首页 > 最新文献

2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)最新文献

英文 中文
A Novel Deep Learning-based Approach for Covid-19 Infection Identification in Chest X-ray Image using Improved Image Segmentation Technique
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125745
Gouri Shankar Chakraborty, Salil Batra, Makul Mahajan
Covid-19 diagnosis systems are being improved with the emerging development of deep learning techniques. Covid-19 is widely known for the deadly effects and its high transmission rate. To overcome the challenges, different deep learning-based detection methods have been introduced through which the disease can easily be identified in patient's body. But only identification of the disease is not sufficient to assist physicians for further diagnosis. Infection identification process with severity measurement from medical image can put an advancement in current Covid-19 diagnosis systems. This work presents a novel infection detection approach based on image segmentation technique that can be used to localize the infection. The proposed system is able to predict segmented lung and mask images with visual representation so that it makes the diagnosis task easier for the physicians. ResNet-U-N et, VGG16-U-Net and a modified U-Net model have been implemented in the proposed work where the modified U-Net performed better with 0.968 IoU, 98.60% accuracy and 0.9567 of dice coefficient. An advanced module using OpenCV has been designed that can calculate the area of the predicted lung and infection mask images separately and then the infection percentage can be calculated accurately.
随着深度学习技术的新兴发展,Covid-19诊断系统正在得到改进。Covid-19因其致命的影响和高传播率而广为人知。为了克服这一挑战,引入了各种基于深度学习的检测方法,通过这些方法可以轻松地在患者体内识别疾病。但仅仅识别疾病是不足以帮助医生进一步诊断的。基于医学图像的严重程度测量的感染识别过程可以推动当前Covid-19诊断系统的发展。本文提出了一种基于图像分割技术的新型感染检测方法,可用于定位感染。所提出的系统能够预测分割的肺和用视觉表示的掩膜图像,从而使医生的诊断任务更容易。本文实现了ResNet-U-N et、VGG16-U-Net和改进后的U-Net模型,改进后的U-Net模型具有0.968 IoU、98.60%准确率和0.9567 dice系数。利用OpenCV设计了一个先进的模块,可以分别计算预测肺部和感染口罩图像的面积,从而准确计算感染百分比。
{"title":"A Novel Deep Learning-based Approach for Covid-19 Infection Identification in Chest X-ray Image using Improved Image Segmentation Technique","authors":"Gouri Shankar Chakraborty, Salil Batra, Makul Mahajan","doi":"10.1109/ICOEI56765.2023.10125745","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125745","url":null,"abstract":"Covid-19 diagnosis systems are being improved with the emerging development of deep learning techniques. Covid-19 is widely known for the deadly effects and its high transmission rate. To overcome the challenges, different deep learning-based detection methods have been introduced through which the disease can easily be identified in patient's body. But only identification of the disease is not sufficient to assist physicians for further diagnosis. Infection identification process with severity measurement from medical image can put an advancement in current Covid-19 diagnosis systems. This work presents a novel infection detection approach based on image segmentation technique that can be used to localize the infection. The proposed system is able to predict segmented lung and mask images with visual representation so that it makes the diagnosis task easier for the physicians. ResNet-U-N et, VGG16-U-Net and a modified U-Net model have been implemented in the proposed work where the modified U-Net performed better with 0.968 IoU, 98.60% accuracy and 0.9567 of dice coefficient. An advanced module using OpenCV has been designed that can calculate the area of the predicted lung and infection mask images separately and then the infection percentage can be calculated accurately.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Key Generation using Curve Fitting for Polynomial based Cryptography 基于多项式密码的曲线拟合密钥生成
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125901
K. R. Ramkumar, Taniya Hasija, Bhupendra Singh, Amanpreet Kaur, S. Mittal
Every organization's primary concern is security. A cryptography method will remain safe in the system if the key is not cracked by a hacker through any kind of attacks. A conventional cryptography algorithm's strength relies on the key size and structure. Cryptography algorithms can be susceptible to brute force attacks since their keys have fixed lengths. The advantage of having a variable length key is leveraged to mitigate key-Size based attacks by using polynomials. This article outlines an algorithm for generating and maintaining the keys based on the polynomials and interpolation.
