首页 > 最新文献

2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)最新文献

英文 中文
2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM 2023) 第三届国际技术与管理创新实践会议(ICIPTM 2023)
{"title":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM 2023)","authors":"","doi":"10.1109/iciptm57143.2023.10118303","DOIUrl":"https://doi.org/10.1109/iciptm57143.2023.10118303","url":null,"abstract":"","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133416488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review On Enhancing Healthcare Services for Heart Disease Patients using Machine Learning Approaches in Cloud Environment 云环境下使用机器学习方法增强心脏病患者医疗保健服务综述
Marouf Muzaffar War, Dalwinder Singh
Vision-based Alarming rates of heart disease affect both sexes. Early warning of heart disease may be obtained by monitoring a variety of risk factors. This new technology is having a profound effect on healthcare systems. As a result of the Internet of Things, we can now remotely monitor patients, gather data, and analyze it to provide superior treatment. However, there is a critical need to provide unique and state-of-the-art secure algorithms for speedy event processing and effective event identification. In this piece, we present a tetrolet ELGamal algorithm (TEA)-based machine learning based logistic Bayesian decision tree (LBDT) for predicting cardiac issues based on existing data saved in the cloud. In addition to providing a safe place to keep sensitive patient data, the cloud may be used as a reliable data source for educational purposes. Comparisons are made between the suggested (LBDT TEA) and other algorithms in terms of encrypting and decrypting times, as well as accuracy, precision, recall, and F-score.
基于视力的心脏病发病率惊人,男女皆有。通过监测各种危险因素,可以获得心脏病的早期预警。这项新技术正在对医疗保健系统产生深远的影响。由于物联网,我们现在可以远程监控病人,收集数据,并对其进行分析,以提供更好的治疗。然而,迫切需要提供独特的、最先进的安全算法,以实现快速事件处理和有效的事件识别。在这篇文章中,我们提出了一种基于tetrolet ELGamal算法(TEA)的基于机器学习的逻辑贝叶斯决策树(LBDT),用于根据保存在云中的现有数据预测心脏问题。除了提供保存敏感患者数据的安全场所外,云还可以用作可靠的数据源,用于教育目的。将建议的(LBDT TEA)算法与其他算法在加密和解密时间、准确性、精度、召回率和f分数方面进行比较。
{"title":"Review On Enhancing Healthcare Services for Heart Disease Patients using Machine Learning Approaches in Cloud Environment","authors":"Marouf Muzaffar War, Dalwinder Singh","doi":"10.1109/ICIPTM57143.2023.10117963","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10117963","url":null,"abstract":"Vision-based Alarming rates of heart disease affect both sexes. Early warning of heart disease may be obtained by monitoring a variety of risk factors. This new technology is having a profound effect on healthcare systems. As a result of the Internet of Things, we can now remotely monitor patients, gather data, and analyze it to provide superior treatment. However, there is a critical need to provide unique and state-of-the-art secure algorithms for speedy event processing and effective event identification. In this piece, we present a tetrolet ELGamal algorithm (TEA)-based machine learning based logistic Bayesian decision tree (LBDT) for predicting cardiac issues based on existing data saved in the cloud. In addition to providing a safe place to keep sensitive patient data, the cloud may be used as a reliable data source for educational purposes. Comparisons are made between the suggested (LBDT TEA) and other algorithms in terms of encrypting and decrypting times, as well as accuracy, precision, recall, and F-score.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wild Animals Intrusion Detection for Safe Commuting in Forest Corridors using AI Techniques 基于人工智能技术的森林走廊野生动物入侵检测
J. J. Daniel Raj, C.N Sangeetha, Sarthak Ghorai, Subhajit Das, Manish, Shariq Ahmed
There are many animal attacks on human is being reported in the recent days particularly in the forest area which claims innocent lives. In order to reduce such incidents this work is aimed to identify animals and alert vehicles to slowdown accident rates using IOT detection system. If the detection is triggered, the alert system will give signals to driver. Hence, the system will save the animal and reduce number of accidents in the jungle side highways. In this work Raspberry Pi 3 Model B is used for detecting the animals and alerting the vehicles. The camera is configured for use in Raspberry Pi to take shoot images and movement of animals. It also employs IOT based image detection system using display or sound alert system. We try to slowdown the vehicle to avoid accidents. We have used YOLO algorithm which helps us to process the system which takes 45 frames per sec. This proposed system process the image to predict the object at once.
