首页 > 最新文献

2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)最新文献

英文 中文
Implementation and Identification of Crop based on Soil Texture using AI 基于土壤纹理的人工智能作物识别实现
Neetu Mittal, Akash Bhanja
Soil is the foremost and elementary resource to improve efficiency in agricultural. Many advanced Computing Techniques are arisen and are get executed in different domains of agriculture. The main intent of the work is to develop an application that associates crop names and to expose the basic capabilities of the system. The Aim is to build a machine learning model that recommends the most suitable crop for a given region based on a variety of factors such as soil type, climate, precipitation, and available resources. The model will be trained using NLP techniques to analyze and extract useful information from text data on various crops, including their characteristics, growth conditions, and yield potential. A machine learning model trained using the extracted features and may be capable of predicting the most suitable crop for a given region based on the input data. The proposed model is used as a web service to facilitate faster development.
土壤是提高农业生产效率最重要、最基本的资源。许多先进的计算技术正在兴起,并在农业的不同领域得到应用。这项工作的主要目的是开发一个关联作物名称的应用程序,并公开系统的基本功能。目的是建立一个机器学习模型,根据土壤类型、气候、降水和可用资源等多种因素,为给定地区推荐最合适的作物。该模型将使用NLP技术进行训练,从各种作物的文本数据中分析和提取有用的信息,包括它们的特性、生长条件和产量潜力。使用提取的特征进行训练的机器学习模型,可能能够根据输入数据预测给定区域最适合的作物。建议的模型用作web服务,以促进更快的开发。
{"title":"Implementation and Identification of Crop based on Soil Texture using AI","authors":"Neetu Mittal, Akash Bhanja","doi":"10.1109/ICESC57686.2023.10192937","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10192937","url":null,"abstract":"Soil is the foremost and elementary resource to improve efficiency in agricultural. Many advanced Computing Techniques are arisen and are get executed in different domains of agriculture. The main intent of the work is to develop an application that associates crop names and to expose the basic capabilities of the system. The Aim is to build a machine learning model that recommends the most suitable crop for a given region based on a variety of factors such as soil type, climate, precipitation, and available resources. The model will be trained using NLP techniques to analyze and extract useful information from text data on various crops, including their characteristics, growth conditions, and yield potential. A machine learning model trained using the extracted features and may be capable of predicting the most suitable crop for a given region based on the input data. The proposed model is used as a web service to facilitate faster development.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115281084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Broad Survey on Detection of Depression in Societal Platforms using Machine Learning Model for the Public Health Care System 在公共卫生保健系统中使用机器学习模型对社会平台中抑郁症检测的广泛调查
P. L. Priya, V. Prakash
Anxiety and depression are on the rise, particularly since the COVID-19 epidemic, yet detection rates have not kept pace. There has been a lot of talk about people showing signs of mental health problems on social media sites like Facebook, Twitter etc. The social media anxiety and sadness detected using machine learning algorithms is considered and reviewed in this research. Soon after depression was recognized as a major public health problem around the world, efforts were made to improve its detection. The speed with which technology is developing is changing the way people talk to one another. Standardized scales that rely on patients’ subjective reactions or clinical diagnoses from attending clinicians are typically used to detect depression, despite their limitations. First, the replies patients give on conventional standardized measures may be influenced by factors such as the patient’s current mental state, the nature of the clinician-patient relationship, the patient’s current mood, and the patient’s previous experiences and memory bias. Social media platforms like Twitter, Facebook, Telegram, and Instagram have exploded in popularity as places for people to open up about their innermost thoughts, psyche, and feelings with the proliferation of the Internet. Text is analyzed using psychological analysis to pull out relevant aspects, characteristics, and information from the perspectives of users. Psychological analysts rely on social media for the early identification of depressive symptoms and patterns of behavior. A person’s social network may tell us a lot about the thoughts and actions that precede the start of depression, such as the person’s isolation, the importance they place on themselves, and the hours they spend awake. This research presents a brief review that attempts to synthesize the literature on the use of Machine Learning (ML) techniques on social media text data for the purpose of detecting depressive symptoms and to point the way toward future research in this field.
