首页 > 最新文献

2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)最新文献

英文 中文
IoT Health care Monitoring and Tracking: A Survey 物联网医疗监测和跟踪:一项调查
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862763
S. Mishra, A. Rasool
Hospitals all over the world are moving towards better and more advanced technologies. In the recent times, integration of the Internet of Things with the available medical technologies as well as with patients and their environment has given a new scope for data collection and better decisions. This survey paper focuses on various ways the IoT devices can be used to improve the health of people along with ensuring that there are no mistakes in the process of medication and medicine delivery. Here we have taken many examples of the devices that are being used and which are and can be used in the future for more advanced and secure health care.
世界各地的医院都在朝着更好、更先进的技术发展。近年来,物联网与现有医疗技术以及患者及其环境的融合为数据收集和更好的决策提供了新的空间。这篇调查论文的重点是物联网设备可以用来改善人们健康的各种方式,同时确保在药物治疗和药物输送过程中没有错误。在这里,我们举了许多正在使用的设备的例子,这些设备将来可以用于更先进和更安全的医疗保健。
{"title":"IoT Health care Monitoring and Tracking: A Survey","authors":"S. Mishra, A. Rasool","doi":"10.1109/ICOEI.2019.8862763","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862763","url":null,"abstract":"Hospitals all over the world are moving towards better and more advanced technologies. In the recent times, integration of the Internet of Things with the available medical technologies as well as with patients and their environment has given a new scope for data collection and better decisions. This survey paper focuses on various ways the IoT devices can be used to improve the health of people along with ensuring that there are no mistakes in the process of medication and medicine delivery. Here we have taken many examples of the devices that are being used and which are and can be used in the future for more advanced and secure health care.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130663266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Crime Analysis and Prediction Using Fuzzy C-Means Algorithm 基于模糊c均值算法的犯罪分析与预测
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862691
B. Sivanagaleela, S. Rajesh
Crime analysis is methodological approach for identify the crime areas. The crime areas are mainly based on the crime type these identified crime areas are helpful to reduce the crime rate. This can be very easy to identify the crime areas, based on this process the crime rate can be analyzed. With the increasing of computer systems the crime data analysts can help to the crime investigators to analyze the crime. Based on the clustering and preprocessing extract the crime areas from a structured data. The cause of occurrences of crimes like crime details of person and other factors we are focusing mainly on crime factors of previous years. This system is mainly focus on in which area the crime will occur, does not focus on the identify the criminal. In the existing system naive bayes classification was used In the present system, the fuzzy C-Means algorithm will be use to cluster the crime data for total cognizable crimes such as Kidnapping, murder, Theft, Burglary, cheating, crime against women, robbery and other such crimes.
犯罪分析是识别犯罪区域的方法论方法。犯罪区域主要是根据犯罪类型来确定的,这些犯罪区域的确定有助于降低犯罪率。这样就可以很容易地识别出犯罪区域,根据这个过程就可以对犯罪率进行分析。随着计算机系统的不断发展,犯罪数据分析人员可以帮助犯罪侦查人员对犯罪进行分析。在聚类和预处理的基础上,从结构化数据中提取犯罪区域。犯罪发生的原因,如犯罪细节和其他因素,我们主要关注的是前几年的犯罪因素。这一制度主要关注犯罪将在哪个地区发生,而不是关注罪犯的身份。在现有的系统中使用朴素贝叶斯分类,在本系统中,将使用模糊C-Means算法对绑架、谋杀、盗窃、入室盗窃、欺骗、侵害妇女、抢劫等全部可认知犯罪的犯罪数据进行聚类。
{"title":"Crime Analysis and Prediction Using Fuzzy C-Means Algorithm","authors":"B. Sivanagaleela, S. Rajesh","doi":"10.1109/ICOEI.2019.8862691","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862691","url":null,"abstract":"Crime analysis is methodological approach for identify the crime areas. The crime areas are mainly based on the crime type these identified crime areas are helpful to reduce the crime rate. This can be very easy to identify the crime areas, based on this process the crime rate can be analyzed. With the increasing of computer systems the crime data analysts can help to the crime investigators to analyze the crime. Based on the clustering and preprocessing extract the crime areas from a structured data. The cause of occurrences of crimes like crime details of person and other factors we are focusing mainly on crime factors of previous years. This system is mainly focus on in which area the crime will occur, does not focus on the identify the criminal. In the existing system naive bayes classification was used In the present system, the fuzzy C-Means algorithm will be use to cluster the crime data for total cognizable crimes such as Kidnapping, murder, Theft, Burglary, cheating, crime against women, robbery and other such crimes.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130425347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Real-Time Monitoring and Control of Consumed Power for Household Appliances using Arduino Uno through Bluetooth and Android Application 基于蓝牙和Android应用的Arduino Uno家用电器耗电实时监测与控制
