首页 > 最新文献

2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)最新文献

英文 中文
Data Security and Privacy Preserving with Augmented Homomorphic Re-Encryption Decryption (AHRED) Algorithm in Big Data Analytics 基于增广同态再加密解密(AHRED)算法的大数据分析数据安全和隐私保护
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9544802
V. Shoba, R. Parameswari
The process of Big data storage has become challenging due to the expansion of extensive data; data providers will offer encrypted data and upload to Big data. However, the data exchange mechanism is unable to accommodate encrypted data. Particularly when a large number of users share the scalable data, the scalability becomes extremely limited. Using a contemporary privacy protection system to solve this issue and ensure the security of encrypted data, as well as partially homomorphic re-encryption and decryption (PHRED). This scheme has the flexibility to share data by ensuring user's privacy with partially trusted Big Data. It can access to strong unforgeable scheme it make the transmuted cipher text have public and private key verification combined identity based Augmented Homomorphic Re Encryption Decryption(AHRED) on paillier crypto System with Laplacian noise filter the performance of the data provider for privacy preserving big data.
由于大量数据的扩展,大数据的存储过程变得具有挑战性;数据提供商将提供加密数据并上传到大数据。但是,数据交换机制无法容纳加密的数据。特别是当大量用户共享可扩展数据时,可伸缩性变得非常有限。采用现代的隐私保护系统解决了这一问题,保证了加密数据的安全性,以及部分同态的再加解密(PHRED)。该方案通过部分可信大数据保障用户隐私,实现数据共享的灵活性。它可以获得强不可伪造方案,使转换后的密文具有公钥和私钥验证,结合基于身份的增强同态再加密解密(AHRED),在具有拉普拉斯噪声滤波的paillier密码系统上实现数据提供者的性能,实现了大数据的隐私保护。
{"title":"Data Security and Privacy Preserving with Augmented Homomorphic Re-Encryption Decryption (AHRED) Algorithm in Big Data Analytics","authors":"V. Shoba, R. Parameswari","doi":"10.1109/ICIRCA51532.2021.9544802","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544802","url":null,"abstract":"The process of Big data storage has become challenging due to the expansion of extensive data; data providers will offer encrypted data and upload to Big data. However, the data exchange mechanism is unable to accommodate encrypted data. Particularly when a large number of users share the scalable data, the scalability becomes extremely limited. Using a contemporary privacy protection system to solve this issue and ensure the security of encrypted data, as well as partially homomorphic re-encryption and decryption (PHRED). This scheme has the flexibility to share data by ensuring user's privacy with partially trusted Big Data. It can access to strong unforgeable scheme it make the transmuted cipher text have public and private key verification combined identity based Augmented Homomorphic Re Encryption Decryption(AHRED) on paillier crypto System with Laplacian noise filter the performance of the data provider for privacy preserving big data.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
E-Challan Automation for RTO using OCR E-Challan自动化RTO使用OCR
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9545082
Rakesh Kumar, Meenu Gupta, Suyash Shukla, R. Yadav
Diligent Traffic Enforcement is a major problem throughout India, often focusing on corruption and abuse; is the subject of major changes initiated by senior management of all traffic police institutions in India. Therefore, this paper proposes an effective e-challan production strategy using OCR (Optical Character recognition) where the challan ends using the online application. Scanning different number plates and downloading facts from the database and producing E-Challan. The E-Challan is a web platform that provides various types of support for monitoring and managing the traffic penalties and it also helps the users to overcome the problems that they face while paying for their challan during the traffic time. The E-challan Application is the interaction between HD Cameras and drivers with the use of an online platform. The driver who will breach the traffic rule, vehicle's number plate snapshot is captured automatically by the HD Camera located near a traffic light and traffic area through Image Processing technology and Artificial Intelligence, the software will automatically detect the vehicle owner for the penalty and then apply the suitable penalty against the vehicle owner in their account. With the help of this online prototype, the challan system becomes easy for the users by keeping it online.