焦虑和抑郁呈上升趋势,特别是自2019冠状病毒病流行以来,但检出率并未跟上。在Facebook、Twitter等社交媒体网站上,有很多关于人们表现出心理健康问题迹象的讨论。本研究对使用机器学习算法检测的社交媒体焦虑和悲伤进行了思考和回顾。在抑郁症被公认为世界范围内的一个主要公共卫生问题后不久,人们就开始努力提高对抑郁症的检测。科技发展的速度正在改变人们彼此交谈的方式。标准化的量表依赖于患者的主观反应或主治医生的临床诊断,通常用于检测抑郁症,尽管它们有局限性。首先,患者对常规标准化测量的回答可能受到患者当前精神状态、医患关系的性质、患者当前情绪、患者以前的经历和记忆偏差等因素的影响。随着互联网的普及,推特、脸书、电报和Instagram等社交媒体平台作为人们敞开内心深处想法、心理和感受的场所,迅速流行起来。运用心理学分析方法对文本进行分析,从用户的角度提取出相关的方面、特征和信息。心理分析师依靠社交媒体来早期识别抑郁症状和行为模式。一个人的社交网络可以告诉我们很多关于抑郁开始之前的想法和行为,比如这个人的孤立感,他们对自己的重视程度,以及他们醒着的时间。本研究简要回顾了关于在社交媒体文本数据上使用机器学习(ML)技术以检测抑郁症状的文献,并为该领域的未来研究指明了方向。
{"title":"A Broad Survey on Detection of Depression in Societal Platforms using Machine Learning Model for the Public Health Care System","authors":"P. L. Priya, V. Prakash","doi":"10.1109/ICESC57686.2023.10193515","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193515","url":null,"abstract":"Anxiety and depression are on the rise, particularly since the COVID-19 epidemic, yet detection rates have not kept pace. There has been a lot of talk about people showing signs of mental health problems on social media sites like Facebook, Twitter etc. The social media anxiety and sadness detected using machine learning algorithms is considered and reviewed in this research. Soon after depression was recognized as a major public health problem around the world, efforts were made to improve its detection. The speed with which technology is developing is changing the way people talk to one another. Standardized scales that rely on patients’ subjective reactions or clinical diagnoses from attending clinicians are typically used to detect depression, despite their limitations. First, the replies patients give on conventional standardized measures may be influenced by factors such as the patient’s current mental state, the nature of the clinician-patient relationship, the patient’s current mood, and the patient’s previous experiences and memory bias. Social media platforms like Twitter, Facebook, Telegram, and Instagram have exploded in popularity as places for people to open up about their innermost thoughts, psyche, and feelings with the proliferation of the Internet. Text is analyzed using psychological analysis to pull out relevant aspects, characteristics, and information from the perspectives of users. Psychological analysts rely on social media for the early identification of depressive symptoms and patterns of behavior. A person’s social network may tell us a lot about the thoughts and actions that precede the start of depression, such as the person’s isolation, the importance they place on themselves, and the hours they spend awake. This research presents a brief review that attempts to synthesize the literature on the use of Machine Learning (ML) techniques on social media text data for the purpose of detecting depressive symptoms and to point the way toward future research in this field.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120971667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Rounding based Approximate Multiplier for Floating Point Numbers 可重构的基于舍入的浮点数近似乘数
R. Mahima, M. Maheswari, P. Ramkumar, N. Kaushik, N. M. Karthik, S. Nishanth
Most of all computations carried out by these DSP cores are contributed by the arithmetic units, particularly multipliers. For the creation of energy-effectual digital signal processing cores, a high economical and low power design is also a crucial necessity. The DSP processors in portable devices run multimedia programs and produces image and video outputs for human consumption. Because human vision is limited, an approximate architecture can be employed to achieve excellent energy consumption with minimal performance loss. The theme is to design a reconfigurable ROBA multiplier by using floating numbers as an input. The architectural (circuit and logic levels) and algorithmic of ROBA multiplier can used to approximate values within arithmetic units. As a result, researchers in the subject of approximation computing have focused particularly on developing approximate arithmetic units, ROBA multiplier offers a superior trade-off between power, performance, and computational error. The design is stimulated by Xilinix Vivado software.
