首页 > 最新文献

Journal of Trends in Computer Science and Smart Technology最新文献

英文 中文
Deterrence of Accident Using IoT 利用物联网威慑事故
Pub Date : 2022-07-21 DOI: 10.36548/jtcsst.2022.2.005
C. M. Nalayini, P. Sreemathi, B. Nanditha
Now-a-days human beings have a tendency to transport in a faster pace which leads to greater street injuries. During night time motors typically tour in more velocity. When an coincidence happens in the course of night it is difficult for the rescue team to right away locate the place and shop the humans. This document gives a machine to robotically alternate between high and low beams with the aid of dimming the headlight of the different vehicles. Automatic collision prevention and detection is the device anticipated. It will become aware of a auto crash, and then ship the vital facts to the hospitals. This gadget substantially helps cars that have indulged in an accident in the search and rescue. The pace of the motors is one of the important reasons. If emergency offerings should achieve facts about accidents and attain them early, many lives can be saved. GPS has now end up a part of a vehicle framework. A GPS recipient is successful of checking the vehicle speed and recognizing mishaps dependent absolutely upon oversaw speed and sending an accident region to an Alert Service Center. We have put collectively an automated headlight dimmer prototype to stop such incidents. This adjusts the excessive beam routinely into the low beam, which reduces the depth of light by way of sensing the automobile approaching. It additionally eliminates the want for manual driver switching that is no longer constantly done. This paper talks about in element the building and blessings of this model.
如今,人们倾向于以更快的速度运输,这导致了更多的街头伤害。在夜间,马达通常以更快的速度运转。当巧合在夜间发生时,救援队伍很难立即确定地点并救出人类。该文件给出了一种机器,可以在不同车辆的车头灯变暗的帮助下,自动地在高低光束之间切换。自动碰撞预防和检测是预期的设备。它会意识到一场车祸,然后将重要的事实发送到医院。这个小装置极大地帮助了陷入事故的汽车的搜索和救援。电动机的转速是其中一个重要原因。如果应急服务能够了解事故的真相并尽早获得,就可以挽救许多生命。GPS现在已经成为车辆框架的一部分。GPS接收器可以成功地检查车辆速度,并完全根据监督的速度识别事故,并将事故区域发送给警报服务中心。我们已经把一个自动前灯调光器的原型,以防止此类事件。这将过度的光束常规地调整为低光束,通过感应汽车接近的方式减少了光的深度。它还消除了不再经常进行的手动驾驶员切换的需要。本文从要素上论述了这一模式的构建与实现。
{"title":"Deterrence of Accident Using IoT","authors":"C. M. Nalayini, P. Sreemathi, B. Nanditha","doi":"10.36548/jtcsst.2022.2.005","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.005","url":null,"abstract":"Now-a-days human beings have a tendency to transport in a faster pace which leads to greater street injuries. During night time motors typically tour in more velocity. When an coincidence happens in the course of night it is difficult for the rescue team to right away locate the place and shop the humans. This document gives a machine to robotically alternate between high and low beams with the aid of dimming the headlight of the different vehicles. Automatic collision prevention and detection is the device anticipated. It will become aware of a auto crash, and then ship the vital facts to the hospitals. This gadget substantially helps cars that have indulged in an accident in the search and rescue. The pace of the motors is one of the important reasons. If emergency offerings should achieve facts about accidents and attain them early, many lives can be saved. GPS has now end up a part of a vehicle framework. A GPS recipient is successful of checking the vehicle speed and recognizing mishaps dependent absolutely upon oversaw speed and sending an accident region to an Alert Service Center. We have put collectively an automated headlight dimmer prototype to stop such incidents. This adjusts the excessive beam routinely into the low beam, which reduces the depth of light by way of sensing the automobile approaching. It additionally eliminates the want for manual driver switching that is no longer constantly done. This paper talks about in element the building and blessings of this model.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127690688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on Human Computer Interaction Intelligent Learning for Improved Identification Procedure 改进识别过程的人机交互智能学习研究进展
Pub Date : 2022-07-13 DOI: 10.36548/jtcsst.2022.2.002
I. Jeena Jacob
Every day, new systems and devices are being developed, and research in this human and computer interaction field has increased dramatically over the previous several decades. Research into how computers impact people's lives, organizations, and society as a whole is done via the field of Human-Computer Interaction (HCI). This involves not just the simplicity of use but also innovative interaction approaches for supporting user activities, offering better access to information through new HCI principle, and establishing more powerful forms of communication for the user. After contemplating its potential, HCI is currently a popular new study topic among academics with feedback and recommendation by yes or no. To make HCI an effective tool, it must learn from the new principles of HCI that is planned here for future and reconsider some of its fundamental concepts.