勤勉的交通执法是整个印度的主要问题,通常集中在腐败和滥用;是由印度所有交通警察机构的高级管理层发起的重大变革的主题。因此,本文提出了一种使用OCR(光学字符识别)的有效电子挑战生产策略,其中挑战使用在线应用程序结束。扫描不同的车牌号,从数据库下载数据,生成E-Challan。E-Challan是一个网络平台,为监控和管理交通罚款提供各种类型的支持,它也帮助用户克服他们在交通时间支付他们的challan时面临的问题。E-challan应用程序是使用在线平台的高清摄像机和驾驶员之间的交互。将违反交通规则的驾驶员,车辆的车牌快照由位于交通灯和交通区域附近的高清摄像头通过图像处理技术和人工智能自动捕获,软件将自动检测车主的处罚,然后在其账户中对车主进行适当的处罚。在这个在线原型的帮助下,通过保持在线,使用户可以轻松地使用挑战系统。
{"title":"E-Challan Automation for RTO using OCR","authors":"Rakesh Kumar, Meenu Gupta, Suyash Shukla, R. Yadav","doi":"10.1109/ICIRCA51532.2021.9545082","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9545082","url":null,"abstract":"Diligent Traffic Enforcement is a major problem throughout India, often focusing on corruption and abuse; is the subject of major changes initiated by senior management of all traffic police institutions in India. Therefore, this paper proposes an effective e-challan production strategy using OCR (Optical Character recognition) where the challan ends using the online application. Scanning different number plates and downloading facts from the database and producing E-Challan. The E-Challan is a web platform that provides various types of support for monitoring and managing the traffic penalties and it also helps the users to overcome the problems that they face while paying for their challan during the traffic time. The E-challan Application is the interaction between HD Cameras and drivers with the use of an online platform. The driver who will breach the traffic rule, vehicle's number plate snapshot is captured automatically by the HD Camera located near a traffic light and traffic area through Image Processing technology and Artificial Intelligence, the software will automatically detect the vehicle owner for the penalty and then apply the suitable penalty against the vehicle owner in their account. With the help of this online prototype, the challan system becomes easy for the users by keeping it online.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Augmented Reality Experience for Real-World Objects, Monuments, and Cities 增强现实体验为现实世界的对象,古迹和城市
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9544792
C. Z. Basha, D. P. K. Reddy, S. Chand, Azmira Krishna
Augmented reality experience enables us to view real-world objects in 3D by overlapping real-world objects with digital 3d objects to provide a much-enhanced user experience. This paper explains and presents the ways to construct a 3D (3 Dimension) asset of the real world like cities, monuments, and other objects using blender and then the3D digital asset will be incorporated into our application. So that whenever our marker scans the object i.e., the 3D asset gets overlayed. The main idea of this concept is to experience real-world objects in the absence of real-world objects. Let us say that, a person wants to see the Eiffel tower and he/she searches it on Google. Now, the person could only see the images of Eiffel tower. To experience it in 3D he/she can use Google earth but it does not provide an original 3D experience. So, this is the point where augmented reality enters into the scene. The proposed research work has created a 3D asset by using a blender tool. Now, that asset will be imported and applied it to a marker. Whenever, this marker is scanned by using our application, the 3D effect of Eiffel tower will be overlayed on the screen. Augmented Reality is overlapping real-world objects with 3d objects. The main objective of augmented reality is that users cannot notice the discrepancy between augmented objects and real-world objects. AR is a wholly distinct technology, which helps our daily living and many other experiences so improved. It uses our most common hardware such as mobiles, cameras, etc. This makes this technology very beneficial and effortless to use. It is also a lot more different from VR in terms of hardware. But most of the purpose is the same.