这些DSP核心执行的大部分计算都是由算术单元,特别是乘法器贡献的。为了创造节能的数字信号处理核心,高经济和低功耗的设计也是至关重要的。便携式设备中的DSP处理器运行多媒体程序并产生供人类消费的图像和视频输出。由于人类的视觉是有限的,因此可以采用近似的架构来实现最佳的能耗和最小的性能损失。主题是通过使用浮点数作为输入来设计一个可重构的ROBA乘法器。ROBA乘法器的结构(电路和逻辑层)和算法可用于在算术单位内逼近值。因此,近似计算领域的研究人员特别关注近似算术单元的开发,ROBA乘法器在功率、性能和计算误差之间提供了更好的权衡。本设计采用Xilinix Vivado软件进行仿真。
{"title":"Reconfigurable Rounding based Approximate Multiplier for Floating Point Numbers","authors":"R. Mahima, M. Maheswari, P. Ramkumar, N. Kaushik, N. M. Karthik, S. Nishanth","doi":"10.1109/ICESC57686.2023.10193056","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193056","url":null,"abstract":"Most of all computations carried out by these DSP cores are contributed by the arithmetic units, particularly multipliers. For the creation of energy-effectual digital signal processing cores, a high economical and low power design is also a crucial necessity. The DSP processors in portable devices run multimedia programs and produces image and video outputs for human consumption. Because human vision is limited, an approximate architecture can be employed to achieve excellent energy consumption with minimal performance loss. The theme is to design a reconfigurable ROBA multiplier by using floating numbers as an input. The architectural (circuit and logic levels) and algorithmic of ROBA multiplier can used to approximate values within arithmetic units. As a result, researchers in the subject of approximation computing have focused particularly on developing approximate arithmetic units, ROBA multiplier offers a superior trade-off between power, performance, and computational error. The design is stimulated by Xilinix Vivado software.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121047230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Malicious URL Websites using Machine Learning Models 使用机器学习模型检测恶意URL网站
Karri Narendra Reddy, Kolapalli Naga, Venkatesh, Dr. T. Prem
In recent years, web applications have become increasingly vulnerable to hacking, with an estimated occurrence of 32,590 attacks every day. However, many web developers and website owners are unprepared to identify and prevent these attacks. Hackers utilize various techniques, including phishing websites to gain unauthorized access or compromise authentic web programmers. This research study examines the web application security and the frequency of attacks on such systems. This study focuses on the most common types of attacks and suggests effective detection methods for preventing them. Recently, the secure coding methodologies and machine learning algorithms are used to detect and block unauthorized access and phishing attacks.In almost all the existing research works, a web application is developed to test several website URLs. The findings suggest that the model is capable of detecting malicious web application attacks. Furthermore, the model compares the performance of several machine learning algorithms for identifying phishing website links and detecting with the best model.
近年来,web应用程序越来越容易受到黑客攻击,据估计每天发生32,590次攻击。然而,许多web开发人员和网站所有者并没有做好识别和防止这些攻击的准备。黑客利用各种技术,包括网络钓鱼网站来获得未经授权的访问或危害真正的网络程序员。本研究考察了web应用程序的安全性以及此类系统遭受攻击的频率。本研究的重点是最常见的攻击类型,并建议有效的检测方法来防止它们。近年来,安全编码方法和机器学习算法被用于检测和阻止未经授权的访问和网络钓鱼攻击。在几乎所有现有的研究工作中,都开发了一个web应用程序来测试多个网站的url。结果表明,该模型能够检测出恶意的web应用程序攻击。此外,该模型比较了几种机器学习算法在识别钓鱼网站链接和检测方面的性能,并使用最佳模型进行检测。
{"title":"Detection of Malicious URL Websites using Machine Learning Models","authors":"Karri Narendra Reddy, Kolapalli Naga, Venkatesh, Dr. T. Prem","doi":"10.1109/ICESC57686.2023.10193080","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193080","url":null,"abstract":"In recent years, web applications have become increasingly vulnerable to hacking, with an estimated occurrence of 32,590 attacks every day. However, many web developers and website owners are unprepared to identify and prevent these attacks. Hackers utilize various techniques, including phishing websites to gain unauthorized access or compromise authentic web programmers. This research study examines the web application security and the frequency of attacks on such systems. This study focuses on the most common types of attacks and suggests effective detection methods for preventing them. Recently, the secure coding methodologies and machine learning algorithms are used to detect and block unauthorized access and phishing attacks.In almost all the existing research works, a web application is developed to test several website URLs. The findings suggest that the model is capable of detecting malicious web application attacks. Furthermore, the model compares the performance of several machine learning algorithms for identifying phishing website links and detecting with the best model.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of Triangular KOCH Curve and SIERPINSKI Gasket Fractal Antenna Designs for Wireless Applications 无线应用中三角形KOCH曲线与SIERPINSKI衬垫分形天线设计的性能比较
Sujay D. Mainkar
As the entire world is proceeding towards experiencing 5G/6G wireless technologies, the performance requirements imposed on antenna size, effectiveness, frequency of operation, and reconfigurability are increasing day-by-day. This has inspired scientists working on antennas to create several models that adhere to these stringent specifications. Despite of this multiconstrained scenario, the use of fractal geometry in the construction of antennas is one of the unique approaches towards enhancing antenna performance. The proposed work targets at systematic investigation of promising performance demonstrated by miniaturized fractal antennas facilitating multiband operation.
