首页 > 最新文献

INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT最新文献

英文 中文
Protecting Privacy in Surveillance Systems via Selective Video Encryption 通过选择性视频加密保护监控系统中的隐私
Pub Date : 2024-05-24 DOI: 10.55041/ijsrem34554
Mr. Nandish M
The "Privacy Preservation in Surveillance Video Using Selective Encryption" study addresses the issue of privacy in surveillance videos. Video surveillance systems are widely deployed in many public places such as banks, supermarkets, airports, roads, and residential areas. However, the privacy of individuals in these videos is a major concern. The proposed system aims to conceal faces while not interfering with the observation and recognition of human activities. The system uses selective encryption to encrypt only the face region of the frames while other parts of the frame are retained as it is. The proposed method is reversible for revealing faces whenever needed to the authorized person using proper secret keys. The project also aims to ensure the security of the encryption algorithm used and provide a user-friendly interface for ease of use. Overall, this study aims to provide an efficient and scalable solution to the problem of privacy in surveillances.
利用选择性加密保护监控视频中的隐私 "研究解决了监控视频中的隐私问题。视频监控系统广泛部署在许多公共场所,如银行、超市、机场、道路和住宅区。然而,这些视频中的个人隐私是一个主要问题。拟议的系统旨在隐藏人脸,同时不干扰对人类活动的观察和识别。该系统使用选择性加密技术,只对帧中的人脸区域进行加密,而帧的其他部分则保持原样。所提出的方法是可逆的,可在需要时使用适当的密匙向授权人员显示人脸。该项目还旨在确保所使用加密算法的安全性,并提供一个便于使用的用户友好界面。总之,本研究旨在为监控中的隐私问题提供一个高效、可扩展的解决方案。
{"title":"Protecting Privacy in Surveillance Systems via Selective Video Encryption","authors":"Mr. Nandish M","doi":"10.55041/ijsrem34554","DOIUrl":"https://doi.org/10.55041/ijsrem34554","url":null,"abstract":"The \"Privacy Preservation in Surveillance Video Using Selective Encryption\" study addresses the issue of privacy in surveillance videos. Video surveillance systems are widely deployed in many public places such as banks, supermarkets, airports, roads, and residential areas. However, the privacy of individuals in these videos is a major concern. The proposed system aims to conceal faces while not interfering with the observation and recognition of human activities. The system uses selective encryption to encrypt only the face region of the frames while other parts of the frame are retained as it is. The proposed method is reversible for revealing faces whenever needed to the authorized person using proper secret keys. The project also aims to ensure the security of the encryption algorithm used and provide a user-friendly interface for ease of use. Overall, this study aims to provide an efficient and scalable solution to the problem of privacy in surveillances.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141101718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revolutionizing Identity Verification and Recognition 身份验证和识别的革命性变革
Pub Date : 2024-05-24 DOI: 10.55041/ijsrem34580
Priti Nagtode
The innovative integration of real-time human detection improves both security and user experience in identity authentication. This approach improves authentication processes by analysing physiological and behavioural indicators such as face movements and eye movements, hence reducing fraud risks. Its deployment across sectors promises to enhance security in finance, healthcare, e-commerce, and law enforcement. Despite the hurdles, the benefits of this human-centered approach are enormous, indicating a more secure digital future. Keywords— Identity verification, live human detection, digital security, biometric authentication, user experience, fraud prevention, computer vision, physiological and behavioural cues, facial and vocal patterns, finance, healthcare, e-commerce, law enforcement.