增强现实体验使我们能够通过将现实世界的物体与数字3D物体重叠,以3D方式查看现实世界的物体,从而提供大大增强的用户体验。本文解释并介绍了使用blender构建现实世界的3D(3维)资产的方法,例如城市,纪念碑和其他对象,然后将3D数字资产合并到我们的应用程序中。这样每当我们的标记扫描对象时,3D资产就会被覆盖。这个概念的主要思想是在没有真实世界物体的情况下体验真实世界的物体。比方说,一个人想看埃菲尔铁塔,他/她在b谷歌上搜索。现在,这个人只能看到埃菲尔铁塔的图像。要体验3D,他/她可以使用谷歌earth,但它不能提供原始的3D体验。所以,这就是增强现实进入场景的地方。提出的研究工作是通过使用搅拌器工具创建一个3D资产。现在,该资产将被导入并应用到一个标记上。每当使用我们的应用程序扫描这个标记时,埃菲尔铁塔的3D效果就会叠加在屏幕上。增强现实是将现实世界的物体与3d物体重叠。增强现实的主要目标是用户无法注意到增强对象与现实世界对象之间的差异。增强现实是一项完全不同的技术,它帮助我们的日常生活和许多其他体验得到改善。它使用我们最常见的硬件,如手机、相机等。这使得这项技术非常有益,使用起来毫不费力。在硬件方面,它与VR也有很大的不同。但大多数目的是相同的。
{"title":"Augmented Reality Experience for Real-World Objects, Monuments, and Cities","authors":"C. Z. Basha, D. P. K. Reddy, S. Chand, Azmira Krishna","doi":"10.1109/ICIRCA51532.2021.9544792","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544792","url":null,"abstract":"Augmented reality experience enables us to view real-world objects in 3D by overlapping real-world objects with digital 3d objects to provide a much-enhanced user experience. This paper explains and presents the ways to construct a 3D (3 Dimension) asset of the real world like cities, monuments, and other objects using blender and then the3D digital asset will be incorporated into our application. So that whenever our marker scans the object i.e., the 3D asset gets overlayed. The main idea of this concept is to experience real-world objects in the absence of real-world objects. Let us say that, a person wants to see the Eiffel tower and he/she searches it on Google. Now, the person could only see the images of Eiffel tower. To experience it in 3D he/she can use Google earth but it does not provide an original 3D experience. So, this is the point where augmented reality enters into the scene. The proposed research work has created a 3D asset by using a blender tool. Now, that asset will be imported and applied it to a marker. Whenever, this marker is scanned by using our application, the 3D effect of Eiffel tower will be overlayed on the screen. Augmented Reality is overlapping real-world objects with 3d objects. The main objective of augmented reality is that users cannot notice the discrepancy between augmented objects and real-world objects. AR is a wholly distinct technology, which helps our daily living and many other experiences so improved. It uses our most common hardware such as mobiles, cameras, etc. This makes this technology very beneficial and effortless to use. It is also a lot more different from VR in terms of hardware. But most of the purpose is the same.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115643015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AI-based content filtering system using an age prediction algorithm 使用年龄预测算法的基于人工智能的内容过滤系统
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9544100
Ashutosh Upadhyay, K. S.
Computer vision mainly focuses on the automatic extraction, analysis, and understanding of useful information from a single image or video. On the other hand, authenticity is emerging as one of the primary requirements in today's world by developing a system for computer vision complexity. Generally, two robust techniques such as age estimation and face recognition are required to maintain authenticity. In reality, fraud and scams are getting increased, so here this paper has proposed a new combined model for face recognition and age prediction. Face recognition has been implemented and presented in this paper by using a Deep Neural Network. The authenticity problem can be handled by using either facial recognition or age prediction alone; this study has presented a method that employs both of them together to enhance the system's robustness. So, first, this model detects the person's face, and then it predicts the person's age. If the individual is eligible to view the information or perform a task, their access will be limited; otherwise, their access will be restricted. So it helps to solve two difficulties in this case: the person's identification cannot be faked, and their age is also confirmed by the system. (CNN for the face, and mention technique for the age.)