最近几天有许多动物袭击人类的报道,特别是在森林地区,夺走了无辜的生命。为了减少此类事件,这项工作旨在识别动物并警告车辆使用物联网检测系统来降低事故率。如果检测被触发,报警系统将向驾驶员发出信号。因此,该系统将拯救动物,并减少丛林边高速公路上的事故数量。在这项工作中,树莓派3模型B用于检测动物和提醒车辆。该相机配置用于树莓派拍摄图像和动物的运动。它还采用基于物联网的图像检测系统,使用显示或声音警报系统。我们设法放慢车速以避免事故。我们使用了YOLO算法,该算法可以帮助我们处理系统,每秒45帧,该系统可以一次处理图像以预测目标。
{"title":"Wild Animals Intrusion Detection for Safe Commuting in Forest Corridors using AI Techniques","authors":"J. J. Daniel Raj, C.N Sangeetha, Sarthak Ghorai, Subhajit Das, Manish, Shariq Ahmed","doi":"10.1109/ICIPTM57143.2023.10117831","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10117831","url":null,"abstract":"There are many animal attacks on human is being reported in the recent days particularly in the forest area which claims innocent lives. In order to reduce such incidents this work is aimed to identify animals and alert vehicles to slowdown accident rates using IOT detection system. If the detection is triggered, the alert system will give signals to driver. Hence, the system will save the animal and reduce number of accidents in the jungle side highways. In this work Raspberry Pi 3 Model B is used for detecting the animals and alerting the vehicles. The camera is configured for use in Raspberry Pi to take shoot images and movement of animals. It also employs IOT based image detection system using display or sound alert system. We try to slowdown the vehicle to avoid accidents. We have used YOLO algorithm which helps us to process the system which takes 45 frames per sec. This proposed system process the image to predict the object at once.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115932247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT based Weather, Soil, Earthquake, Air pollution Monitoring System 基于物联网的天气、土壤、地震、空气污染监测系统
K. M. Sankar, B. Booba, C. Rangaswamy, P. V. Pramila, S. Kar, Ashok Kumar, M. Sudhakar
This article provides IoT information on a great option for tracking local temperature variables and enabling the information accessible from any part of the planet. The dynamic changes in the weather are to blame for the severe flooding. Using the NODEMCU ESP8266, it accomplishes the creation of a flood observing arrangement for loading and recovering data from the arrangement. Ultrasonic sensors and LEDs are used to warn the authorities to the presence of heavy water. A crucial component of plant life, soil moisture will directly impact crop growth and output. A key component of the vegetation that directly affects the development and production of the harvest is soil moisture. It uses a microcontroller and sensor to carry out the advancement of soil dampness checking. The initial tremor of a large earthquake is picked up by an earthquake warning system employing a sensor. Because there are more businesses and vehicles on the road today, the air quality is poor, which has an impact on people. The importance of using IOT to evaluate the value of the air and the amount of pollutants in the environment cannot be overstated because the field has experienced a major development. It creates a system that uses the MQ135 sensor, which will be visible on the Cayenne platform, to measure the amount of harmful airborne pollutants such methane, alcohol, benzene, and CO2. Data is automatically stored in private channels by thing talk. The data obtained from the embedded scheme could be reachable over an internet from wherever in the sphere.