实时人体检测的创新整合提高了身份验证的安全性和用户体验。这种方法通过分析人脸移动和眼球运动等生理和行为指标来改进身份验证流程,从而降低欺诈风险。该技术在各行各业的应用有望提高金融、医疗保健、电子商务和执法领域的安全性。尽管障碍重重,但这种以人为本的方法好处巨大,预示着一个更加安全的数字未来。关键词: 身份验证、真人检测、数字安全、生物识别认证、用户体验、欺诈防范、计算机视觉、生理和行为线索、面部和声音模式、金融、医疗保健、电子商务、执法。
{"title":"Revolutionizing Identity Verification and Recognition","authors":"Priti Nagtode","doi":"10.55041/ijsrem34580","DOIUrl":"https://doi.org/10.55041/ijsrem34580","url":null,"abstract":"The innovative integration of real-time human detection improves both security and user experience in identity authentication. This approach improves authentication processes by analysing physiological and behavioural indicators such as face movements and eye movements, hence reducing fraud risks. Its deployment across sectors promises to enhance security in finance, healthcare, e-commerce, and law enforcement. Despite the hurdles, the benefits of this human-centered approach are enormous, indicating a more secure digital future. Keywords— Identity verification, live human detection, digital security, biometric authentication, user experience, fraud prevention, computer vision, physiological and behavioural cues, facial and vocal patterns, finance, healthcare, e-commerce, law enforcement.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141102765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FEA-Based Camshaft Design and Analysis on a Range of Heat-Treated Materials 基于有限元分析的一系列热处理材料凸轮轴设计与分析
Pub Date : 2024-05-22 DOI: 10.55041/ijsrem34479
Puppala Nagababu
Camshafts play a critical role in internal combustion engines, dictating the timing and duration of valve opening and closing events. To ensure optimal engine performance and longevity, camshaft design must balance factors such as strength, durability, and weight. Finite Element Analysis (FEA) offers a powerful tool for evaluating camshaft designs under varying operating conditions. This paper presents a comprehensive study on the design and analysis of camshafts using FEA, focusing on the influence of different heat-treated materials. The study begins with an overview of material selection criteria for camshaft applications, considering factors such as strength, fatigue resistance, and wear characteristics. Various materials high-performance alloys are investigated for their suitability and performance enhancements through heat treatment processes such as carburizing, quenching, and tempering. A detailed 3D CAD model of the camshaft geometry is developed, capturing key features such as lobes, journals, and bearings. Finite element meshing techniques are employed to ensure accurate representation of the geometry and precise stress analysis. Boundary conditions are defined to simulate realistic operating conditions, including forces exerted by cam followers and valve springs. Material properties are assigned to finite elements based on the selected materials and heat treatment parameters. Static and dynamic FEA analyses are conducted to evaluate stress distribution, deformation, fatigue life, and natural frequencies of the camshaft under varying load scenarios. The results of the FEA analyses are used to optimize the camshaft design iteratively, considering factors such as weight reduction, performance enhancement, and durability improvement. Validation of FEA results is performed through physical testing and comparison with empirical data. Overall, this paper provides valuable insights into the design and analysis of camshafts using FEA, highlighting the importance of material selection and heat treatment processes in optimizing camshaft performance and reliability in automotive engine applications. Key Words: Design, Analysis, geartrain, idler gear, FEA, reciprocating motion, Solid works, CAD, ANSYS, efficiency, IC engines, camshaft.
凸轮轴在内燃机中起着至关重要的作用,它决定着气门开启和关闭的时间和持续时间。为确保发动机的最佳性能和使用寿命,凸轮轴的设计必须兼顾强度、耐用性和重量等因素。有限元分析(FEA)为评估不同工作条件下的凸轮轴设计提供了强有力的工具。本文介绍了利用有限元分析进行凸轮轴设计和分析的综合研究,重点是不同热处理材料的影响。研究首先概述了凸轮轴应用的材料选择标准,考虑了强度、抗疲劳性和磨损特性等因素。通过渗碳、淬火和回火等热处理工艺,研究了各种材料高性能合金的适用性和性能提升。开发了凸轮轴几何形状的详细 3D CAD 模型,捕捉了叶片、轴颈和轴承等关键特征。采用有限元网格划分技术确保几何形状的准确表达和精确的应力分析。定义了边界条件,以模拟真实的工作条件,包括凸轮从动件和气门弹簧施加的力。根据所选材料和热处理参数为有限元分配材料属性。进行静态和动态有限元分析,以评估凸轮轴在不同负载情况下的应力分布、变形、疲劳寿命和固有频率。考虑到减轻重量、提高性能和耐用性等因素,利用有限元分析的结果反复优化凸轮轴的设计。通过物理测试以及与经验数据的比较,对有限元分析结果进行了验证。总之,本文为使用有限元分析设计和分析凸轮轴提供了宝贵的见解,突出了材料选择和热处理工艺在优化汽车发动机应用中凸轮轴性能和可靠性方面的重要性。关键字设计,分析,传动系统,惰轮,有限元分析,往复运动,Solid works,CAD,ANSYS,效率,集成电路发动机,凸轮轴。
