首页 > 最新文献

2023 2nd International Conference on Edge Computing and Applications (ICECAA)最新文献

英文 中文
Method for Monitoring Patterns in the Behavior of Brain Activity Prior to an Episode of Epilepsy, Applied to Young People in Times of the Covid-19 Pandemic, using Low-Cost BCI Devices 使用低成本脑机接口设备监测癫痫发作前大脑活动行为模式的方法,应用于Covid-19大流行时期的年轻人
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212315
W. Auccahuasi, Oscar Linares, Luis Vivanco-Aldon, Martin Campos-Martinez, Humberto Quispe-Peña, Julia Sobrino-Mesias
Epilepsy is one of the characteristic diseases of brain activity. People with this disease live with the symptoms and try to control the events to mitigate the effects that they may cause, such as a fall, blow, or any other consequence. In these times of pandemic caused by COVID-19, many of the people who have this disease present many events in a row, which can be caused by many factors, such as being at home most of the day, without being able to go out to get distracted. In this research work, a practical method is presented to monitor and predict an epilepsy event, based on the measurement of stress and meditation levels by using low-cost devices. For the evaluation of the method, measurements were made on a patient who constantly presents epilepsy events. The evaluation was carried out when she took her classes online, where the students present greater pressure. The method uses smartwatches to evaluate the stress level and BCI devices to measure the level of meditation. The results found in the data analysis present grouped values for the positive and negative cases of happening of epilepsy events. In the evaluation, possible threshold values that can be used to classify epilepsy events were determined. The determined threshold value can be used independently if only one device can be counted on. The reference threshold value is determined between values of 41 and 79, on a scale of 1 to 100. It is concluded that the device that can be counted on in the market at a low cost is the smartwatch that measures the stress level, compared to the best-known brain signal analysis device. As for the BCI device, the presented method is easy to implement; it can be easily used by the patients themselves or their relatives.
癫痫是脑活动的特征性疾病之一。患有这种疾病的人生活在症状中,并试图控制这些事件以减轻它们可能引起的影响,如跌倒、打击或任何其他后果。在COVID-19引起的大流行时期,许多患有这种疾病的人连续出现许多事件,这可能是由许多因素引起的,例如一天中大部分时间呆在家里,不能出去分心。在这项研究工作中,提出了一种实用的方法来监测和预测癫痫事件,该方法基于使用低成本设备测量压力和冥想水平。为了对该方法进行评估,对一位经常出现癫痫事件的患者进行了测量。评估是在她上在线课程时进行的,在线课程的学生压力更大。该方法使用智能手表评估压力水平,BCI设备测量冥想水平。在数据分析中发现的结果为癫痫事件发生的阳性和阴性病例提供分组值。在评估中,确定了可用于癫痫事件分类的可能阈值。如果只有一个设备可以计数,则确定的阈值可以独立使用。参考阈值在41到79之间确定,范围为1到100。结论是,与最著名的大脑信号分析设备相比,在市场上可以信赖的低成本设备是测量压力水平的智能手表。对于BCI装置,该方法易于实现;它可以很容易地被病人自己或他们的亲属使用。
{"title":"Method for Monitoring Patterns in the Behavior of Brain Activity Prior to an Episode of Epilepsy, Applied to Young People in Times of the Covid-19 Pandemic, using Low-Cost BCI Devices","authors":"W. Auccahuasi, Oscar Linares, Luis Vivanco-Aldon, Martin Campos-Martinez, Humberto Quispe-Peña, Julia Sobrino-Mesias","doi":"10.1109/ICECAA58104.2023.10212315","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212315","url":null,"abstract":"Epilepsy is one of the characteristic diseases of brain activity. People with this disease live with the symptoms and try to control the events to mitigate the effects that they may cause, such as a fall, blow, or any other consequence. In these times of pandemic caused by COVID-19, many of the people who have this disease present many events in a row, which can be caused by many factors, such as being at home most of the day, without being able to go out to get distracted. In this research work, a practical method is presented to monitor and predict an epilepsy event, based on the measurement of stress and meditation levels by using low-cost devices. For the evaluation of the method, measurements were made on a patient who constantly presents epilepsy events. The evaluation was carried out when she took her classes online, where the students present greater pressure. The method uses smartwatches to evaluate the stress level and BCI devices to measure the level of meditation. The results found in the data analysis present grouped values for the positive and negative cases of happening of epilepsy events. In the evaluation, possible threshold values that can be used to classify epilepsy events were determined. The determined threshold value can be used independently if only one device can be counted on. The reference threshold value is determined between values of 41 and 79, on a scale of 1 to 100. It is concluded that the device that can be counted on in the market at a low cost is the smartwatch that measures the stress level, compared to the best-known brain signal analysis device. As for the BCI device, the presented method is easy to implement; it can be easily used by the patients themselves or their relatives.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115748485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Safety and Vehicle Speed Controlling using Internet of Things (IoT) 基于物联网(IoT)的人类安全和车速控制
