首页 > 最新文献

2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)最新文献

英文 中文
Smart Garbage Monitorıng and Vigilant System 智能垃圾Monitorıng和警戒系统
Thilagaraj, Dr.M. Sivaramkrishnan, Dr. G. Venkatesan, A. Mohanraj, Dr. M. Siva, Ramkumar, Kottaimalai Ramaraj
Now days, the population is very high. Due to this high population the needs for the people also increasing rapidly. This ultimately leads to produce huge wastes in the country. In lot of places the people dumb the waste inside the garbage already filled. So, because of this, wastes are spilled outside the garbage. This causes to many dangerous diseases like Dengue, Malaria, Chicken Pox, etc. Not only spread of diseases, also animals can eat the wastes spilled around the garbage and causes to death. To avoid these things, the garbage is monitored smartly and attentive system that keep on watching the garbage level inside the bin continuously using the ultrasonic sensor. Once the level reaches the particular level, then the Arduino uno receives the bins’ site placed through the help of GPS. The garbage bins are shown in the map by means of Internet of Things (IoT) device with how much percentage waste are filled in the dustbin. Through this the waste collector collects the waste easily.
现在,人口非常多。由于人口众多,对人口的需求也在迅速增加。这最终导致在这个国家产生巨大的浪费。在很多地方,人们把垃圾放在已经填满的垃圾里。所以,正因为如此,废物被溢出到垃圾外面。这会导致许多危险的疾病,如登革热、疟疾、水痘等。不仅传播疾病,还会使动物吃到周围散落的垃圾而导致死亡。为了避免这些事情的发生,垃圾监控系统是智能和细心的,它使用超声波传感器持续观察垃圾桶内的垃圾水平。一旦水平达到特定水平,然后Arduino uno接收通过GPS的帮助下放置的箱子的位置。通过物联网(IoT)设备在地图上显示垃圾箱的垃圾填充百分比。通过这种方式,废物收集者很容易收集废物。
{"title":"Smart Garbage Monitorıng and Vigilant System","authors":"Thilagaraj, Dr.M. Sivaramkrishnan, Dr. G. Venkatesan, A. Mohanraj, Dr. M. Siva, Ramkumar, Kottaimalai Ramaraj","doi":"10.1109/ICESC57686.2023.10193043","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193043","url":null,"abstract":"Now days, the population is very high. Due to this high population the needs for the people also increasing rapidly. This ultimately leads to produce huge wastes in the country. In lot of places the people dumb the waste inside the garbage already filled. So, because of this, wastes are spilled outside the garbage. This causes to many dangerous diseases like Dengue, Malaria, Chicken Pox, etc. Not only spread of diseases, also animals can eat the wastes spilled around the garbage and causes to death. To avoid these things, the garbage is monitored smartly and attentive system that keep on watching the garbage level inside the bin continuously using the ultrasonic sensor. Once the level reaches the particular level, then the Arduino uno receives the bins’ site placed through the help of GPS. The garbage bins are shown in the map by means of Internet of Things (IoT) device with how much percentage waste are filled in the dustbin. Through this the waste collector collects the waste easily.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting the Sale Price of Pre-Owned Vehicles with the Ensemble ML Model 基于集成ML模型的二手车销售价格预测
M. Kathiravan, M. Ramya, S. Jayanthi, Vangala Vamseedhar Reddy, Lokesh Ponguru, N. Bharathiraja
Car price forecasting is a popular study topic because it requires a lot of work and knowledge. Used car pricing forecasting is a major auto industry concern. Machine learning can accurately predict used automobile prices based on many characteristics. Many distinct qualities are considered for accurate predictions. The suggested model uses a dataset that contains vehicle brand and model, year of production, mileage, condition, and other factors that affect used car prices. This study used linear regression, GBT regression, and random forest regression to estimate secondhand car prices. Then, algorithm performance was compared to find which method better fit the data set. Thus, these methods outperform others.