每天都有新的系统和设备被开发出来,在这个人机交互领域的研究在过去的几十年里急剧增加。研究计算机如何影响人们的生活、组织和社会作为一个整体是通过人机交互(HCI)领域完成的。这不仅涉及使用的简单性,还涉及支持用户活动的创新交互方法,通过新的HCI原则提供更好的信息访问,并为用户建立更强大的通信形式。经过对其潜力的思考,HCI目前是学术界的一个流行的新研究课题,反馈和建议是或不是。为了使HCI成为一种有效的工具,它必须从这里为未来规划的HCI的新原则中学习,并重新考虑其一些基本概念。
{"title":"Review on Human Computer Interaction Intelligent Learning for Improved Identification Procedure","authors":"I. Jeena Jacob","doi":"10.36548/jtcsst.2022.2.002","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.002","url":null,"abstract":"Every day, new systems and devices are being developed, and research in this human and computer interaction field has increased dramatically over the previous several decades. Research into how computers impact people's lives, organizations, and society as a whole is done via the field of Human-Computer Interaction (HCI). This involves not just the simplicity of use but also innovative interaction approaches for supporting user activities, offering better access to information through new HCI principle, and establishing more powerful forms of communication for the user. After contemplating its potential, HCI is currently a popular new study topic among academics with feedback and recommendation by yes or no. To make HCI an effective tool, it must learn from the new principles of HCI that is planned here for future and reconsider some of its fundamental concepts.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Two-Phase Monitoring Server for Ransomware Evaluation and Detection in IoT Environment 物联网环境下用于勒索软件评估与检测的两相监控服务器研究
Pub Date : 2022-07-13 DOI: 10.36548/jtcsst.2022.2.003
Amirthasaravanan Arivunambi, Arjun Paramarthalingam
Current trending- Internet of things (IoT) is internetworking of an assortment of hardware devices to offer a collection of applications and services. In the present-day world, ransomware cyber-attack has become one of the major attacks in IoT systems. Ransomware is a hazardous malware that targets the user’s computer inaccessible or inoperative, and then requesting the computer victim user to transfer a huge ransom to relapse the damage. At instance, the evolution rate outcomes illustrate that the level of attacks such as Locky and Cryptowall ransomware are conspicuously growing then other ransomware. Thus, these ransomware relations are the latent threat to IoT. To address the issue, this paper presents Two-phase ransomware prediction model based on the behavioral and communication study of Cryptowall ransomware for IoT networks. This proposed Two-phase model equipped with, Phase-1: observes the inward TCP/IP flowing traffic through a monitoring server to avert the ransomware attack The procedure of the monitoring server is to monitor the IoT's TCP/IP. The process of Monitoring TCP/IP is to extract TCP/IP header and routines command and control (C&C) server IP blacklisting to discover the ransomware attacks. In Phase-2: the proposed system will also analyze the application pattern for malicious behavior of the Web and URLs. Several societies have very affluent security tools in their milieu, but their events or logs are not monitored, which make affluent tools ineffective. The process of having efficient security based monitoring server is vital for detecting and controlling the ransomware attack.