计算机视觉主要侧重于从单个图像或视频中自动提取、分析和理解有用信息。另一方面,通过开发计算机视觉复杂性系统,真实性正在成为当今世界的主要要求之一。通常需要年龄估计和人脸识别两种鲁棒技术来保持图像的真实性。在现实生活中,欺诈和诈骗越来越多,因此本文提出了一种新的人脸识别和年龄预测相结合的模型。本文利用深度神经网络实现了人脸识别。真实性问题可以通过单独使用面部识别或年龄预测来解决;本研究提出了一种将两者结合使用以增强系统鲁棒性的方法。首先,这个模型检测人的脸,然后预测这个人的年龄。如果个人有资格查看信息或执行任务,他们的访问将受到限制;否则,他们的访问将受到限制。因此,它有助于解决这个案例中的两个困难:人的身份不能伪造,他们的年龄也被系统确认。(CNN的脸,提到技术的年龄。)
{"title":"AI-based content filtering system using an age prediction algorithm","authors":"Ashutosh Upadhyay, K. S.","doi":"10.1109/ICIRCA51532.2021.9544100","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544100","url":null,"abstract":"Computer vision mainly focuses on the automatic extraction, analysis, and understanding of useful information from a single image or video. On the other hand, authenticity is emerging as one of the primary requirements in today's world by developing a system for computer vision complexity. Generally, two robust techniques such as age estimation and face recognition are required to maintain authenticity. In reality, fraud and scams are getting increased, so here this paper has proposed a new combined model for face recognition and age prediction. Face recognition has been implemented and presented in this paper by using a Deep Neural Network. The authenticity problem can be handled by using either facial recognition or age prediction alone; this study has presented a method that employs both of them together to enhance the system's robustness. So, first, this model detects the person's face, and then it predicts the person's age. If the individual is eligible to view the information or perform a task, their access will be limited; otherwise, their access will be restricted. So it helps to solve two difficulties in this case: the person's identification cannot be faked, and their age is also confirmed by the system. (CNN for the face, and mention technique for the age.)","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"22 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114105171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Markerless Augmented Reality based application for E-Commerce to Visualise 3D Content 基于无标记增强现实的电子商务应用程序可视化3D内容
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9545009
Yashvi Desai, Naisha Shah, Vrushali Shah, P. Bhavathankar, Kaisar Katchi
Augmented reality has three principal features: combining the real world environment with the virtual world, real-time interaction for users, and accurate representation of 3D objects. Augmented Reality in E-commerce allows customers to view products or experience services in their physical space before purchasing the required items. Current online shopping services only allow customers to see 2D images of the products they are buying. This type of experience is not personalized and sometimes leads to bad shopping choices choices; the customers find it difficult to shop only with a static image view available. Customers cannot accurately predict whether the product they purchase will fit their home environment. This results in a lot of people returning or exchanging the things their purchases. AR resolves these issues. Thus, a method has been proposed for adding a virtual object in the real world by just using a real-time camera. The main aim of this paper is to provide user visualization of high resolution E-commerce products in a real environment.
增强现实有三个主要特征:将真实世界环境与虚拟世界相结合、用户的实时交互以及3D对象的准确表示。电子商务中的增强现实允许客户在购买所需物品之前在其物理空间中查看产品或体验服务。目前的在线购物服务只允许客户看到他们购买的产品的二维图像。这种类型的体验不是个性化的,有时会导致糟糕的购物选择;客户发现仅使用静态图像视图很难购物。顾客无法准确预测他们购买的产品是否适合他们的家庭环境。这导致很多人退货或交换他们购买的东西。AR解决了这些问题。因此,提出了一种利用实时摄像机在现实世界中添加虚拟物体的方法。本文的主要目的是在真实环境中为用户提供高分辨率的电子商务产品可视化。
{"title":"Markerless Augmented Reality based application for E-Commerce to Visualise 3D Content","authors":"Yashvi Desai, Naisha Shah, Vrushali Shah, P. Bhavathankar, Kaisar Katchi","doi":"10.1109/ICIRCA51532.2021.9545009","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9545009","url":null,"abstract":"Augmented reality has three principal features: combining the real world environment with the virtual world, real-time interaction for users, and accurate representation of 3D objects. Augmented Reality in E-commerce allows customers to view products or experience services in their physical space before purchasing the required items. Current online shopping services only allow customers to see 2D images of the products they are buying. This type of experience is not personalized and sometimes leads to bad shopping choices choices; the customers find it difficult to shop only with a static image view available. Customers cannot accurately predict whether the product they purchase will fit their home environment. This results in a lot of people returning or exchanging the things their purchases. AR resolves these issues. Thus, a method has been proposed for adding a virtual object in the real world by just using a real-time camera. The main aim of this paper is to provide user visualization of high resolution E-commerce products in a real environment.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114247802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Leakage Location System of Electric Vehicle Battery Pack Based on Wavelet Transform 基于小波变换的电动汽车电池组漏电定位系统
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9544701
Hejuan Chen
The proposed research study focuses on the leakage location system of the electric vehicle battery pack based on the Wavelet transform. Under the same equalization time, the equalization efficiency of the method that has been tested from the battery pack to the cell to the battery pack is 91.4%, and the overall equalization efficiency of this method is 93.8%. When the battery pack is in a discharging state, the equalization circuit module can complete the migration of the battery pack's power to the battery with the lowest terminal voltage or SOC. With the considerations of the mentioned features, this paper applies the wavelet model to construct the efficient location system. The proposed model is tested on the different scenarios with different data sets. The performance guides us that the accuracy of proposed model is much higher.