汽车价格预测是一个热门的研究课题,因为它需要大量的工作和知识。二手车价格预测是汽车行业关注的一个主要问题。机器学习可以根据许多特征准确预测二手车价格。许多不同的特性被认为是准确的预测。建议的模型使用一个数据集,该数据集包含汽车品牌和型号、生产年份、里程、状况以及影响二手车价格的其他因素。本文采用线性回归、GBT回归和随机森林回归对二手车价格进行估计。然后,比较算法性能,找出哪种方法更适合数据集。因此,这些方法优于其他方法。
{"title":"Predicting the Sale Price of Pre-Owned Vehicles with the Ensemble ML Model","authors":"M. Kathiravan, M. Ramya, S. Jayanthi, Vangala Vamseedhar Reddy, Lokesh Ponguru, N. Bharathiraja","doi":"10.1109/ICESC57686.2023.10192988","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10192988","url":null,"abstract":"Car price forecasting is a popular study topic because it requires a lot of work and knowledge. Used car pricing forecasting is a major auto industry concern. Machine learning can accurately predict used automobile prices based on many characteristics. Many distinct qualities are considered for accurate predictions. The suggested model uses a dataset that contains vehicle brand and model, year of production, mileage, condition, and other factors that affect used car prices. This study used linear regression, GBT regression, and random forest regression to estimate secondhand car prices. Then, algorithm performance was compared to find which method better fit the data set. Thus, these methods outperform others.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and Identification of Crop based on Soil Texture using AI 基于土壤纹理的人工智能作物识别实现
Neetu Mittal, Akash Bhanja
Soil is the foremost and elementary resource to improve efficiency in agricultural. Many advanced Computing Techniques are arisen and are get executed in different domains of agriculture. The main intent of the work is to develop an application that associates crop names and to expose the basic capabilities of the system. The Aim is to build a machine learning model that recommends the most suitable crop for a given region based on a variety of factors such as soil type, climate, precipitation, and available resources. The model will be trained using NLP techniques to analyze and extract useful information from text data on various crops, including their characteristics, growth conditions, and yield potential. A machine learning model trained using the extracted features and may be capable of predicting the most suitable crop for a given region based on the input data. The proposed model is used as a web service to facilitate faster development.
土壤是提高农业生产效率最重要、最基本的资源。许多先进的计算技术正在兴起,并在农业的不同领域得到应用。这项工作的主要目的是开发一个关联作物名称的应用程序,并公开系统的基本功能。目的是建立一个机器学习模型,根据土壤类型、气候、降水和可用资源等多种因素,为给定地区推荐最合适的作物。该模型将使用NLP技术进行训练,从各种作物的文本数据中分析和提取有用的信息,包括它们的特性、生长条件和产量潜力。使用提取的特征进行训练的机器学习模型,可能能够根据输入数据预测给定区域最适合的作物。建议的模型用作web服务,以促进更快的开发。
{"title":"Implementation and Identification of Crop based on Soil Texture using AI","authors":"Neetu Mittal, Akash Bhanja","doi":"10.1109/ICESC57686.2023.10192937","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10192937","url":null,"abstract":"Soil is the foremost and elementary resource to improve efficiency in agricultural. Many advanced Computing Techniques are arisen and are get executed in different domains of agriculture. The main intent of the work is to develop an application that associates crop names and to expose the basic capabilities of the system. The Aim is to build a machine learning model that recommends the most suitable crop for a given region based on a variety of factors such as soil type, climate, precipitation, and available resources. The model will be trained using NLP techniques to analyze and extract useful information from text data on various crops, including their characteristics, growth conditions, and yield potential. A machine learning model trained using the extracted features and may be capable of predicting the most suitable crop for a given region based on the input data. The proposed model is used as a web service to facilitate faster development.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115281084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Broad Survey on Detection of Depression in Societal Platforms using Machine Learning Model for the Public Health Care System 在公共卫生保健系统中使用机器学习模型对社会平台中抑郁症检测的广泛调查
P. L. Priya, V. Prakash
Anxiety and depression are on the rise, particularly since the COVID-19 epidemic, yet detection rates have not kept pace. There has been a lot of talk about people showing signs of mental health problems on social media sites like Facebook, Twitter etc. The social media anxiety and sadness detected using machine learning algorithms is considered and reviewed in this research. Soon after depression was recognized as a major public health problem around the world, efforts were made to improve its detection. The speed with which technology is developing is changing the way people talk to one another. Standardized scales that rely on patients’ subjective reactions or clinical diagnoses from attending clinicians are typically used to detect depression, despite their limitations. First, the replies patients give on conventional standardized measures may be influenced by factors such as the patient’s current mental state, the nature of the clinician-patient relationship, the patient’s current mood, and the patient’s previous experiences and memory bias. Social media platforms like Twitter, Facebook, Telegram, and Instagram have exploded in popularity as places for people to open up about their innermost thoughts, psyche, and feelings with the proliferation of the Internet. Text is analyzed using psychological analysis to pull out relevant aspects, characteristics, and information from the perspectives of users. Psychological analysts rely on social media for the early identification of depressive symptoms and patterns of behavior. A person’s social network may tell us a lot about the thoughts and actions that precede the start of depression, such as the person’s isolation, the importance they place on themselves, and the hours they spend awake. This research presents a brief review that attempts to synthesize the literature on the use of Machine Learning (ML) techniques on social media text data for the purpose of detecting depressive symptoms and to point the way toward future research in this field.