每个组织最关心的是安全。如果密钥不被黑客通过任何形式的攻击破解,那么加密方法将在系统中保持安全。传统密码算法的强度取决于密钥的大小和结构。加密算法容易受到暴力攻击,因为它们的密钥具有固定长度。利用可变长度密钥的优势,可以通过使用多项式来减轻基于密钥大小的攻击。本文概述了一种基于多项式和插值的生成和维护密钥的算法。
{"title":"Key Generation using Curve Fitting for Polynomial based Cryptography","authors":"K. R. Ramkumar, Taniya Hasija, Bhupendra Singh, Amanpreet Kaur, S. Mittal","doi":"10.1109/ICOEI56765.2023.10125901","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125901","url":null,"abstract":"Every organization's primary concern is security. A cryptography method will remain safe in the system if the key is not cracked by a hacker through any kind of attacks. A conventional cryptography algorithm's strength relies on the key size and structure. Cryptography algorithms can be susceptible to brute force attacks since their keys have fixed lengths. The advantage of having a variable length key is leveraged to mitigate key-Size based attacks by using polynomials. This article outlines an algorithm for generating and maintaining the keys based on the polynomials and interpolation.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131337440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Security Testing of Mobile Applications for Building Trust in the Digital World 在数字世界中建立信任的有效移动应用安全测试
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125814
Kapil Kant Kamal, Padmaja Joshi, A. Bang, Kavita Bhatia
In recent years, mobile applications have become increasingly important. These applications differ significantly from desktop and web applications, and being used increasingly in various enterprise domains. Accordingly, this motivates the mobile industries to increase the accessibility of mobile applications and their development across many platforms, including Android and iPhone. This research work discusses the security testing procedure and features of India's first indigenous AppStore “mSeva AppStore”. To ensure the quality of the hosted mobile applications, distinct techniques, and effective testing approaches are required. Before hosting the application on mSeva AppStore regressive testing is performed in all aspects like insecure permissions, data storage, secure logic, proper platform algorithms, etc. However, in the current mobile application testing scenario, other AppStore does not consider all factors before hosting the applications, which is quite necessary. This study highlights the key terminologies of mobile application testing and quality parameters. Further, demonstrates the actual results that are obtained during the security testing of various applications. Along with this, the first-ever Common Weakness Enumeration (CWE) based classification regarding common artifacts in mobile application testing is provided. The peculiarities discussed with respect to mobile applications and the testing requirements in the context of secure hosting will help the relevant researcher and stakeholders in this field.