本文提供了物联网信息,这是跟踪当地温度变量的一个很好的选择,并使信息能够从地球的任何地方访问。天气的动态变化是造成严重洪水的原因。使用NODEMCU ESP8266,它完成了洪水观测装置的创建,以便从装置中加载和恢复数据。超声波传感器和led被用来警告当局重水的存在。作为植物生命的重要组成部分,土壤湿度将直接影响作物的生长和产量。植被的一个关键组成部分是土壤水分,它直接影响作物的生长和产量。它采用单片机和传感器来实现对土壤湿度的超前检测。一场大地震的最初震动是由采用传感器的地震预警系统捕捉到的。因为今天路上的商家和车辆比较多,空气质量比较差,对人有影响。使用物联网来评估空气价值和环境中污染物数量的重要性怎么强调都不为过,因为该领域经历了重大发展。它创建了一个使用MQ135传感器的系统,该系统将在Cayenne平台上可见,以测量有害空气污染物的数量,如甲烷,酒精,苯和二氧化碳。数据被自动存储在私有通道中。从嵌入式方案获得的数据可以通过互联网从球体的任何地方访问。
{"title":"IoT based Weather, Soil, Earthquake, Air pollution Monitoring System","authors":"K. M. Sankar, B. Booba, C. Rangaswamy, P. V. Pramila, S. Kar, Ashok Kumar, M. Sudhakar","doi":"10.1109/ICIPTM57143.2023.10118160","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10118160","url":null,"abstract":"This article provides IoT information on a great option for tracking local temperature variables and enabling the information accessible from any part of the planet. The dynamic changes in the weather are to blame for the severe flooding. Using the NODEMCU ESP8266, it accomplishes the creation of a flood observing arrangement for loading and recovering data from the arrangement. Ultrasonic sensors and LEDs are used to warn the authorities to the presence of heavy water. A crucial component of plant life, soil moisture will directly impact crop growth and output. A key component of the vegetation that directly affects the development and production of the harvest is soil moisture. It uses a microcontroller and sensor to carry out the advancement of soil dampness checking. The initial tremor of a large earthquake is picked up by an earthquake warning system employing a sensor. Because there are more businesses and vehicles on the road today, the air quality is poor, which has an impact on people. The importance of using IOT to evaluate the value of the air and the amount of pollutants in the environment cannot be overstated because the field has experienced a major development. It creates a system that uses the MQ135 sensor, which will be visible on the Cayenne platform, to measure the amount of harmful airborne pollutants such methane, alcohol, benzene, and CO2. Data is automatically stored in private channels by thing talk. The data obtained from the embedded scheme could be reachable over an internet from wherever in the sphere.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Data Reduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage 云存储中高效可靠多密钥管理的安全数据复制系统
B. Jayaram, T. Suguna, S. Fairooz, A. P, S. Vimal
Malicious hackers may compromise hundreds or millions of machines with little effort, allowing them to shut down networks, steal sensitive data, and compromise critical infrastructure. Data is stolen and used for malicious purposes by hackers who exploit security flaws in the network. And the sophisticated technology they use, like the bucks they do, are continually feeding them the information they needed, not just once. Moreover, even if Internet firewalls have improved, cybercrime has been on the rise. Then, we have a long way to go before we approach the limit, what with all the different kinds of cloud server devices that can connect to the internet nowadays. It's certain that in the future, little devices, no matter how helpful they are really in our everyday lives, will become the preferred tool of villains. In this research, we offer a novel security technique for protecting sensitive data on cloud servers. This intelligent cloud server was protected from any hacking with the aid of this algorithm. The system's output was measured against those of pre-existing algorithms. More than 96% of inputs are authenticated by the proposed technique, while password cracking operations are reduced by about 3%. The source code security management is improved to 99% and the updating issues for various devices entries is reduced 0.02%, and further the privacy breach is reduced up to 0.32%. Hence the proposed method was more secured from cyber security issues.
恶意黑客可以毫不费力地入侵数亿台机器,从而关闭网络、窃取敏感数据并破坏关键基础设施。黑客利用网络中的安全漏洞窃取数据并将其用于恶意目的。他们使用的复杂技术,就像他们所做的雄鹿一样,不断地为他们提供所需的信息,而不仅仅是一次。此外,即使互联网防火墙有所改善,网络犯罪也在上升。那么,在接近极限之前,我们还有很长的路要走,因为现在有各种各样的云服务器设备可以连接到互联网。可以肯定的是,在未来,小设备,无论它们在我们的日常生活中有多么有用,都会成为坏人的首选工具。在这项研究中,我们提供了一种新的安全技术来保护云服务器上的敏感数据。借助该算法,该智能云服务器免受任何黑客攻击。该系统的输出是根据已有的算法进行测量的。超过96%的输入通过该技术进行了身份验证,而密码破解操作减少了约3%。源代码安全管理提高到99%,各种设备条目的更新问题减少0.02%,隐私泄露进一步减少到0.32%。因此,该方法更不受网络安全问题的影响。
{"title":"Secure Data Reduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage","authors":"B. Jayaram, T. Suguna, S. Fairooz, A. P, S. Vimal","doi":"10.1109/ICIPTM57143.2023.10118064","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10118064","url":null,"abstract":"Malicious hackers may compromise hundreds or millions of machines with little effort, allowing them to shut down networks, steal sensitive data, and compromise critical infrastructure. Data is stolen and used for malicious purposes by hackers who exploit security flaws in the network. And the sophisticated technology they use, like the bucks they do, are continually feeding them the information they needed, not just once. Moreover, even if Internet firewalls have improved, cybercrime has been on the rise. Then, we have a long way to go before we approach the limit, what with all the different kinds of cloud server devices that can connect to the internet nowadays. It's certain that in the future, little devices, no matter how helpful they are really in our everyday lives, will become the preferred tool of villains. In this research, we offer a novel security technique for protecting sensitive data on cloud servers. This intelligent cloud server was protected from any hacking with the aid of this algorithm. The system's output was measured against those of pre-existing algorithms. More than 96% of inputs are authenticated by the proposed technique, while password cracking operations are reduced by about 3%. The source code security management is improved to 99% and the updating issues for various devices entries is reduced 0.02%, and further the privacy breach is reduced up to 0.32%. Hence the proposed method was more secured from cyber security issues.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Blockchain Banking Cloud with Error Recovery Processes 具有错误恢复流程的安全区块链银行云
