首页 > 最新文献

2023 2nd International Conference on Edge Computing and Applications (ICECAA)最新文献

英文 中文
Diagnosis of Melanoma by Analysing UV-Ray Intensity and Dermoscopy Images Through Mobile Application 通过移动应用程序分析紫外线强度和皮肤镜图像诊断黑色素瘤
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212183
D.Wishma, S.Gayathri, C. Viknesh, R.Seetharaman
Skin cancer is caused by unrepaired DNA damage to the epidermis, the top layer of skin, which results in mutations and uncontrollable cell proliferation of abnormal cells. Skin cells undergo modification, proliferate rapidly, and transform into malignant tumors as a result. Squamous cell carcinoma, melanoma, and basal cell carcinoma are the three most prevalent kinds of skin cancer. The first two types of skin cancer as well as a few additional less common types are collectively referred to as non-melanoma skin cancer. The size, shape, or color of a mole changes, or it bleeds or itches. Its margins could also be discolored or uneven. Melanoma is the most dangerous type of cancer. In 90% of cases, exposure to the sun's UV rays is to blame. This exposure increases the risk of acquiring any of the three primary kinds of skin cancer. Skin cancer is brought on by unbalanced sunburn cells carried on by continuous UVB exposure. In order to prevent harm, UV intensity is measured and safety precautions are performed for the corresponding intensity. Here is a methodological approach for using a mobile application to diagnose melanoma using dermoscopy images.
皮肤癌是由于皮肤最上层表皮的DNA损伤未修复,导致异常细胞突变和不可控的细胞增殖而引起的。皮肤细胞经过修饰,迅速增殖,最终转化为恶性肿瘤。鳞状细胞癌、黑色素瘤和基底细胞癌是三种最常见的皮肤癌。前两种类型的皮肤癌以及其他一些不太常见的类型统称为非黑色素瘤皮肤癌。痣的大小、形状或颜色会发生变化,或者会出血或发痒。它的边缘也可能变色或不均匀。黑色素瘤是最危险的癌症类型。在90%的病例中,暴露在太阳的紫外线下是罪魁祸首。这种暴露增加了患三种原发性皮肤癌的风险。皮肤癌是由持续暴露在中波紫外线下导致的不平衡的晒伤细胞引起的。为防止危害,对紫外线强度进行测量,并对相应强度进行安全防范。这是一种使用移动应用程序使用皮肤镜图像诊断黑色素瘤的方法。
{"title":"Diagnosis of Melanoma by Analysing UV-Ray Intensity and Dermoscopy Images Through Mobile Application","authors":"D.Wishma, S.Gayathri, C. Viknesh, R.Seetharaman","doi":"10.1109/ICECAA58104.2023.10212183","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212183","url":null,"abstract":"Skin cancer is caused by unrepaired DNA damage to the epidermis, the top layer of skin, which results in mutations and uncontrollable cell proliferation of abnormal cells. Skin cells undergo modification, proliferate rapidly, and transform into malignant tumors as a result. Squamous cell carcinoma, melanoma, and basal cell carcinoma are the three most prevalent kinds of skin cancer. The first two types of skin cancer as well as a few additional less common types are collectively referred to as non-melanoma skin cancer. The size, shape, or color of a mole changes, or it bleeds or itches. Its margins could also be discolored or uneven. Melanoma is the most dangerous type of cancer. In 90% of cases, exposure to the sun's UV rays is to blame. This exposure increases the risk of acquiring any of the three primary kinds of skin cancer. Skin cancer is brought on by unbalanced sunburn cells carried on by continuous UVB exposure. In order to prevent harm, UV intensity is measured and safety precautions are performed for the corresponding intensity. Here is a methodological approach for using a mobile application to diagnose melanoma using dermoscopy images.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Impact of RPL Control Overhead on Network Performance 评估RPL控制开销对网络性能的影响
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212142
S. Hussain, M. Roopa
In IoT-LLN networks, RPL is a widely used routing protocol. RPL provides a lightweight and efficient way to route packets between devices in LLNs, creating a mesh network topology. For network bootstrapping and maintenance purposes, it periodically transmits DIO, DIS, DAO, and DAO-ACK packets. The lower-layer 6TiS CH protocol uses only a single minimal cell in a slotframe to transfer control messages. This increases the transmitting control messages' queue size. The packets in the transmission queue that have been waiting for a long time are removed from the queue. Network-associated nodes transfer control messages simultaneously, which causes the collision. Because of these issues, nodes waiting to join the network are not receiving the required control messages, and remain unassociated. Network-associated nodes must receive the DIO packets regularly to update the network topology information. If these nodes do not receive the DIO packets, it causes unnecessary parent-switching measures. Extensive simulations were done using Contiki-NG's COOJA simulator with varying network sizes, slotframe lengths, and hop sequences. Increased network size, slotframe lengths, and hop sequence caused more control message collisions, and parent-switching.