随着全球向5G/6G无线技术迈进,对天线尺寸、有效性、工作频率和可重构性的性能要求日益提高。这激发了从事天线研究的科学家们创造出几种符合这些严格规范的模型。尽管存在这种多约束情况,但在天线结构中使用分形几何是提高天线性能的独特方法之一。提出的工作目标是系统研究小型化分形天线在多波段操作中所表现出的良好性能。
{"title":"Performance Comparison of Triangular KOCH Curve and SIERPINSKI Gasket Fractal Antenna Designs for Wireless Applications","authors":"Sujay D. Mainkar","doi":"10.1109/ICESC57686.2023.10193539","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193539","url":null,"abstract":"As the entire world is proceeding towards experiencing 5G/6G wireless technologies, the performance requirements imposed on antenna size, effectiveness, frequency of operation, and reconfigurability are increasing day-by-day. This has inspired scientists working on antennas to create several models that adhere to these stringent specifications. Despite of this multiconstrained scenario, the use of fractal geometry in the construction of antennas is one of the unique approaches towards enhancing antenna performance. The proposed work targets at systematic investigation of promising performance demonstrated by miniaturized fractal antennas facilitating multiband operation.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123808531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart System for Accident Prevention Using Drunk and Drive Controller 基于醉驾控制器的事故预防智能系统
M. Jaishree, M. Mohamed Asharaf, T. Naveenkumar, V. Nikil
People are currently involved in numerous accidents while travelling by car. Drunk driving and reckless driving during peak hours are the leading causes of accidents. This project contributes to the prevention of such accidents by developing a system that, using a sensor, prevents an intoxicated driver from driving the vehicle and, as a result, controls the ignition of the vehicle’s engine. Accidents occur frequently near school zones. As a result, controlling the vehicle speed is the most important aspect to deal with. This mechanism regulates the vehicle’s speed in school, college, and hospital zones when the camera detects school and hospital zone signs. The method for gathering and detecting signs is mainly reliant on digital image processing. The image processing algorithm takes the necessary action for the acquired indicators. The traffic signs were captured using image enhancement techniques through the Raspberry Pi camera port. The features of speed signs are investigated using the embedded system small computing platform. At that period of daytime vision, the Haar Cascade approach had been used for form analysis to distinguish traffic symbols. The proposed work uses Raspberry Pi 3 board to implement the existing traffic signaling technique.