本文主要研究基于小波变换的电动汽车电池组泄漏定位系统。在相同均衡时间下,已经测试的方法从电池组到电芯再到电池组的均衡效率为91.4%,该方法的整体均衡效率为93.8%。当电池组处于放电状态时,均衡电路模块可以完成将电池组的功率迁移到终端电压或SOC最低的电池上。考虑到上述特点,本文应用小波模型构建了高效的定位系统。用不同的数据集在不同的场景下对模型进行了测试。实验结果表明,所提模型的精度有了很大提高。
{"title":"Leakage Location System of Electric Vehicle Battery Pack Based on Wavelet Transform","authors":"Hejuan Chen","doi":"10.1109/ICIRCA51532.2021.9544701","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544701","url":null,"abstract":"The proposed research study focuses on the leakage location system of the electric vehicle battery pack based on the Wavelet transform. Under the same equalization time, the equalization efficiency of the method that has been tested from the battery pack to the cell to the battery pack is 91.4%, and the overall equalization efficiency of this method is 93.8%. When the battery pack is in a discharging state, the equalization circuit module can complete the migration of the battery pack's power to the battery with the lowest terminal voltage or SOC. With the considerations of the mentioned features, this paper applies the wavelet model to construct the efficient location system. The proposed model is tested on the different scenarios with different data sets. The performance guides us that the accuracy of proposed model is much higher.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of IoT and UAV Based WBAN for healthcare applications 基于物联网和无人机的无线宽带网络在医疗保健应用中的实现
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9545052
J. Ananthi, P. S. H. Jose
Recently, Wireless Body Area Networks (WBAN) have been increasingly significant in healthcare applications. It is derived from the wireless sensor network with biomedical sensors. The Internet of Things (IoT) has a huge impact on how medical data is received and transmitted to the right systems in healthcare applications. Security, fastest delivery, and energy consumption are major concerns in wireless body area networks. This research work focuses on the rapid data transmission between the patient and doctor using Unmanned Aerial Vehicles (UAV). There are five sensors that are analyzed as Heart rate monitoring sensor, Temperature sensor, Human motion sensor, Oximeter sensor, and Blood pressure sensor. For the fastest delivery, the sensed medical data was delivered utilizing unmanned aerial vehicles. This helps the patients in critical/emergencies to communicate the medical information to the doctor safely and securely. The experimental result examines various sensors attached to the Arduino IDE. The obtained results will be transmitted to the patients using unmanned aerial vehicles. These techniques help to improve the fastest communication for emergency condition patients.