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212192
S. Kavitha, Safreen, Padmasree, Niskriyaa, Keerthana
People require transportation to move from one place to another place nowadays. As the population expands, so does transportation across the country. Despite the high demand for vehicles, the number of accidents are increasing due to the lack of safety precautions. Moreover, major accidents occur for two-wheeler drivers because two-wheelers lack safety precautions that four-wheelers have. Many research studies that are conducted recently to determine the cause of accidents concluded that driving recklessly in crowded areas causes road accidents. The major goal of this research work is to minimize the road accidents and prevent road accidents while ensuring driver safety. The proposed model enhances human safety while driving is by employing Arduino UNO and IoT. The vehicle will only start if the driver wears helmet and not intoxicated. To track the vehicle's current location, GPS module is used. To avoid accidents due to vehicle overspeed, the speed of vehicle is continuously monitored. In a particular zone, the driver will be alerted to reduce the speed.
现在人们从一个地方到另一个地方需要交通工具。随着人口的增长,全国的交通也在增长。尽管对车辆的需求很高,但由于缺乏安全预防措施,事故数量正在增加。此外,两轮车司机经常发生重大事故,因为两轮车缺乏四轮车所具备的安全防范措施。最近进行的许多确定事故原因的研究得出结论,在拥挤地区鲁莽驾驶会导致交通事故。本研究工作的主要目标是在保证驾驶员安全的同时,最大限度地减少道路事故的发生,预防道路事故的发生。本文提出的模型通过使用Arduino UNO和IoT来提高人类驾驶时的安全性。车辆只有在驾驶员戴上头盔且没有醉酒的情况下才能启动。为了跟踪车辆的当前位置,使用了GPS模块。为了避免事故由于车辆超速、连续监控车辆的速度。在一个特定的区域,司机会被提醒减速。
{"title":"Human Safety and Vehicle Speed Controlling using Internet of Things (IoT)","authors":"S. Kavitha, Safreen, Padmasree, Niskriyaa, Keerthana","doi":"10.1109/ICECAA58104.2023.10212192","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212192","url":null,"abstract":"People require transportation to move from one place to another place nowadays. As the population expands, so does transportation across the country. Despite the high demand for vehicles, the number of accidents are increasing due to the lack of safety precautions. Moreover, major accidents occur for two-wheeler drivers because two-wheelers lack safety precautions that four-wheelers have. Many research studies that are conducted recently to determine the cause of accidents concluded that driving recklessly in crowded areas causes road accidents. The major goal of this research work is to minimize the road accidents and prevent road accidents while ensuring driver safety. The proposed model enhances human safety while driving is by employing Arduino UNO and IoT. The vehicle will only start if the driver wears helmet and not intoxicated. To track the vehicle's current location, GPS module is used. To avoid accidents due to vehicle overspeed, the speed of vehicle is continuously monitored. In a particular zone, the driver will be alerted to reduce the speed.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124929086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Denial of Service Attack Analysis Using Machine Learning Techniques 使用机器学习技术的拒绝服务攻击分析
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212215
Sohail Hussain, R. Karthikeyan, S. Ramamoorthi, I. Arafat, S. M. Gani
Internet helps the users to develop their skills as well as for doing their day to day activities. Regular work of the users is generally done via online. If people want to do money based transaction or sending important message to their neighbor, they use online network. This can be used and interfere by the attackers. Many attackers utilize the tools to disturb the authorized user job. Major attack utilized by the attacker to disturb the service get by the authorized users is denial of service. It becomes major kind of procedure done by the intruder to take control over system or to down the server. In this paper we analyze the DoS attack including its distributed version. Impacts of DoS are also discussed. Based on the survey and analysis we suggest the model for handling the DoS attack dynamically is also mentioned.