在IoT-LLN网络中,RPL是一种广泛使用的路由协议。RPL提供了一种轻量级和高效的方式在lln中设备之间路由数据包,从而创建了网状网络拓扑。出于网络引导和维护的目的,它定期传输DIO、DIS、DAO和DAO- ack报文。较低层的6TiS - CH协议仅使用槽帧中的单个最小单元来传输控制消息。这增加了传输控制消息的队列大小。传输队列中等待时间较长的数据包将被从队列中移除。与网络相关的节点同时传输控制消息,从而导致冲突。由于这些问题,等待加入网络的节点没有收到所需的控制消息,并且保持未关联状态。网络关联节点需要定期接收DIO报文,以更新网络拓扑信息。如果这些节点没有收到DIO报文,就会导致不必要的父交换措施。使用Contiki-NG的COOJA模拟器对不同的网络大小、槽帧长度和跳数序列进行了大量的模拟。增加的网络大小、槽帧长度和跳序列会导致更多的控制消息冲突和父交换。
{"title":"Evaluating the Impact of RPL Control Overhead on Network Performance","authors":"S. Hussain, M. Roopa","doi":"10.1109/ICECAA58104.2023.10212142","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212142","url":null,"abstract":"In IoT-LLN networks, RPL is a widely used routing protocol. RPL provides a lightweight and efficient way to route packets between devices in LLNs, creating a mesh network topology. For network bootstrapping and maintenance purposes, it periodically transmits DIO, DIS, DAO, and DAO-ACK packets. The lower-layer 6TiS CH protocol uses only a single minimal cell in a slotframe to transfer control messages. This increases the transmitting control messages' queue size. The packets in the transmission queue that have been waiting for a long time are removed from the queue. Network-associated nodes transfer control messages simultaneously, which causes the collision. Because of these issues, nodes waiting to join the network are not receiving the required control messages, and remain unassociated. Network-associated nodes must receive the DIO packets regularly to update the network topology information. If these nodes do not receive the DIO packets, it causes unnecessary parent-switching measures. Extensive simulations were done using Contiki-NG's COOJA simulator with varying network sizes, slotframe lengths, and hop sequences. Increased network size, slotframe lengths, and hop sequence caused more control message collisions, and parent-switching.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Fault Current Detection System Using IoT 使用物联网的可重构故障电流检测系统
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212218
P. Latha, Victoria Jancee, K. Kaviyarasan, S. Aghalya, J. Martin, L. Manickam
This research study intends to develop a novel method for identifying over-current or fault-current concerns in appliances and electronics used in the home or industry, such as battery and chargers is discussed. The system monitors electrical circuits in real-time, detects faults, and alerts appropriate parties through sound alarms and email notifications. The system may be configured according to individual defect detection needs. The NIOS II (Altera DE2 EDK) processor controls the numerous components and processes and analyzes data. To properly monitor electrical characteristics, voltage, and current sensors are added into the system. The NIOS II processor continually monitors observed data and compares them to specified threshold levels. An alarm sounds if voltage or current exceeds the thresholds, communicating an issue or abnormal situation. Through IoT server connectivity, the system sends email notifications in addition to the sound alert. An email notice is sent to a predetermined email address when a fault condition is detected, providing remote monitoring and quick information about the fault occurrence. The system's benefits include reconfigurability, monitoring in real-time, alarm alerting, remote email notification, safety, and customization.
