programme, version R2018a, to carry out in a mechanised manner all of the necessary analytical procedures. Throughout the course of constructing a knowledge process in MLP used for rGO sheet confrontation, it was found that the LM had a major influence on the whole process. The MSE for LM has been lowered the greatest, particularly in comparison to SCG and resilient backpropagation (RP).
分类器区分还原氧化石墨烯(rGO)薄膜电阻的相似性和差异性的能力通过称为多层感知器优化的过程进行测试。特别地,为了本研究的目的,我们使用了缩放共轭梯度、levenberg-marquardt和鲁棒反向传播的学习方法。作为本研究的数据集,使用MIMOS Bhd给出的氧化石墨烯薄膜的薄片电阻。为了进行这项测试,我们必须从几张氧化石墨烯薄膜中收集数据,每一张薄膜都有一个独特的厚度和电阻组合。规范化、随机化和分割是应用于输入和输出数据的三种预处理类型。用于训练的数据之间有37%的分割,用于验证的数据之间有15%的分割,用于测试的数据之间有15%的分割。为了提高学习过程的有效性,在MLP中使用了不同数量的隐藏神经元,从1到10不等。由于他们的辛勤工作,已经产生了迄今为止用于在rGO片材电阻均匀性中寻找MLP的最先进的学习算法。测量从均方误差(MSE)到所有训练、验证和测试数据集的准确性,以及整体性能。整个调查依赖于使用MATLAB程序,版本R2018a,以机械化的方式执行所有必要的分析程序。在构建用于rGO表对抗的MLP知识流程的过程中,我们发现LM对整个过程有着重要的影响。LM的MSE降低幅度最大,特别是与SCG和弹性反向传播(RP)相比。
{"title":"Multilayer Perceptron Learning for Decreasing the Resistance of Graphene Oxide Thin Films","authors":"G. Rao, V.Dhanakodi, M.Gayathri","doi":"10.58599/ijsmem.2023.1504","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1504","url":null,"abstract":"The capability of the classifier to differentiate between the similarities and differences in the resistance of thin films of reduced Graphene Oxide (rGO) is put to the test via a process known as multilayer Perceptron optimisation. In particular, for the purpose of this research, we used the learning methods of scaled conjugate gradient, levenberg-marquardt, and robust back propagation. As the dataset for this investigation, the sheet resistance of rGO thin films that was given by MIMOS Bhd was used. In order for us to carry out this test, we had to gather data from several sheets of rGO thin film, each of which included a unique combination of thickness and resistance. Normalisation, randomization, and splitting were the three types of pre-processing that were applied to both the input and the output data. There was a thirty-seven percent split between the data used for training, fifteen percent split between the data used for validation, and fifteen percent split between the data used for testing. Different numbers of hidden neurons, ranging from one to ten, were used in MLP in order to enhance the effectiveness of the learning procedures. Because to their hard work, the most cutting-edge learning algorithms that have ever been built for finding MLP in rGO sheet resistance uniformity have been produced. Measurements were taken of everything from mean squared errors (MSE) to accuracy throughout all of the training, validation, and testing datasets, as well as overall performance. The whole investigation was dependent on using the MATLAB programme, version R2018a, to carry out in a mechanised manner all of the necessary analytical procedures. Throughout the course of constructing a knowledge process in MLP used for rGO sheet confrontation, it was found that the LM had a major influence on the whole process. The MSE for LM has been lowered the greatest, particularly in comparison to SCG and resilient backpropagation (RP).","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Error Recovery in a Banking Cloud using Blockchain 使用区块链的银行云中的安全性和错误恢复
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1302
K.Jamberi, S. Reddy, D Sasikala
It is possible to store data in the cloud in a variety of different ways, including in a single database or across numerous servers; however, database clients are only able to save their information on a single server. No matter how straightforward the management of data in a single database may appear to be, there will invariably be complications regarding concerns of safety, consistency, availability, and bottlenecks. Distributed databases eliminate this issue by splintering the data among different servers, which in turn makes it possible for multiple clients to access the database at the same time. All of this information is readily available to the public and may be viewed whenever one chooses and from wherever one may be. Clients are able to quickly access replicas even in the event that the original is destroyed as a result of concurrent access. Users also have the option of protecting the data using either the Advanced Encryption Standard (AES) or the Triple Data Encryption Standard (3DES). Ensuring the privacy of sensitive data can be accomplished using any one of a number of distinct ciphering techniques, which can then be applied to any one of several distinct data formats. In the event that it is found out that the data was also altered, a procedure for recovering it will be carried out. In the case that a cloud instance experiences an error, the problem is fixed right away. This architecture protects sensitive data by removing potential points of failure from the design. Clients may not be aware of the encryption technology that is used to secure data or the particular cloud server instance that is responsible for delivering it if the system is configured in this manner. Hence, a unified strategy for the architecture of cloud-based databases offers higher levels of security, consistency, and accessibility.