互联网帮助用户发展他们的技能,以及做他们的日常活动。用户的日常工作一般都是通过网络完成的。如果人们想要进行基于金钱的交易或向邻居发送重要信息,他们使用在线网络。这可以被攻击者使用和干扰。许多攻击者利用这些工具来干扰授权用户的作业。攻击者干扰授权用户获得服务的主要攻击方式是拒绝服务。入侵者采取的主要手段是控制系统或使服务器瘫痪。本文分析了DoS攻击及其分布式版本。还讨论了DoS的影响。在调查分析的基础上,提出了动态处理DoS攻击的模型。
{"title":"Denial of Service Attack Analysis Using Machine Learning Techniques","authors":"Sohail Hussain, R. Karthikeyan, S. Ramamoorthi, I. Arafat, S. M. Gani","doi":"10.1109/ICECAA58104.2023.10212215","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212215","url":null,"abstract":"Internet helps the users to develop their skills as well as for doing their day to day activities. Regular work of the users is generally done via online. If people want to do money based transaction or sending important message to their neighbor, they use online network. This can be used and interfere by the attackers. Many attackers utilize the tools to disturb the authorized user job. Major attack utilized by the attacker to disturb the service get by the authorized users is denial of service. It becomes major kind of procedure done by the intruder to take control over system or to down the server. In this paper we analyze the DoS attack including its distributed version. Impacts of DoS are also discussed. Based on the survey and analysis we suggest the model for handling the DoS attack dynamically is also mentioned.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125881837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Light Weight Intelligible Text-to-Speech Voice Model for Indian Accent Telugu 建立轻量级可理解的印度泰卢固语文本到语音语音模型
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212348
C. A. Kumar, Dr. Y. Chalapathi Rao, Vondala Naveen, Kumar, R. K. Senapati
Text-to-speech (TTS) synthesis involves creating machines that can talk. It is the process of automatically converting written text into spoken speech. TTS systems are important in human-computer interaction, and they have become more prominent with the advancement of computer technology. There has been a growing demand for speech applications in various areas such as telemedicine, robotics, Google Assistant, and other fields, especially during the Covid-19 era. It is clear that the existing speech technology is not good enough for users. Many speech applications still use pre-recorded prompts instead of text-to-speech because the quality of text-to-speech isn't good, and it can't pronounce non-standard words. In this study, a dependable and effective approach is proposed for creating speech synthesis voices that are specialized for specific domains and can handle non-standard words. This involves developing lexicon rules for non-standard words. By constructing databases that are closely related to the specific domain of the speech application, concatenative unit selection synthesis techniques, implemented using the festival/festvox tool, can be utilized to achieve high-quality, intelligible, and natural speech synthesis within the targeted domain. And the quality of proposed voice model is measured using Melcepstral distortion as an objective metric and Mean Opinion score as a subjective metric.
文本到语音(TTS)合成涉及到创造会说话的机器。它是将书面文本自动转换为口头语言的过程。TTS系统是人机交互的重要组成部分,随着计算机技术的发展,其作用日益突出。远程医疗、机器人、谷歌助手等各个领域对语音应用的需求不断增长,特别是在Covid-19时代。很明显,现有的语音技术对用户来说还不够好。许多语音应用程序仍然使用预先录制的提示,而不是文本到语音的提示,因为文本到语音的质量不好,而且不能发非标准单词的音。在本研究中,提出了一种可靠有效的方法来创建专门用于特定领域的语音合成语音,并且可以处理非标准单词。这包括为非标准单词制定词汇规则。通过构建与语音应用的特定领域密切相关的数据库,利用festival/festvox工具实现的串联单元选择合成技术可以在目标领域内实现高质量、可理解和自然的语音合成。并以残音失真作为客观度量,以平均意见评分作为主观度量,对所提出的语音模型的质量进行了度量。
{"title":"Building a Light Weight Intelligible Text-to-Speech Voice Model for Indian Accent Telugu","authors":"C. A. Kumar, Dr. Y. Chalapathi Rao, Vondala Naveen, Kumar, R. K. Senapati","doi":"10.1109/ICECAA58104.2023.10212348","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212348","url":null,"abstract":"Text-to-speech (TTS) synthesis involves creating machines that can talk. It is the process of automatically converting written text into spoken speech. TTS systems are important in human-computer interaction, and they have become more prominent with the advancement of computer technology. There has been a growing demand for speech applications in various areas such as telemedicine, robotics, Google Assistant, and other fields, especially during the Covid-19 era. It is clear that the existing speech technology is not good enough for users. Many speech applications still use pre-recorded prompts instead of text-to-speech because the quality of text-to-speech isn't good, and it can't pronounce non-standard words. In this study, a dependable and effective approach is proposed for creating speech synthesis voices that are specialized for specific domains and can handle non-standard words. This involves developing lexicon rules for non-standard words. By constructing databases that are closely related to the specific domain of the speech application, concatenative unit selection synthesis techniques, implemented using the festival/festvox tool, can be utilized to achieve high-quality, intelligible, and natural speech synthesis within the targeted domain. And the quality of proposed voice model is measured using Melcepstral distortion as an objective metric and Mean Opinion score as a subjective metric.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scene Style Conversion Algorithm of AI Digital Host: A Deep Learning Approach AI数字主机场景风格转换算法:一种深度学习方法