本研究旨在开发一种新的方法来识别家庭或工业中使用的电器和电子产品中的过流或故障电流问题,例如电池和充电器。系统对电路进行实时监控,及时发现故障,并通过声音报警、邮件通知等方式向相关方发出警报。系统可以根据单个缺陷检测的需要进行配置。NIOS II (Altera DE2 EDK)处理器控制众多组件和进程并分析数据。为了正确地监控电气特性,在系统中添加了电压和电流传感器。NIOS II处理器持续监视观察到的数据,并将它们与指定的阈值水平进行比较。当电压或电流超过阈值时发出告警,提示存在问题或异常情况。通过物联网服务器连接,系统除了发出声音警报外,还会发送电子邮件通知。当检测到故障情况时,通过邮件通知的方式发送到指定邮箱,实现远程监控和快速了解故障发生情况。该系统的优点包括可重构性、实时监控、警报警报、远程电子邮件通知、安全性和可定制性。
{"title":"Reconfigurable Fault Current Detection System Using IoT","authors":"P. Latha, Victoria Jancee, K. Kaviyarasan, S. Aghalya, J. Martin, L. Manickam","doi":"10.1109/ICECAA58104.2023.10212218","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212218","url":null,"abstract":"This research study intends to develop a novel method for identifying over-current or fault-current concerns in appliances and electronics used in the home or industry, such as battery and chargers is discussed. The system monitors electrical circuits in real-time, detects faults, and alerts appropriate parties through sound alarms and email notifications. The system may be configured according to individual defect detection needs. The NIOS II (Altera DE2 EDK) processor controls the numerous components and processes and analyzes data. To properly monitor electrical characteristics, voltage, and current sensors are added into the system. The NIOS II processor continually monitors observed data and compares them to specified threshold levels. An alarm sounds if voltage or current exceeds the thresholds, communicating an issue or abnormal situation. Through IoT server connectivity, the system sends email notifications in addition to the sound alert. An email notice is sent to a predetermined email address when a fault condition is detected, providing remote monitoring and quick information about the fault occurrence. The system's benefits include reconfigurability, monitoring in real-time, alarm alerting, remote email notification, safety, and customization.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"325-326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Customisable AI Deck for Pitch Reports and Automated III Umpire Decision Review System DRS 一个可定制的AI甲板球场报告和自动III裁判决定审查系统DRS
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212245
P. Ramya, C.P. Gowtham, S. K. Kumar, T. P. Silpica, P. Renugadevi
Nowadays giving fair verdict is a quite challenging task because of certain contentious aspects in modern cricket. So, in order to avoid making wrong decisions, we develop an automated AI-based solution. This project focus on a technology that helps both the main umpire and third umpire to makes critical determination for Leg Before the Wicket (LBW) regarding whether the batsman is out or not-out and also minimizes the waiting time for players until the third umpire go through the trajectory of the ball to make a correct decision. The main purpose of our AI-DRS is to remove the umpires call which plays a vital role in giving third umpires decision because whether any one of the cases shows umpires call the decision will be stick with on-field umpires call whether it may be out or not-out. The pitch report and comprehensive cricket laws are also included for the sake of the game. The pitch report will be examined with several key wicket characteristics, such as kind of soil, cracks, amount of grass cover, and wetness, etc. using drone we capture the video of the match day pitch. To determine the field crack, canny edge detection is performed and soil moisture sensor is used to determine the moisture content of the soil. This information help cricket team to make a decision about whether to bat or field after winning the toss and helps to choose the strongest 11 players through which can win the match on that pitch on that day. Utilizing support vector machine (SVM) and histograms of gradients (HOG), objects are classified and recognized. In order to monitor and forecast the velocity of the ball, linear regression and quadratic regression are applied. Finally, Tkinter is used for GUI development, imutils and OpenCV are used as implementation tools. Due to the controversy of rare wicket calls, boundary and penalty runs, we bring a voice recognized AI system which gave fans to easily understand why this decision is made by the umpire and sometime umpires found difficulty to remember some rules which is rarely used in cricket it will also give assist to on-field umpires to give a very clear idea why he made the decision, the on-field umpires can easily access the laws through voice recognition which use Alan-AI. The Voice recognition web app was developed using react-js.
如今,由于现代板球中某些有争议的方面,给予公平裁决是一项相当具有挑战性的任务。因此,为了避免做出错误的决定,我们开发了一个基于人工智能的自动化解决方案。该项目主要研究一种技术,可以帮助主裁判员和第三裁判员在三柱前(LBW)对击球手是否出局做出关键判断,并最大限度地减少球员等待时间,直到第三裁判员通过球的轨迹做出正确的决定。我们的AI-DRS的主要目的是消除裁判员的判罚,裁判员的判罚在给予第三裁判判罚的过程中起着至关重要的作用,因为任何一种情况显示裁判员的判罚都将与现场裁判员的判罚保持一致,无论该判罚是否出局。球场报告和全面的板球规则也包括为了比赛。球场报告将检查几个关键的小门特征,如土壤类型,裂缝,草覆盖的数量和湿度等。我们使用无人机捕捉比赛日球场的视频。为确定现场裂缝,采用精细边缘检测和土壤水分传感器测定土壤含水量。这些信息有助于板球队在赢得投掷后决定是击球还是上场,并有助于选择当天在该球场上赢得比赛的最强11名球员。利用支持向量机(SVM)和梯度直方图(HOG)对目标进行分类和识别。为了监测和预测球的速度,应用了线性回归和二次回归。最后,使用Tkinter进行GUI开发,使用imutils和OpenCV作为实现工具。由于罕见的wicket调用的争议,边界和罚款,我们把一个声音公认的AI系统,给粉丝们很容易理解为什么这个决定是由裁判和裁判的某个时候发现很难记住一些规则在板球很少使用它也会给协助场上裁判给一个非常明确的知道为什么他决定,一秒钟内作出取代场上裁判可以很容易地通过语音识别使用Alan-AI访问的法律。语音识别web应用程序是使用react-js开发的。