当前趋势——物联网(IoT)是各种硬件设备的互联网络,提供一系列应用程序和服务。在当今世界,勒索软件网络攻击已成为物联网系统中的主要攻击之一。勒索软件是一种危险的恶意软件,其目标是用户的计算机无法访问或无法运行,然后要求计算机受害者用户转移巨额赎金以再次遭受损害。例如,进化率结果表明,像Locky和Cryptowall勒索软件这样的攻击水平明显高于其他勒索软件。因此,这些勒索软件关系是对物联网的潜在威胁。为了解决这一问题,本文提出了基于物联网网络中Cryptowall勒索软件行为和通信研究的两阶段勒索软件预测模型。提出的两阶段模型,第一阶段:通过监控服务器观察向内的TCP/IP流量,以避免勒索软件攻击,监控服务器的过程是监控物联网的TCP/IP。监控TCP/IP的过程是提取TCP/IP报头和例程命令与控制(C&C)服务器IP黑名单,以发现勒索软件攻击。在阶段2:建议的系统还将分析Web和url的恶意行为的应用程序模式。一些社会在其环境中拥有非常丰富的安全工具,但他们的事件或日志没有受到监视,这使得丰富的工具无效。建立高效的基于安全的监控服务器对于检测和控制勒索软件攻击至关重要。
{"title":"A Study on Two-Phase Monitoring Server for Ransomware Evaluation and Detection in IoT Environment","authors":"Amirthasaravanan Arivunambi, Arjun Paramarthalingam","doi":"10.36548/jtcsst.2022.2.003","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.003","url":null,"abstract":"Current trending- Internet of things (IoT) is internetworking of an assortment of hardware devices to offer a collection of applications and services. In the present-day world, ransomware cyber-attack has become one of the major attacks in IoT systems. Ransomware is a hazardous malware that targets the user’s computer inaccessible or inoperative, and then requesting the computer victim user to transfer a huge ransom to relapse the damage. At instance, the evolution rate outcomes illustrate that the level of attacks such as Locky and Cryptowall ransomware are conspicuously growing then other ransomware. Thus, these ransomware relations are the latent threat to IoT. To address the issue, this paper presents Two-phase ransomware prediction model based on the behavioral and communication study of Cryptowall ransomware for IoT networks. \u0000This proposed Two-phase model equipped with, Phase-1: observes the inward TCP/IP flowing traffic through a monitoring server to avert the ransomware attack The procedure of the monitoring server is to monitor the IoT's TCP/IP. The process of Monitoring TCP/IP is to extract TCP/IP header and routines command and control (C&C) server IP blacklisting to discover the ransomware attacks. \u0000In Phase-2: the proposed system will also analyze the application pattern for malicious behavior of the Web and URLs. Several societies have very affluent security tools in their milieu, but their events or logs are not monitored, which make affluent tools ineffective. The process of having efficient security based monitoring server is vital for detecting and controlling the ransomware attack.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Driving Safety Framework through Security Architecture - Survey 通过安全架构的自动驾驶安全框架-调查
Pub Date : 2022-06-27 DOI: 10.36548/jtcsst.2022.2.001
K. Geetha
An enormous wave of automation technology is about to hit the global market. To save thousands of people's lives, autonomous vehicle technology may decrease congestion and increase mobility, as well as may enhance the productivity of the transportation industry. Developed country governments, on the other hand, are concerned that they may be placing unneeded or unforeseen obstacles on the path of growth. As a result, when it comes to features, safety always comes first. With the help of various functions based on certain automation technologies, this effort attempts to find example ideas. A more technical look at the needs throughout the development to minimize safety-related dangers is presented in this paper, which is meant to augment previous publications on different safety elements. This article emphasizes the significance of safety by design. Additionally, the goal of this article is to overcome the problems of the existing system with authentication and security architecture framework.