近年来,无线体域网络(WBAN)在医疗保健领域的应用越来越重要。它是由生物医学传感器无线传感器网络发展而来的。物联网(IoT)对如何接收医疗数据并将其传输到医疗保健应用程序中的正确系统具有巨大影响。安全性、最快的传输速度和能源消耗是无线体域网络的主要关注点。本研究的重点是利用无人机实现医患之间的快速数据传输。有五种传感器分析为心率监测传感器、温度传感器、人体运动传感器、血氧计传感器和血压传感器。为了最快交付,利用无人驾驶飞行器交付感测医疗数据。这有助于危重/紧急情况的患者安全地与医生沟通医疗信息。实验结果检查了连接到Arduino IDE的各种传感器。获得的结果将通过无人驾驶飞行器传送给患者。这些技术有助于改善紧急情况患者的最快沟通。
{"title":"Implementation of IoT and UAV Based WBAN for healthcare applications","authors":"J. Ananthi, P. S. H. Jose","doi":"10.1109/ICIRCA51532.2021.9545052","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9545052","url":null,"abstract":"Recently, Wireless Body Area Networks (WBAN) have been increasingly significant in healthcare applications. It is derived from the wireless sensor network with biomedical sensors. The Internet of Things (IoT) has a huge impact on how medical data is received and transmitted to the right systems in healthcare applications. Security, fastest delivery, and energy consumption are major concerns in wireless body area networks. This research work focuses on the rapid data transmission between the patient and doctor using Unmanned Aerial Vehicles (UAV). There are five sensors that are analyzed as Heart rate monitoring sensor, Temperature sensor, Human motion sensor, Oximeter sensor, and Blood pressure sensor. For the fastest delivery, the sensed medical data was delivered utilizing unmanned aerial vehicles. This helps the patients in critical/emergencies to communicate the medical information to the doctor safely and securely. The experimental result examines various sensors attached to the Arduino IDE. The obtained results will be transmitted to the patients using unmanned aerial vehicles. These techniques help to improve the fastest communication for emergency condition patients.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116977443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Brain Tumor Prediction by analyzing MRI using deep learning architectures 利用深度学习架构分析MRI预测脑肿瘤
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9545077
M. Ahmed, Rafeed Rahman, Shahriar Hossain, Shahnewaz Ali Mohammad
The brain tumor is a lethal illness that has endured innumerable individuals. Brain tumor causes abnormal growth of brain tissues, the tissues can be either malignant or non-malignant, but both are capable of causing long term harm and in about 95% cases can cause demise. Utilizing MRI (Magnetic resonance imaging) scans has become one of the meaningful techniques for identifying its existence in the human brain. Subsequent to getting the MRI filters these are physically investigated by experts to determine the presence of a brain tumor in a patient. Various specialists assessing MRI scans may result in outcomes that are not same; this happens because of the variance in forming evaluations from one professional to the next. Furthermore, because MRI scan analysis is a manual procedure, various people might make different mistakes. Based on the interpretations of the experts, two distinct MRI scans performed on the same patient may yield different findings. To make things simpler, reliable, and obtaining acquiring predictable outcomes for both specialists and non-specialists while performing assessment of MRI scans, this research work has presented deep learning strategies in the context of transfer learning models such as ResNet 50, ResNet 152 inception v3, VGG16 and also proposed Conv2d+SVM model to analyze MRI scans and determine the presence of a brain tumor. Also, this research work has utilized a dataset consisting of 253 images and then performed augmentation to increase the amount of data. After training, our model portrayed accuracy of 87.17% and 76.62% for ResNet 50, 99.28% and 88.24% for ResNet 152, 99.28% and 96.08% for inception v3, 99.78 and 86.27% for VGG16 and 92% and 78.3% for Conv2D+SVM in terms of training and validation respectively