{"title":"A Customisable AI Deck for Pitch Reports and Automated III Umpire Decision Review System DRS","authors":"P. Ramya, C.P. Gowtham, S. K. Kumar, T. P. Silpica, P. Renugadevi","doi":"10.1109/ICECAA58104.2023.10212245","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212245","url":null,"abstract":"Nowadays giving fair verdict is a quite challenging task because of certain contentious aspects in modern cricket. So, in order to avoid making wrong decisions, we develop an automated AI-based solution. This project focus on a technology that helps both the main umpire and third umpire to makes critical determination for Leg Before the Wicket (LBW) regarding whether the batsman is out or not-out and also minimizes the waiting time for players until the third umpire go through the trajectory of the ball to make a correct decision. The main purpose of our AI-DRS is to remove the umpires call which plays a vital role in giving third umpires decision because whether any one of the cases shows umpires call the decision will be stick with on-field umpires call whether it may be out or not-out. The pitch report and comprehensive cricket laws are also included for the sake of the game. The pitch report will be examined with several key wicket characteristics, such as kind of soil, cracks, amount of grass cover, and wetness, etc. using drone we capture the video of the match day pitch. To determine the field crack, canny edge detection is performed and soil moisture sensor is used to determine the moisture content of the soil. This information help cricket team to make a decision about whether to bat or field after winning the toss and helps to choose the strongest 11 players through which can win the match on that pitch on that day. Utilizing support vector machine (SVM) and histograms of gradients (HOG), objects are classified and recognized. In order to monitor and forecast the velocity of the ball, linear regression and quadratic regression are applied. Finally, Tkinter is used for GUI development, imutils and OpenCV are used as implementation tools. Due to the controversy of rare wicket calls, boundary and penalty runs, we bring a voice recognized AI system which gave fans to easily understand why this decision is made by the umpire and sometime umpires found difficulty to remember some rules which is rarely used in cricket it will also give assist to on-field umpires to give a very clear idea why he made the decision, the on-field umpires can easily access the laws through voice recognition which use Alan-AI. The Voice recognition web app was developed using react-js.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122515119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Warehouse-Based Ad Archive for Media Analysis 基于数据仓库的媒体分析广告归档
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212301
G. Indra, B. P. Kumar, G. H. Kumar, Mr. B. Srikanth
Media influence's public opinion and decision-making today. Advertisements especially affect audience perceptions, actions, and purchases. A comprehensive data library on commercials and their performance is needed to understand how media affects society. Ad content, placement, and performance are stored in a data warehouse-based ad archive. The archive can evaluate marketing campaigns and discover media trends. Ad servers, social media platforms, and media monitoring tools may build the data warehouse-based ad archive. A dimensional data model helps retrieve and analyze data. Structured Query Language (SQL) queries, Online Analytical Processing (OLAP) cubes, and data visualization tools may access the archive. Media academics, marketers, and politicians may study the media environment using the data warehouse-based ad archive. Media academics may utilize the collection to study the marketing campaigns, media trends and media's influence on society. The archive may help advertisers analyze their ad campaigns, optimize media placement, and understand their target demographic. Policymakers may use the archive to monitor media outlets' advertising compliance and assess policy changes' media landscape effects.
今天,媒体影响着公众舆论和决策。广告尤其会影响观众的认知、行为和购买。要了解媒体如何影响社会,就需要一个关于广告及其表现的综合数据库。广告内容、位置和效果存储在基于数据仓库的广告存档中。该档案可以评估营销活动并发现媒体趋势。广告服务器、社交媒体平台和媒体监控工具可以构建基于数据仓库的广告存档。维度数据模型有助于检索和分析数据。结构化查询语言(SQL)查询、在线分析处理(OLAP)多维数据集和数据可视化工具都可以访问该存档。媒体学者、营销人员和政治家可以使用基于数据仓库的广告存档来研究媒体环境。媒体学者可以利用这些资料来研究营销活动、媒体趋势和媒体对社会的影响。这些档案可以帮助广告商分析他们的广告活动,优化媒体布局,并了解他们的目标人群。政策制定者可以使用档案来监控媒体机构的广告依从性,并评估政策变化对媒体景观的影响。
{"title":"Data Warehouse-Based Ad Archive for Media Analysis","authors":"G. Indra, B. P. Kumar, G. H. Kumar, Mr. B. Srikanth","doi":"10.1109/ICECAA58104.2023.10212301","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212301","url":null,"abstract":"Media influence's public opinion and decision-making today. Advertisements especially affect audience perceptions, actions, and purchases. A comprehensive data library on commercials and their performance is needed to understand how media affects society. Ad content, placement, and performance are stored in a data warehouse-based ad archive. The archive can evaluate marketing campaigns and discover media trends. Ad servers, social media platforms, and media monitoring tools may build the data warehouse-based ad archive. A dimensional data model helps retrieve and analyze data. Structured Query Language (SQL) queries, Online Analytical Processing (OLAP) cubes, and data visualization tools may access the archive. Media academics, marketers, and politicians may study the media environment using the data warehouse-based ad archive. Media academics may utilize the collection to study the marketing campaigns, media trends and media's influence on society. The archive may help advertisers analyze their ad campaigns, optimize media placement, and understand their target demographic. Policymakers may use the archive to monitor media outlets' advertising compliance and assess policy changes' media landscape effects.