{"title":"FEA-Based Camshaft Design and Analysis on a Range of Heat-Treated Materials","authors":"Puppala Nagababu","doi":"10.55041/ijsrem34479","DOIUrl":"https://doi.org/10.55041/ijsrem34479","url":null,"abstract":"Camshafts play a critical role in internal combustion engines, dictating the timing and duration of valve opening and closing events. To ensure optimal engine performance and longevity, camshaft design must balance factors such as strength, durability, and weight. Finite Element Analysis (FEA) offers a powerful tool for evaluating camshaft designs under varying operating conditions. This paper presents a comprehensive study on the design and analysis of camshafts using FEA, focusing on the influence of different heat-treated materials. The study begins with an overview of material selection criteria for camshaft applications, considering factors such as strength, fatigue resistance, and wear characteristics. Various materials high-performance alloys are investigated for their suitability and performance enhancements through heat treatment processes such as carburizing, quenching, and tempering. A detailed 3D CAD model of the camshaft geometry is developed, capturing key features such as lobes, journals, and bearings. Finite element meshing techniques are employed to ensure accurate representation of the geometry and precise stress analysis. Boundary conditions are defined to simulate realistic operating conditions, including forces exerted by cam followers and valve springs. Material properties are assigned to finite elements based on the selected materials and heat treatment parameters. Static and dynamic FEA analyses are conducted to evaluate stress distribution, deformation, fatigue life, and natural frequencies of the camshaft under varying load scenarios. The results of the FEA analyses are used to optimize the camshaft design iteratively, considering factors such as weight reduction, performance enhancement, and durability improvement. Validation of FEA results is performed through physical testing and comparison with empirical data. Overall, this paper provides valuable insights into the design and analysis of camshafts using FEA, highlighting the importance of material selection and heat treatment processes in optimizing camshaft performance and reliability in automotive engine applications. Key Words: Design, Analysis, geartrain, idler gear, FEA, reciprocating motion, Solid works, CAD, ANSYS, efficiency, IC engines, camshaft.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141109066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SEAMLESS M4T-POWERED SPEECH TO TEXT WITH GRADIO UI 通过GradioUI实现由M4T支持的无缝语音转文字功能
Pub Date : 2024-05-22 DOI: 10.55041/ijsrem33886
M. R
Speech-to-text translation is pivotal in overcoming language barriers and enhancing communication across cultures. This paper introduces a novel application that leverages the Seamless M4T model and Gradio UI for accurate and efficient speech-to-text translation. The system supports multiple languages, with a focus on English and Tamil, and integrates audio input from diverse sources. Gradio UI’s intuitive interface ensures the application’s accessibility to a broad audience. The system’s performance, evaluated through various test cases, demonstrates its robustness and accuracy, marking a significant advancement in communication technology. Keywords— Artificial Intelligence, Multilingual Communication, Speech Recognition, Speech-to-Text Translation, User Interface Design, Gradio UI, Seamless M4T.
语音到文本的翻译在克服语言障碍和加强跨文化交流方面至关重要。本文介绍了一种新颖的应用程序,它利用无缝 M4T 模型和 Gradio UI 实现了准确、高效的语音到文本翻译。该系统支持多种语言,重点是英语和泰米尔语,并整合了来自不同来源的音频输入。Gradio UI 的直观界面确保了该应用程序对广大受众的易用性。该系统的性能通过各种测试案例进行了评估,证明了其稳健性和准确性,标志着通信技术的重大进步。关键词: 人工智能、多语言通信、语音识别、语音到文本翻译、用户界面设计、Gradio UI、无缝 M4T。
{"title":"SEAMLESS M4T-POWERED SPEECH TO TEXT WITH GRADIO UI","authors":"M. R","doi":"10.55041/ijsrem33886","DOIUrl":"https://doi.org/10.55041/ijsrem33886","url":null,"abstract":"Speech-to-text translation is pivotal in overcoming language barriers and enhancing communication across cultures. This paper introduces a novel application that leverages the Seamless M4T model and Gradio UI for accurate and efficient speech-to-text translation. The system supports multiple languages, with a focus on English and Tamil, and integrates audio input from diverse sources. Gradio UI’s intuitive interface ensures the application’s accessibility to a broad audience. The system’s performance, evaluated through various test cases, demonstrates its robustness and accuracy, marking a significant advancement in communication technology. Keywords— Artificial Intelligence, Multilingual Communication, Speech Recognition, Speech-to-Text Translation, User Interface Design, Gradio UI, Seamless M4T.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early detection of Alzheimer’s Disease using Deep Learning 利用深度学习早期检测阿尔茨海默病
Pub Date : 2024-05-22 DOI: 10.55041/ijsrem34463
M. M. B. S. Sree