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212269
Xinli Lyu, Fangli Ying, Pintusorn Onpium
In the recent years, image diversity generation algorithms based on deep learning have gradually mined feature information that can describe the essential content of images through hierarchical learning, which has become a current research hotspot. In particular, the emergence of GANs has made the qualitative leap in the speed and quality of image data generation due to its good autonomous generation ability and ingenious weakly supervised learning mode. In this study, the focus is deep learning based scene style conversion algorithm of the AI digital host. The proposed model has 2 aspects: (1) Efficient face modelling. In this step, the face features are extracted and combined with deep neural networks to obtain the efficient representations, then, the rough stitching of point cloud data is applied to construct the different perspectives the faces. (2) Efficient style conversion algorithm. This study designs an improved GAN algorithm to create new image conversion scheme to complete the design of the AI host. In the experiment section, the mainstream evaluation methods are adopted to test the performance.
近年来,基于深度学习的图像多样性生成算法通过分层学习逐渐挖掘出能够描述图像本质内容的特征信息,成为当前的研究热点。特别是gan的出现,由于其良好的自主生成能力和巧妙的弱监督学习模式,使得图像数据生成的速度和质量都有了质的飞跃。本研究的重点是基于深度学习的AI数字主机场景风格转换算法。该模型具有2个方面:(1)高效的人脸建模。该步骤首先提取人脸特征并结合深度神经网络进行有效表征,然后利用点云数据的粗拼接来构建人脸的不同视角。(2)高效的风格转换算法。本研究设计了一种改进的GAN算法来创建新的图像转换方案,以完成AI主机的设计。在实验部分,采用主流评价方法对性能进行测试。
{"title":"Scene Style Conversion Algorithm of AI Digital Host: A Deep Learning Approach","authors":"Xinli Lyu, Fangli Ying, Pintusorn Onpium","doi":"10.1109/ICECAA58104.2023.10212269","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212269","url":null,"abstract":"In the recent years, image diversity generation algorithms based on deep learning have gradually mined feature information that can describe the essential content of images through hierarchical learning, which has become a current research hotspot. In particular, the emergence of GANs has made the qualitative leap in the speed and quality of image data generation due to its good autonomous generation ability and ingenious weakly supervised learning mode. In this study, the focus is deep learning based scene style conversion algorithm of the AI digital host. The proposed model has 2 aspects: (1) Efficient face modelling. In this step, the face features are extracted and combined with deep neural networks to obtain the efficient representations, then, the rough stitching of point cloud data is applied to construct the different perspectives the faces. (2) Efficient style conversion algorithm. This study designs an improved GAN algorithm to create new image conversion scheme to complete the design of the AI host. In the experiment section, the mainstream evaluation methods are adopted to test the performance.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125573006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT based on Smart Traffic Lights and Streetlight System 基于智能交通灯和路灯系统的物联网
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212121
S. S, Shakunthala M, C. V. Josphine, M. T. Kingslin, S. Sivarajan, Chairma Lakshmi K R
Energy wastage, traffic jams, and traffic monitoring are the three main problems the world's population is confronting. The traditional roadway management method is ineffective at controlling the flow of traffic when one lane has significantly more traffic than the others. Additionally, the present street light controller uses lights that are not turned off in the morning even though it is sufficiently light outside and that are turned on in the late afternoon before even the sun sets, which causes some power loss. This proposed system will offer an advanced smart traffic management system and intelligent street lighting system to bring a standardized approach to solving this issue. The enhanced smart traffic control system is accomplished by modifying the signal timings based on the comparison of the densities on all roads, i.e., when a specific lane has much more density compared to the other lanes, that specific lane is modified to a green signal for a specified length of time. By computerizing solar-powered street lights with IoT, energy wastage in the traditional street lighting system is prevented. The street lights are activated whenever an item moves, or they remain off otherwise. This proposed method reduces traffic issues, and energy wastage and improves the traffic monitoring process also.