焦虑和抑郁呈上升趋势,特别是自2019冠状病毒病流行以来,但检出率并未跟上。在Facebook、Twitter等社交媒体网站上,有很多关于人们表现出心理健康问题迹象的讨论。本研究对使用机器学习算法检测的社交媒体焦虑和悲伤进行了思考和回顾。在抑郁症被公认为世界范围内的一个主要公共卫生问题后不久,人们就开始努力提高对抑郁症的检测。科技发展的速度正在改变人们彼此交谈的方式。标准化的量表依赖于患者的主观反应或主治医生的临床诊断,通常用于检测抑郁症,尽管它们有局限性。首先,患者对常规标准化测量的回答可能受到患者当前精神状态、医患关系的性质、患者当前情绪、患者以前的经历和记忆偏差等因素的影响。随着互联网的普及,推特、脸书、电报和Instagram等社交媒体平台作为人们敞开内心深处想法、心理和感受的场所,迅速流行起来。运用心理学分析方法对文本进行分析,从用户的角度提取出相关的方面、特征和信息。心理分析师依靠社交媒体来早期识别抑郁症状和行为模式。一个人的社交网络可以告诉我们很多关于抑郁开始之前的想法和行为,比如这个人的孤立感,他们对自己的重视程度,以及他们醒着的时间。本研究简要回顾了关于在社交媒体文本数据上使用机器学习(ML)技术以检测抑郁症状的文献,并为该领域的未来研究指明了方向。
{"title":"A Broad Survey on Detection of Depression in Societal Platforms using Machine Learning Model for the Public Health Care System","authors":"P. L. Priya, V. Prakash","doi":"10.1109/ICESC57686.2023.10193515","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193515","url":null,"abstract":"Anxiety and depression are on the rise, particularly since the COVID-19 epidemic, yet detection rates have not kept pace. There has been a lot of talk about people showing signs of mental health problems on social media sites like Facebook, Twitter etc. The social media anxiety and sadness detected using machine learning algorithms is considered and reviewed in this research. Soon after depression was recognized as a major public health problem around the world, efforts were made to improve its detection. The speed with which technology is developing is changing the way people talk to one another. Standardized scales that rely on patients’ subjective reactions or clinical diagnoses from attending clinicians are typically used to detect depression, despite their limitations. First, the replies patients give on conventional standardized measures may be influenced by factors such as the patient’s current mental state, the nature of the clinician-patient relationship, the patient’s current mood, and the patient’s previous experiences and memory bias. Social media platforms like Twitter, Facebook, Telegram, and Instagram have exploded in popularity as places for people to open up about their innermost thoughts, psyche, and feelings with the proliferation of the Internet. Text is analyzed using psychological analysis to pull out relevant aspects, characteristics, and information from the perspectives of users. Psychological analysts rely on social media for the early identification of depressive symptoms and patterns of behavior. A person’s social network may tell us a lot about the thoughts and actions that precede the start of depression, such as the person’s isolation, the importance they place on themselves, and the hours they spend awake. This research presents a brief review that attempts to synthesize the literature on the use of Machine Learning (ML) techniques on social media text data for the purpose of detecting depressive symptoms and to point the way toward future research in this field.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120971667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Rounding based Approximate Multiplier for Floating Point Numbers 可重构的基于舍入的浮点数近似乘数
R. Mahima, M. Maheswari, P. Ramkumar, N. Kaushik, N. M. Karthik, S. Nishanth
Most of all computations carried out by these DSP cores are contributed by the arithmetic units, particularly multipliers. For the creation of energy-effectual digital signal processing cores, a high economical and low power design is also a crucial necessity. The DSP processors in portable devices run multimedia programs and produces image and video outputs for human consumption. Because human vision is limited, an approximate architecture can be employed to achieve excellent energy consumption with minimal performance loss. The theme is to design a reconfigurable ROBA multiplier by using floating numbers as an input. The architectural (circuit and logic levels) and algorithmic of ROBA multiplier can used to approximate values within arithmetic units. As a result, researchers in the subject of approximation computing have focused particularly on developing approximate arithmetic units, ROBA multiplier offers a superior trade-off between power, performance, and computational error. The design is stimulated by Xilinix Vivado software.