一股巨大的自动化技术浪潮即将冲击全球市场。为了挽救成千上万人的生命,自动驾驶汽车技术可能会减少拥堵,增加机动性,并可能提高运输行业的生产率。另一方面,发达国家政府担心,他们可能会在增长的道路上设置不必要的或不可预见的障碍。因此,当涉及到功能时,安全总是第一位的。借助基于某些自动化技术的各种功能,本工作试图找到示例思想。本文对整个开发过程中最小化安全相关危险的需求进行了更技术性的研究,这是对以前关于不同安全要素的出版物的补充。本文强调了设计安全的重要性。此外,本文的目标是通过身份验证和安全体系结构框架来克服现有系统的问题。
{"title":"Automated Driving Safety Framework through Security Architecture - Survey","authors":"K. Geetha","doi":"10.36548/jtcsst.2022.2.001","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.001","url":null,"abstract":"An enormous wave of automation technology is about to hit the global market. To save thousands of people's lives, autonomous vehicle technology may decrease congestion and increase mobility, as well as may enhance the productivity of the transportation industry. Developed country governments, on the other hand, are concerned that they may be placing unneeded or unforeseen obstacles on the path of growth. As a result, when it comes to features, safety always comes first. With the help of various functions based on certain automation technologies, this effort attempts to find example ideas. A more technical look at the needs throughout the development to minimize safety-related dangers is presented in this paper, which is meant to augment previous publications on different safety elements. This article emphasizes the significance of safety by design. Additionally, the goal of this article is to overcome the problems of the existing system with authentication and security architecture framework.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130380793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security 评估区块链、深度学习和加密算法在云安全中的作用
Pub Date : 2022-05-19 DOI: 10.36548/jtcsst.2021.4.006
H. Andi
Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location. A reliable shielding approach will protect the data stored in the cloud from the hackers and malwares. Blockchain is one of the recent technologies implemented to the cloud network for storing the location of the saved data in an encrypted ledger format. This saves the stored data location without exploring it to the hacker’s algorithm. Hence the hacking algorithm fails by not knowing the location to be targeted. Deep learning is an advanced technique developed to act like that of the human neurological analysis on several problems. Implementation of deep learning algorithm to the cloud security module identifies the movement of malware and spywares in the cloud storage. Similarly the cryptography is an old technique structured to hide the information with a cover data or cover image. It allows the hacking algorithm to extract only the useless data. This paper reviews the recent advancements in the cloud security with blockchain, deep learning and cryptographic models.
由于其可访问性的优点,云网络在最近变得非常流行。客户端可以从任何位置访问存储在云环境中的数据。可靠的屏蔽方法将保护存储在云中的数据免受黑客和恶意软件的攻击。区块链是最近实现的云网络技术之一,用于以加密分类账格式存储保存数据的位置。这将保存存储的数据位置,而无需向黑客的算法探索它。因此,黑客算法由于不知道目标位置而失败。深度学习是一种先进的技术,可以像人类神经学分析一样对一些问题进行分析。在云安全模块中实现深度学习算法,识别云存储中恶意软件和间谍软件的移动。类似地,密码学是一种古老的技术,其结构是用掩护数据或掩护图像隐藏信息。它允许黑客算法只提取无用的数据。本文回顾了区块链、深度学习和加密模型在云安全方面的最新进展。
{"title":"Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security","authors":"H. Andi","doi":"10.36548/jtcsst.2021.4.006","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.006","url":null,"abstract":"Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location. A reliable shielding approach will protect the data stored in the cloud from the hackers and malwares. Blockchain is one of the recent technologies implemented to the cloud network for storing the location of the saved data in an encrypted ledger format. This saves the stored data location without exploring it to the hacker’s algorithm. Hence the hacking algorithm fails by not knowing the location to be targeted. Deep learning is an advanced technique developed to act like that of the human neurological analysis on several problems. Implementation of deep learning algorithm to the cloud security module identifies the movement of malware and spywares in the cloud storage. Similarly the cryptography is an old technique structured to hide the information with a cover data or cover image. It allows the hacking algorithm to extract only the useless data. This paper reviews the recent advancements in the cloud security with blockchain, deep learning and cryptographic models.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131197149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Improved Methodology of SVM to Classify Acoustic Signal by Spectral Centroid 基于谱质心的支持向量机声信号分类改进方法
Pub Date : 2022-05-10 DOI: 10.36548/jtcsst.2021.4.005
S. Kavitha, J. Manikandan
Acoustic signal classification issues are addressed in this work using spectral examination, channel extracting the features from the input and machine learning algorithm. This brief article examines the effect of various settings on feature extraction. This feature-level channel combination's accuracy increase is then observed. To categorise things, pattern recognition utilises a variety of classification schemes. "Pattern" refers to the measures that must be categorised with accurate feature extracted. Images and audio signals are among the most common kinds of measurements. The proposed Support Vector Machine (SVM) is used for the necessity of an effective categorization of acoustic signals driven by the continual improvements in multimedia technology. This study uses two machine learning algorithms to enhance audio classification and categorization. The proposed SVM achieves superior performance than the other ML algorithm by spectral features.