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pegasus Spyware: A Vulnerable Behaviour-based Attack System Pegasus间谍软件:一个脆弱的基于行为的攻击系统
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212163
Sidhant Chourasiya, Gyanesh Samanta, Devadarshan K Sardar, Ponnu Sharma, C. Kumar
The development of weaponized software presents substantial cybersecurity challenges, with the Pegasus spyware, developed by the Israeli group NSO, serving as a prominent example. This malicious code operates covertly, infiltrating target systems without the user's knowledge, extracting sensitive information, and monitoring user behavior. This research aims to investigate the unique characteristics and implications of the Pegasus spyware. Specifically, its zero-click functionality is understood, where exploitation occurs without user interaction and its reliance on zero-day vulnerabilities for system compromise. Furthermore, the study aims to explore the extent of control granted to the Pegasus operator, including command execution, data access, and remote manipulation of hardware components. Through an in-depth analysis, this study examines the technical intricacies of the Pegasus spyware. This study explores its methods of propagation, emphasizing its ability to exploit zero-day vulnerabilities without requiring user engagement. Moreover, mechanisms employed by spyware to establish command and control channels are investigated using HTTPS connections, leading to potential avenues for tracking and detection. The findings reveal the elusive nature of Pegasus, leaving minimal traces of its activities on infected systems. The software's sophisticated techniques and reliance on secure communication channels pose significant challenges in detecting and tracking its presence. The study also highlights the extensive control granted to the Pegasus operator, enabling comprehensive surveillance and data exfiltration from compromised systems. The Pegasus spyware represents a formidable cybersecurity threat due to its stealthy infiltration, powerful surveillance capabilities, and limited traceability. Mitigating this threat necessitates innovative approaches to detect and prevent its deployment. This research provides valuable insights into the workings of Pegasus and paves the way for developing effective countermeasures and mitigation strategies to safeguard systems and user privacy.
武器化软件的开发带来了巨大的网络安全挑战,以色列NSO集团开发的Pegasus间谍软件就是一个突出的例子。这种恶意代码暗中运行,在用户不知情的情况下渗透目标系统,提取敏感信息并监视用户行为。本研究旨在调查飞马间谍软件的独特特征和影响。具体来说,它的零点击功能是可以理解的,在没有用户交互的情况下进行利用,并且它依赖于零日漏洞来破坏系统。此外,该研究旨在探索授予Pegasus操作员的控制范围,包括命令执行、数据访问和硬件组件的远程操作。通过深入分析,本研究考察了飞马间谍软件的技术复杂性。本研究探讨了其传播方法,强调了其利用零日漏洞而无需用户参与的能力。此外,间谍软件使用HTTPS连接来建立命令和控制通道的机制被调查,从而导致跟踪和检测的潜在途径。这些发现揭示了Pegasus难以捉摸的本质,在受感染的系统上留下了最小的活动痕迹。该软件的复杂技术和对安全通信渠道的依赖对检测和跟踪其存在构成了重大挑战。该研究还强调了Pegasus运营商的广泛控制权,能够从受损系统中进行全面监控和数据泄露。Pegasus间谍软件由于其隐秘的渗透、强大的监视能力和有限的可追溯性,代表了一个强大的网络安全威胁。为了减轻这一威胁,必须采用创新方法来检测和防止其部署。这项研究为Pegasus的工作提供了有价值的见解,并为制定有效的对策和缓解策略铺平了道路,以保护系统和用户隐私。
{"title":"Pegasus Spyware: A Vulnerable Behaviour-based Attack System","authors":"Sidhant Chourasiya, Gyanesh Samanta, Devadarshan K Sardar, Ponnu Sharma, C. Kumar","doi":"10.1109/ICECAA58104.2023.10212163","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212163","url":null,"abstract":"The development of weaponized software presents substantial cybersecurity challenges, with the Pegasus spyware, developed by the Israeli group NSO, serving as a prominent example. This malicious code operates covertly, infiltrating target systems without the user's knowledge, extracting sensitive information, and monitoring user behavior. This research aims to investigate the unique characteristics and implications of the Pegasus spyware. Specifically, its zero-click functionality is understood, where exploitation occurs without user interaction and its reliance on zero-day vulnerabilities for system compromise. Furthermore, the study aims to explore the extent of control granted to the Pegasus operator, including command execution, data access, and remote manipulation of hardware components. Through an in-depth analysis, this study examines the technical intricacies of the Pegasus spyware. This study explores its methods of propagation, emphasizing its ability to exploit zero-day vulnerabilities without requiring user engagement. Moreover, mechanisms employed by spyware to establish command and control channels are investigated using HTTPS connections, leading to potential avenues for tracking and detection. The findings reveal the elusive nature of Pegasus, leaving minimal traces of its activities on infected systems. The software's sophisticated techniques and reliance on secure communication channels pose significant challenges in detecting and tracking its presence. The study also highlights the extensive control granted to the Pegasus operator, enabling comprehensive surveillance and data exfiltration from compromised systems. The Pegasus spyware represents a formidable cybersecurity threat due to its stealthy infiltration, powerful surveillance capabilities, and limited traceability. Mitigating this threat necessitates innovative approaches to detect and prevent its deployment. This research provides valuable insights into the workings of Pegasus and paves the way for developing effective countermeasures and mitigation strategies to safeguard systems and user privacy.