这些DSP核心执行的大部分计算都是由算术单元,特别是乘法器贡献的。为了创造节能的数字信号处理核心,高经济和低功耗的设计也是至关重要的。便携式设备中的DSP处理器运行多媒体程序并产生供人类消费的图像和视频输出。由于人类的视觉是有限的,因此可以采用近似的架构来实现最佳的能耗和最小的性能损失。主题是通过使用浮点数作为输入来设计一个可重构的ROBA乘法器。ROBA乘法器的结构(电路和逻辑层)和算法可用于在算术单位内逼近值。因此,近似计算领域的研究人员特别关注近似算术单元的开发,ROBA乘法器在功率、性能和计算误差之间提供了更好的权衡。本设计采用Xilinix Vivado软件进行仿真。
{"title":"Reconfigurable Rounding based Approximate Multiplier for Floating Point Numbers","authors":"R. Mahima, M. Maheswari, P. Ramkumar, N. Kaushik, N. M. Karthik, S. Nishanth","doi":"10.1109/ICESC57686.2023.10193056","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193056","url":null,"abstract":"Most of all computations carried out by these DSP cores are contributed by the arithmetic units, particularly multipliers. For the creation of energy-effectual digital signal processing cores, a high economical and low power design is also a crucial necessity. The DSP processors in portable devices run multimedia programs and produces image and video outputs for human consumption. Because human vision is limited, an approximate architecture can be employed to achieve excellent energy consumption with minimal performance loss. The theme is to design a reconfigurable ROBA multiplier by using floating numbers as an input. The architectural (circuit and logic levels) and algorithmic of ROBA multiplier can used to approximate values within arithmetic units. As a result, researchers in the subject of approximation computing have focused particularly on developing approximate arithmetic units, ROBA multiplier offers a superior trade-off between power, performance, and computational error. The design is stimulated by Xilinix Vivado software.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121047230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Malicious URL Websites using Machine Learning Models 使用机器学习模型检测恶意URL网站
Karri Narendra Reddy, Kolapalli Naga, Venkatesh, Dr. T. Prem
In recent years, web applications have become increasingly vulnerable to hacking, with an estimated occurrence of 32,590 attacks every day. However, many web developers and website owners are unprepared to identify and prevent these attacks. Hackers utilize various techniques, including phishing websites to gain unauthorized access or compromise authentic web programmers. This research study examines the web application security and the frequency of attacks on such systems. This study focuses on the most common types of attacks and suggests effective detection methods for preventing them. Recently, the secure coding methodologies and machine learning algorithms are used to detect and block unauthorized access and phishing attacks.In almost all the existing research works, a web application is developed to test several website URLs. The findings suggest that the model is capable of detecting malicious web application attacks. Furthermore, the model compares the performance of several machine learning algorithms for identifying phishing website links and detecting with the best model.