alzheimer's Disease (AD) is a progressive neurodegenerative disorder that affects millions of people worldwide and causes cognitive impairment. It is the most common cause of dementia, a general term for a decline in cognitive abilities that interfere with daily life. Deep Learning, the subset of Artificial Intelligence is used in the early detection of Alzheimer's Disease. The human-level performance of the Deep Learning algorithm has been effectively shown in different disciplines. There isn’t a specific algorithm that is universal, but various Deep Learning algorithms, are used for the early detection of Alzheimer’s Disease. Researchers developed a blood test that could detect Alzheimer’s Disease promoting compounds in blood before the symptoms emerged. These findings may lead to early diagnostic tests for Alzheimer’s and other neurodegenerative diseases. Through research on the “Early detection of Alzheimer’s Disease using Deep Learning”, we can learn more about the potential of using advanced technology to identify the disease at its earliest stages. It also discusses the challenges and limitations of using Deep Learning for Alzheimer's Disease detection and highlights the need for future research in this area. Additionally, it can provide insights into the progression of the disease and potentially lead to the development of more accurate diagnostic tools. KEYWORDS: Alzheimer’s Disease, neurodegenerative, dementia, Early diagnosis, Deep Learning algorithms
阿尔茨海默病(AD)是一种进行性神经退行性疾病,影响着全球数百万人,并导致认知障碍。它是痴呆症最常见的病因,痴呆症是认知能力下降并影响日常生活的总称。深度学习是人工智能的一个子集,被用于阿尔茨海默病的早期检测。深度学习算法的人类水平性能已在不同学科中得到有效展示。没有一种特定的算法是万能的,但各种深度学习算法,都被用于阿尔茨海默病的早期检测。研究人员开发了一种血液检测方法,可以在症状出现之前检测出血液中促进阿尔茨海默病的化合物。这些发现可能会带来阿尔茨海默病和其他神经退行性疾病的早期诊断检测。通过对 "利用深度学习早期检测阿尔茨海默病 "的研究,我们可以更多地了解利用先进技术在疾病早期阶段识别疾病的潜力。报告还讨论了利用深度学习检测阿尔茨海默病所面临的挑战和局限性,并强调了该领域未来研究的必要性。此外,它还能让人们深入了解该疾病的进展情况,并有可能开发出更准确的诊断工具。关键词: 阿尔茨海默病 神经退行性痴呆症 早期诊断 深度学习算法
{"title":"Early detection of Alzheimer’s Disease using Deep Learning","authors":"M. M. B. S. Sree","doi":"10.55041/ijsrem34463","DOIUrl":"https://doi.org/10.55041/ijsrem34463","url":null,"abstract":"alzheimer's Disease (AD) is a progressive neurodegenerative disorder that affects millions of people worldwide and causes cognitive impairment. It is the most common cause of dementia, a general term for a decline in cognitive abilities that interfere with daily life. Deep Learning, the subset of Artificial Intelligence is used in the early detection of Alzheimer's Disease. The human-level performance of the Deep Learning algorithm has been effectively shown in different disciplines. There isn’t a specific algorithm that is universal, but various Deep Learning algorithms, are used for the early detection of Alzheimer’s Disease. Researchers developed a blood test that could detect Alzheimer’s Disease promoting compounds in blood before the symptoms emerged. These findings may lead to early diagnostic tests for Alzheimer’s and other neurodegenerative diseases. Through research on the “Early detection of Alzheimer’s Disease using Deep Learning”, we can learn more about the potential of using advanced technology to identify the disease at its earliest stages. It also discusses the challenges and limitations of using Deep Learning for Alzheimer's Disease detection and highlights the need for future research in this area. Additionally, it can provide insights into the progression of the disease and potentially lead to the development of more accurate diagnostic tools. KEYWORDS: Alzheimer’s Disease, neurodegenerative, dementia, Early diagnosis, Deep Learning algorithms","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM 太阳能无线电动汽车充电系统
Pub Date : 2024-05-22 DOI: 10.55041/ijsrem34501
Amar Kamble,
This research paper introduces a groundbreaking Solar-powered wireless charging solution for electric vehicles, responding to the global shift toward sustainable transportation. The project employs solar panels to efficiently capture and store energy, utilizing wireless energy transfer technology for eco-friendly EV charging. Key objectives include harnessing solar energy, wireless power transmission, DC charging, and lowering our dependency on traditional grid electricity. The project's weight stems from its potential to advance sustainable transportation, reduce emissions, and drive innovation in wireless power transfer and solar technology. It serves as a proof-of-concept, demonstrating feasibility, inspiring investment, and promoting awareness of renewable energy's role in EV charging for a greener future. Keywords : Future mobility trends, Innovation in charging technology, Sustainable transportation, Wireless energy transfer
本研究论文介绍了一种开创性的太阳能电动汽车无线充电解决方案,以应对全球向可持续交通的转变。该项目采用太阳能电池板有效捕获和储存能量,利用无线能量传输技术为环保型电动汽车充电。主要目标包括利用太阳能、无线输电、直流充电,以及降低对传统电网电力的依赖。该项目的重要性在于其推动可持续交通、减少排放以及推动无线输电和太阳能技术创新的潜力。该项目可作为概念验证,展示可行性,激励投资,并提高人们对可再生能源在电动汽车充电中的作用的认识,从而创造一个更加绿色的未来。关键词 :未来交通趋势 充电技术创新 可持续交通 无线能量传输
