Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1205
Kiran Kumar Gopathoti, Shamili Srimani Pendyala
Nowadays, power consumption is one of the primary considerations in the design of VLSI (Very Large Scale Integration) circuits based on complementary metal oxide semiconductors (CMOS) and carbon nanotube field effect transistors (CNTFET). This is because of the present circumstance. The fundamental reason for this is that power utilisation has been raised to the status of a top priority due to the improvements in integration and scaling as well as the constant increases in operating frequency. Additional power consumption from circuits and designs makes them challenging to implement in portable devices. The quantity of power lost during operation has an immediate effect on the cost of packaging the IC and systems. A variety of power dissipation sources and low power VLSI design strategies for CMOS and CNTFET-based circuits are discussed in this article.
目前,功耗是基于互补金属氧化物半导体(CMOS)和碳纳米管场效应晶体管(CNTFET)的VLSI (Very Large Scale Integration)电路设计的主要考虑因素之一。这是因为目前的情况。其根本原因是,由于集成和缩放的改进以及工作频率的不断增加,功率利用率已提高到首要任务的地位。电路和设计的额外功耗使它们难以在便携式设备中实现。运行过程中功率损失的数量对集成电路和系统的封装成本有直接影响。本文讨论了CMOS和cntfet电路的各种功耗源和低功耗VLSI设计策略。
{"title":"A Review on low-Power VLSI CMOS and CNTFET Circuits","authors":"Kiran Kumar Gopathoti, Shamili Srimani Pendyala","doi":"10.58599/ijsmem.2023.1205","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1205","url":null,"abstract":"Nowadays, power consumption is one of the primary considerations in the design of VLSI (Very Large Scale Integration) circuits based on complementary metal oxide semiconductors (CMOS) and carbon nanotube field effect transistors (CNTFET). This is because of the present circumstance. The fundamental reason for this is that power utilisation has been raised to the status of a top priority due to the improvements in integration and scaling as well as the constant increases in operating frequency. Additional power consumption from circuits and designs makes them challenging to implement in portable devices. The quantity of power lost during operation has an immediate effect on the cost of packaging the IC and systems. A variety of power dissipation sources and low power VLSI design strategies for CMOS and CNTFET-based circuits are discussed in this article.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1303
G.Sunil Kumar, J. Kamal Vijetha, K. G. S. Venkatesan
Edge detection using the Canny method is popular. The Canny method’s calculation is too complex for traditional embedded systems, preventing real-time edge recognition. High-end embedded CPUs with GPGPUs can process more data (General Purpose Graphics Processing Units). This research proposes a distributed computing-friendly parallel canny technique.
{"title":"An Investigation of Heterogeneous Embedded CPU and GPU Architectures","authors":"G.Sunil Kumar, J. Kamal Vijetha, K. G. S. Venkatesan","doi":"10.58599/ijsmem.2023.1303","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1303","url":null,"abstract":"Edge detection using the Canny method is popular. The Canny method’s calculation is too complex for traditional embedded systems, preventing real-time edge recognition. High-end embedded CPUs with GPGPUs can process more data (General Purpose Graphics Processing Units). This research proposes a distributed computing-friendly parallel canny technique.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1702
K. Venkatesan, Kishore Kumar Mamidala, Swaroopa Rani B
Innovative security systems are increasingly making use of biometric modalities as an authentication method. However, the biometric technology that is presently available on the market provides solutions to a significant number of these difficulties. The widespread use of bogus biometrics in today’s society is one of the most significant reasons for concern. The results of an electroencephalogram (EEG) can provide some interesting information on the matter. This is a highly challenging endeavour since reproduction calls for careful preparation on your part. Several different investigations have shown that the procedure may be trusted to provide accurate results. Nonetheless, the collecting of data necessitates a large expenditure of time in addition to the sensors. In this study, we provide a biometric technique that takes use of EO resting-state EEG recordings that were taken from a single-channel electrode placement on the scalp. These recordings were generated in order to determine the precision of the method. The electroencephalograms (EEGs) of all nine persons who were examined yielded a total of 45 different signals. The interval of time that passed between each EEG wave segment was under five seconds. This specific piece of study focused its attention on the