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862528
Soumyendu Banerjee, Sabuj Laskar, A. Chowdhury, Sayantani Sarkar, A. Roy, A. Das
In this work, Arduino Uno and Bluetooth controlled real time power measurement and control of household electrical appliances, was proposed. An android application was also been used to display the amount of real-time consumed power of each appliance separately and also to make the user aware the total billing amount. Along with measurement of total power consumed, this system also keeps a record of the total consumed electrical power in every hour and creates the load curve, which was used to estimate optimal billing amount based on two part tariff. The main focus in this work was imposed on reducing maximum demand power consumed by user so that total billing amount can be reduced. After estimation of load curve, system generates a time span within which all the appliances with relatively high power consumption capacity, should be used so that the average load curve becomes almost horizontal thus reducing maximum demand. The whole work was implemented on one tungsten bulb of 60 watt, two compact fluorescent light, each of 25 watt, one table fan of 40 watt and a DC electric motor of 1.2 HP. The optimal power consumption was displayed in an Android mobile phone through HC-05 Bluetooth module.
在本工作中,提出了Arduino Uno和蓝牙控制的家用电器实时功率测量和控制。还使用了一个android应用程序来单独显示每个设备的实时消耗电量,并使用户了解总账单金额。在测量总耗电量的同时,该系统还记录每小时总耗电量,并生成负荷曲线,用于根据两部分电价估算最优计费金额。这项工作的主要重点是减少用户消耗的最大需求功率,从而减少总账单金额。在负荷曲线估算后,系统生成一个时间跨度,在这个时间跨度内,所有用电容量相对较大的电器都应被使用,使平均负荷曲线几乎是水平的,从而减少最大需求。整个工作是在一个60瓦的钨丝灯泡,两个25瓦的紧凑型荧光灯,一个40瓦的台式风扇和一个1.2马力的直流电动机上实现的。通过HC-05蓝牙模块在Android手机上显示最优功耗。
{"title":"Real-Time Monitoring and Control of Consumed Power for Household Appliances using Arduino Uno through Bluetooth and Android Application","authors":"Soumyendu Banerjee, Sabuj Laskar, A. Chowdhury, Sayantani Sarkar, A. Roy, A. Das","doi":"10.1109/ICOEI.2019.8862528","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862528","url":null,"abstract":"In this work, Arduino Uno and Bluetooth controlled real time power measurement and control of household electrical appliances, was proposed. An android application was also been used to display the amount of real-time consumed power of each appliance separately and also to make the user aware the total billing amount. Along with measurement of total power consumed, this system also keeps a record of the total consumed electrical power in every hour and creates the load curve, which was used to estimate optimal billing amount based on two part tariff. The main focus in this work was imposed on reducing maximum demand power consumed by user so that total billing amount can be reduced. After estimation of load curve, system generates a time span within which all the appliances with relatively high power consumption capacity, should be used so that the average load curve becomes almost horizontal thus reducing maximum demand. The whole work was implemented on one tungsten bulb of 60 watt, two compact fluorescent light, each of 25 watt, one table fan of 40 watt and a DC electric motor of 1.2 HP. The optimal power consumption was displayed in an Android mobile phone through HC-05 Bluetooth module.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Biometric Personal Iris Recognition from an Image at Long Distance 远距离图像生物识别个人虹膜
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862640
Swati D. Shirke, C. Rajabhushnam
Now a days, Iris recognition is mostly used in biometrics for personal identification. It is the most powerful tool for person identification. But in real time it is quite difficult to capture the better quality of iris images. The images obtained are more degraded due to the lack of texture, blur. In this paper, a simple high instability technique is presented also this process is more convenient to use. This super-resolution algorithm is applied to the pixels of iris images to select the best frame from the iris image. A segmentation algorithm that segments the input iris images. Spatial FCM used for segmentation testing purpose. Iris image is framing 600 x 600 in sequence to calculate vessel area in each framework using for pattern abstraction using loop descriptor. The Hough transforms cast-off de-noising the image. The experimental results show that this proposed system successfully recognizes the iris about 4 to 8 meters long distance of a person. This proposed work is developed on MATLAB for “reading” the profile also for completing the Hough transforms performance. The database used for this purpose is CASIA V4. The simulation results show that the stable extraction of iris recognition.