近年来,移动应用程序变得越来越重要。这些应用程序与桌面和web应用程序有很大的不同,并且越来越多地用于各种企业领域。因此,这促使移动行业增加移动应用的可访问性,并在多个平台(包括Android和iPhone)上进行开发。本研究讨论了印度首个本土应用商店“mSeva AppStore”的安全测试程序和特点。为了确保托管移动应用程序的质量,需要不同的技术和有效的测试方法。在mSeva AppStore上托管应用程序之前,我们在所有方面进行了回归测试,如不安全的权限、数据存储、安全逻辑、适当的平台算法等。然而,在目前的手机应用测试场景中,其他AppStore在托管应用之前并没有考虑到所有的因素,这是非常必要的。本研究重点介绍了移动应用程序测试和质量参数的关键术语。此外,还演示了在对各种应用程序进行安全测试期间获得的实际结果。与此同时,提供了关于移动应用程序测试中常见工件的第一个基于通用弱点枚举(CWE)的分类。关于移动应用程序和安全托管环境下的测试要求的特性讨论将有助于该领域的相关研究人员和利益相关者。
{"title":"Effective Security Testing of Mobile Applications for Building Trust in the Digital World","authors":"Kapil Kant Kamal, Padmaja Joshi, A. Bang, Kavita Bhatia","doi":"10.1109/ICOEI56765.2023.10125814","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125814","url":null,"abstract":"In recent years, mobile applications have become increasingly important. These applications differ significantly from desktop and web applications, and being used increasingly in various enterprise domains. Accordingly, this motivates the mobile industries to increase the accessibility of mobile applications and their development across many platforms, including Android and iPhone. This research work discusses the security testing procedure and features of India's first indigenous AppStore “mSeva AppStore”. To ensure the quality of the hosted mobile applications, distinct techniques, and effective testing approaches are required. Before hosting the application on mSeva AppStore regressive testing is performed in all aspects like insecure permissions, data storage, secure logic, proper platform algorithms, etc. However, in the current mobile application testing scenario, other AppStore does not consider all factors before hosting the applications, which is quite necessary. This study highlights the key terminologies of mobile application testing and quality parameters. Further, demonstrates the actual results that are obtained during the security testing of various applications. Along with this, the first-ever Common Weakness Enumeration (CWE) based classification regarding common artifacts in mobile application testing is provided. The peculiarities discussed with respect to mobile applications and the testing requirements in the context of secure hosting will help the relevant researcher and stakeholders in this field.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Need of Cyber Security, Tools, Uses and Future Research 网络安全的需求、工具、用途和未来研究
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125792
P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh
Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.
网络安全用于保护计算机系统、网络和其他数字设备免受损害。黑客总是试图使用先进的工具来混淆他们的检测,并发起新的网络攻击。因此,需要一些先进的网络安全工具来检查系统的安全性。在本文中,提供了一些潜在的网络安全工具及其用途的细节。提供了有关它们的功能、许可和在线链接的信息。此外,还解释了网络安全的必要性。最后,提出了与网络安全相关的一些潜在研究方向。
{"title":"Need of Cyber Security, Tools, Uses and Future Research","authors":"P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh","doi":"10.1109/ICOEI56765.2023.10125792","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125792","url":null,"abstract":"Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT based Overload Detection System in Public Transportation Vehicles 基于物联网的公共交通车辆过载检测系统
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125693
B. Masram, Aakansha Nimje, Arpita Raut, Neha Mehatre, Sayli Humane
In India, due to the negligence of the legal systems, transporters loaded the goods vehicles with weights far above the permissible limit. Overloaded vehicles cause extensive road damage and enormous economic losses to society, seriously threatening road safety. Due to overloading, many people lose their lives in accidents, and vehicle fuel consumption increases, resulting in environmental pollution. To create a workable, effective system for the Regional Transport Office department and to generate, and manipulate fines. The proposed system has given the count of incoming and departing passengers which has become a feasible, efficient technique in any Regional Transport Office department. The IOT system has used the Node MCU model in proposed system for the efficient work of the system
在印度,由于法律制度的疏忽,运输商装载的货物重量远远超过了允许的限制。超载车辆造成广泛的道路破坏和巨大的社会经济损失,严重威胁道路安全。由于超载,许多人在事故中丧生,车辆油耗增加,造成环境污染。为区域运输办公室部门创建一个可行的,有效的系统,并产生和操纵罚款。提出的系统给出了进出港旅客的计数,这已成为任何地区交通局部门可行、高效的技术。为了保证系统的高效工作,本系统采用了Node单片机模型
{"title":"IoT based Overload Detection System in Public Transportation Vehicles","authors":"B. Masram, Aakansha Nimje, Arpita Raut, Neha Mehatre, Sayli Humane","doi":"10.1109/ICOEI56765.2023.10125693","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125693","url":null,"abstract":"In India, due to the negligence of the legal systems, transporters loaded the goods vehicles with weights far above the permissible limit. Overloaded vehicles cause extensive road damage and enormous economic losses to society, seriously threatening road safety. Due to overloading, many people lose their lives in accidents, and vehicle fuel consumption increases, resulting in environmental pollution. To create a workable, effective system for the Regional Transport Office department and to generate, and manipulate fines. The proposed system has given the count of incoming and departing passengers which has become a feasible, efficient technique in any Regional Transport Office department. The IOT system has used the Node MCU model in proposed system for the efficient work of the system","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127190235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disease Identification in Tomato Leaves Using Inception V3 Convolutional Neural Networks 基于Inception V3卷积神经网络的番茄叶片病害识别