声学信号的分类问题在这项工作中使用频谱检查,通道提取的特征从输入和机器学习算法。这篇简短的文章探讨了各种设置对特征提取的影响。然后观察到这种特征级通道组合的精度增加。为了对事物进行分类,模式识别利用了各种各样的分类方案。“模式”是指必须进行分类并提取准确特征的度量。图像和音频信号是最常见的测量方式。在多媒体技术不断发展的背景下,提出了支持向量机(SVM)对声信号进行有效分类的必要性。本研究使用两种机器学习算法来增强音频分类和分类。基于谱特征的支持向量机比其他机器学习算法具有更好的性能。
{"title":"Improved Methodology of SVM to Classify Acoustic Signal by Spectral Centroid","authors":"S. Kavitha, J. Manikandan","doi":"10.36548/jtcsst.2021.4.005","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.005","url":null,"abstract":"Acoustic signal classification issues are addressed in this work using spectral examination, channel extracting the features from the input and machine learning algorithm. This brief article examines the effect of various settings on feature extraction. This feature-level channel combination's accuracy increase is then observed. To categorise things, pattern recognition utilises a variety of classification schemes. \"Pattern\" refers to the measures that must be categorised with accurate feature extracted. Images and audio signals are among the most common kinds of measurements. The proposed Support Vector Machine (SVM) is used for the necessity of an effective categorization of acoustic signals driven by the continual improvements in multimedia technology. This study uses two machine learning algorithms to enhance audio classification and categorization. The proposed SVM achieves superior performance than the other ML algorithm by spectral features.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121842148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Future Challenges of the Internet of Things in the Health Care Domain - An Overview 物联网在医疗保健领域的未来挑战——概述
Pub Date : 2022-02-09 DOI: 10.36548/jtcsst.2021.4.003
S. Smys, Jennifer S. Raj
Medical IoT systems have recently become one of the most sophisticated medical technologies in well-developed countries. The remote monitoring of medical services may benefit greatly from this technology. According to a new study, security measures and training are critical in protecting IoMT systems from cyber-attacks. In this paper, the primary security and privacy challenges with IoMT are examined using current security solutions. Non-cryptographic and cryptographic approaches are used for a variety of attacks. It's therefore possible to compare the computational complexity of the various solutions and the resources they demand. Besides, the discussion of attack versions with causes for possible solutions, the dangerous scenarios of various attacks are also provided here. IoMT security methods, particularly in the rapidly expanding field of digital healthcare, show a trade-off between security level and system performance. There is a final section that talks about the acceptable security solutions, such as various attacks through common solution methods and protocols.
医疗物联网系统最近已成为发达国家最先进的医疗技术之一。医疗服务的远程监控可能会从这项技术中受益匪浅。根据一项新的研究,安全措施和培训对于保护IoMT系统免受网络攻击至关重要。在本文中,使用当前的安全解决方案检查了IoMT的主要安全和隐私挑战。非加密和加密方法用于各种攻击。因此,可以比较各种解决方案的计算复杂性及其所需的资源。此外,还讨论了各种攻击的版本和可能解决方案的原因,以及各种攻击的危险场景。IoMT安全方法,特别是在快速发展的数字医疗领域,需要在安全级别和系统性能之间进行权衡。最后一节讨论了可接受的安全解决方案,例如通过通用解决方案方法和协议进行的各种攻击。
{"title":"Future Challenges of the Internet of Things in the Health Care Domain - An Overview","authors":"S. Smys, Jennifer S. Raj","doi":"10.36548/jtcsst.2021.4.003","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.003","url":null,"abstract":"Medical IoT systems have recently become one of the most sophisticated medical technologies in well-developed countries. The remote monitoring of medical services may benefit greatly from this technology. According to a new study, security measures and training are critical in protecting IoMT systems from cyber-attacks. In this paper, the primary security and privacy challenges with IoMT are examined using current security solutions. Non-cryptographic and cryptographic approaches are used for a variety of attacks. It's therefore possible to compare the computational complexity of the various solutions and the resources they demand. Besides, the discussion of attack versions with causes for possible solutions, the dangerous scenarios of various attacks are also provided here. IoMT security methods, particularly in the rapidly expanding field of digital healthcare, show a trade-off between security level and system performance. There is a final section that talks about the acceptable security solutions, such as various attacks through common solution methods and protocols.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133326774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fake News Detection using Data Mining Techniques 利用数据挖掘技术检测假新闻
Pub Date : 2021-12-31 DOI: 10.36548/jtcsst.2021.4.002
S. Sunil Kumar Aithal, Krishna Prasad Roa, R. P. Puneeth
Nowadays, internet has been well known as an information source where the information might be real or fake. Fake news over the web exist since several years. The main challenge is to detect the truthfulness of the news. The motive behind writing and publishing the fake news is to mislead the people. It causes damage to an agency, entity or person. This paper aims to detect fake news using semantic search.