如今,虹膜识别主要用于个人身份识别的生物识别技术。它是最强大的身份识别工具。但在实时情况下,很难获得高质量的虹膜图像。所获得的图像由于缺乏纹理、模糊而较差。本文提出了一种简单的高不稳定性工艺,该工艺更便于使用。将该超分辨率算法应用于虹膜图像像素,从虹膜图像中选择最佳帧。分割算法,分割输入虹膜图像。空间FCM用于分割测试目的。虹膜图像按600 × 600的顺序分帧,使用循环描述符进行模式抽象,计算每个框架中的血管面积。霍夫变换对图像进行去噪。实验结果表明,该系统能够成功地识别出4 ~ 8米远的人的虹膜。这项工作是在MATLAB上开发的,用于“读取”剖面,也用于完成霍夫变换性能。用于此目的的数据库是CASIA V4。仿真结果表明,提取的虹膜识别效果稳定。
{"title":"Biometric Personal Iris Recognition from an Image at Long Distance","authors":"Swati D. Shirke, C. Rajabhushnam","doi":"10.1109/ICOEI.2019.8862640","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862640","url":null,"abstract":"Now a days, Iris recognition is mostly used in biometrics for personal identification. It is the most powerful tool for person identification. But in real time it is quite difficult to capture the better quality of iris images. The images obtained are more degraded due to the lack of texture, blur. In this paper, a simple high instability technique is presented also this process is more convenient to use. This super-resolution algorithm is applied to the pixels of iris images to select the best frame from the iris image. A segmentation algorithm that segments the input iris images. Spatial FCM used for segmentation testing purpose. Iris image is framing 600 x 600 in sequence to calculate vessel area in each framework using for pattern abstraction using loop descriptor. The Hough transforms cast-off de-noising the image. The experimental results show that this proposed system successfully recognizes the iris about 4 to 8 meters long distance of a person. This proposed work is developed on MATLAB for “reading” the profile also for completing the Hough transforms performance. The database used for this purpose is CASIA V4. The simulation results show that the stable extraction of iris recognition.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoT Practices in Military Applications 军事应用中的物联网实践
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862559
V. Gotarane, Sandeep Raskar
Internet of Things (IoT) is very fast-growing technology leading to speedy and better communication. Use of IoT in Military application has become necessity of today's world as anti-military activities have increased and become threat to Nations. Lives of warfighters are priceless, so it is important to protect their lives to the maximum we can. Military ammunition control is also an important and integral part of military activities. Different IoT applications and methodologies for Military activities are discussed and analyzed in this paper. This paper also discusses the protocols and methods of implementation used and presented by people over the globe.
物联网(IoT)是一种快速发展的技术,可以实现更快、更好的通信。随着反军事活动的增加并成为对国家的威胁,物联网在军事应用中的使用已成为当今世界的必需品。战士的生命是无价的,所以最大限度地保护他们的生命是非常重要的。军事弹药管制也是军事活动的重要组成部分。本文讨论和分析了军事活动中不同的物联网应用和方法。本文还讨论了全球人们使用和提出的协议和实现方法。
{"title":"IoT Practices in Military Applications","authors":"V. Gotarane, Sandeep Raskar","doi":"10.1109/ICOEI.2019.8862559","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862559","url":null,"abstract":"Internet of Things (IoT) is very fast-growing technology leading to speedy and better communication. Use of IoT in Military application has become necessity of today's world as anti-military activities have increased and become threat to Nations. Lives of warfighters are priceless, so it is important to protect their lives to the maximum we can. Military ammunition control is also an important and integral part of military activities. Different IoT applications and methodologies for Military activities are discussed and analyzed in this paper. This paper also discusses the protocols and methods of implementation used and presented by people over the globe.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133218599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Approaches on Partial Face Recognition: A Literature Review 部分人脸识别方法:文献综述
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862783
M. Reshma, B. Kannan
Face recognition technology has gained attention over past years owing to its broad applications. It is a potential research area in the scope of image analysis, computer vision and pattern recognition. The requirement of identifying an authentic user through different authentication mechanisms are increasing rapidly following the intense concerns about security, and rapid advancement in networking, communication, and mobility. Face recognition is an area which has attained attention over the last few decades. The traditional applications of face recognition system, especially those used for access control, authentication, and surveillance, usually need maximum information of face to attain exceptional performance in recognition. Occasionally it is difficult to get access of a full face under certain restricted situations. For example, a non-cooperative face can lead to face occlusion. For recognizing an arbitrary image captured in an unconstrained environment is a more challenging condition in video surveillance, handheld devices etc. Numerous methods have been devised for unconstrained face recognition with remarkable achievements. This paper provides an overview of different partial face recognition approaches proposed.