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125758
Srinivas Samala, Nakka Bhavith, Raghav Bang, Durshanapally Kondal Rao, C. Prasad, Srikanth Yalabaka
Tomatoes are the most widely grown vegetable, used in a wide variety of dishes around the world. After potatoes and sweet potatoes, it is the third most extensively cultivated crop in the world. However, due to several diseases, both the quality and quantity of tomato harvests dedine. To maximize tomato yields, it is important to identify and eradicate the many diseases that harm the crop as early as possible. In this paper, we investigate the potential of deep learning techniques for diagnosing diseases on tomato leaves. The use of automatic methods for tomato leaf disease detection is helpful because it reduces the amount of monitoring needed in large-scale crop farms and does so at a very early stage when the signs of the disease identified on plant leaves are still easy to cure. The Kaggle dataset for tomato leaf disease was used for the study. A technique based on convolutional neural networks is used for disease identification and classification. Deep learning models, such as Inception V3 are used in this work. This proposed system obtained an accuracy of 99.60% suggesting that the neural network approach is effective even under difficult situations.
西红柿是种植最广泛的蔬菜,被用于世界各地的各种菜肴中。继土豆和红薯之后,它是世界上第三大广泛种植的作物。然而,由于几种病害,番茄收成的质量和数量都下降了。为了最大限度地提高番茄产量,尽早发现和根除危害作物的许多疾病是很重要的。在本文中,我们研究了深度学习技术在诊断番茄叶片疾病方面的潜力。使用自动方法检测番茄叶片疾病是有帮助的,因为它减少了大规模作物农场所需的监测量,并且在植物叶片上发现的疾病迹象仍然容易治愈的早期阶段就进行了监测。该研究使用了番茄叶病的Kaggle数据集。基于卷积神经网络的疾病识别和分类技术。在这项工作中使用了深度学习模型,比如Inception V3。该系统获得了99.60%的准确率,表明即使在困难的情况下,神经网络方法也是有效的。
{"title":"Disease Identification in Tomato Leaves Using Inception V3 Convolutional Neural Networks","authors":"Srinivas Samala, Nakka Bhavith, Raghav Bang, Durshanapally Kondal Rao, C. Prasad, Srikanth Yalabaka","doi":"10.1109/ICOEI56765.2023.10125758","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125758","url":null,"abstract":"Tomatoes are the most widely grown vegetable, used in a wide variety of dishes around the world. After potatoes and sweet potatoes, it is the third most extensively cultivated crop in the world. However, due to several diseases, both the quality and quantity of tomato harvests dedine. To maximize tomato yields, it is important to identify and eradicate the many diseases that harm the crop as early as possible. In this paper, we investigate the potential of deep learning techniques for diagnosing diseases on tomato leaves. The use of automatic methods for tomato leaf disease detection is helpful because it reduces the amount of monitoring needed in large-scale crop farms and does so at a very early stage when the signs of the disease identified on plant leaves are still easy to cure. The Kaggle dataset for tomato leaf disease was used for the study. A technique based on convolutional neural networks is used for disease identification and classification. Deep learning models, such as Inception V3 are used in this work. This proposed system obtained an accuracy of 99.60% suggesting that the neural network approach is effective even under difficult situations.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dual Band Fractal Antenna with Truncated Hexagonal Nested Rings for Wireless Applications 用于无线应用的截断六边形嵌套环双波段分形天线
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125628
N. Srikanta, M. Pachiyaannan
This article presents and analyses a low profile truncated hexagonal nested rings patch antenna for use in various wireless applications. This dual band antenna is fed by a 50 ohm microstrip feed line and is made of truncated nested hexagonal rings-shaped radiating patch elements on a single layer 1.6 mm thick FR4 substrate. To achieve adequate impedance matching between the antenna and the source, the truncated patch with partial ground plane is used. While the S11value is less than −10 dB, the designed antenna functions at two different frequency bands, including 4.6-6.7 GHz, and 12 GHz to 14.2 GHz. In order to test the antenna operation at the two distinct frequency bands and optimise the design, the Ansoft High Frequency Structure Simulator (HFSS) is used. At two frequency bands, the developed antenna shows greater gain. To verify its performance, the dual band antenna underwent testing and prototype development. The simulation outcomes demonstrate a fair level of agreement with the measurement outcomes.