{"title":"SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM","authors":"Amar Kamble,","doi":"10.55041/ijsrem34501","DOIUrl":"https://doi.org/10.55041/ijsrem34501","url":null,"abstract":"This research paper introduces a groundbreaking Solar-powered wireless charging solution for electric vehicles, responding to the global shift toward sustainable transportation. The project employs solar panels to efficiently capture and store energy, utilizing wireless energy transfer technology for eco-friendly EV charging. Key objectives include harnessing solar energy, wireless power transmission, DC charging, and lowering our dependency on traditional grid electricity. The project's weight stems from its potential to advance sustainable transportation, reduce emissions, and drive innovation in wireless power transfer and solar technology. It serves as a proof-of-concept, demonstrating feasibility, inspiring investment, and promoting awareness of renewable energy's role in EV charging for a greener future. Keywords : Future mobility trends, Innovation in charging technology, Sustainable transportation, Wireless energy transfer","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141113153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT based Water Tank Cleaner using STM32 使用 STM32 的基于物联网的水箱清洁器
Pub Date : 2024-05-22 DOI: 10.55041/ijsrem34430
Gite Rutuja
Water tanks are essential for storing and supplying clean water in both residential and industrial settings. However, over time, these tanks can accumulate sediment, algae, and other contaminants that can compromise water quality. Cleaning and maintaining water tanks is a critical task to ensure the supply of safe and clean water to consumers. The IoT-Based Water Tank Cleaner using STM32 project aims to address this issue by developing an innovative solution that automates the cleaning process of water tanks. This project leverages the power of the Internet of Things (IoT) and the capabilities of the STM32 microcontroller to create an intelligent and efficient water tank cleaning system. This project presents an innovative solution for water tank cleaning using the STM32 microcontroller and IoT (Internet of Things) technology. The proposed system automates the process of cleaning and monitoring water tanks, ensuring efficient operation and minimizing manual intervention. Water scarcity is a pressing global issue, necessitating efficient management of water resources. One significant aspect of water management is maintaining the cleanliness of water storage tanks, which often harbor contaminants due to neglect or inadequate cleaning procedures. This project introduces an IoT-based solution leveraging the STM32 microcontroller to automate the cleaning process of water tanks. The system employs sensors to monitor water quality, an actuator for tank cleaning, and IoT connectivity for remote monitoring and control. Key Words: Water tank cleaning, IoT-based solution, STM32, Water quality, Sediment removal
水箱对于在住宅和工业环境中储存和供应清洁的水至关重要。然而,随着时间的推移,这些水箱会积累沉淀物、藻类和其他污染物,从而影响水质。清洁和维护水箱是确保向消费者供应安全清洁水的一项关键任务。使用 STM32 的基于物联网的水箱清洁器项目旨在通过开发一种创新的解决方案,实现水箱清洁过程的自动化,从而解决这一问题。该项目利用物联网(IoT)的力量和 STM32 微控制器的功能,创建了一个智能、高效的水箱清洁系统。该项目利用 STM32 微控制器和 IoT(物联网)技术提出了一种创新的水箱清洗解决方案。所提议的系统可实现水箱清洁和监控过程的自动化,确保高效运行并最大限度地减少人工干预。水资源短缺是一个紧迫的全球性问题,需要对水资源进行有效管理。水资源管理的一个重要方面是保持储水罐的清洁,由于疏于管理或清洁程序不当,储水罐往往藏有污染物。本项目介绍了一种基于物联网的解决方案,利用 STM32 微控制器实现水箱清洁过程的自动化。该系统采用传感器监测水质,采用执行器进行水箱清洁,采用物联网连接进行远程监测和控制。关键字水箱清洁、基于物联网的解决方案、STM32、水质、沉积物清除
{"title":"IoT based Water Tank Cleaner using STM32","authors":"Gite Rutuja","doi":"10.55041/ijsrem34430","DOIUrl":"https://doi.org/10.55041/ijsrem34430","url":null,"abstract":"Water tanks are essential for storing and supplying clean water in both residential and industrial settings. However, over time, these tanks can accumulate sediment, algae, and other contaminants that can compromise water quality. Cleaning and maintaining water tanks is a critical task to ensure the supply of safe and clean water to consumers. The IoT-Based Water Tank Cleaner using STM32 project aims to address this issue by developing an innovative solution that automates the cleaning process of water tanks. This project leverages the power of the Internet of Things (IoT) and the capabilities of the STM32 microcontroller to create an intelligent and efficient water tank cleaning system. This project presents an innovative solution for water tank cleaning using the STM32 microcontroller and IoT (Internet of Things) technology. The proposed system automates the process of cleaning and monitoring water tanks, ensuring efficient operation and minimizing manual intervention. Water scarcity is a pressing global issue, necessitating efficient management of water resources. One significant aspect of water management is maintaining the cleanliness of water storage tanks, which often harbor contaminants due to neglect or inadequate cleaning procedures. This project introduces an IoT-based solution leveraging the STM32 microcontroller to automate the cleaning process of water tanks. The system employs sensors to monitor water quality, an actuator for tank cleaning, and IoT connectivity for remote monitoring and control. Key Words: Water tank cleaning, IoT-based solution, STM32, Water quality, Sediment removal","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141108480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMPREHENSIVE STUDY ON PROSPECTS AND CHALLENGES OF WOMEN ENTREPRENEURSHIP IN INDIA 关于印度妇女创业前景与挑战的综合研究