人脸识别技术由于其广泛的应用,近年来受到了广泛的关注。它是图像分析、计算机视觉和模式识别领域的一个有潜力的研究领域。随着对安全性的强烈关注以及网络、通信和移动性的快速发展,通过不同的身份验证机制识别真实用户的需求正在迅速增加。人脸识别是近几十年来引起人们关注的一个领域。人脸识别系统的传统应用,特别是在访问控制、身份验证和监控等应用中,通常需要最大限度地获取人脸信息以获得优异的识别性能。在某些限制的情况下,有时很难获得全脸的访问。例如,一个不合作的脸会导致脸遮挡。在视频监控、手持设备等领域,识别在不受约束的环境中捕获的任意图像是一个更具挑战性的条件。针对无约束人脸识别,人们设计了许多方法,并取得了显著的成果。本文概述了不同的部分人脸识别方法。
{"title":"Approaches on Partial Face Recognition: A Literature Review","authors":"M. Reshma, B. Kannan","doi":"10.1109/ICOEI.2019.8862783","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862783","url":null,"abstract":"Face recognition technology has gained attention over past years owing to its broad applications. It is a potential research area in the scope of image analysis, computer vision and pattern recognition. The requirement of identifying an authentic user through different authentication mechanisms are increasing rapidly following the intense concerns about security, and rapid advancement in networking, communication, and mobility. Face recognition is an area which has attained attention over the last few decades. The traditional applications of face recognition system, especially those used for access control, authentication, and surveillance, usually need maximum information of face to attain exceptional performance in recognition. Occasionally it is difficult to get access of a full face under certain restricted situations. For example, a non-cooperative face can lead to face occlusion. For recognizing an arbitrary image captured in an unconstrained environment is a more challenging condition in video surveillance, handheld devices etc. Numerous methods have been devised for unconstrained face recognition with remarkable achievements. This paper provides an overview of different partial face recognition approaches proposed.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"45 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129557717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Machine Learning based Health Prediction System using IBM Cloud as PaaS 基于机器学习的健康预测系统,使用IBM云作为PaaS
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862754
A. A. Neloy, S. Alam, R. A. Bindu, N. J. Moni
Adaptable Critical Patient Caring system is a key concern for hospitals in developing countries like Bangladesh. Most of the hospital in Bangladesh lack serving proper health service due to unavailability of appropriate, easy and scalable smart systems. The aim of this project is to build an adequate system for hospitals to serve critical patients with a real-time feedback method. In this paper, we propose a generic architecture, associated terminology and a classificatory model for observing critical patient's health condition with machine learning and IBM cloud computing as Platform as a service (PaaS). Machine Learning (ML) based health prediction of the patients is the key concept of this research. IBM Cloud, IBM Watson studio is the platform for this research to store and maintain our data and ml models. For our ml models, we have chosen the following Base Predictors: Naïve Bayes, Logistic Regression, KNeighbors Classifier, Decision Tree Classifier, Random Forest Classifier, Gradient Boosting Classifier, and MLP Classifier. For improving the accuracy of the model, the bagging method of ensemble learning has been used. The following algorithms are used for ensemble learning: Bagging Random Forest, Bagging Extra Trees, Bagging KNeighbors, Bagging SVC, and Bagging Ridge. We have developed a mobile application named “Critical Patient Management System - CPMS” for real-time data and information view. The system architecture is designed in such a way that the ml models can train and deploy in a real-time interval by retrieving the data from IBM Cloud and the cloud information can also be accessed through CPMS in a requested time interval. To help the doctors, the ml models will predict the condition of a patient. If the prediction based on the condition gets worse, the CPMS will send an SMS to the duty doctor and nurse for getting immediate attention to the patient. Combining with the ml models and mobile application, the project may serve as a smart healthcare solution for the hospitals.