近年来,web应用程序越来越容易受到黑客攻击,据估计每天发生32,590次攻击。然而,许多web开发人员和网站所有者并没有做好识别和防止这些攻击的准备。黑客利用各种技术,包括网络钓鱼网站来获得未经授权的访问或危害真正的网络程序员。本研究考察了web应用程序的安全性以及此类系统遭受攻击的频率。本研究的重点是最常见的攻击类型,并建议有效的检测方法来防止它们。近年来,安全编码方法和机器学习算法被用于检测和阻止未经授权的访问和网络钓鱼攻击。在几乎所有现有的研究工作中,都开发了一个web应用程序来测试多个网站的url。结果表明,该模型能够检测出恶意的web应用程序攻击。此外,该模型比较了几种机器学习算法在识别钓鱼网站链接和检测方面的性能,并使用最佳模型进行检测。
{"title":"Detection of Malicious URL Websites using Machine Learning Models","authors":"Karri Narendra Reddy, Kolapalli Naga, Venkatesh, Dr. T. Prem","doi":"10.1109/ICESC57686.2023.10193080","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193080","url":null,"abstract":"In recent years, web applications have become increasingly vulnerable to hacking, with an estimated occurrence of 32,590 attacks every day. However, many web developers and website owners are unprepared to identify and prevent these attacks. Hackers utilize various techniques, including phishing websites to gain unauthorized access or compromise authentic web programmers. This research study examines the web application security and the frequency of attacks on such systems. This study focuses on the most common types of attacks and suggests effective detection methods for preventing them. Recently, the secure coding methodologies and machine learning algorithms are used to detect and block unauthorized access and phishing attacks.In almost all the existing research works, a web application is developed to test several website URLs. The findings suggest that the model is capable of detecting malicious web application attacks. Furthermore, the model compares the performance of several machine learning algorithms for identifying phishing website links and detecting with the best model.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of Triangular KOCH Curve and SIERPINSKI Gasket Fractal Antenna Designs for Wireless Applications 无线应用中三角形KOCH曲线与SIERPINSKI衬垫分形天线设计的性能比较
Sujay D. Mainkar
As the entire world is proceeding towards experiencing 5G/6G wireless technologies, the performance requirements imposed on antenna size, effectiveness, frequency of operation, and reconfigurability are increasing day-by-day. This has inspired scientists working on antennas to create several models that adhere to these stringent specifications. Despite of this multiconstrained scenario, the use of fractal geometry in the construction of antennas is one of the unique approaches towards enhancing antenna performance. The proposed work targets at systematic investigation of promising performance demonstrated by miniaturized fractal antennas facilitating multiband operation.
随着全球向5G/6G无线技术迈进,对天线尺寸、有效性、工作频率和可重构性的性能要求日益提高。这激发了从事天线研究的科学家们创造出几种符合这些严格规范的模型。尽管存在这种多约束情况,但在天线结构中使用分形几何是提高天线性能的独特方法之一。提出的工作目标是系统研究小型化分形天线在多波段操作中所表现出的良好性能。
{"title":"Performance Comparison of Triangular KOCH Curve and SIERPINSKI Gasket Fractal Antenna Designs for Wireless Applications","authors":"Sujay D. Mainkar","doi":"10.1109/ICESC57686.2023.10193539","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193539","url":null,"abstract":"As the entire world is proceeding towards experiencing 5G/6G wireless technologies, the performance requirements imposed on antenna size, effectiveness, frequency of operation, and reconfigurability are increasing day-by-day. This has inspired scientists working on antennas to create several models that adhere to these stringent specifications. Despite of this multiconstrained scenario, the use of fractal geometry in the construction of antennas is one of the unique approaches towards enhancing antenna performance. The proposed work targets at systematic investigation of promising performance demonstrated by miniaturized fractal antennas facilitating multiband operation.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123808531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart System for Accident Prevention Using Drunk and Drive Controller 基于醉驾控制器的事故预防智能系统
M. Jaishree, M. Mohamed Asharaf, T. Naveenkumar, V. Nikil
People are currently involved in numerous accidents while travelling by car. Drunk driving and reckless driving during peak hours are the leading causes of accidents. This project contributes to the prevention of such accidents by developing a system that, using a sensor, prevents an intoxicated driver from driving the vehicle and, as a result, controls the ignition of the vehicle’s engine. Accidents occur frequently near school zones. As a result, controlling the vehicle speed is the most important aspect to deal with. This mechanism regulates the vehicle’s speed in school, college, and hospital zones when the camera detects school and hospital zone signs. The method for gathering and detecting signs is mainly reliant on digital image processing. The image processing algorithm takes the necessary action for the acquired indicators. The traffic signs were captured using image enhancement techniques through the Raspberry Pi camera port. The features of speed signs are investigated using the embedded system small computing platform. At that period of daytime vision, the Haar Cascade approach had been used for form analysis to distinguish traffic symbols. The proposed work uses Raspberry Pi 3 board to implement the existing traffic signaling technique.