脑瘤是一种致命的疾病,已经折磨了无数人。脑肿瘤导致脑组织的异常生长,这些组织可以是恶性的,也可以是非恶性的,但两者都能造成长期的伤害,大约95%的病例会导致死亡。利用MRI(磁共振成像)扫描已成为识别其在人脑中存在的有意义的技术之一。在获得核磁共振成像过滤器之后,专家会对其进行物理检查,以确定患者是否存在脑肿瘤。不同的专家评估MRI扫描可能会得出不同的结果;之所以会出现这种情况,是因为不同专业人员在形成评估时存在差异。此外,由于MRI扫描分析是一个人工过程,不同的人可能会犯不同的错误。根据专家的解释,对同一病人进行两次不同的核磁共振扫描可能会产生不同的结果。为了使专家和非专业人员在进行MRI扫描评估时获得更简单、可靠和可预测的结果,本研究工作在迁移学习模型(如ResNet 50、ResNet 152 inception v3、VGG16)的背景下提出了深度学习策略,并提出了Conv2d+SVM模型来分析MRI扫描并确定脑肿瘤的存在。此外,本研究工作利用了由253张图像组成的数据集,然后进行了增强,以增加数据量。经过训练,我们的模型在训练和验证方面,ResNet 50的准确率分别为87.17%和76.62%,ResNet 152的准确率为99.28%和88.24%,inception v3的准确率为99.28%和96.08%,VGG16的准确率为99.78和86.27%,Conv2D+SVM的准确率分别为92%和78.3%
{"title":"Brain Tumor Prediction by analyzing MRI using deep learning architectures","authors":"M. Ahmed, Rafeed Rahman, Shahriar Hossain, Shahnewaz Ali Mohammad","doi":"10.1109/ICIRCA51532.2021.9545077","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9545077","url":null,"abstract":"The brain tumor is a lethal illness that has endured innumerable individuals. Brain tumor causes abnormal growth of brain tissues, the tissues can be either malignant or non-malignant, but both are capable of causing long term harm and in about 95% cases can cause demise. Utilizing MRI (Magnetic resonance imaging) scans has become one of the meaningful techniques for identifying its existence in the human brain. Subsequent to getting the MRI filters these are physically investigated by experts to determine the presence of a brain tumor in a patient. Various specialists assessing MRI scans may result in outcomes that are not same; this happens because of the variance in forming evaluations from one professional to the next. Furthermore, because MRI scan analysis is a manual procedure, various people might make different mistakes. Based on the interpretations of the experts, two distinct MRI scans performed on the same patient may yield different findings. To make things simpler, reliable, and obtaining acquiring predictable outcomes for both specialists and non-specialists while performing assessment of MRI scans, this research work has presented deep learning strategies in the context of transfer learning models such as ResNet 50, ResNet 152 inception v3, VGG16 and also proposed Conv2d+SVM model to analyze MRI scans and determine the presence of a brain tumor. Also, this research work has utilized a dataset consisting of 253 images and then performed augmentation to increase the amount of data. After training, our model portrayed accuracy of 87.17% and 76.62% for ResNet 50, 99.28% and 88.24% for ResNet 152, 99.28% and 96.08% for inception v3, 99.78 and 86.27% for VGG16 and 92% and 78.3% for Conv2D+SVM in terms of training and validation respectively","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117142844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clinical Study on Fast Rehabilitation Program of Integrated Traditional Chinese and Western Medicine after Laparoscopic Hysterectomy based on Data Mining 基于数据挖掘的腹腔镜子宫切除术后中西医结合快速康复方案临床研究
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9544800
E. Zhang
Uterine fibroids are the most common benign tumors in gynecology, with high incidence rate and showing an increasing trend. Some uterine fibroids can lead to patients with prolonged menstrual cycle, increased menstrual volume, more severe cases will appear hemorrhagic anemia. Larger uterine fibroids will oppress the patient's pelvic cavity, so that patients have frequent urination, fecal discomfort, etc. This disease seriously affects women's life and health. This paper completes the requirement analysis and overall design of the disease data mining system. After that, the system is divided into data processing subsystem, algorithm calling subsystem, knowledge display subsystem, user management subsystem, as well as the realization technology, function modules and main process of the main functions of the system.