目前,人们在开车旅行时发生了许多事故。高峰时段的酒后驾驶和鲁莽驾驶是造成交通事故的主要原因。该项目通过开发一种系统来防止醉酒驾驶员驾驶车辆,从而控制车辆发动机的点火,从而有助于防止此类事故的发生。事故经常发生在学校附近。因此,控制车辆速度是最重要的方面来处理。当摄像头检测到学校和医院区域标志时,该机制可以调节车辆在学校、大学和医院区域的速度。信号的采集和检测方法主要依靠数字图像处理。图像处理算法对采集到的指标进行必要的处理。通过树莓派相机端口使用图像增强技术捕获交通标志。利用嵌入式系统小型计算平台对速度标志的特点进行了研究。在白天视野的那段时间,哈尔级联方法被用于形式分析,以区分交通标志。提出的工作使用树莓派3板来实现现有的交通信号技术。
{"title":"Smart System for Accident Prevention Using Drunk and Drive Controller","authors":"M. Jaishree, M. Mohamed Asharaf, T. Naveenkumar, V. Nikil","doi":"10.1109/ICESC57686.2023.10192990","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10192990","url":null,"abstract":"People are currently involved in numerous accidents while travelling by car. Drunk driving and reckless driving during peak hours are the leading causes of accidents. This project contributes to the prevention of such accidents by developing a system that, using a sensor, prevents an intoxicated driver from driving the vehicle and, as a result, controls the ignition of the vehicle’s engine. Accidents occur frequently near school zones. As a result, controlling the vehicle speed is the most important aspect to deal with. This mechanism regulates the vehicle’s speed in school, college, and hospital zones when the camera detects school and hospital zone signs. The method for gathering and detecting signs is mainly reliant on digital image processing. The image processing algorithm takes the necessary action for the acquired indicators. The traffic signs were captured using image enhancement techniques through the Raspberry Pi camera port. The features of speed signs are investigated using the embedded system small computing platform. At that period of daytime vision, the Haar Cascade approach had been used for form analysis to distinguish traffic symbols. The proposed work uses Raspberry Pi 3 board to implement the existing traffic signaling technique.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124936981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Advanced Keyword Searching Model with Data Security in Cloud Computing 云计算中具有数据安全性的高级关键字搜索模型
Afsha Jabeen, Ch Rajendra prasad
The growing popularity of cloud computing has necessitated the development of more efficient and secure methods of searching and retrieving data from cloud storage. In this paper, we propose an advanced keyword-searching model that ensures data security in cloud computing environments. To ensure data confidentiality and safety, our model employs advanced encryption techniques such as symmetric-key, homomorphic, and attribute-based encryption. Also, this study introduces an optimized indexing technique using a binary search algorithm to reduce search time and improve search efficiency. Furthermore, our model employs a secure multi-party computation approach to enable fast computation between multiple parties while keeping private information private. Using a benchmark dataset, this study demonstrates that the proposed model achieves high accuracy and efficiency while maintaining data security. The proposed model can be used in various applications, such as healthcare, finance, and ecommerce, where sensitive data must be securely stored and retrieved. The proposed model provides an efficient and secure solution for keyword searching in cloud computing environments.
随着云计算的日益普及,有必要开发更有效、更安全的从云存储中搜索和检索数据的方法。本文提出了一种先进的关键字搜索模型,以保证云计算环境下的数据安全。为了确保数据的机密性和安全性,我们的模型采用了高级加密技术,如对称密钥、同态和基于属性的加密。此外,本文还介绍了一种利用二元搜索算法的优化索引技术,以减少搜索时间,提高搜索效率。此外,我们的模型采用了一种安全的多方计算方法来实现多方之间的快速计算,同时保持私有信息的私密性。使用一个基准数据集,研究表明,该模型在保持数据安全性的同时实现了较高的准确性和效率。所建议的模型可用于各种应用程序,例如医疗保健、金融和电子商务,这些应用程序必须安全地存储和检索敏感数据。该模型为云计算环境下的关键字搜索提供了一种高效、安全的解决方案。
{"title":"An Advanced Keyword Searching Model with Data Security in Cloud Computing","authors":"Afsha Jabeen, Ch Rajendra prasad","doi":"10.1109/ICESC57686.2023.10193266","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193266","url":null,"abstract":"The growing popularity of cloud computing has necessitated the development of more efficient and secure methods of searching and retrieving data from cloud storage. In this paper, we propose an advanced keyword-searching model that ensures data security in cloud computing environments. To ensure data confidentiality and safety, our model employs advanced encryption techniques such as symmetric-key, homomorphic, and attribute-based encryption. Also, this study introduces an optimized indexing technique using a binary search algorithm to reduce search time and improve search efficiency. Furthermore, our model employs a secure multi-party computation approach to enable fast computation between multiple parties while keeping private information private. Using a benchmark dataset, this study demonstrates that the proposed model achieves high accuracy and efficiency while maintaining data security. The proposed model can be used in various applications, such as healthcare, finance, and ecommerce, where sensitive data must be securely stored and retrieved. The proposed model provides an efficient and secure solution for keyword searching in cloud computing environments.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI based Scarecrow Preventing from Crop Vandalization 基于AI的稻草人防止作物破坏
Y.Alekya Rani, T. Bhaskar, M. Arshad, B. Allam
Crop harm as a result of animal assaults is one of the foremost threats in decreasing the crop yield. Crop in farms is often broken via local animals like buffalos, cows, goats, wild animals like bears, monkeys, wild pigs, elephants, etc and many other birds like sparrows, crows, pigeons. These may cause serious damage to crops which in turn ends in large losses for the farmers. It is difficult for the field owners to build physical barriers to entire field and monitor it. The existing systems mainly based on observation. Farmers take actions according to the animal that entered. The other ways farmers use to prevent the crop destruction by virtue of animals include constructing barricades, electrical fences and manual surveillance. Farmers also use human puppets in middle of fields to ward off animals or birds. So here this study proposes an AI based Scarecrow that protects the crops from wild animals with the help of scanning using camera, it detects the stray animals or birds and when it detects the stray animals or birds then it produces a sound of animal extermination. This study makes a program with the help of live video detecting object using yolov3, coco names, cv2 modules. It ensures complete safety of crops from animals causing damage to it.