{"title":"Detecting Optimal Regions for a Single EEG Channel Biometric System","authors":"K. Venkatesan, Kishore Kumar Mamidala, Swaroopa Rani B","doi":"10.58599/ijsmem.2023.1702","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1702","url":null,"abstract":"Innovative security systems are increasingly making use of biometric modalities as an authentication method. However, the biometric technology that is presently available on the market provides solutions to a significant number of these difficulties. The widespread use of bogus biometrics in today’s society is one of the most significant reasons for concern. The results of an electroencephalogram (EEG) can provide some interesting information on the matter. This is a highly challenging endeavour since reproduction calls for careful preparation on your part. Several different investigations have shown that the procedure may be trusted to provide accurate results. Nonetheless, the collecting of data necessitates a large expenditure of time in addition to the sensors. In this study, we provide a biometric technique that takes use of EO resting-state EEG recordings that were taken from a single-channel electrode placement on the scalp. These recordings were generated in order to determine the precision of the method. The electroencephalograms (EEGs) of all nine persons who were examined yielded a total of 45 different signals. The interval of time that passed between each EEG wave segment was under five seconds. This specific piece of study focused its attention on the","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"PC-26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126678428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1505
E. Jyothi, M.Kranthi
It is vital to first determine whether or not plant illnesses are there, and then to make steps to restrict the spread of those diseases in order to maximize both the quality and quantity of the harvest. First, it is important to determine whether or not plant illnesses are present. There are a number of advantages to mechanizing plant diseases, one of which is reducing the amount of time spent manually examining crops in a big agricultural area that produces a significant amount of mango. As a result of the fact that leaves are in charge of the majority of a plant’s nutrition absorption, it is very important to diagnose leaf diseases in a timely and precise manner. In this particular research, we classified and identified the several illnesses that may be harmful to mango leaf by using CNN. We employ multiple CNN models that have been trained via transfer learning in order to increase the quality of the results obtained from the training set. These CNN models include DenseNet201, InceptionResNetV2, InceptionV3, ResNet50, ResNet152V2, and Xception. Acquiring pictures, segmenting those images, and deriving features from them are all stages that are included in the process of sickness diagnosis. The collection contains approximately a thousand photographs, all of which depict either healthy mango leaves or mango leaves affected by illness. According to the findings of our investigation into the overall performance matrices, the DenseNet201 model earned the highest level of accuracy (98.00%) compared to all of the other models.
{"title":"Application of Transfer Learning to Convolutional Neural Network Models for Mango Leaf Disease Recognition","authors":"E. Jyothi, M.Kranthi","doi":"10.58599/ijsmem.2023.1505","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1505","url":null,"abstract":"It is vital to first determine whether or not plant illnesses are there, and then to make steps to restrict the spread of those diseases in order to maximize both the quality and quantity of the harvest. First, it is important to determine whether or not plant illnesses are present. There are a number of advantages to mechanizing plant diseases, one of which is reducing the amount of time spent manually examining crops in a big agricultural area that produces a significant amount of mango. As a result of the fact that leaves are in charge of the majority of a plant’s nutrition absorption, it is very important to diagnose leaf diseases in a timely and precise manner. In this particular research, we classified and identified the several illnesses that may be harmful to mango leaf by using CNN. We employ multiple CNN models that have been trained via transfer learning in order to increase the quality of the results obtained from the training set. These CNN models include DenseNet201, InceptionResNetV2, InceptionV3, ResNet50, ResNet152V2, and Xception. Acquiring pictures, segmenting those images, and deriving features from them are all stages that are included in the process of sickness diagnosis. The collection contains approximately a thousand photographs, all of which depict either healthy mango leaves or mango leaves affected by illness. According to the findings of our investigation into the overall performance matrices, the DenseNet201 model earned the highest level of accuracy (98.00%) compared to all of the other models.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115721084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1404
Pankaj K. Kawadkar, B.Rebecca, Puppala Krupa Sagar
Image processing is essential for the success of image-based authentication. Included in multiple ”Multimodal image classification” subheadings. In this research, we will investigate three methods that have been shown to improve the precision of image classification. Pre-processing refers to the subsequent phase of extracting and classifying features. Gaussian filters are used for the pre-processing step, while the PSO algorithm is responsible for the feature extraction. Incorporating categorization algorithms is made possible by employing the ECNN. Finally, we evaluate our proposal by contrasting it with state-of-the-art scientific findings.