能源浪费、交通堵塞和交通监控是世界人口面临的三大主要问题。传统的道路管理方法在一条车道的交通量明显大于另一条车道的情况下无法有效控制交通流量。此外,目前的路灯控制器使用的灯在早上没有关闭,即使外面光线充足,并且在下午晚些时候甚至在太阳落山之前打开,这导致了一些电力损失。该系统将提供先进的智能交通管理系统和智能街道照明系统,为解决这一问题带来标准化的方法。增强型智能交通控制系统是通过比较所有道路上的密度来修改信号配时来实现的,即当特定车道的密度比其他车道大得多时,该特定车道在指定的时间内被修改为绿色信号。通过物联网将太阳能路灯电脑化,避免了传统路灯系统的能源浪费。每当有物品移动时,路灯就会被激活,否则它们就会保持关闭状态。该方法减少了交通问题和能源浪费,改进了交通监控过程。
{"title":"IoT based on Smart Traffic Lights and Streetlight System","authors":"S. S, Shakunthala M, C. V. Josphine, M. T. Kingslin, S. Sivarajan, Chairma Lakshmi K R","doi":"10.1109/ICECAA58104.2023.10212121","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212121","url":null,"abstract":"Energy wastage, traffic jams, and traffic monitoring are the three main problems the world's population is confronting. The traditional roadway management method is ineffective at controlling the flow of traffic when one lane has significantly more traffic than the others. Additionally, the present street light controller uses lights that are not turned off in the morning even though it is sufficiently light outside and that are turned on in the late afternoon before even the sun sets, which causes some power loss. This proposed system will offer an advanced smart traffic management system and intelligent street lighting system to bring a standardized approach to solving this issue. The enhanced smart traffic control system is accomplished by modifying the signal timings based on the comparison of the densities on all roads, i.e., when a specific lane has much more density compared to the other lanes, that specific lane is modified to a green signal for a specified length of time. By computerizing solar-powered street lights with IoT, energy wastage in the traditional street lighting system is prevented. The street lights are activated whenever an item moves, or they remain off otherwise. This proposed method reduces traffic issues, and energy wastage and improves the traffic monitoring process also.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Security Analysis using Blockchain Technology 使用区块链技术进行云安全分析
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212415
K. Meenakshi, S. Sivasubramanian, B. Bharathi, S. John, Justin Thangaraj
Cloud computing is now widely employed across a variety of IT-related fields. It has become an essential technology to address infrastructure and data service requirements with minimal effort, low-cost, and with a high degree of scalability. Although the use of cloud computing has increased significantly, information security concerns have not yet been fully resolved. There are still certain information security concerns that must be resolved in order for cloud computing to advance. In terms of integrity, authenticity, and secrecy, in particular, Blockchain has developed into an essential security instrument. The application of Blockchain in cloud computing security is further examined in this article after a review of the different security concerns in blockchain and cloud computing. The main challenge in the cloud computing is cloud computing security. Because data in the cloud must be transported via the Internet, data security becomes a top priority. It is necessary to maintain the primary data protection methods, such as integrity, accountability, privacies, access controls, authentications, and authorizations. Blockchain is a technological advancement that enhances cloud computing. Blockchain resolves cloud computing security problems. This study seeks to analyze and contrast various cloud environment security challenges with blockchain security difficulties.