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116505503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Untrustworthy Mobile Node Isolation by Belief Factor in Autonomous Mobile Network 基于信念因子的自主移动网络不可信移动节点隔离
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212372
K. Dhivya, S. J, K. Premkumar, K. Balasaranya, S. Dhanalakshmi
An Autonomous Mobile Network (AMN) is a wireless network in which no structure is accessible. AMN has significantly assisted in many applications recently. The AMN is often employed in such environments where humans do not exist. Therefore, each mobile node should be understood in case of a malfunction or connection failure between mobile nodes. Ant colony optimization (ACO) techniques have helped to develop AMN routing. An Untrustworthy mobile node Isolation by applying the Belief Factor (UIBF) system to detects the untrustworthy mobile nodes efficiently. The node energy, node cooperativeness, node packet losses, and node delay measures are combined to compute the belief factor. This mechanism uses the ACO algorithm to choose the optimal route from the sender to the recipient. Simulation results evaluate the UIBF approach to provide a better untrustworthy node detection ratio and raise the throughput with minimum network delay.
自治移动网络(AMN)是一种无结构可达的无线网络。AMN最近在许多应用中发挥了重要作用。人工神经网络通常在没有人类存在的环境中使用。因此,当移动节点之间发生故障或连接失败时,应了解每个移动节点。蚁群优化(ACO)技术有助于AMN路由的发展。利用信度因子(Belief Factor, UIBF)系统有效地检测出不可信移动节点,实现了不可信移动节点隔离。结合节点能量、节点合作度、节点丢包量和节点延迟度量来计算信度因子。该机制使用蚁群算法选择从发送方到接收方的最优路由。仿真结果表明,UIBF方法可以提供更好的不可信节点检测率,并以最小的网络延迟提高吞吐量。
{"title":"Untrustworthy Mobile Node Isolation by Belief Factor in Autonomous Mobile Network","authors":"K. Dhivya, S. J, K. Premkumar, K. Balasaranya, S. Dhanalakshmi","doi":"10.1109/ICECAA58104.2023.10212372","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212372","url":null,"abstract":"An Autonomous Mobile Network (AMN) is a wireless network in which no structure is accessible. AMN has significantly assisted in many applications recently. The AMN is often employed in such environments where humans do not exist. Therefore, each mobile node should be understood in case of a malfunction or connection failure between mobile nodes. Ant colony optimization (ACO) techniques have helped to develop AMN routing. An Untrustworthy mobile node Isolation by applying the Belief Factor (UIBF) system to detects the untrustworthy mobile nodes efficiently. The node energy, node cooperativeness, node packet losses, and node delay measures are combined to compute the belief factor. This mechanism uses the ACO algorithm to choose the optimal route from the sender to the recipient. Simulation results evaluate the UIBF approach to provide a better untrustworthy node detection ratio and raise the throughput with minimum network delay.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"84 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125924466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Improvement of Single Slope Solar Still with Exterior Cooling and PCM Using Direct Current Water Heaters and Photovoltaic Panels 利用直流热水器和光伏板提高外冷和PCM单坡太阳能蒸馏器的性能
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212280
S. Kumaravel, M. Nagaraj, G. Bharathiraja
It is a new multi-stage solar freshwater system that uses a photovoltaic (PV) heater. A layer of paraffin wax weighing 15 kg as a phase change material (Paraffin wax) was found at the bottom of the solar still's down basin. Research into the system has been conducted to assess its effectiveness at improving freshwater. Solar rays and a direct current (DC) water heater were used to preheat the saltwater. Surfaces that collect condensation vapor were planned for, such as the single glass lid on top and the bottom of two stacked trays. The purpose of doing so is to make freshwater production more efficient by lowering the resistance of condensation. The extreme heat of the glass cover was reduced by using velocity of cooling water shower. The flow velocity of the shower's cooling water, the impact of the heater, and the depth of lower basin water are all factors included in the research. Solar radiation, paraffin wax, heater input heat found to be proportionate in the innovative solar desalination. An astounding 18 liters per day of distilled water may be generated by the Multiple Stage Effect Photovoltaic Heater (MSEPVH). Both mathematical modelling and experimental were used to calculate the maximum possible cooling water flow rate, the total amount of freshwater, and the effectiveness of MSEPVH on the best possible day.