{"title":"Clustering Techniques for Person Authentication from Online Intelligence Data Inspired by Nature","authors":"Pankaj K. Kawadkar, B.Rebecca, Puppala Krupa Sagar","doi":"10.58599/ijsmem.2023.1404","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1404","url":null,"abstract":"Image processing is essential for the success of image-based authentication. Included in multiple ”Multimodal image classification” subheadings. In this research, we will investigate three methods that have been shown to improve the precision of image classification. Pre-processing refers to the subsequent phase of extracting and classifying features. Gaussian filters are used for the pre-processing step, while the PSO algorithm is responsible for the feature extraction. Incorporating categorization algorithms is made possible by employing the ECNN. Finally, we evaluate our proposal by contrasting it with state-of-the-art scientific findings.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126074352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1504
G. Rao, V.Dhanakodi, M.Gayathri
The capability of the classifier to differentiate between the similarities and differences in the resistance of thin films of reduced Graphene Oxide (rGO) is put to the test via a process known as multilayer Perceptron optimisation. In particular, for the purpose of this research, we used the learning methods of scaled conjugate gradient, levenberg-marquardt, and robust back propagation. As the dataset for this investigation, the sheet resistance of rGO thin films that was given by MIMOS Bhd was used. In order for us to carry out this test, we had to gather data from several sheets of rGO thin film, each of which included a unique combination of thickness and resistance. Normalisation, randomization, and splitting were the three types of pre-processing that were applied to both the input and the output data. There was a thirty-seven percent split between the data used for training, fifteen percent split between the data used for validation, and fifteen percent split between the data used for testing. Different numbers of hidden neurons, ranging from one to ten, were used in MLP in order to enhance the effectiveness of the learning procedures. Because to their hard work, the most cutting-edge learning algorithms that have ever been built for finding MLP in rGO sheet resistance uniformity have been produced. Measurements were taken of everything from mean squared errors (MSE) to accuracy throughout all of the training, validation, and testing datasets, as well as overall performance. The whole investigation was dependent on using the MATLAB programme, version R2018a, to carry out in a mechanised manner all of the necessary analytical procedures. Throughout the course of constructing a knowledge process in MLP used for rGO sheet confrontation, it was found that the LM had a major influence on the whole process. The MSE for LM has been lowered the greatest, particularly in comparison to SCG and resilient backpropagation (RP).
{"title":"Multilayer Perceptron Learning for Decreasing the Resistance of Graphene Oxide Thin Films","authors":"G. Rao, V.Dhanakodi, M.Gayathri","doi":"10.58599/ijsmem.2023.1504","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1504","url":null,"abstract":"The capability of the classifier to differentiate between the similarities and differences in the resistance of thin films of reduced Graphene Oxide (rGO) is put to the test via a process known as multilayer Perceptron optimisation. In particular, for the purpose of this research, we used the learning methods of scaled conjugate gradient, levenberg-marquardt, and robust back propagation. As the dataset for this investigation, the sheet resistance of rGO thin films that was given by MIMOS Bhd was used. In order for us to carry out this test, we had to gather data from several sheets of rGO thin film, each of which included a unique combination of thickness and resistance. Normalisation, randomization, and splitting were the three types of pre-processing that were applied to both the input and the output data. There was a thirty-seven percent split between the data used for training, fifteen percent split between the data used for validation, and fifteen percent split between the data used for testing. Different numbers of hidden neurons, ranging from one to ten, were used in MLP in order to enhance the effectiveness of the learning procedures. Because to their hard work, the most cutting-edge learning algorithms that have ever been built for finding MLP in rGO sheet resistance uniformity have been produced. Measurements were taken of everything from mean squared errors (MSE) to accuracy throughout all of the training, validation, and testing datasets, as well as overall performance. The whole investigation was dependent on using the MATLAB programme, version R2018a, to carry out in a mechanised manner all of the necessary analytical procedures. Throughout the course of constructing a knowledge process in MLP used for rGO sheet confrontation, it was found that the LM had a major influence on the whole process. The MSE for LM has been lowered the greatest, particularly in comparison to SCG and resilient backpropagation (RP).","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1302
K.Jamberi, S. Reddy, D Sasikala
It is possible to store data in the cloud in a variety of different ways, including in a single database or across numerous servers; however, database clients are only able to save their information on a single server. No matter how straightforward the management of data in a single database may appear to be, there will invariably be complications regarding concerns of safety, consistency, availability, and bottlenecks. Distributed databases eliminate this issue by splintering the data among different servers, which in turn makes it possible for multiple clients to access the database at the same time. All of this information is readily available to the public and may be viewed whenever one chooses and from wherever one may be. Clients are able to quickly access replicas even in the event that the original is destroyed as a result of concurrent access. Users also have the option of protecting the data using either the Advanced Encryption Standard (AES) or the Triple Data Encryption Standard (3DES). Ensuring the privacy of sensitive data can be accomplished using any one of a number of distinct ciphering techniques, which can then be applied to any one of several distinct data formats. In the event that it is found out that the data was also altered, a procedure for recovering it will be carried out. In the case that a cloud instance experiences an error, the problem is fixed right away. This architecture protects sensitive data by removing potential points of failure from the design. Clients may not be aware of the encryption technology that is used to secure data or the particular cloud server instance that is responsible for delivering it if the system is configured in this manner. Hence, a unified strategy for the architecture of cloud-based databases offers higher levels of security, consistency, and accessibility.