如今,互联网已经众所周知的信息来源,其中的信息可能是真实的或虚假的。网络上的假新闻已经存在好几年了。主要的挑战是查明新闻的真实性。撰写和发布假新闻的动机是误导人民。对机构、实体或个人造成损害。本文旨在利用语义搜索来检测假新闻。
{"title":"Fake News Detection using Data Mining Techniques","authors":"S. Sunil Kumar Aithal, Krishna Prasad Roa, R. P. Puneeth","doi":"10.36548/jtcsst.2021.4.002","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.002","url":null,"abstract":"Nowadays, internet has been well known as an information source where the information might be real or fake. Fake news over the web exist since several years. The main challenge is to detect the truthfulness of the news. The motive behind writing and publishing the fake news is to mislead the people. It causes damage to an agency, entity or person. This paper aims to detect fake news using semantic search.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speedy Detection Module for Abandoned Belongings in Airport Using Improved Image Processing Technique 基于改进图像处理技术的机场弃物快速检测模块
Pub Date : 2021-12-28 DOI: 10.36548/jtcsst.2021.4.001
A. Sathesh, Y. B. Hamdan
Recently, in computer vision and video surveillance applications, moving object recognition and tracking have become more popular and are hard research issues. When an item is left unattended in a video surveillance system for an extended period of time, it is considered abandoned. Detecting abandoned or removed things from complex surveillance recordings is challenging owing to various variables, including occlusion, rapid illumination changes, and so forth. Background subtraction used in conjunction with object tracking are often used in an automated abandoned item identification system, to check for certain pre-set patterns of activity that occur when an item is abandoned. An upgraded form of image processing is used in the preprocessing stage to remove foreground items. In subsequent frames with extended duration periods, static items are recognized by utilizing the contour characteristics of foreground objects. The edge-based object identification approach is used to classify the identified static items into human and nonhuman things. An alert is activated at a specific distance from the item, depending on the analysis of the stationary object. There is evidence that the suggested system has a fast reaction time and is useful for monitoring in real time. The aim of this study is to discover abandoned items in public settings in a timely manner.