K. Manoj
Cloud computing technology is an excellent source for increasing data management capacity and providing a variety of services. Clients can access a variety of services via the internet using this technology. This Cloud technology provides several advantages to banks, including lower costs, more data processing capability, and better competence in financial services. Financial firms would use cloud services with greater efficiency and flexibility as needed. However, many firms are hesitating to employ this technology because of security concerns. Keeping data safe in the cloud is becoming more and more important. The paper aims to propose a solution to the aforementioned problem using blockchain and biometrics. Biometrics is a digitalized method for recognizing people based on physiological characteristics. Biometrics and cryptography might be used to make the cloud server extra secure. The cloud-based protected data is secured using bio-cryptography concealment. The method secures the protection and deciphering of data in the cloud by using biometrics as the primary component. We discuss how to make the biometric system safer by utilizing cloud computing, as well as how to improve its performance so that criminals cannot access your data. Biometric authentication is a viable solution for cloud services. We will explore how to construct a cryptographic technique within a blockchain to overcome these concerns. Blockchain technology will improve data security by utilizing cryptographic keys. The system also manages error recovery, which leads to the failing cloud instance being immediately identified and corrected.
云计算技术是增加数据管理能力和提供各种服务的极好来源。客户可以使用这种技术通过互联网访问各种服务。这种云技术为银行提供了几个优势,包括更低的成本、更多的数据处理能力和更好的金融服务能力。金融公司将根据需要以更高的效率和灵活性使用云服务。然而,出于安全考虑,许多公司对采用这项技术犹豫不决。保持云中的数据安全变得越来越重要。本文旨在利用区块链和生物识别技术提出解决上述问题的方法。生物特征识别是一种基于生理特征识别人的数字化方法。生物识别技术和加密技术可能会使云服务器更加安全。基于云的受保护数据使用生物密码隐藏来保护。该方法通过使用生物识别技术作为主要组件来确保云中的数据的保护和解密。我们讨论了如何利用云计算使生物识别系统更安全,以及如何提高其性能,使犯罪分子无法访问您的数据。生物识别身份验证是云服务的可行解决方案。我们将探索如何在区块链中构建加密技术来克服这些问题。区块链技术将通过使用加密密钥来提高数据安全性。系统还可以管理错误恢复,从而可以立即识别和纠正失败的云实例。
{"title":"Secure Blockchain Banking Cloud with Error Recovery Processes","authors":"K. Manoj","doi":"10.1109/ICIPTM57143.2023.10118028","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10118028","url":null,"abstract":"Cloud computing technology is an excellent source for increasing data management capacity and providing a variety of services. Clients can access a variety of services via the internet using this technology. This Cloud technology provides several advantages to banks, including lower costs, more data processing capability, and better competence in financial services. Financial firms would use cloud services with greater efficiency and flexibility as needed. However, many firms are hesitating to employ this technology because of security concerns. Keeping data safe in the cloud is becoming more and more important. The paper aims to propose a solution to the aforementioned problem using blockchain and biometrics. Biometrics is a digitalized method for recognizing people based on physiological characteristics. Biometrics and cryptography might be used to make the cloud server extra secure. The cloud-based protected data is secured using bio-cryptography concealment. The method secures the protection and deciphering of data in the cloud by using biometrics as the primary component. We discuss how to make the biometric system safer by utilizing cloud computing, as well as how to improve its performance so that criminals cannot access your data. Biometric authentication is a viable solution for cloud services. We will explore how to construct a cryptographic technique within a blockchain to overcome these concerns. Blockchain technology will improve data security by utilizing cryptographic keys. The system also manages error recovery, which leads to the failing cloud instance being immediately identified and corrected.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116819806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence driven security model for Internet of Medical Things (IoMT) 人工智能驱动的医疗物联网(IoMT)安全模型
Cuddapah Anitha, K. R, Chettiyar Vani Vivekanand, S. D. Lalitha, S. Boopathi, R. R
The Internet of Medical Things (IoMT) has been applied to provide health care facilities for elders and parents. Remote health care is essential for providing scarce resources and facilities to coronavirus patients. Ongoing IoMT communication is susceptible to potential security attacks. In this research, an artificial intelligence-driven security model of the IoMT is also proposed to simulate and analyses the results. Under the proposed plan, only authorized users will be able to access private and sensitive patient information, and unauthorized users will be unable to access a secure healthcare network. The various phases for implementing artificial intelligence (AI) techniques in the IoMT system have been discussed. AI-driven IoMT is implemented using decision trees, logistic regression, support vector machines (SVM), and k-nearest neighbours (KNN) techniques. The KNN learning models are recommended for IoMT applications due to their low consumption time with high accuracy and effective prediction.