适应性强的重症病人护理系统是孟加拉国等发展中国家医院关注的一个关键问题。由于没有适当、简便和可扩展的智能系统,孟加拉国的大多数医院缺乏适当的卫生服务。该项目的目的是为医院建立一个适当的系统,以实时反馈的方式为危重患者服务。在本文中,我们提出了一个通用架构、相关术语和分类模型,用于使用机器学习和IBM云计算即平台即服务(PaaS)来观察危重患者的健康状况。基于机器学习的患者健康预测是本研究的关键概念。IBM Cloud、IBM Watson studio是本研究存储和维护数据和ml模型的平台。对于我们的ml模型,我们选择了以下基本预测器:Naïve贝叶斯,逻辑回归,KNeighbors分类器,决策树分类器,随机森林分类器,梯度增强分类器和MLP分类器。为了提高模型的准确性,采用了集成学习的bagging方法。以下算法用于集成学习:Bagging Random Forest, Bagging Extra Trees, Bagging KNeighbors, Bagging SVC和Bagging Ridge。我们开发了一款名为“重症患者管理系统- CPMS”的移动应用程序,用于实时数据和信息查看。系统架构的设计使得ml模型可以通过从IBM Cloud检索数据来进行实时训练和部署,并且还可以在请求的时间间隔内通过CPMS访问云信息。为了帮助医生,机器学习模型将预测病人的病情。如果基于病情的预测变得更糟,CPMS会向值班医生和护士发送短信,让他们立即关注患者。结合ml模型和移动应用程序,该项目可作为医院的智能医疗解决方案。
{"title":"Machine Learning based Health Prediction System using IBM Cloud as PaaS","authors":"A. A. Neloy, S. Alam, R. A. Bindu, N. J. Moni","doi":"10.1109/ICOEI.2019.8862754","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862754","url":null,"abstract":"Adaptable Critical Patient Caring system is a key concern for hospitals in developing countries like Bangladesh. Most of the hospital in Bangladesh lack serving proper health service due to unavailability of appropriate, easy and scalable smart systems. The aim of this project is to build an adequate system for hospitals to serve critical patients with a real-time feedback method. In this paper, we propose a generic architecture, associated terminology and a classificatory model for observing critical patient's health condition with machine learning and IBM cloud computing as Platform as a service (PaaS). Machine Learning (ML) based health prediction of the patients is the key concept of this research. IBM Cloud, IBM Watson studio is the platform for this research to store and maintain our data and ml models. For our ml models, we have chosen the following Base Predictors: Naïve Bayes, Logistic Regression, KNeighbors Classifier, Decision Tree Classifier, Random Forest Classifier, Gradient Boosting Classifier, and MLP Classifier. For improving the accuracy of the model, the bagging method of ensemble learning has been used. The following algorithms are used for ensemble learning: Bagging Random Forest, Bagging Extra Trees, Bagging KNeighbors, Bagging SVC, and Bagging Ridge. We have developed a mobile application named “Critical Patient Management System - CPMS” for real-time data and information view. The system architecture is designed in such a way that the ml models can train and deploy in a real-time interval by retrieving the data from IBM Cloud and the cloud information can also be accessed through CPMS in a requested time interval. To help the doctors, the ml models will predict the condition of a patient. If the prediction based on the condition gets worse, the CPMS will send an SMS to the duty doctor and nurse for getting immediate attention to the patient. Combining with the ml models and mobile application, the project may serve as a smart healthcare solution for the hospitals.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Survey on Vulnerability Assessment & Penetration Testing for Secure Communication 安全通信漏洞评估与渗透测试研究综述
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862767
Keyur Patel
As the technology is growing rapidly, the development of systems and software are becoming more complex. For this reason, the security of software and web applications become more vulnerable. In the last two decades, the use of internet application and security hacking activities are on top of the glance. The organizations are having the biggest challenge that how to secure their web applications from the rapidly increasing cyber threats because the organization can't compromise the security of their sensitive information. Vulnerability Assessment and Penetration Testing techniques may help organizations to find security loopholes. The weakness can be the asset for the attacker if the organizations are not aware of this. Vulnerability Assessment and Penetration Testing helps an organization to cover the security loopholes and determine their security arrangements are working as per defined policies or not. To cover the tracks and mitigate the threats it is necessary to install security patches. This paper includes the survey on the current vulnerabilities, determination of those vulnerabilities, the methodology used for determination, tools used to determine the vulnerabilities to secure the organizations from cyber threat.