本文介绍并分析了一种用于各种无线应用的低轮廓截断六边形嵌套环贴片天线。该双频天线由50欧姆微带馈线馈电,在单层1.6 mm厚的FR4基板上由截断嵌套的六边形环形辐射贴片元件构成。为了在天线和源之间实现充分的阻抗匹配,采用了带部分地平面的截断贴片。在s11值小于−10 dB的情况下,设计的天线工作在4.6 ~ 6.7 GHz和12 GHz ~ 14.2 GHz两个不同的频段。为了测试天线在两个不同频段的工作并优化设计,使用了Ansoft高频结构模拟器(HFSS)。在两个频段,该天线显示出更大的增益。为了验证其性能,双波段天线进行了测试和原型开发。仿真结果与测量结果相当一致。
{"title":"A Dual Band Fractal Antenna with Truncated Hexagonal Nested Rings for Wireless Applications","authors":"N. Srikanta, M. Pachiyaannan","doi":"10.1109/ICOEI56765.2023.10125628","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125628","url":null,"abstract":"This article presents and analyses a low profile truncated hexagonal nested rings patch antenna for use in various wireless applications. This dual band antenna is fed by a 50 ohm microstrip feed line and is made of truncated nested hexagonal rings-shaped radiating patch elements on a single layer 1.6 mm thick FR4 substrate. To achieve adequate impedance matching between the antenna and the source, the truncated patch with partial ground plane is used. While the S11value is less than −10 dB, the designed antenna functions at two different frequency bands, including 4.6-6.7 GHz, and 12 GHz to 14.2 GHz. In order to test the antenna operation at the two distinct frequency bands and optimise the design, the Ansoft High Frequency Structure Simulator (HFSS) is used. At two frequency bands, the developed antenna shows greater gain. To verify its performance, the dual band antenna underwent testing and prototype development. The simulation outcomes demonstrate a fair level of agreement with the measurement outcomes.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117353412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-based Web Application for Passenger Travel Tracking System 基于物联网的旅客出行跟踪系统Web应用
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125610
M. Sohaib, V. Aarthi, M. N. Laxmi, G. G. Shivaji, T. A. Kumar, M. Ramesh
In this work, RFID (Radio Frequency Identification Device) labels are used to create electronic transportation tickets for the public transportation system. Transport systems with cutting-edge innovations like RFID, IoT, and GPS will eventually gain popularity due to their advantages of greater comfort and higher ethical standards as compared to traditional transport systems or paper ticketing systems. In the proposed approach, the passenger is automatically identified by using their RFID card, and the fare according to the distance travelled by the passenger is automatically subtracted from the RFID card. GPS and RFID tags are used to increase the precision of fare calculation and passenger identification. The RFID system can replace conventional paper-based tickets since they are better because they are reusable and offer improved accuracy. This eliminates the outdated paper-based bus booking system and guards against money laundering and corruption. RFID tags are used as reusable tickets that calculate the fee based on the user's GPS-measured distance travelled. By using this system, human errors and effort are reduced.