医疗物联网(IoMT)已被应用于为老年人和父母提供医疗保健设施。远程医疗对于向冠状病毒患者提供稀缺的资源和设施至关重要。正在进行的IoMT通信容易受到潜在的安全攻击。在本研究中,还提出了一个人工智能驱动的IoMT安全模型来模拟和分析结果。根据拟议的计划,只有授权用户才能访问私人和敏感的患者信息,未经授权的用户将无法访问安全的医疗保健网络。讨论了在IoMT系统中实现人工智能(AI)技术的各个阶段。人工智能驱动的IoMT使用决策树、逻辑回归、支持向量机(SVM)和k近邻(KNN)技术实现。由于KNN学习模型消耗时间少,精度高,预测效果好,因此被推荐用于IoMT应用。
{"title":"Artificial Intelligence driven security model for Internet of Medical Things (IoMT)","authors":"Cuddapah Anitha, K. R, Chettiyar Vani Vivekanand, S. D. Lalitha, S. Boopathi, R. R","doi":"10.1109/ICIPTM57143.2023.10117713","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10117713","url":null,"abstract":"The Internet of Medical Things (IoMT) has been applied to provide health care facilities for elders and parents. Remote health care is essential for providing scarce resources and facilities to coronavirus patients. Ongoing IoMT communication is susceptible to potential security attacks. In this research, an artificial intelligence-driven security model of the IoMT is also proposed to simulate and analyses the results. Under the proposed plan, only authorized users will be able to access private and sensitive patient information, and unauthorized users will be unable to access a secure healthcare network. The various phases for implementing artificial intelligence (AI) techniques in the IoMT system have been discussed. AI-driven IoMT is implemented using decision trees, logistic regression, support vector machines (SVM), and k-nearest neighbours (KNN) techniques. The KNN learning models are recommended for IoMT applications due to their low consumption time with high accuracy and effective prediction.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NutriFACT: An Android based Mobile Application for Intake of Food Nutrition during Rare Disease NutriFACT:一个基于Android的移动应用程序,用于在罕见疾病期间摄入食物营养
Mohitsinh Parmar, Hardik Rajgor, S. Khant
In current era people are suffering from many problems including common and rare diseases. The common diseases like hypertension and diabetes can be curable and controllable using proper medical guidance and diet but there is some rare disease which people do not aware about. Some of the rare diseases are Wilson's disease, Hemochromatosis and Ricket's disease. The causes of these disease are food deficiency or excessive consumption of minerals. Proper Food intake must be necessary to control these rare diseases. Specific nutrition must be required to control these diseases. In this research paper we have proposed an application which can be used by thepatient suffering from these rare diseases. It is developed using Android Studio platform. In the application user can enter the rare disease type and based on selected type a user is guided forfood to be intake by them. User can get the information regarding the hospitals which provides treatments for these raredisease.