可以以各种不同的方式在云中存储数据,包括在单个数据库中或跨多个服务器;但是,数据库客户机只能在单个服务器上保存它们的信息。无论单个数据库中的数据管理看起来多么简单,在安全性、一致性、可用性和瓶颈方面总会出现一些复杂的问题。分布式数据库通过将数据分散到不同的服务器上,从而消除了这个问题,这反过来又使多个客户机可以同时访问数据库。所有这些信息都很容易向公众提供,并且可以随时随地查看。客户机能够快速访问副本,即使原始副本由于并发访问而被破坏。用户还可以选择使用高级加密标准(AES)或三重数据加密标准(3DES)来保护数据。可以使用许多不同的加密技术中的任何一种来确保敏感数据的隐私,然后可以将其应用于几种不同的数据格式中的任何一种。如果发现数据也被更改,则将执行恢复数据的程序。如果云实例出现错误,问题将立即得到修复。这种架构通过消除设计中的潜在故障点来保护敏感数据。如果系统以这种方式配置,客户端可能不知道用于保护数据的加密技术,也不知道负责交付数据的特定云服务器实例。因此,基于云的数据库体系结构的统一策略提供了更高级别的安全性、一致性和可访问性。
{"title":"Security and Error Recovery in a Banking Cloud using Blockchain","authors":"K.Jamberi, S. Reddy, D Sasikala","doi":"10.58599/ijsmem.2023.1302","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1302","url":null,"abstract":"It is possible to store data in the cloud in a variety of different ways, including in a single database or across numerous servers; however, database clients are only able to save their information on a single server. No matter how straightforward the management of data in a single database may appear to be, there will invariably be complications regarding concerns of safety, consistency, availability, and bottlenecks. Distributed databases eliminate this issue by splintering the data among different servers, which in turn makes it possible for multiple clients to access the database at the same time. All of this information is readily available to the public and may be viewed whenever one chooses and from wherever one may be. Clients are able to quickly access replicas even in the event that the original is destroyed as a result of concurrent access. Users also have the option of protecting the data using either the Advanced Encryption Standard (AES) or the Triple Data Encryption Standard (3DES). Ensuring the privacy of sensitive data can be accomplished using any one of a number of distinct ciphering techniques, which can then be applied to any one of several distinct data formats. In the event that it is found out that the data was also altered, a procedure for recovering it will be carried out. In the case that a cloud instance experiences an error, the problem is fixed right away. This architecture protects sensitive data by removing potential points of failure from the design. Clients may not be aware of the encryption technology that is used to secure data or the particular cloud server instance that is responsible for delivering it if the system is configured in this manner. Hence, a unified strategy for the architecture of cloud-based databases offers higher levels of security, consistency, and accessibility.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A VLSI Image Processing Algorithm for Biomedical Applications 一种生物医学应用的VLSI图像处理算法
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1503
P. Kumari, A. Rajani, Allanki Sanyasi Rao
The domain of signal processing that is dedicated to applications in the medical sector has shown phenomenal expansion over the course of the last decade. It’s possible that developments in fields such as computer-aided design (CAD), healthcare, and automated signal processing have played a key part in this expansion. As a result of the current COVID-19 epidemic, there is a greater need for biomedical signal analysis, and from an imaging point of view, biomedical research projects far exceed those that use more basic signal processing methodologies. The fundamentals of image processing and the processing of biological pictures have been the subject of a lot of studies, and the findings of these studies have shown a variety of possible applications in a variety of settings. A examination of the existing literature reveals that there are a limited number of solutions that are based on very large scale integration (VLSI). As a direct consequence of this, this chapter devotes a significant amount of its focus to the investigation of biological image processing, particularly in terms of its applications and VLSI implementations. It is hoped that researchers and investigators would find this useful in better preparing a solution to this issue so that it may be put into action. Following an analysis of the most recent developments in research, a number of possible directions for future research have been contemplated.