在这项工作中,RFID(无线射频识别设备)标签被用来为公共交通系统创建电子交通票。与传统的运输系统或纸质票务系统相比,具有RFID、物联网和GPS等尖端创新的运输系统将最终获得普及,因为它们具有更大的舒适性和更高的道德标准。在提出的方法中,通过使用RFID卡自动识别乘客,并根据乘客所行驶的距离自动从RFID卡中扣除票价。使用GPS和RFID标签来提高票价计算和乘客识别的精度。RFID系统可以取代传统的纸质门票,因为它们可以重复使用,而且准确性更高。这消除了过时的纸质巴士预订系统,并防止洗钱和腐败。RFID标签被用作可重复使用的门票,根据用户的gps测量的旅行距离来计算费用。通过使用该系统,可以减少人为错误和工作量。
{"title":"IoT-based Web Application for Passenger Travel Tracking System","authors":"M. Sohaib, V. Aarthi, M. N. Laxmi, G. G. Shivaji, T. A. Kumar, M. Ramesh","doi":"10.1109/ICOEI56765.2023.10125610","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125610","url":null,"abstract":"In this work, RFID (Radio Frequency Identification Device) labels are used to create electronic transportation tickets for the public transportation system. Transport systems with cutting-edge innovations like RFID, IoT, and GPS will eventually gain popularity due to their advantages of greater comfort and higher ethical standards as compared to traditional transport systems or paper ticketing systems. In the proposed approach, the passenger is automatically identified by using their RFID card, and the fare according to the distance travelled by the passenger is automatically subtracted from the RFID card. GPS and RFID tags are used to increase the precision of fare calculation and passenger identification. The RFID system can replace conventional paper-based tickets since they are better because they are reusable and offer improved accuracy. This eliminates the outdated paper-based bus booking system and guards against money laundering and corruption. RFID tags are used as reusable tickets that calculate the fee based on the user's GPS-measured distance travelled. By using this system, human errors and effort are reduced.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Implementation of Image Steganography by Using AES Algorithm 基于AES算法的图像隐写分析与实现
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125790
Riya Kedia, B. Kumar, Pallab Banerjee, Pooja Jha, Tannisha Kundu, Mohan Kumar Dehury
Popular cryptographic technology called Advanced Encryption Standard (AES) enables secure data transfer over the internet. It is used for a variety of purposes, such as secure data transfer, mobile phone encryption, and encryption of extremely sensitive data. It operates in terms of blocks, or chunks, of data. Steganography is the process of hiding data in another sort of data, such as a digital image. If a user wants to utilize a cryptographic method to conceal encrypted data in an image, such as AES, it is essential that the method be impervious to all possible attacks. This study has analyzed the possibility to hide data inside digital photos by utilizing encryption techniques like AES. The performance comparison of AES and Data Encryption Standard (DES), a full Python implementation of the AES for image steganography is also presented. To illustrate how each method performs, experimental results are provided. The Advanced Encryption Standard can be programmed in software or built with pure hardware.