Pub Date : 2024-05-22 DOI: 10.55041/ijsrem34464
Ashutosh Singh
This research study thoroughly examines the situation of female entrepreneurship in India, focusing on its evolution, present state, challenges, and promising prospects. It meticulously examines the socio-cultural, economic, and regulatory barriers women entrepreneurs face, as well as the significant, positive impact of government efforts and policy assistance specifically designed to support female-led firms. It also highlights the socioeconomic contributions of women entrepreneurs, particularly in terms of economic growth, social empowerment, and community development. The study concludes with a set of recommendations for improving access to funding, mentorship, regulatory reforms, and cultural change in India, all aimed at fostering a more conducive environment for women entrepreneurs. The findings highlight the significant advancements in women's entrepreneurship in India, characterised by burgeoning participation and expansion into diverse industries. Female entrepreneurs are not just making socio-economic contributions; they are also driving economic expansion, promoting social empowerment, and fostering community development. Despite these achievements, they face persistent obstacles such as socio-cultural impediments, budgetary limitations, a lack of guidance, and regulatory hurdles. However, the potential of women entrepreneurs to overcome these challenges and contribute even more to India's progress is immense. Addressing these issues through ongoing government assistance, legislative overhauls, inclusion in financial services, skill enhancement, and societal transformation is crucial for establishing a more comprehensive and vibrant entrepreneurial environment. The promotion of the economic and social advancement of women entrepreneurs is not just a necessity but a beacon of hope for achieving long-term and equitable progress in India. Key Words: Women Entrepreneurs, Women Empowerment, Entrepreneurship
本研究报告深入探讨了印度女性创业的情况,重点关注其演变、现状、挑战和前景。它仔细研究了女性创业者面临的社会文化、经济和监管障碍,以及政府为支持女性领导的企业而专门做出的努力和政策援助所产生的重大积极影响。研究还强调了女企业家的社会经济贡献,尤其是在经济增长、社会赋权和社区发展方面。研究最后提出了一系列建议,以改善印度的资金获取、指导、监管改革和文化变革,所有这些都旨在为女企业家营造一个更有利的环境。研究结果凸显了印度女性创业的显著进步,其特点是参与度不断提高,并向不同行业扩展。女企业家不仅为社会经济做出了贡献,还推动了经济扩张,促进了社会赋权,推动了社区发展。尽管取得了这些成就,但她们仍面临着持续的障碍,如社会文化障碍、预算限制、缺乏指导和监管障碍。然而,女企业家克服这些挑战并为印度进步做出更大贡献的潜力是巨大的。通过持续的政府援助、立法改革、纳入金融服务、提高技能和社会转型来解决这些问题,对于建立一个更加全面和充满活力的创业环境至关重要。促进女企业家的经济和社会进步不仅是必要的,也是印度实现长期和公平进步的希望灯塔。关键字女企业家、妇女赋权、创业精神
{"title":"COMPREHENSIVE STUDY ON PROSPECTS AND CHALLENGES OF WOMEN ENTREPRENEURSHIP IN INDIA","authors":"Ashutosh Singh","doi":"10.55041/ijsrem34464","DOIUrl":"https://doi.org/10.55041/ijsrem34464","url":null,"abstract":"This research study thoroughly examines the situation of female entrepreneurship in India, focusing on its evolution, present state, challenges, and promising prospects. It meticulously examines the socio-cultural, economic, and regulatory barriers women entrepreneurs face, as well as the significant, positive impact of government efforts and policy assistance specifically designed to support female-led firms. It also highlights the socioeconomic contributions of women entrepreneurs, particularly in terms of economic growth, social empowerment, and community development. The study concludes with a set of recommendations for improving access to funding, mentorship, regulatory reforms, and cultural change in India, all aimed at fostering a more conducive environment for women entrepreneurs. The findings highlight the significant advancements in women's entrepreneurship in India, characterised by burgeoning participation and expansion into diverse industries. Female entrepreneurs are not just making socio-economic contributions; they are also driving economic expansion, promoting social empowerment, and fostering community development. Despite these achievements, they face persistent obstacles such as socio-cultural impediments, budgetary limitations, a lack of guidance, and regulatory hurdles. However, the potential of women entrepreneurs to overcome these challenges and contribute even more to India's progress is immense. Addressing these issues through ongoing government assistance, legislative overhauls, inclusion in financial services, skill enhancement, and societal transformation is crucial for establishing a more comprehensive and vibrant entrepreneurial environment. The promotion of the economic and social advancement of women entrepreneurs is not just a necessity but a beacon of hope for achieving long-term and equitable progress in India. Key Words: Women Entrepreneurs, Women Empowerment, Entrepreneurship","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Holistic Approach to Cybersecurity Integration in Autonomous Vehicles 自动驾驶汽车网络安全集成的整体方法