子宫肌瘤是妇科最常见的良性肿瘤,发病率高且呈上升趋势。部分子宫肌瘤可导致患者月经周期延长,月经量增加,严重者还会出现出血性贫血。较大的子宫肌瘤会压迫患者的盆腔,使患者出现尿频、大便不适等。这种疾病严重影响妇女的生命和健康。本文完成了疾病数据挖掘系统的需求分析和总体设计。然后将系统划分为数据处理子系统、算法调用子系统、知识显示子系统、用户管理子系统,以及系统主要功能的实现技术、功能模块和主要流程。
{"title":"Clinical Study on Fast Rehabilitation Program of Integrated Traditional Chinese and Western Medicine after Laparoscopic Hysterectomy based on Data Mining","authors":"E. Zhang","doi":"10.1109/ICIRCA51532.2021.9544800","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544800","url":null,"abstract":"Uterine fibroids are the most common benign tumors in gynecology, with high incidence rate and showing an increasing trend. Some uterine fibroids can lead to patients with prolonged menstrual cycle, increased menstrual volume, more severe cases will appear hemorrhagic anemia. Larger uterine fibroids will oppress the patient's pelvic cavity, so that patients have frequent urination, fecal discomfort, etc. This disease seriously affects women's life and health. This paper completes the requirement analysis and overall design of the disease data mining system. After that, the system is divided into data processing subsystem, algorithm calling subsystem, knowledge display subsystem, user management subsystem, as well as the realization technology, function modules and main process of the main functions of the system.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavioural Analysis For Prospects In Crowd Emotion Sensing: A Survey 人群情绪感知前景的行为分析:一项调查
Pub Date : 2021-09-02 DOI: 10.1109/ICIRCA51532.2021.9544607
Manojkumar. K, L. Sujihelen
Crowd behavioural analysis is an interesting and emerging domain in research, with incomplete set of activities, tasks and lack of intermediate cub-processes which are mandated for productive analysis. Since the domain is untapped to a major extent, the research carried out in the domain needs proper stages of operations. A proper taxonomy will direct the futuristic domains in the right track of processes and organization of intermediate tasks. This review paper intends to document the list of stages and processes, data collection, pipelining the sub-tasks, pre-emptive identification of supposed problems during the later stages in detection of crowd emotions and behavioural analysis. Deep learning techniques have been widely deployed to investigate the models of crowd analysis, anomaly detection, and look for meaningful insights and patterns from datasets. The Different models are investigated thoroughly for their respective understanding about the emotional aspects considered in the studies. Emotional characteristics when powered with crowd behavioural analysis and real world entities will deliver a promising solution for crime detections, anomaly detection and ensure a safer environment for nations. Video surveillance tools, datasets from crime datasets and various other factors contributed to the previous research works, models are now being designed to incorporate the best features of these models into one and thus achieve one fruitful model for continuous video analytics.
群体行为分析是一个有趣的新兴研究领域,其活动和任务不完整,缺乏用于生产性分析的中间立方体过程。由于该领域在很大程度上是未开发的,因此在该领域开展研究需要适当的操作阶段。适当的分类法将引导未来领域在正确的过程和中间任务组织轨道上。本文综述了群体情绪检测和行为分析的阶段和过程列表、数据收集、流水线子任务、在后期阶段对假定问题的先发制人识别。深度学习技术已被广泛应用于研究人群分析、异常检测的模型,并从数据集中寻找有意义的见解和模式。对不同的模型进行了深入的研究,以了解它们各自对研究中所考虑的情感方面的理解。当情感特征与人群行为分析和现实世界实体相结合时,将为犯罪检测、异常检测提供有前途的解决方案,并确保国家更安全的环境。视频监控工具,来自犯罪数据集的数据集和其他各种因素促成了以前的研究工作,现在正在设计模型,将这些模型的最佳功能整合到一个模型中,从而实现一个富有成效的连续视频分析模型。
{"title":"Behavioural Analysis For Prospects In Crowd Emotion Sensing: A Survey","authors":"Manojkumar. K, L. Sujihelen","doi":"10.1109/ICIRCA51532.2021.9544607","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544607","url":null,"abstract":"Crowd behavioural analysis is an interesting and emerging domain in research, with incomplete set of activities, tasks and lack of intermediate cub-processes which are mandated for productive analysis. Since the domain is untapped to a major extent, the research carried out in the domain needs proper stages of operations. A proper taxonomy will direct the futuristic domains in the right track of processes and organization of intermediate tasks. This review paper intends to document the list of stages and processes, data collection, pipelining the sub-tasks, pre-emptive identification of supposed problems during the later stages in detection of crowd emotions and behavioural analysis. Deep learning techniques have been widely deployed to investigate the models of crowd analysis, anomaly detection, and look for meaningful insights and patterns from datasets. The Different models are investigated thoroughly for their respective understanding about the emotional aspects considered in the studies. Emotional characteristics when powered with crowd behavioural analysis and real world entities will deliver a promising solution for crime detections, anomaly detection and ensure a safer environment for nations. Video surveillance tools, datasets from crime datasets and various other factors contributed to the previous research works, models are now being designed to incorporate the best features of these models into one and thus achieve one fruitful model for continuous video analytics.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121561779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1