动物袭击造成的作物危害是降低作物产量的主要威胁之一。农场里的庄稼经常被当地的动物,如水牛、奶牛、山羊、熊、猴子、野猪、大象等野生动物以及麻雀、乌鸦、鸽子等许多其他鸟类破坏。这些可能会对农作物造成严重损害,进而给农民造成巨大损失。油田所有者很难对整个油田建立物理屏障并进行监控。现有的系统主要以观测为主。农民根据进入的动物采取行动。农民们用来防止牲畜破坏庄稼的其他方法包括设置路障、电栅栏和人工监控。农民们还在田地中央使用木偶来驱赶动物或鸟类。因此,这项研究提出了一个基于人工智能的稻草人,它可以保护庄稼免受野生动物的侵害,通过摄像头扫描,它可以检测到流浪动物或鸟类,当它检测到流浪动物或鸟类时,它会发出动物灭绝的声音。本研究利用yolov3、coco names、cv2模块,制作了一个借助实时视频检测对象的程序。它确保了农作物的完全安全,不受动物的损害。
{"title":"AI based Scarecrow Preventing from Crop Vandalization","authors":"Y.Alekya Rani, T. Bhaskar, M. Arshad, B. Allam","doi":"10.1109/ICESC57686.2023.10193604","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193604","url":null,"abstract":"Crop harm as a result of animal assaults is one of the foremost threats in decreasing the crop yield. Crop in farms is often broken via local animals like buffalos, cows, goats, wild animals like bears, monkeys, wild pigs, elephants, etc and many other birds like sparrows, crows, pigeons. These may cause serious damage to crops which in turn ends in large losses for the farmers. It is difficult for the field owners to build physical barriers to entire field and monitor it. The existing systems mainly based on observation. Farmers take actions according to the animal that entered. The other ways farmers use to prevent the crop destruction by virtue of animals include constructing barricades, electrical fences and manual surveillance. Farmers also use human puppets in middle of fields to ward off animals or birds. So here this study proposes an AI based Scarecrow that protects the crops from wild animals with the help of scanning using camera, it detects the stray animals or birds and when it detects the stray animals or birds then it produces a sound of animal extermination. This study makes a program with the help of live video detecting object using yolov3, coco names, cv2 modules. It ensures complete safety of crops from animals causing damage to it.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116601104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Cyber Supply Chain: A Risk-based Approach to Threat Assessment and Mitigation 保护网络供应链:基于风险的威胁评估和缓解方法
L. Prathyusha, Vadlamudi Jhansi, A. Madhuri, E. Jyothi, Sampreeth Chowdary, S. Sindhura
The system of Cyber Supply Chain (CSC) is characterized by its complexity, consisting of several subsystems, each responsible for a distinct set of responsibilities. Securing the supply chain presents a challenge due to the presence of vulnerabilities and threats throughout the system that has the potential to be taken advantage of at any time, considering that any component of the system is susceptible to such attacks. As a result, supply chain security is difficult to achieve. This has the potential to create a significant interruption to the overall continuity of the company. Therefore, it is of the utmost importance to identify the hazards and make educated guesses about their likely outcomes so that organizations can take the appropriate precautions to ensure the safety of their supply chains. By leveraging a range of factors, such as the expertise and incentives of threat actors, Tactics, Techniques, and Procedures (TT and P), as well as Indicators of Compromise (IoC), the analysis of Cyber Threat Intelligence (CTI) offers valuable information on both identified ansignd unidentified cybersecurity threats. In order to increase the safety of the cyber supply chain, the purpose of this article is to investigate and speculate on potential dangers. The CTI and Machine Learning (ML) approaches have been employed by us in order to study and forecast the risks based on the CTI attributes. This makes it possible to detect the inherent CSC vulnerabilities, which enables suitable control. To enhance the overall security of computer systems, it is imperative to implement specific actions, including the collection of CTI data and the adoption