在过去的十年中,致力于医疗领域应用的信号处理领域呈现出惊人的扩张。计算机辅助设计(CAD)、医疗保健和自动信号处理等领域的发展可能在这种扩张中发挥了关键作用。由于当前的COVID-19流行,对生物医学信号分析的需求更大,从成像的角度来看,生物医学研究项目远远超过使用更基本的信号处理方法的研究项目。图像处理和生物图像处理的基本原理一直是许多研究的主题,这些研究的结果显示了在各种环境中的各种可能的应用。对现有文献的研究表明,基于超大规模集成(VLSI)的解决方案数量有限。作为一个直接的结果,本章将大量的重点放在生物图像处理的研究上,特别是在其应用和VLSI实现方面。希望研究人员和调查人员发现这有助于更好地准备解决这一问题的办法,以便付诸行动。在分析了最近的研究进展之后,对未来研究的一些可能方向进行了设想。
{"title":"A VLSI Image Processing Algorithm for Biomedical Applications","authors":"P. Kumari, A. Rajani, Allanki Sanyasi Rao","doi":"10.58599/ijsmem.2023.1503","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1503","url":null,"abstract":"The domain of signal processing that is dedicated to applications in the medical sector has shown phenomenal expansion over the course of the last decade. It’s possible that developments in fields such as computer-aided design (CAD), healthcare, and automated signal processing have played a key part in this expansion. As a result of the current COVID-19 epidemic, there is a greater need for biomedical signal analysis, and from an imaging point of view, biomedical research projects far exceed those that use more basic signal processing methodologies. The fundamentals of image processing and the processing of biological pictures have been the subject of a lot of studies, and the findings of these studies have shown a variety of possible applications in a variety of settings. A examination of the existing literature reveals that there are a limited number of solutions that are based on very large scale integration (VLSI). As a direct consequence of this, this chapter devotes a significant amount of its focus to the investigation of biological image processing, particularly in terms of its applications and VLSI implementations. It is hoped that researchers and investigators would find this useful in better preparing a solution to this issue so that it may be put into action. Following an analysis of the most recent developments in research, a number of possible directions for future research have been contemplated.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Internet of Things based Multi-Tiered Wireless Security System 基于物联网的多层无线安防系统
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1703
K. Venkatesan
In today’s contemporary culture, the need of taking precautions to protect one’s own belongings and privacy cannot be stressed. Because of this, an adaptive multilayer wireless security system, also known as ML-WSS, has been developed in order to monitor also safeguard a location with the assistance of the internet of things (IoT). In the hardware and software design of the ML- WSS, the sensors, the Wi-Fi module, also the process and monitoring mobile application all play key roles. The proposed method enables remote monitoring and management to take place finished the Internet also the ThingSpeak cloud, which is where the OMM application keeps the data that it has collected. The idea suggests slicing the crucial area into three distinct sectors, with sector 1 being the least dangerous, sector 2 being intermediate, and sector 3 being the most dangerous of the three. The criteria for the level of security should serve as a reference for both the placement of sensors and the classification of sensors according to the level of protection they give. Both of these processes should be carried out in accordance with the criteria. In the event that there is a breach in security, actions are carried out in accordance with these principles. A exact model also pseudocode were used in order to demonstrate the functionality of the planned system. It is reasonable to assert that the strategy used up to this point has been successful, given that level-3 locations now suffer from around half as many security breaches as level-1 areas.