被称为高级加密标准(AES)的流行加密技术使互联网上的数据传输安全。它被用于各种目的,例如安全数据传输、移动电话加密和极端敏感数据的加密。它以数据块或数据块的形式进行操作。隐写术是将数据隐藏在另一种数据(如数字图像)中的过程。如果用户希望利用加密方法(如AES)在图像中隐藏加密数据,则必须确保该方法不受所有可能的攻击的影响。该研究分析了利用AES等加密技术将数据隐藏在数码照片中的可能性。AES和数据加密标准(DES)的性能比较,并给出了用于图像隐写的AES的完整Python实现。为了说明每种方法如何执行,提供了实验结果。高级加密标准可以用软件编程,也可以用纯硬件构建。
{"title":"Analysis and Implementation of Image Steganography by Using AES Algorithm","authors":"Riya Kedia, B. Kumar, Pallab Banerjee, Pooja Jha, Tannisha Kundu, Mohan Kumar Dehury","doi":"10.1109/ICOEI56765.2023.10125790","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125790","url":null,"abstract":"Popular cryptographic technology called Advanced Encryption Standard (AES) enables secure data transfer over the internet. It is used for a variety of purposes, such as secure data transfer, mobile phone encryption, and encryption of extremely sensitive data. It operates in terms of blocks, or chunks, of data. Steganography is the process of hiding data in another sort of data, such as a digital image. If a user wants to utilize a cryptographic method to conceal encrypted data in an image, such as AES, it is essential that the method be impervious to all possible attacks. This study has analyzed the possibility to hide data inside digital photos by utilizing encryption techniques like AES. The performance comparison of AES and Data Encryption Standard (DES), a full Python implementation of the AES for image steganography is also presented. To illustrate how each method performs, experimental results are provided. The Advanced Encryption Standard can be programmed in software or built with pure hardware.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KARE - Presto Canteen Management System with an Android Application KARE - Presto食堂管理系统与Android应用程序
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125634
P. Manikandan, K. K. Babu, G. M. Reddy, G. Kalayan, V. Muneeswaran
In the midst of a technological revolution that is set to drastically alter human daily lives and may even redefine the concept of humanity. One area where technology is being implemented is in canteen management systems, which offer a convenient way for university students and staff to order food without having to physically go to the cafeteria and wait in long queues. This research work proposes a canteen management system that utilizes an ARM processor, Bluetooth module, thermal printer, Liquid Crystal Display (LCD), and an Android application. The Android app dis plays the food menu with prices and ratings, allowing users to remotely order their food from within the canteen. This saves time for students and staff, who no longer must stand in line for extended periods. The canteen cashier can see the orders and print the bill once the user has paid. This system is designed to streamline the food ordering process and reduce wait times. Many universities do not have a food order collection system, forcing students to go directly to the counter and place an order, which is a time-consuming process. This system aims to solve this problem and provide a more efficient way for students and staff to order food.
一场技术革命即将彻底改变人类的日常生活,甚至可能重新定义人类的概念。技术正在实施的一个领域是食堂管理系统,它为大学生和员工提供了一种方便的方式来点餐,而不必亲自去自助餐厅排队等候。本研究提出了一种利用ARM处理器、蓝牙模块、热敏打印机、液晶显示器(LCD)和Android应用程序的食堂管理系统。这款安卓应用程序会显示食物菜单,包括价格和评级,用户可以在食堂内远程点餐。这为学生和工作人员节省了时间,他们不再需要长时间排队。食堂收银员可以看到用户的订单,并在用户付款后打印账单。该系统旨在简化点餐过程,减少等待时间。许多大学没有订餐收集系统,迫使学生直接到柜台下单,这是一个耗时的过程。本系统旨在解决这一问题,为学生和员工订餐提供一种更高效的方式。
{"title":"KARE - Presto Canteen Management System with an Android Application","authors":"P. Manikandan, K. K. Babu, G. M. Reddy, G. Kalayan, V. Muneeswaran","doi":"10.1109/ICOEI56765.2023.10125634","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125634","url":null,"abstract":"In the midst of a technological revolution that is set to drastically alter human daily lives and may even redefine the concept of humanity. One area where technology is being implemented is in canteen management systems, which offer a convenient way for university students and staff to order food without having to physically go to the cafeteria and wait in long queues. This research work proposes a canteen management system that utilizes an ARM processor, Bluetooth module, thermal printer, Liquid Crystal Display (LCD), and an Android application. The Android app dis plays the food menu with prices and ratings, allowing users to remotely order their food from within the canteen. This saves time for students and staff, who no longer must stand in line for extended periods. The canteen cashier can see the orders and print the bill once the user has paid. This system is designed to streamline the food ordering process and reduce wait times. Many universities do not have a food order collection system, forcing students to go directly to the counter and place an order, which is a time-consuming process. This system aims to solve this problem and provide a more efficient way for students and staff to order food.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131646829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1