在当今时代,人们正在遭受许多问题,包括常见和罕见的疾病。高血压、糖尿病等常见病,通过适当的医疗指导和饮食,是可以治愈和控制的,但也有一些罕见的疾病,人们并没有意识到。一些罕见的疾病是威尔逊氏病,血色素沉着症和佝偻病。这些疾病的原因是食物缺乏或过度消耗矿物质。适当的食物摄入是控制这些罕见疾病的必要条件。控制这些疾病需要特殊的营养。在这篇研究论文中,我们提出了一种可以用于这些罕见疾病患者的应用程序。使用Android Studio平台开发。在应用程序中,用户可以输入罕见疾病类型,并根据所选类型指导用户摄入的食物。用户可以获得有关提供这些罕见疾病治疗的医院的信息。
{"title":"NutriFACT: An Android based Mobile Application for Intake of Food Nutrition during Rare Disease","authors":"Mohitsinh Parmar, Hardik Rajgor, S. Khant","doi":"10.1109/ICIPTM57143.2023.10118023","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10118023","url":null,"abstract":"In current era people are suffering from many problems including common and rare diseases. The common diseases like hypertension and diabetes can be curable and controllable using proper medical guidance and diet but there is some rare disease which people do not aware about. Some of the rare diseases are Wilson's disease, Hemochromatosis and Ricket's disease. The causes of these disease are food deficiency or excessive consumption of minerals. Proper Food intake must be necessary to control these rare diseases. Specific nutrition must be required to control these diseases. In this research paper we have proposed an application which can be used by thepatient suffering from these rare diseases. It is developed using Android Studio platform. In the application user can enter the rare disease type and based on selected type a user is guided forfood to be intake by them. User can get the information regarding the hospitals which provides treatments for these raredisease.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132029985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel EV Charging Using Stationary Bike 一种利用固定自行车充电的新型电动汽车
Pooja Jose, S. S, Meghana S, U. M. Arshad, Suraj Raju Jadhav, Santhosh Kummi
The current state of air pollution in India is a major worry. Many Indian cities are among the maximum polluted, according to a new global report. The two main causes of air pollution are the industrial and transportation sectors. Among these, the industrial and transportation sectors are each accountable for 27% and 51%, respectively, of the air pollution. Every year, two million Indians die before their time due to air pollution. Electric vehicles (EV) can aid in lowering GHG emissions, which in turn can aid in lowering air pollution. Numerous benefits, including a drop in pollution and lower costs for oil imports, are provided by electric vehicles. Despite numerous obstacles, India is moving toward building electric vehicles. In this paper, we express our concern over the rising global energy consumption, which motivates us to convert to renewable energy sources. We can conserve energy in many different ways across a range of industries. The conversion of stationary exercise bikes to electric bikes is our primary goal. As there is less pollution, low maintenance costs, and reduced noise, we employ an electrical motor (BLDC motor) in these electric bikes instead of a combustion engine. The rechargeable battery packs chemical energy is used by these bikes. This paper discusses the design and development of electric bikes from conserving energy by pedaling the stationary exercise.
印度目前的空气污染状况令人担忧。根据一份新的全球报告,印度许多城市都是污染最严重的城市之一。空气污染的两个主要原因是工业和运输部门。其中,工业和交通运输部门分别占空气污染的27%和51%。每年有200万印度人死于空气污染。电动汽车(EV)有助于减少温室气体排放,从而有助于减少空气污染。电动汽车带来了许多好处,包括减少污染和降低石油进口成本。尽管障碍重重,印度正朝着制造电动汽车的方向迈进。在这篇文章中,我们表达了对全球能源消耗不断上升的担忧,这促使我们转向可再生能源。我们可以通过许多不同的方式在一系列行业中节约能源。我们的首要目标是将固定式健身自行车转变为电动自行车。由于污染少,维护成本低,噪音低,我们在这些电动自行车中使用电动机(BLDC电动机)代替内燃机。这些自行车使用可充电电池组的化学能。本文从脚踏运动节能的角度探讨了电动自行车的设计与开发。
{"title":"A Novel EV Charging Using Stationary Bike","authors":"Pooja Jose, S. S, Meghana S, U. M. Arshad, Suraj Raju Jadhav, Santhosh Kummi","doi":"10.1109/iciptm57143.2023.10117886","DOIUrl":"https://doi.org/10.1109/iciptm57143.2023.10117886","url":null,"abstract":"The current state of air pollution in India is a major worry. Many Indian cities are among the maximum polluted, according to a new global report. The two main causes of air pollution are the industrial and transportation sectors. Among these, the industrial and transportation sectors are each accountable for 27% and 51%, respectively, of the air pollution. Every year, two million Indians die before their time due to air pollution. Electric vehicles (EV) can aid in lowering GHG emissions, which in turn can aid in lowering air pollution. Numerous benefits, including a drop in pollution and lower costs for oil imports, are provided by electric vehicles. Despite numerous