云计算现在被广泛应用于各种it相关领域。它已经成为以最小的努力、低成本和高度可伸缩性来满足基础设施和数据服务需求的一项基本技术。虽然云计算的使用显著增加,但信息安全问题尚未完全解决。为了推动云计算的发展,仍然需要解决一些信息安全问题。特别是在完整性、真实性和保密性方面,区块链已经发展成为一种必不可少的安全工具。在回顾了区块链和云计算中的不同安全问题之后,本文将进一步研究区块链在云计算安全中的应用。云计算面临的主要挑战是云计算的安全性。由于云中的数据必须通过互联网传输,因此数据安全成为重中之重。维护主要的数据保护方法是必要的,例如完整性、责任、隐私、访问控制、身份验证和授权。区块链是一项增强云计算的技术进步。区块链解决了云计算的安全问题。本研究旨在分析和对比各种云环境安全挑战与区块链安全困难。
{"title":"Cloud Security Analysis using Blockchain Technology","authors":"K. Meenakshi, S. Sivasubramanian, B. Bharathi, S. John, Justin Thangaraj","doi":"10.1109/ICECAA58104.2023.10212415","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212415","url":null,"abstract":"Cloud computing is now widely employed across a variety of IT-related fields. It has become an essential technology to address infrastructure and data service requirements with minimal effort, low-cost, and with a high degree of scalability. Although the use of cloud computing has increased significantly, information security concerns have not yet been fully resolved. There are still certain information security concerns that must be resolved in order for cloud computing to advance. In terms of integrity, authenticity, and secrecy, in particular, Blockchain has developed into an essential security instrument. The application of Blockchain in cloud computing security is further examined in this article after a review of the different security concerns in blockchain and cloud computing. The main challenge in the cloud computing is cloud computing security. Because data in the cloud must be transported via the Internet, data security becomes a top priority. It is necessary to maintain the primary data protection methods, such as integrity, accountability, privacies, access controls, authentications, and authorizations. Blockchain is a technological advancement that enhances cloud computing. Blockchain resolves cloud computing security problems. This study seeks to analyze and contrast various cloud environment security challenges with blockchain security difficulties.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Raspberry Pi Controller based Sewage Treating Mobile Robot using Machine Learning 基于树莓派控制器的污水处理机器学习移动机器人
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212386
K. M, N. M, Naresh Kumar A, Nitheesh Gokul M
The sewage system is the mechanism for efficiently dumping sewage from buildings and other locations. Sewage is collected using various components such as drains, manholes, pumping stations, and sanitary sewers. In cities, sewage is transported separately in sanitary sewers, while street runoff is managed by storm drains. In cities, the sewage system is accessible by a manhole. Due to high precipitation seasons, sewage is discharged straight into receiving waterways, posing a concern to public health. To decrease human labour and fatalities, a robot is deployed to remove blocked garbage from the canal and warns crew members if the container used for waste collection becomes totally full. To maintain the environment clean, the sewage canals should be monitored by performing live data comparison.
污水处理系统是有效地从建筑物和其他地点倾倒污水的机制。污水是通过各种组件收集的,如排水沟、沙井、泵站和卫生下水道。在城市,污水在卫生下水道中单独运输,而街道径流由雨水渠管理。在城市里,污水处理系统可以通过人孔进入。由于高降水季节,污水直接排入接收水道,对公众健康构成关切。为了减少人力和死亡人数,他们部署了一个机器人来清除运河上堵塞的垃圾,并在用于收集垃圾的容器完全装满时警告船员。为保持环境清洁,污水渠应进行实时数据比较监测。
{"title":"Raspberry Pi Controller based Sewage Treating Mobile Robot using Machine Learning","authors":"K. M, N. M, Naresh Kumar A, Nitheesh Gokul M","doi":"10.1109/ICECAA58104.2023.10212386","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212386","url":null,"abstract":"The sewage system is the mechanism for efficiently dumping sewage from buildings and other locations. Sewage is collected using various components such as drains, manholes, pumping stations, and sanitary sewers. In cities, sewage is transported separately in sanitary sewers, while street runoff is managed by storm drains. In cities, the sewage system is accessible by a manhole. Due to high precipitation seasons, sewage is discharged straight into receiving waterways, posing a concern to public health. To decrease human labour and fatalities, a robot is deployed to remove blocked garbage from the canal and warns crew members if the container used for waste collection becomes totally full. To maintain the environment clean, the sewage canals should be monitored by performing live data comparison.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122835118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Analysis on Unconstraint Video Analysis Using Deep Learning Approaches 基于深度学习方法的无约束视频分析综合分析
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212227
P. N. Bhushanam, S. S
Unconstraint video analytics are important in visual learning. Unconstrained videos contain complex content with various artifacts, variable lengths, and different operating environments. Human activity plays an important role in the video, abundant in archives and becoming more prevalent on the Internet. Various methods are employed for action recognition under constrained conditions, but huge attention to complex actions and realistic applications is substantially needed. Complex movements consist of sequences of simple movements that have long temporal structures. Complex actions in the same class exhibit large variations in class-interior appearance and behavior due to complex temporal structures, confusing backgrounds, changes in viewpoint, and changes in movement speed. Thus, feature representation and classification of complex motions are determined to be challenging in unconstrained video analysisdue to complex temporal structures. This article presents a comprehensive analysis to solve this problem using deep learningapproaches.