Pub Date : 2024-05-22 DOI: 10.55041/ijsrem34426
Chandana R M
The breakthrough of the self-driving car technology is a double-edged sword that gives us incredible opportunities and at the same time, it is the source of huge cybersecurity challenges. This paper champions the creation of a complete legal system and worldwide standards, like the ISO 26262, to regulate different parts of the autonomous vehicle (AV) operations, such as safety testing, liability, data privacy, and cybersecurity. By highlighting the significance of cybersecurity from the very start, the stakeholders and the automakers have to incorporate the practices like secure programming, routine updates, intrusion detection systems and encryption methods which will be the effective shield against the unauthorized access and data breaches. People should be informed and educated about the cybersecurity risks of AVs so that they can take the steps to protect themselves. Nevertheless, the integration of AVs with the Internet of Things (IoT) and other devices makes the cybersecurity landscape even more complicated, which means that there is a constant need for research and development to deal with problems like adversarial attacks. Presently, the deep learning-driven AV systems do not have the explainability which complicates the safety-critical applications, hence the need to increase the resilience training and deepen the deep learning models against attacks. The paper goes through all the literature on AV cybersecurity which stresses the need for functional safety standards and cybersecurity engineering guidelines. Collaboration between the governments, the industry, and the researchers is a must to set the legal foundations and the technical details for the AV cybersecurity across all levels of automation. Finally, solid cybersecurity is the key to the success of the autonomous vehicle revolution, hence the road to transformative safety, efficiency, and sustainability is paved. INDEX TERMS: Autonomous vehicles, Cybersecurity, ISO 26262, Encryption methods, ISO 21434, EU regulations, Security and Privacy.
自动驾驶汽车技术的突破是一把双刃剑,在给我们带来巨大机遇的同时,也带来了巨大的网络安全挑战。本文倡导建立完整的法律体系和世界性标准,如 ISO 26262,以规范自动驾驶汽车(AV)运营的各个环节,如安全测试、责任、数据隐私和网络安全。通过从一开始就强调网络安全的重要性,利益相关者和汽车制造商必须将安全编程、例行更新、入侵检测系统和加密方法等做法纳入其中,从而有效防止未经授权的访问和数据泄露。人们应该了解和认识到自动驾驶汽车的网络安全风险,以便采取措施保护自己。然而,自动驾驶汽车与物联网(IoT)和其他设备的整合使网络安全形势变得更加复杂,这意味着需要不断研发以应对对抗性攻击等问题。目前,深度学习驱动的视听系统不具备可解释性,这使得安全关键型应用变得更加复杂,因此有必要增加复原力训练,深化深度学习模型以应对攻击。本文详述了有关视听网络安全的所有文献,强调了功能安全标准和网络安全工程指南的必要性。政府、行业和研究人员之间必须开展合作,为各级自动化的视听网络安全制定法律基础和技术细节。最后,坚实的网络安全是自动驾驶汽车革命取得成功的关键,从而为实现安全、高效和可持续的变革铺平道路。索引词条:自动驾驶汽车、网络安全、ISO 26262、加密方法、ISO 21434、欧盟法规、安全与隐私。
{"title":"A Holistic Approach to Cybersecurity Integration in Autonomous Vehicles","authors":"Chandana R M","doi":"10.55041/ijsrem34426","DOIUrl":"https://doi.org/10.55041/ijsrem34426","url":null,"abstract":"The breakthrough of the self-driving car technology is a double-edged sword that gives us incredible opportunities and at the same time, it is the source of huge cybersecurity challenges. This paper champions the creation of a complete legal system and worldwide standards, like the ISO 26262, to regulate different parts of the autonomous vehicle (AV) operations, such as safety testing, liability, data privacy, and cybersecurity. By highlighting the significance of cybersecurity from the very start, the stakeholders and the automakers have to incorporate the practices like secure programming, routine updates, intrusion detection systems and encryption methods which will be the effective shield against the unauthorized access and data breaches. People should be informed and educated about the cybersecurity risks of AVs so that they can take the steps to protect themselves. Nevertheless, the integration of AVs with the Internet of Things (IoT) and other devices makes the cybersecurity landscape even more complicated, which means that there is a constant need for research and development to deal with problems like adversarial attacks. Presently, the deep learning-driven AV systems do not have the explainability which complicates the safety-critical applications, hence