of various machine learning techniques. These techniques encompass Logistic Regression (LG), Support Vector Machine (SVM), Random Forest (RF), Decision Tree (DT), Cat Boost, and Gradient Boost, which are employed in analyzing the Microsoft Malware Prediction dataset to create predictive analytics. This is done in order to illustrate that the technique can be applied to a variety of situations.As input parameters, the experiment takes into account the assault and the TTP, while as output parameters, it takes into account vulnerabilities and indicators of compromise (IoC). According to the findings of the investigation, the most foreseen dangers in CSC are spyware and ransomware, as well as spear phishing. When it came to forecasting vulnerabilities, the predictive models that were produced using the Random Forest algorithm obtained the best accuracy rate of 91%, while the predictive models that were developed using the LR method earned the highest accuracy rate of 86%. In light of the results, the paper strongly advise putting appropriate controls into place in order to combat these dangers. The paper strongly recommend that the ML predicate model make use of CTI data in order to improve the CSC’s cyber security on the whole.
网络供应链系统的特点是其复杂性,由多个子系统组成,每个子系统负责一组不同的职责。由于整个系统存在漏洞和威胁,考虑到系统的任何组件都容易受到此类攻击,因此在任何时候都有可能被利用,因此确保供应链的安全是一项挑战。因此,供应链安全很难实现。这有可能对公司的整体连续性造成重大中断。因此,识别危害并对其可能的结果做出有根据的猜测是至关重要的,这样组织就可以采取适当的预防措施来确保其供应链的安全。通过利用一系列因素,如威胁行为者的专业知识和动机、战术、技术和程序(TT和P)以及妥协指标(IoC),网络威胁情报(CTI)分析提供了有关已识别或未识别网络安全威胁的宝贵信息。为了提高网络供应链的安全性,本文的目的是调查和推测潜在的危险。为了研究和预测基于CTI属性的风险,我们采用了CTI和机器学习(ML)方法。这使得检测固有的CSC漏洞成为可能,从而实现适当的控制。为了加强电脑系统的整体安全,必须采取具体的行动,包括收集电脑呼叫中心数据和采用各种机器学习技术。这些技术包括逻辑回归(LG),支持向量机(SVM),随机森林(RF),决策树(DT), Cat Boost和梯度Boost,用于分析微软恶意软件预测数据集以创建预测分析。这样做是为了说明该技术可以应用于各种情况。实验的输入参数考虑了攻击和TTP,输出参数考虑了漏洞和妥协指标(IoC)。根据调查结果,CSC最可预见的危险是间谍软件和勒索软件,以及鱼叉式网络钓鱼。在漏洞预测方面,使用随机森林算法生成的预测模型准确率最高,为91%,而使用LR方法开发的预测模型准确率最高,为86%。鉴于这些结果,论文强烈建议采取适当的控制措施,以对抗这些危险。本文强烈建议ML谓词模型利用CTI数据,从整体上提高CSC的网络安全。
{"title":"Securing the Cyber Supply Chain: A Risk-based Approach to Threat Assessment and Mitigation","authors":"L. Prathyusha, Vadlamudi Jhansi, A. Madhuri, E. Jyothi, Sampreeth Chowdary, S. Sindhura","doi":"10.1109/ICESC57686.2023.10193255","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193255","url":null,"abstract":"The system of Cyber Supply Chain (CSC) is characterized by its complexity, consisting of several subsystems, each responsible for a distinct set of responsibilities. Securing the supply chain presents a challenge due to the presence of vulnerabilities and threats throughout the system that has the potential to be taken advantage of at any time, considering that any component of the system is susceptible to such attacks. As a result, supply chain security is difficult to achieve. This has the potential to create a significant interruption to the overall continuity of the company. Therefore, it is of the utmost importance to identify the hazards and make educated guesses about their likely outcomes so that organizations can take the appropriate precautions to ensure the safety of their supply chains. By leveraging a range of factors, such as the expertise and incentives of threat actors, Tactics, Techniques, and Procedures (TT and P), as well as Indicators of Compromise (IoC), the analysis of Cyber Threat Intelligence (CTI) offers valuable information on both identified ansignd unidentified cybersecurity threats. In order to increase the safety of the cyber supply chain, the purpose of this article is to investigate and speculate on potential dangers. The CTI and Machine Learning (ML) approaches have been employed by us in order to study and forecast the risks based on the CTI attributes. This makes it possible to detect the inherent CSC vulnerabilities, which enables suitable control. To enhance the overall security of computer