无约束视频分析在视觉学习中很重要。不受约束的视频包含具有各种工件、可变长度和不同操作环境的复杂内容。人类活动在视频中扮演着重要的角色,在档案中丰富,在互联网上越来越流行。约束条件下的动作识别方法多种多样,但需要对复杂动作和实际应用给予高度重视。复杂动作由一系列具有长时间结构的简单动作组成。由于复杂的时间结构、令人困惑的背景、视点的变化和移动速度的变化,同一职业中的复杂动作在职业内部的外观和行为上表现出很大的变化。因此,由于复杂的时间结构,复杂运动的特征表示和分类在无约束视频分析中具有挑战性。本文提出了一个全面的分析,以解决这个问题,使用深度学习的方法。
{"title":"A Comprehensive Analysis on Unconstraint Video Analysis Using Deep Learning Approaches","authors":"P. N. Bhushanam, S. S","doi":"10.1109/ICECAA58104.2023.10212227","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212227","url":null,"abstract":"Unconstraint video analytics are important in visual learning. Unconstrained videos contain complex content with various artifacts, variable lengths, and different operating environments. Human activity plays an important role in the video, abundant in archives and becoming more prevalent on the Internet. Various methods are employed for action recognition under constrained conditions, but huge attention to complex actions and realistic applications is substantially needed. Complex movements consist of sequences of simple movements that have long temporal structures. Complex actions in the same class exhibit large variations in class-interior appearance and behavior due to complex temporal structures, confusing backgrounds, changes in viewpoint, and changes in movement speed. Thus, feature representation and classification of complex motions are determined to be challenging in unconstrained video analysisdue to complex temporal structures. This article presents a comprehensive analysis to solve this problem using deep learningapproaches.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"105 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114032554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Digital Cheque Signature Verification using Deep Learning Approach 基于深度学习方法的在线数字支票签名验证
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212410
A. M., S. Suvarna, Rajgopal K T
The use of a signature as a biometric authentication method is crucial in banking and financial systems. The two forms of signatures are offline and online, with offline signatures being the more popular choice because of how straightforward and distinctive they are. The payer and payee must both sign digital cheques, just like paper ones. In this proposed approach we build a security system, verifying entrance applications and evaluating password substitutes. The proposed approach will create a system that can authenticate digital signatures online while clearing checks for banks and detecting any flaws, guaranteeing confidentiality and preventing fraud. The goal is to successfully validate the validity of online digital checks that contain signatures.
在银行和金融系统中,使用签名作为生物识别认证方法是至关重要的。签名的两种形式是离线和在线,离线签名是更受欢迎的选择,因为它们非常简单和独特。付款人和收款人都必须签署数字支票,就像纸质支票一样。在这个建议的方法中,我们建立了一个安全系统,验证入口申请和评估密码替代品。拟议的方法将创建一个系统,可以在线验证数字签名,同时为银行清算支票并检测任何缺陷,保证保密性并防止欺诈。目标是成功验证包含签名的在线数字检查的有效性。
{"title":"Online Digital Cheque Signature Verification using Deep Learning Approach","authors":"A. M., S. Suvarna, Rajgopal K T","doi":"10.1109/ICECAA58104.2023.10212410","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212410","url":null,"abstract":"The use of a signature as a biometric authentication method is crucial in banking and financial systems. The two forms of signatures are offline and online, with offline signatures being the more popular choice because of how straightforward and distinctive they are. The payer and payee must both sign digital cheques, just like paper ones. In this proposed approach we build a security system, verifying entrance applications and evaluating password substitutes. The proposed approach will create a system that can authenticate digital signatures online while clearing checks for banks and detecting any flaws, guaranteeing confidentiality and preventing fraud. The goal is to successfully validate the validity of online digital checks that contain signatures.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122031626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 2nd International Conference on Edge Computing and Applications (ICECAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1