the need to increase the resilience training and deepen the deep learning models against attacks. The paper goes through all the literature on AV cybersecurity which stresses the need for functional safety standards and cybersecurity engineering guidelines. Collaboration between the governments, the industry, and the researchers is a must to set the legal foundations and the technical details for the AV cybersecurity across all levels of automation. Finally, solid cybersecurity is the key to the success of the autonomous vehicle revolution, hence the road to transformative safety, efficiency, and sustainability is paved. INDEX TERMS: Autonomous vehicles, Cybersecurity, ISO 26262, Encryption methods, ISO 21434, EU regulations, Security and Privacy.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141111365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances in Data Leak Detection: A Review of SQL Injection Detection Techniques and Challenges 数据泄漏检测的进展:SQL 注入检测技术与挑战综述
Pub Date : 2024-05-22 DOI: 10.55041/ijsrem34454
Komalseerut Kaur
In the current landscape where important processes are almost entirely dependent on web apps, SQL injection becomes an important issue for information-stealing throughout many organizations worldwide. This paper aims to review that data leak can be detected from a technical perspective of SQL injection including strategies and techniques to minimize related risk. As a first step, as an overview SQL injection and its associates with them consequences, the paper then go further to various important detection methods such as signatures and anomalies-based processes. It is noteworthy that the paper also explores the function of machine learning and artificial intelligence in improving recognition correctness. As we illustrate the effects of SQL injection attacks on various organizations, we will as well simulate the process of drawing the lessons learnt to prevent and combat the attacks. Obstacles and perspectives in the sphere are stated, which will guide a researcher and a practitioner on his way to raise the quality of data leak detecting technologies used across numerous branches of the economy. This article will weaving together the current blackout and will aims at identifying the gaps through which the attackers are able to get access to the system by the means of SQL injection. Keywords— Data leak detection, SQL injection, Web applications, Security, Detection techniques, Machine learning, Anomaly-based detection, Signature-based detection, Prevention, Mitigation.
在当前重要流程几乎完全依赖网络应用程序的情况下,SQL 注入成为全球许多组织信息窃取的重要问题。本文旨在从 SQL 注入的技术角度回顾数据泄漏的检测方法,包括将相关风险降至最低的策略和技术。首先,本文概述了 SQL 注入及其相关后果,然后进一步介绍了各种重要的检测方法,如签名和基于异常的流程。值得注意的是,本文还探讨了机器学习和人工智能在提高识别正确性方面的作用。在说明 SQL 注入攻击对不同组织的影响时,我们还将模拟总结经验教训的过程,以预防和打击此类攻击。本文阐述了该领域的障碍和前景,这将为研究人员和从业人员提供指导,帮助他们提高数据泄漏检测技术的质量,并将其应用于众多经济领域。本文将对当前的黑客攻击进行梳理,旨在找出攻击者通过 SQL 注入手段进入系统的漏洞。关键词-- 数据泄露检测、SQL 注入、网络应用、安全、检测技术、机器学习、基于异常的检测、基于签名的检测、预防、缓解。
{"title":"Advances in Data Leak Detection: A Review of SQL Injection Detection Techniques and Challenges","authors":"Komalseerut Kaur","doi":"10.55041/ijsrem34454","DOIUrl":"https://doi.org/10.55041/ijsrem34454","url":null,"abstract":"In the current landscape where important processes are almost entirely dependent on web apps, SQL injection becomes an important issue for information-stealing throughout many organizations worldwide. This paper aims to review that data leak can be detected from a technical perspective of SQL injection including strategies and techniques to minimize related risk. As a first step, as an overview SQL injection and its associates with them consequences, the paper then go further to various important detection methods such as signatures and anomalies-based processes. It is noteworthy that the paper also explores the function of machine learning and artificial intelligence in improving recognition correctness. As we illustrate the effects of SQL injection attacks on various organizations, we will as well simulate the process of drawing the lessons learnt to prevent and combat the attacks. Obstacles and perspectives in the sphere are stated, which will guide a researcher and a practitioner on his way to raise the quality of data leak detecting technologies used across numerous branches of the economy. This article will weaving together the current blackout and will aims at identifying the gaps through which the attackers are able to get access to the system by the means of SQL injection. Keywords— Data leak detection, SQL injection, Web applications, Security, Detection techniques, Machine learning, Anomaly-based detection, Signature-based detection, Prevention, Mitigation.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141112323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1