它是一种新型多级太阳能淡水系统,使用光伏(PV)加热器。在太阳能蒸馏器的下盆底部发现了一层重达15公斤的石蜡作为相变材料(石蜡)。对该系统进行了研究,以评估其在改善淡水方面的有效性。使用太阳射线和直流(DC)热水器来预热盐水。设计了收集冷凝蒸汽的表面,例如顶部的单个玻璃盖和两个堆叠托盘的底部。这样做的目的是通过降低冷凝阻力来提高淡水生产的效率。利用冷却水喷头的流速,降低了玻璃罩的极热。淋浴器冷却水的流速、加热器的冲击以及下盆水的深度都是研究的因素。太阳辐射、石蜡、加热器输入的热量在创新太阳能脱盐中发现成正比。多级效应光伏加热器(MSEPVH)每天可以产生惊人的18升蒸馏水。采用数学模型和实验相结合的方法,计算了最佳时段的最大可能冷却水流量、淡水总量和MSEPVH的有效性。
{"title":"Performance Improvement of Single Slope Solar Still with Exterior Cooling and PCM Using Direct Current Water Heaters and Photovoltaic Panels","authors":"S. Kumaravel, M. Nagaraj, G. Bharathiraja","doi":"10.1109/ICECAA58104.2023.10212280","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212280","url":null,"abstract":"It is a new multi-stage solar freshwater system that uses a photovoltaic (PV) heater. A layer of paraffin wax weighing 15 kg as a phase change material (Paraffin wax) was found at the bottom of the solar still's down basin. Research into the system has been conducted to assess its effectiveness at improving freshwater. Solar rays and a direct current (DC) water heater were used to preheat the saltwater. Surfaces that collect condensation vapor were planned for, such as the single glass lid on top and the bottom of two stacked trays. The purpose of doing so is to make freshwater production more efficient by lowering the resistance of condensation. The extreme heat of the glass cover was reduced by using velocity of cooling water shower. The flow velocity of the shower's cooling water, the impact of the heater, and the depth of lower basin water are all factors included in the research. Solar radiation, paraffin wax, heater input heat found to be proportionate in the innovative solar desalination. An astounding 18 liters per day of distilled water may be generated by the Multiple Stage Effect Photovoltaic Heater (MSEPVH). Both mathematical modelling and experimental were used to calculate the maximum possible cooling water flow rate, the total amount of freshwater, and the effectiveness of MSEPVH on the best possible day.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125290153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Industry 4.0 in the Energy Sector 工业4.0在能源领域的实施
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212266
Gunji Prem Prasad, G. Kathrine, Jemimah M Kuruvilla, Mohammed Moosa Razeek J
This research study intends to explore various challenges that humans have encountered as well as any that may arise in the near future. Poor sanitation facility is one of the main causes of malnutrition and it leads to a number of diseases, which also indirectly impacts other sectors. Excessive use of resources that are not renewable is another considerable issue. There is a lot of energy resource wastage; for example, streetlights in cities and on highways are often left ON during the day, this may cause energy wastage. Also, it is already known fact that the non-renewable energy resources are very limited. Therefore, an alternative energy source such as renewable energy like wind, solar power, and others are required. In future there might be a rise in the electricity consumption, therefore some innovative ways should be developed to fulfill the requirements. Through innovative technologies, energy can be efficiently utilized. IIoT aims to automate system-based monitoring and control of devices. Integrating the use of renewable energy and leveraging technology in the sanitation sector will promote social development.