{"title":"Security and Error Recovery in a Banking Cloud using Blockchain","authors":"K.Jamberi, S. Reddy, D Sasikala","doi":"10.58599/ijsmem.2023.1302","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1302","url":null,"abstract":"It is possible to store data in the cloud in a variety of different ways, including in a single database or across numerous servers; however, database clients are only able to save their information on a single server. No matter how straightforward the management of data in a single database may appear to be, there will invariably be complications regarding concerns of safety, consistency, availability, and bottlenecks. Distributed databases eliminate this issue by splintering the data among different servers, which in turn makes it possible for multiple clients to access the database at the same time. All of this information is readily available to the public and may be viewed whenever one chooses and from wherever one may be. Clients are able to quickly access replicas even in the event that the original is destroyed as a result of concurrent access. Users also have the option of protecting the data using either the Advanced Encryption Standard (AES) or the Triple Data Encryption Standard (3DES). Ensuring the privacy of sensitive data can be accomplished using any one of a number of distinct ciphering techniques, which can then be applied to any one of several distinct data formats. In the event that it is found out that the data was also altered, a procedure for recovering it will be carried out. In the case that a cloud instance experiences an error, the problem is fixed right away. This architecture protects sensitive data by removing potential points of failure from the design. Clients may not be aware of the encryption technology that is used to secure data or the particular cloud server instance that is responsible for delivering it if the system is configured in this manner. Hence, a unified strategy for the architecture of cloud-based databases offers higher levels of security, consistency, and accessibility.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131661666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1503
P. Kumari, A. Rajani, Allanki Sanyasi Rao
The domain of signal processing that is dedicated to applications in the medical sector has shown phenomenal expansion over the course of the last decade. It’s possible that developments in fields such as computer-aided design (CAD), healthcare, and automated signal processing have played a key part in this expansion. As a result of the current COVID-19 epidemic, there is a greater need for biomedical signal analysis, and from an imaging point of view, biomedical research projects far exceed those that use more basic signal processing methodologies. The fundamentals of image processing and the processing of biological pictures have been the subject of a lot of studies, and the findings of these studies have shown a variety of possible applications in a variety of settings. A examination of the existing literature reveals that there are a limited number of solutions that are based on very large scale integration (VLSI). As a direct consequence of this, this chapter devotes a significant amount of its focus to the investigation of biological image processing, particularly in terms of its applications and VLSI implementations. It is hoped that researchers and investigators would find this useful in better preparing a solution to this issue so that it may be put into action. Following an analysis of the most recent developments in research, a number of possible directions for future research have been contemplated.
{"title":"A VLSI Image Processing Algorithm for Biomedical Applications","authors":"P. Kumari, A. Rajani, Allanki Sanyasi Rao","doi":"10.58599/ijsmem.2023.1503","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1503","url":null,"abstract":"The domain of signal processing that is dedicated to applications in the medical sector has shown phenomenal expansion over the course of the last decade. It’s possible that developments in fields such as computer-aided design (CAD), healthcare, and automated signal processing have played a key part in this expansion. As a result of the current COVID-19 epidemic, there is a greater need for biomedical signal analysis, and from an imaging point of view, biomedical research projects far exceed those that use more basic signal processing methodologies. The fundamentals of image processing and the processing of biological pictures have been the subject of a lot of studies, and the findings of these studies have shown a variety of possible applications in a variety of settings. A examination of the existing literature reveals that there are a limited number of solutions that are based on very large scale integration (VLSI). As a direct consequence of this, this chapter devotes a significant amount of its focus to the investigation of biological image processing, particularly in terms of its applications and VLSI implementations. It is hoped that researchers and investigators would find this useful in better preparing a solution to this issue so that it may be put into action. Following an analysis of the most recent developments in research, a number of possible directions for future research have been contemplated.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1703
K. Venkatesan
In today’s contemporary culture, the need of taking precautions to protect one’s own belongings and privacy cannot be stressed. Because of this, an adaptive multilayer wireless security system, also known as ML-WSS, has been developed in order to monitor also safeguard a location with the assistance of the internet of things (IoT). In the hardware and software design of the ML- WSS, the sensors, the Wi-Fi module, also the process and monitoring mobile application all play key roles. The proposed method enables remote monitoring and management to take place finished the Internet also the ThingSpeak cloud, which is where the OMM application keeps the data that it has collected. The idea suggests slicing the crucial area into three distinct sectors, with sector 1 being the least dangerous, sector 2 being intermediate, and sector 3 being the most dangerous of the three. The criteria for the level of security should serve as a reference for both the placement of sensors and the classification of sensors according to the level of protection they give. Both of these processes should be carried out in accordance with the criteria. In the event that there is a breach in security, actions are carried out in accordance with these principles. A exact model also pseudocode were used in order to demonstrate the functionality of the planned system. It is reasonable to assert that the strategy used up to this point has been successful, given that level-3 locations now suffer from around half as many security breaches as level-1 areas.