目前,人们在开车旅行时发生了许多事故。高峰时段的酒后驾驶和鲁莽驾驶是造成交通事故的主要原因。该项目通过开发一种系统来防止醉酒驾驶员驾驶车辆,从而控制车辆发动机的点火,从而有助于防止此类事故的发生。事故经常发生在学校附近。因此,控制车辆速度是最重要的方面来处理。当摄像头检测到学校和医院区域标志时,该机制可以调节车辆在学校、大学和医院区域的速度。信号的采集和检测方法主要依靠数字图像处理。图像处理算法对采集到的指标进行必要的处理。通过树莓派相机端口使用图像增强技术捕获交通标志。利用嵌入式系统小型计算平台对速度标志的特点进行了研究。在白天视野的那段时间,哈尔级联方法被用于形式分析,以区分交通标志。提出的工作使用树莓派3板来实现现有的交通信号技术。
{"title":"Smart System for Accident Prevention Using Drunk and Drive Controller","authors":"M. Jaishree, M. Mohamed Asharaf, T. Naveenkumar, V. Nikil","doi":"10.1109/ICESC57686.2023.10192990","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10192990","url":null,"abstract":"People are currently involved in numerous accidents while travelling by car. Drunk driving and reckless driving during peak hours are the leading causes of accidents. This project contributes to the prevention of such accidents by developing a system that, using a sensor, prevents an intoxicated driver from driving the vehicle and, as a result, controls the ignition of the vehicle’s engine. Accidents occur frequently near school zones. As a result, controlling the vehicle speed is the most important aspect to deal with. This mechanism regulates the vehicle’s speed in school, college, and hospital zones when the camera detects school and hospital zone signs. The method for gathering and detecting signs is mainly reliant on digital image processing. The image processing algorithm takes the necessary action for the acquired indicators. The traffic signs were captured using image enhancement techniques through the Raspberry Pi camera port. The features of speed signs are investigated using the embedded system small computing platform. At that period of daytime vision, the Haar Cascade approach had been used for form analysis to distinguish traffic symbols. The proposed work uses Raspberry Pi 3 board to implement the existing traffic signaling technique.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124936981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Advanced Keyword Searching Model with Data Security in Cloud Computing 云计算中具有数据安全性的高级关键字搜索模型
Afsha Jabeen, Ch Rajendra prasad
The growing popularity of cloud computing has necessitated the development of more efficient and secure methods of searching and retrieving data from cloud storage. In this paper, we propose an advanced keyword-searching model that ensures data security in cloud computing environments. To ensure data confidentiality and safety, our model employs advanced encryption techniques such as symmetric-key, homomorphic, and attribute-based encryption. Also, this study introduces an optimized indexing technique using a binary search algorithm to reduce search time and improve search efficiency. Furthermore, our model employs a secure multi-party computation approach to enable fast computation between multiple parties while keeping private information private. Using a benchmark dataset, this study demonstrates that the proposed model achieves high accuracy and efficiency while maintaining data security. The proposed model can be used in various applications, such as healthcare, finance, and ecommerce, where sensitive data must be securely stored and retrieved. The proposed model provides an efficient and secure solution for keyword searching in cloud computing environments.