在当今的当代文化中,采取预防措施保护自己的财产和隐私的必要性再怎么强调也不为过。因此,一种自适应多层无线安全系统,也称为ML-WSS,已经开发出来,以便在物联网(IoT)的帮助下监控和保护一个位置。在ML- WSS的硬件和软件设计中,传感器、Wi-Fi模块以及过程和监控移动应用程序都发挥了关键作用。所提出的方法使远程监控和管理能够通过互联网和ThingSpeak云进行,这是OMM应用程序保存其收集的数据的地方。这个想法建议将关键区域分成三个不同的区域,区域1是最不危险的,区域2是中间的,区域3是三个区域中最危险的。安全级别的标准应作为传感器放置和根据其提供的保护级别对传感器进行分类的参考。这两个过程都应按照标准进行。在发生安全漏洞的情况下,将按照这些原则采取行动。为了演示计划系统的功能,使用了一个精确的模型和伪代码。我们有理由断言,到目前为止使用的策略是成功的,因为3级地点现在遭受的安全漏洞大约是1级地区的一半。
{"title":"An Internet of Things based Multi-Tiered Wireless Security System","authors":"K. Venkatesan","doi":"10.58599/ijsmem.2023.1703","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1703","url":null,"abstract":"In today’s contemporary culture, the need of taking precautions to protect one’s own belongings and privacy cannot be stressed. Because of this, an adaptive multilayer wireless security system, also known as ML-WSS, has been developed in order to monitor also safeguard a location with the assistance of the internet of things (IoT). In the hardware and software design of the ML- WSS, the sensors, the Wi-Fi module, also the process and monitoring mobile application all play key roles. The proposed method enables remote monitoring and management to take place finished the Internet also the ThingSpeak cloud, which is where the OMM application keeps the data that it has collected. The idea suggests slicing the crucial area into three distinct sectors, with sector 1 being the least dangerous, sector 2 being intermediate, and sector 3 being the most dangerous of the three. The criteria for the level of security should serve as a reference for both the placement of sensors and the classification of sensors according to the level of protection they give. Both of these processes should be carried out in accordance with the criteria. In the event that there is a breach in security, actions are carried out in accordance with these principles. A exact model also pseudocode were used in order to demonstrate the functionality of the planned system. It is reasonable to assert that the strategy used up to this point has been successful, given that level-3 locations now suffer from around half as many security breaches as level-1 areas.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130811547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Innovative Internet of Things Access Architecture for a Car Monitoring System 一种创新的汽车监控系统物联网接入架构
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1603
Valli Madhavi Koti, D. Kumar, G.Nagalakshmi
Monitoring traffic, providing medical care, and other industrial uses are just a few of the many promising new uses for the Internet of Things. As time goes on, more and more ”things” will be able to connect to the Internet of Things. Given the vast variety of ”things” that need to be linked, the provision of a universal access mechanism to the Internet of Things is a crucial and basic challenge. The necessity of connectivity within the IoT makes this point extremely salient. In this research, we present an innovative approach to IoT access architecture that makes use of system-on-chip (SoC) and field-programmable gate array (FPGA) technology. This design has the potential to serve as a gateway for both low- and high-speed devices to connect to the Internet of Things with the correct level of adaptability and configurability. The provided notion is utilised in a vehicle tracking system that is based on the IEEE1451.2 standard. The findings provide strong evidence that the technology will perform admirably in real-world applications.
监控交通、提供医疗保健和其他工业用途只是物联网众多有前景的新用途中的一小部分。随着时间的推移,越来越多的“物”将能够连接到物联网。鉴于需要连接的“事物”种类繁多,为物联网提供通用访问机制是一项至关重要的基本挑战。物联网内部连接的必要性使得这一点非常突出。在本研究中,我们提出了一种利用片上系统(SoC)和现场可编程门阵列(FPGA)技术的物联网接入架构的创新方法。该设计有潜力作为低速和高速设备连接到物联网的网关,具有正确的适应性和可配置性。所提供的概念用于基于IEEE1451.2标准的车辆跟踪系统。这些发现提供了强有力的证据,证明该技术在现实世界中的应用将令人钦佩。
{"title":"An Innovative Internet of Things Access Architecture for a Car Monitoring System","authors":"Valli Madhavi Koti, D. Kumar, G.Nagalakshmi","doi":"10.58599/ijsmem.2023.1603","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1603","url":null,"abstract":"Monitoring traffic, providing medical care, and other industrial uses are just a few of the many promising new uses for the Internet of Things. As time goes on, more and more ”things” will be able to connect to the Internet of Things. Given the vast variety of ”things” that need to be linked, the provision of a universal access mechanism to the Internet of Things is a crucial and basic challenge. The necessity of connectivity within the IoT makes this point extremely salient. In this research, we present an innovative approach to IoT access architecture that makes use of system-on-chip (SoC) and field-programmable gate array (FPGA) technology. This design has the potential to serve as a gateway for both low- and high-speed devices to connect to the Internet of Things with the correct level of adaptability and configurability. The provided notion is utilised in a vehicle tracking system that is based on the IEEE1451.2 standard. The findings provide strong evidence that the technology will perform admirably in real-world applications.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Scientific Methods in Engineering and Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1