{"title":"An Internet of Things based Multi-Tiered Wireless Security System","authors":"K. Venkatesan","doi":"10.58599/ijsmem.2023.1703","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1703","url":null,"abstract":"In today’s contemporary culture, the need of taking precautions to protect one’s own belongings and privacy cannot be stressed. Because of this, an adaptive multilayer wireless security system, also known as ML-WSS, has been developed in order to monitor also safeguard a location with the assistance of the internet of things (IoT). In the hardware and software design of the ML- WSS, the sensors, the Wi-Fi module, also the process and monitoring mobile application all play key roles. The proposed method enables remote monitoring and management to take place finished the Internet also the ThingSpeak cloud, which is where the OMM application keeps the data that it has collected. The idea suggests slicing the crucial area into three distinct sectors, with sector 1 being the least dangerous, sector 2 being intermediate, and sector 3 being the most dangerous of the three. The criteria for the level of security should serve as a reference for both the placement of sensors and the classification of sensors according to the level of protection they give. Both of these processes should be carried out in accordance with the criteria. In the event that there is a breach in security, actions are carried out in accordance with these principles. A exact model also pseudocode were used in order to demonstrate the functionality of the planned system. It is reasonable to assert that the strategy used up to this point has been successful, given that level-3 locations now suffer from around half as many security breaches as level-1 areas.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130811547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.58599/ijsmem.2023.1603
Valli Madhavi Koti, D. Kumar, G.Nagalakshmi
Monitoring traffic, providing medical care, and other industrial uses are just a few of the many promising new uses for the Internet of Things. As time goes on, more and more ”things” will be able to connect to the Internet of Things. Given the vast variety of ”things” that need to be linked, the provision of a universal access mechanism to the Internet of Things is a crucial and basic challenge. The necessity of connectivity within the IoT makes this point extremely salient. In this research, we present an innovative approach to IoT access architecture that makes use of system-on-chip (SoC) and field-programmable gate array (FPGA) technology. This design has the potential to serve as a gateway for both low- and high-speed devices to connect to the Internet of Things with the correct level of adaptability and configurability. The provided notion is utilised in a vehicle tracking system that is based on the IEEE1451.2 standard. The findings provide strong evidence that the technology will perform admirably in real-world applications.
{"title":"An Innovative Internet of Things Access Architecture for a Car Monitoring System","authors":"Valli Madhavi Koti, D. Kumar, G.Nagalakshmi","doi":"10.58599/ijsmem.2023.1603","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1603","url":null,"abstract":"Monitoring traffic, providing medical care, and other industrial uses are just a few of the many promising new uses for the Internet of Things. As time goes on, more and more ”things” will be able to connect to the Internet of Things. Given the vast variety of ”things” that need to be linked, the provision of a universal access mechanism to the Internet of Things is a crucial and basic challenge. The necessity of connectivity within the IoT makes this point extremely salient. In this research, we present an innovative approach to IoT access architecture that makes use of system-on-chip (SoC) and field-programmable gate array (FPGA) technology. This design has the potential to serve as a gateway for both low- and high-speed devices to connect to the Internet of Things with the correct level of adaptability and configurability. The provided notion is utilised in a vehicle tracking system that is based on the IEEE1451.2 standard. The findings provide strong evidence that the technology will perform admirably in real-world applications.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}