近年来,在计算机视觉和视频监控应用中,运动目标的识别和跟踪已成为研究热点和难点问题。当一件物品在视频监控系统中长时间无人看管时,它就被认为是废弃的。由于各种变量,包括遮挡、快速照明变化等,从复杂的监控记录中检测废弃或移除的东西是具有挑战性的。背景减法与目标跟踪相结合,经常用于自动丢弃物品识别系统,以检查当物品被丢弃时发生的某些预先设定的活动模式。在预处理阶段使用一种升级形式的图像处理来去除前景项目。在持续时间延长的后续帧中,利用前景物体的轮廓特征来识别静态物体。采用基于边缘的物体识别方法,将识别出的静态物体分为人与非人两类。根据对静止物体的分析,警报会在与物品的特定距离处激活。有证据表明,所建议的系统具有快速的反应时间,可用于实时监控。本研究的目的是及时发现公共场所的废弃物品。
{"title":"Speedy Detection Module for Abandoned Belongings in Airport Using Improved Image Processing Technique","authors":"A. Sathesh, Y. B. Hamdan","doi":"10.36548/jtcsst.2021.4.001","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.001","url":null,"abstract":"Recently, in computer vision and video surveillance applications, moving object recognition and tracking have become more popular and are hard research issues. When an item is left unattended in a video surveillance system for an extended period of time, it is considered abandoned. Detecting abandoned or removed things from complex surveillance recordings is challenging owing to various variables, including occlusion, rapid illumination changes, and so forth. Background subtraction used in conjunction with object tracking are often used in an automated abandoned item identification system, to check for certain pre-set patterns of activity that occur when an item is abandoned. An upgraded form of image processing is used in the preprocessing stage to remove foreground items. In subsequent frames with extended duration periods, static items are recognized by utilizing the contour characteristics of foreground objects. The edge-based object identification approach is used to classify the identified static items into human and nonhuman things. An alert is activated at a specific distance from the item, depending on the analysis of the stationary object. There is evidence that the suggested system has a fast reaction time and is useful for monitoring in real time. The aim of this study is to discover abandoned items in public settings in a timely manner.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT Based Covid Chatbot using Telegram 使用Telegram的基于物联网的Covid聊天机器人
Pub Date : 2021-07-15 DOI: 10.36548/jtcsst.2022.2.004
Jayanthi Muthuswamy, Sabitabrata Bhattacharya, Haswitha P Sai, M. Deepthi, Nikitha Nagaraj, Priya Das P
The days of needing keyboards to avail a service are over. Users today use chatbots or voice assistants to interact with systems. Chatbots provide intelligent and adapted answers. The goal of a chatbot is to establish a productive conversation between humans and machines. For each user query that is considered input, the chatbot responds with an answer. From helping doctors manage their schedules to answering simple questions from the public, chatbots have proven to be very useful in healthcare. The global pandemic caused by the coronavirus has changed everyone's life and has affected it differently. People must be kept informed on various aspects. Purpose of this article is to discuss the implementation and model of a telegram-based chatbot system, which helps people understand the facts, precautions, preventive measures, and various other aspects related to the coronavirus. The bot also focuses on a person's mood and provides mental health support.
需要键盘才能使用服务的时代已经结束了。今天的用户使用聊天机器人或语音助手与系统进行交互。聊天机器人提供智能和适应性的答案。聊天机器人的目标是在人与机器之间建立富有成效的对话。对于被视为输入的每个用户查询,聊天机器人都会响应一个答案。从帮助医生管理日程到回答公众的简单问题,聊天机器人已被证明在医疗保健领域非常有用。由冠状病毒引起的全球大流行改变了每个人的生活,并对其产生了不同的影响。必须让人们了解各个方面的情况。本文的目的是讨论一个基于电报的聊天机器人系统的实现和模型,它可以帮助人们了解与冠状病毒有关的事实、预防措施、预防措施和其他各个方面。该机器人还关注一个人的情绪,并提供心理健康支持。
{"title":"IoT Based Covid Chatbot using Telegram","authors":"Jayanthi Muthuswamy, Sabitabrata Bhattacharya, Haswitha P Sai, M. Deepthi, Nikitha Nagaraj, Priya Das P","doi":"10.36548/jtcsst.2022.2.004","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.004","url":null,"abstract":"The days of needing keyboards to avail a service are over. Users today use chatbots or voice assistants to interact with systems. Chatbots provide intelligent and adapted answers. The goal of a chatbot is to establish a productive conversation between humans and machines. For each user query that is considered input, the chatbot responds with an answer. From helping doctors manage their schedules to answering simple questions from the public, chatbots have proven to be very useful in healthcare. The global pandemic caused by the coronavirus has changed everyone's life and has affected it differently. People must be kept informed on various aspects. Purpose of this article is to discuss the implementation and model of a telegram-based chatbot system, which helps people understand the facts, precautions, preventive measures, and various other aspects related to the coronavirus. The bot also focuses on a person's mood and provides mental health support.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128218821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Trends in Computer Science and Smart Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1