systems, it is imperative to implement specific actions, including the collection of CTI data and the adoption of various machine learning techniques. These techniques encompass Logistic Regression (LG), Support Vector Machine (SVM), Random Forest (RF), Decision Tree (DT), Cat Boost, and Gradient Boost, which are employed in analyzing the Microsoft Malware Prediction dataset to create predictive analytics. This is done in order to illustrate that the technique can be applied to a variety of situations.As input parameters, the experiment takes into account the assault and the TTP, while as output parameters, it takes into account vulnerabilities and indicators of compromise (IoC). According to the findings of the investigation, the most foreseen dangers in CSC are spyware and ransomware, as well as spear phishing. When it came to forecasting vulnerabilities, the predictive models that were produced using the Random Forest algorithm obtained the best accuracy rate of 91%, while the predictive models that were developed using the LR method earned the highest accuracy rate of 86%. In light of the results, the paper strongly advise putting appropriate controls into place in order to combat these dangers. The paper strongly recommend that the ML predicate model make use of CTI data in order to improve the CSC’s cyber security on the whole.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125293284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Different Respiratory Lung Sounds Prediction using Deep Learning 利用深度学习预测不同的呼吸肺部声音
Rajeshree Parsingbhai Vasava, Hetal A. Joshiara
The sounds produced by the lungs when breathing might provide important information to physicians. Based on the findings, a deep learning-based approach is recommended for the prediction of breathing-related lung sounds. The Proposed model was trained in lung sounds collected from people suffering from a broad variety of respiratory conditions. The research improves classifying lung sounds, by audio to image spectrogram features is taken and used to train a deep convolutional neural network. The proposed technique accurately predicts many different types of respiratory lung sounds, demonstrating the promise of deep learning in this domain. This research results have important implications for the development of automated diagnostic tools that might help doctors make correct diagnoses of respiratory disorders more quickly and accurately.
呼吸时肺部发出的声音可能为医生提供重要信息。基于这些发现,我们推荐了一种基于深度学习的方法来预测与呼吸相关的肺音。所提出的模型是在从患有各种呼吸疾病的人身上收集的肺音中进行训练的。该研究改进了肺音的分类,通过提取声像谱特征并用于训练深度卷积神经网络。所提出的技术准确地预测了许多不同类型的呼吸肺部声音,展示了深度学习在这一领域的前景。该研究结果对自动化诊断工具的开发具有重要意义,可以帮助医生更快、更准确地正确诊断呼吸系统疾病。
{"title":"Different Respiratory Lung Sounds Prediction using Deep Learning","authors":"Rajeshree Parsingbhai Vasava, Hetal A. Joshiara","doi":"10.1109/ICESC57686.2023.10193040","DOIUrl":"https://doi.org/10.1109/ICESC57686.2023.10193040","url":null,"abstract":"The sounds produced by the lungs when breathing might provide important information to physicians. Based on the findings, a deep learning-based approach is recommended for the prediction of breathing-related lung sounds. The Proposed model was trained in lung sounds collected from people suffering from a broad variety of respiratory conditions. The research improves classifying lung sounds, by audio to image spectrogram features is taken and used to train a deep convolutional neural network. The proposed technique accurately predicts many different types of respiratory lung sounds, demonstrating the promise of deep learning in this domain. This research results have important implications for the development of automated diagnostic tools that might help doctors make correct diagnoses of respiratory disorders more quickly and accurately.","PeriodicalId":235381,"journal":{"name":"2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1