随着技术的快速发展,系统和软件的开发变得越来越复杂。因此,软件和web应用程序的安全性变得更加脆弱。在过去的二十年里,互联网应用程序的使用和安全黑客活动都是人们关注的焦点。组织面临的最大挑战是如何保护他们的web应用程序免受快速增长的网络威胁,因为组织不能妥协其敏感信息的安全性。漏洞评估和渗透测试技术可以帮助组织发现安全漏洞。如果组织没有意识到这一点,这个弱点可能成为攻击者的资产。漏洞评估和渗透测试帮助组织覆盖安全漏洞,并确定他们的安全安排是否按照定义的策略工作。为了掩盖痕迹并减轻威胁,有必要安装安全补丁。本文包括对当前漏洞的调查,这些漏洞的确定,用于确定的方法,用于确定漏洞以保护组织免受网络威胁的工具。
{"title":"A Survey on Vulnerability Assessment & Penetration Testing for Secure Communication","authors":"Keyur Patel","doi":"10.1109/ICOEI.2019.8862767","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862767","url":null,"abstract":"As the technology is growing rapidly, the development of systems and software are becoming more complex. For this reason, the security of software and web applications become more vulnerable. In the last two decades, the use of internet application and security hacking activities are on top of the glance. The organizations are having the biggest challenge that how to secure their web applications from the rapidly increasing cyber threats because the organization can't compromise the security of their sensitive information. Vulnerability Assessment and Penetration Testing techniques may help organizations to find security loopholes. The weakness can be the asset for the attacker if the organizations are not aware of this. Vulnerability Assessment and Penetration Testing helps an organization to cover the security loopholes and determine their security arrangements are working as per defined policies or not. To cover the tracks and mitigate the threats it is necessary to install security patches. This paper includes the survey on the current vulnerabilities, determination of those vulnerabilities, the methodology used for determination, tools used to determine the vulnerabilities to secure the organizations from cyber threat.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121549258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient and Opportunistic Routing in MANET using Link Lifetime Prediction 基于链路寿命预测的MANET高效机会路由
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862658
S. Sivanantham, G. Balakrishnan, M. Jaidev, S. Mahesh
For improving the transmission of data between the cross layers, we propose an efficient Opportunistic routing in Mobile Adhoc Network (MANET) using Cross Layer Reliable Opportunistic Routing (CBRT) Algorithm and Link Lifetime prediction, in which the fuzzy logic topologies are used. We use the fuzzy logics to regenerate the dead nodes using, if-then rule. Using this, we will reactivate the dead nodes for transmission. For the increased reliability and reduced cost of control, we propose a method of finding degree of node sensing, which senses the degree of the node which helps in sensing the shortest path of the highest lifetime node. Additionally, we propose the link lifetime prediction algorithm which finds the lifetime of the node so that the shortest path can be maintained with the source node and the highest lifetime node. Processing this method will reduce the data loss and balance the efficiency of transmission. Link lifetime prediction algorithm also takes the moving speed and moving direction. Then finally LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is added which consumes less energy during the transmission.