obstacles, India is moving toward building electric vehicles. In this paper, we express our concern over the rising global energy consumption, which motivates us to convert to renewable energy sources. We can conserve energy in many different ways across a range of industries. The conversion of stationary exercise bikes to electric bikes is our primary goal. As there is less pollution, low maintenance costs, and reduced noise, we employ an electrical motor (BLDC motor) in these electric bikes instead of a combustion engine. The rechargeable battery packs chemical energy is used by these bikes. This paper discusses the design and development of electric bikes from conserving energy by pedaling the stationary exercise.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Object Detection in Extreme Dark Condition 极端黑暗条件下的视觉目标检测
S. Subha, Rahul, Jaichandran R K, Dhinakaran K, R. YUVARAJ, S. Mudradi
Independent monitoring as well as video surveillance have a lengthy history. In both controlled indoor and outdoor environments, many currently available devices can accurately monitor human mobility. As a constant part of our everyday lives, low-light conditions have a significant impact. Nevertheless, one of the biggest challenges in visual surveillance is still object detection at night. There has been a rise in poor light image studies, especially in the area of image improvement, but no relevant database serves as a standard. One use of object detection is the remote or centralized management of a large number of security and video surveillance devices. It is suggested that night vision monitoring could benefit from the use of an object detection technique. The method relies on detecting motion. PIR sensors might pick up on unnoticed motion to kick off the search. Due to motion prediction, this method works well in practice for night-time detection. Furthermore, we discuss our interesting and insightful findings concerning the impacts of low light on the object detection job on developing a Deep Learning (DL) method. If an object is spotted, an alert message is sent to the user's registered mobile phone through GSM technology, and send an email with a half-minute video clip of the surroundings. Our investigation on dark images is meant to pave the way for more studies in the low-light domain.01
独立监控和视频监控有着悠久的历史。在受控的室内和室外环境中,许多现有的设备都可以准确地监测人类的活动。作为我们日常生活的一部分,低光条件对我们的影响很大。然而,视觉监控的最大挑战之一仍然是夜间目标检测。对弱光图像的研究有所增加,特别是在图像改进领域,但没有相关的数据库作为标准。物体检测的一个用途是远程或集中管理大量的安全和视频监控设备。这表明,夜视监控可以受益于使用的目标检测技术。该方法依赖于检测运动。PIR传感器可能会捕捉到未被注意到的运动,从而启动搜索。由于运动预测,该方法在夜间检测中效果良好。此外,我们讨论了关于低光对目标检测工作的影响的有趣和有见地的发现,并开发了一种深度学习(DL)方法。如果发现物体,就会通过GSM技术向用户注册的手机发送警报信息,并发送带有半分钟周围环境视频剪辑的电子邮件。我们对暗图像的研究是为在低光领域进行更多的研究铺平道路
{"title":"Visual Object Detection in Extreme Dark Condition","authors":"S. Subha, Rahul, Jaichandran R K, Dhinakaran K, R. YUVARAJ, S. Mudradi","doi":"10.1109/ICIPTM57143.2023.10117607","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10117607","url":null,"abstract":"Independent monitoring as well as video surveillance have a lengthy history. In both controlled indoor and outdoor environments, many currently available devices can accurately monitor human mobility. As a constant part of our everyday lives, low-light conditions have a significant impact. Nevertheless, one of the biggest challenges in visual surveillance is still object detection at night. There has been a rise in poor light image studies, especially in the area of image improvement, but no relevant database serves as a standard. One use of object detection is the remote or centralized management of a large number of security and video surveillance devices. It is suggested that night vision monitoring could benefit from the use of an object detection technique. The method relies on detecting motion. PIR sensors might pick up on unnoticed motion to kick off the search. Due to motion prediction, this method works well in practice for night-time detection. Furthermore, we discuss our interesting and insightful findings concerning the impacts of low light on the object detection job on developing a Deep Learning (DL) method. If an object is spotted, an alert message is sent to the user's registered mobile phone through GSM technology, and send an email with a half-minute video clip of the surroundings. Our investigation on dark images is meant to pave the way for more studies in the low-light domain.01","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122284355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1