这项研究旨在探索人类遇到的各种挑战,以及在不久的将来可能出现的任何挑战。卫生设施差是营养不良的主要原因之一,它导致许多疾病,这也间接影响到其他部门。过度使用不可再生资源是另一个相当大的问题。存在大量的能源浪费;例如,城市和高速公路上的路灯经常在白天开着,这可能会造成能源浪费。此外,不可再生能源资源是非常有限的,这是众所周知的事实。因此,需要一种替代能源,如风能、太阳能等可再生能源。未来的电力消耗可能会增加,因此应该开发一些创新的方法来满足需求。通过创新技术,能源可以得到有效利用。工业物联网旨在自动化基于系统的设备监控和控制。在卫生部门整合使用可再生能源和利用技术将促进社会发展。
{"title":"Implementation of Industry 4.0 in the Energy Sector","authors":"Gunji Prem Prasad, G. Kathrine, Jemimah M Kuruvilla, Mohammed Moosa Razeek J","doi":"10.1109/ICECAA58104.2023.10212266","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212266","url":null,"abstract":"This research study intends to explore various challenges that humans have encountered as well as any that may arise in the near future. Poor sanitation facility is one of the main causes of malnutrition and it leads to a number of diseases, which also indirectly impacts other sectors. Excessive use of resources that are not renewable is another considerable issue. There is a lot of energy resource wastage; for example, streetlights in cities and on highways are often left ON during the day, this may cause energy wastage. Also, it is already known fact that the non-renewable energy resources are very limited. Therefore, an alternative energy source such as renewable energy like wind, solar power, and others are required. In future there might be a rise in the electricity consumption, therefore some innovative ways should be developed to fulfill the requirements. Through innovative technologies, energy can be efficiently utilized. IIoT aims to automate system-based monitoring and control of devices. Integrating the use of renewable energy and leveraging technology in the sanitation sector will promote social development.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Account Abstraction via Singleton Entrypoint Contract and Verifying Paymaster 通过单例入口点合同和验证出纳员进行账户抽象
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212316
Aniket Kumar Singh, Inzimam Ul Hassan, Gaganjot Kaur, Shanu Kumar, Anmol
Ethereum, a leading cryptocurrency, is advancing the way we handle digital transactions. One important concept in Ethereum is “account abstraction,” which could play a crucial role in making it accessible to a wider audience. Currently, Ethereum has two types of accounts: externally owned accounts (EOAs) and contract accounts (CAs). EOAs are controlled by a public address and private key, allowing users to initiate transactions and interact with smart contracts. However, losing the private key can result in the loss of funds, and EOAs are not quantum safe. On the other hand, CAs are controlled by the code written on the Ethereum Virtual Machine (EVM) and do not possess private keys. They rely on network storage, and their creation incurs a cost. To enhance the existing technology and make it more user-friendly, there is a proposal for “account abstraction” in the Ethereum protocol. This change would enable users to interact with smart contracts using smart contract wallets instead of externally owned accounts. This would bring greater flexibility and security to the management of user accounts, as well as open doors for new and innovative user experiences.
以太坊是一种领先的加密货币,正在推进我们处理数字交易的方式。以太坊的一个重要概念是“账户抽象”,它可以在使更广泛的受众访问以太坊方面发挥关键作用。目前,以太坊有两种类型的账户:外部拥有的账户(eoa)和合同账户(ca)。eoa由公共地址和私钥控制,允许用户发起交易并与智能合约交互。但是,丢失私钥可能会导致资金损失,并且eoa不是量子安全的。另一方面,ca由编写在以太坊虚拟机(EVM)上的代码控制,并且不拥有私钥。它们依赖于网络存储,创建它们需要成本。为了增强现有技术并使其更加用户友好,在以太坊协议中提出了“帐户抽象”的建议。这一变化将使用户能够使用智能合约钱包而不是外部拥有的账户与智能合约进行交互。这将为用户帐户管理带来更大的灵活性和安全性,并为新的和创新的用户体验打开大门。
{"title":"Account Abstraction via Singleton Entrypoint Contract and Verifying Paymaster","authors":"Aniket Kumar Singh, Inzimam Ul Hassan, Gaganjot Kaur, Shanu Kumar, Anmol","doi":"10.1109/ICECAA58104.2023.10212316","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212316","url":null,"abstract":"Ethereum, a leading cryptocurrency, is advancing the way we handle digital transactions. One important concept in Ethereum is “account abstraction,” which could play a crucial role in making it accessible to a wider audience. Currently, Ethereum has two types of accounts: externally owned accounts (EOAs) and contract accounts (CAs). EOAs are controlled by a public address and private key, allowing users to initiate transactions and interact with smart contracts. However, losing the private key can result in the loss of funds, and EOAs are not quantum safe. On the other hand, CAs are controlled by the code written on the Ethereum Virtual Machine (EVM) and do not possess private keys. They rely on network storage, and their creation incurs a cost. To enhance the existing technology and make it more user-friendly, there is a proposal for “account abstraction” in the Ethereum protocol. This change would enable users to interact with smart contracts using smart contract wallets instead of externally owned accounts. This would bring greater flexibility and security to the management of user accounts, as well as open doors for new and innovative user experiences.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121529887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 2nd International Conference on Edge Computing and Applications (ICECAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1