为了提高跨层间的数据传输效率,提出了一种基于模糊逻辑拓扑的基于跨层可靠机会路由(CBRT)算法和链路寿命预测的移动自组网(MANET)机会路由算法。我们使用模糊逻辑,使用if-then规则再生死节点。用这个,我们将重新激活死亡节点进行传播。为了提高可靠性和降低控制成本,我们提出了一种寻找节点感知度的方法,该方法通过感知节点的程度来帮助感知最高生命周期节点的最短路径。此外,我们还提出了链路生存期预测算法,该算法可以找到节点的生存期,以便在源节点和生存期最高的节点之间保持最短的路径。这种处理方式可以减少数据丢失,平衡传输效率。链路寿命预测算法还考虑了移动速度和移动方向。最后加入低能量自适应聚类层次(LEACH)协议,该协议在传输过程中消耗的能量更少。
{"title":"Efficient and Opportunistic Routing in MANET using Link Lifetime Prediction","authors":"S. Sivanantham, G. Balakrishnan, M. Jaidev, S. Mahesh","doi":"10.1109/ICOEI.2019.8862658","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862658","url":null,"abstract":"For improving the transmission of data between the cross layers, we propose an efficient Opportunistic routing in Mobile Adhoc Network (MANET) using Cross Layer Reliable Opportunistic Routing (CBRT) Algorithm and Link Lifetime prediction, in which the fuzzy logic topologies are used. We use the fuzzy logics to regenerate the dead nodes using, if-then rule. Using this, we will reactivate the dead nodes for transmission. For the increased reliability and reduced cost of control, we propose a method of finding degree of node sensing, which senses the degree of the node which helps in sensing the shortest path of the highest lifetime node. Additionally, we propose the link lifetime prediction algorithm which finds the lifetime of the node so that the shortest path can be maintained with the source node and the highest lifetime node. Processing this method will reduce the data loss and balance the efficiency of transmission. Link lifetime prediction algorithm also takes the moving speed and moving direction. Then finally LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is added which consumes less energy during the transmission.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indoor air quality monitors using IOT sensors and LPWAN 使用物联网传感器和LPWAN的室内空气质量监视器
Pub Date : 2019-04-23 DOI: 10.1109/ICOEI.2019.8862647
Jithina Jose, T. Sasipraba
The effect of air quality on wellbeing and on life comfort is entrenched. Indoor air quality parameters are critical to make a gainful and sound indoor condition anyway by and large the air quality parameters are altogether different from those characterized as solid qualities. Taking into account that we spend about 90% of our lives inside, it is critical to screen the indoor air quality progressively to distinguish issues in the nature of air and plan intercessions in the building, or in the ventilation frameworks so as to enhance air quality. In this paper we are identifying the indoor air quality with the help of internet of things by using the sensors BME680 from bosch, SGP30 and CCS811 and low power wide area network (LPWAN) for the data transfer. Here we are separating the gases CO2 equivalent, Ethanol, TVoC and so on. For transmitting this IOT information, we require high vitality productive sensor hubs that can impart crosswise over long separation. This propels the improvement of some Low-Power Wide Area Networks (LPWAN) advances, for example, LoRa, to satisfy these requirements. The reports are exhibiting the destructiveness of air that we are taking in step by step. Here we are trying to give a social awareness by using this paper.
空气质量对健康和生活舒适度的影响是根深蒂固的。无论如何,室内空气质量参数对于创造一个有益而健全的室内环境至关重要,总的来说,空气质量参数与那些具有固体质量特征的参数完全不同。考虑到我们大约90%的时间是在室内度过的,我们必须逐步筛选室内空气质量,以区分空气性质的问题,并在建筑物内或通风框架内进行改造,以改善空气质量。在本文中,我们通过使用bosch的传感器BME680, SGP30和CCS811以及低功耗广域网(LPWAN)进行数据传输,在物联网的帮助下识别室内空气质量。这里我们正在分离二氧化碳当量,乙醇,总挥发性有机化合物等气体。为了传输这些物联网信息,我们需要高活力、高效的传感器集线器,这些传感器集线器可以在长时间的分离中横向传递。这推动了一些低功耗广域网(LPWAN)的进步,例如LoRa,以满足这些需求。报告显示了我们正在逐步接受的空气的破坏性。在这里,我们试图通过这篇论文给社会意识。
{"title":"Indoor air quality monitors using IOT sensors and LPWAN","authors":"Jithina Jose, T. Sasipraba","doi":"10.1109/ICOEI.2019.8862647","DOIUrl":"https://doi.org/10.1109/ICOEI.2019.8862647","url":null,"abstract":"The effect of air quality on wellbeing and on life comfort is entrenched. Indoor air quality parameters are critical to make a gainful and sound indoor condition anyway by and large the air quality parameters are altogether different from those characterized as solid qualities. Taking into account that we spend about 90% of our lives inside, it is critical to screen the indoor air quality progressively to distinguish issues in the nature of air and plan intercessions in the building, or in the ventilation frameworks so as to enhance air quality. In this paper we are identifying the indoor air quality with the help of internet of things by using the sensors BME680 from bosch, SGP30 and CCS811 and low power wide area network (LPWAN) for the data transfer. Here we are separating the gases CO2 equivalent, Ethanol, TVoC and so on. For transmitting this IOT information, we require high vitality productive sensor hubs that can impart crosswise over long separation. This propels the improvement of some Low-Power Wide Area Networks (LPWAN) advances, for example, LoRa, to satisfy these requirements. The reports are exhibiting the destructiveness of air that we are taking in step by step. Here we are trying to give a social awareness by using this paper.","PeriodicalId":212501,"journal":{"name":"2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134341930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1