随着云计算的日益普及,有必要开发更有效、更安全的从云存储中搜索和检索数据的方法。本文提出了一种先进的关键字搜索模型,以保证云计算环境下的数据安全。为了确保数据的机密性和安全性,我们的模型采用了高级加密技术,如对称密钥、同态和基于属性的加密。此外,本文还介绍了一种利用二元搜索算法的优化索引技术,以减少搜索时间,提高搜索效率。此外,我们的模型采用了一种安全的多方计算方法来实现多方之间的快速计算,同时保持私有信息的私密性。使用一个基准数据集,研究表明,该模型在保持数据安全性的同时实现了较高的准确性和效率。所建议的模型可用于各种应用程序,例如医疗保健、金融和电子商务,这些应用程序必须安全地存储和检索敏感数据。该模型为云计算环境下的关键字搜索提供了一种高效、安全的解决方案。
{"title":"An Advanced Keyword Searching Model with Data Security in Cloud Computing","authors":"Afsha Jabeen, Ch Rajendra prasad","doi":"10.1109/ICESC57686.2023.10193266","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193266","url":null,"abstract":"The growing popularity of cloud computing has necessitated the development of more efficient and secure methods of searching and retrieving data from cloud storage. In this paper, we propose an advanced keyword-searching model that ensures data security in cloud computing environments. To ensure data confidentiality and safety, our model employs advanced encryption techniques such as symmetric-key, homomorphic, and attribute-based encryption. Also, this study introduces an optimized indexing technique using a binary search algorithm to reduce search time and improve search efficiency. Furthermore, our model employs a secure multi-party computation approach to enable fast computation between multiple parties while keeping private information private. Using a benchmark dataset, this study demonstrates that the proposed model achieves high accuracy and efficiency while maintaining data security. The proposed model can be used in various applications, such as healthcare, finance, and ecommerce, where sensitive data must be securely stored and retrieved. The proposed model provides an efficient and secure solution for keyword searching in cloud computing environments.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI based Scarecrow Preventing from Crop Vandalization 基于AI的稻草人防止作物破坏
Y.Alekya Rani, T. Bhaskar, M. Arshad, B. Allam
Crop harm as a result of animal assaults is one of the foremost threats in decreasing the crop yield. Crop in farms is often broken via local animals like buffalos, cows, goats, wild animals like bears, monkeys, wild pigs, elephants, etc and many other birds like sparrows, crows, pigeons. These may cause serious damage to crops which in turn ends in large losses for the farmers. It is difficult for the field owners to build physical barriers to entire field and monitor it. The existing systems mainly based on observation. Farmers take actions according to the animal that entered. The other ways farmers use to prevent the crop destruction by virtue of animals include constructing barricades, electrical fences and manual surveillance. Farmers also use human puppets in middle of fields to ward off animals or birds. So here this study proposes an AI based Scarecrow that protects the crops from wild animals with the help of scanning using camera, it detects the stray animals or birds and when it detects the stray animals or birds then it produces a sound of animal extermination. This study makes a program with the help of live video detecting object using yolov3, coco names, cv2 modules. It ensures complete safety of crops from animals causing damage to it.
动物袭击造成的作物危害是降低作物产量的主要威胁之一。农场里的庄稼经常被当地的动物,如水牛、奶牛、山羊、熊、猴子、野猪、大象等野生动物以及麻雀、乌鸦、鸽子等许多其他鸟类破坏。这些可能会对农作物造成严重损害,进而给农民造成巨大损失。油田所有者很难对整个油田建立物理屏障并进行监控。现有的系统主要以观测为主。农民根据进入的动物采取行动。农民们用来防止牲畜破坏庄稼的其他方法包括设置路障、电栅栏和人工监控。农民们还在田地中央使用木偶来驱赶动物或鸟类。因此,这项研究提出了一个基于人工智能的稻草人,它可以保护庄稼免受野生动物的侵害,通过摄像头扫描,它可以检测到流浪动物或鸟类,当它检测到流浪动物或鸟类时,它会发出动物灭绝的声音。本研究利用yolov3、coco names、cv2模块,制作了一个借助实时视频检测对象的程序。它确保了农作物的完全安全,不受动物的损害。
{"title":"AI based Scarecrow Preventing from Crop Vandalization","authors":"Y.Alekya Rani, T. Bhaskar, M. Arshad, B. Allam","doi":"10.1109/ICESC57686.2023.10193604","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193604","url":null,"abstract":"Crop harm as a result of animal assaults is one of the foremost threats in decreasing the crop yield. Crop in farms is often broken via local animals like buffalos, cows, goats, wild animals like bears, monkeys, wild pigs, elephants, etc and many other birds like sparrows, crows, pigeons. These may cause serious damage to crops which in turn ends in large losses for the farmers. It is difficult for the field owners to build physical barriers to entire field and monitor it. The existing systems mainly based on observation. Farmers take actions according to the animal that entered. The other ways farmers use to prevent the crop destruction by virtue of animals include constructing barricades, electrical fences and manual surveillance. Farmers also use human puppets in middle of fields to ward off animals or birds. So here this study proposes an AI based Scarecrow that protects the crops from wild animals with the help of scanning using camera, it detects the stray animals or birds and when it detects the stray animals or birds then it produces a sound of animal extermination. This study makes a program with the help of live video detecting object using yolov3, coco names, cv2 modules. It ensures complete safety of crops from animals causing damage to it.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116601104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1