Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752097
Pramod Kumar P, A. R, S. K
In a de veloping country such as India, the intellection of smart city and the boom for a wide range of vehicles, Internet of Vehicles (IoV) has gained a lot of consideration by furnishing numerous benefits, including traffic congestion control, smart parking, vehicle emergency and monitoring levels of pollution. Furthermore, IoV provides support for vehicles over internet aid communication. In order to have a better communication between Vehicle-to-Everything (V2X), an advanced network infrastructure is required. The currently available networks like 3rd generation (3G), 4th generation (4G) or long term evolution (LTE) are not adequate for these kinds of communications; There comes the 5th Generation (5G) cellular network into the picture. The 5G offers real-time crowd sourcing, higher data rates, low latency for transmission and sensing as a complementary base for information. In addition to the leading edge network infrastructure, the mobility of vehicles urges to have a perfect handover (HO) mechanism among heterogeneous networks. This paper discuss about the integration IoV with 5G and the importance of vertical handover (VHO) mechanism using an Artificial Intelligence algorithm and analyze its performance based on few of the parameters such as data transfer rate, transmission delay, mean throughput, packet delivery ratio (PDR) and Quality of Service (QoS).
{"title":"An Efficient VHO Algorithm to Enhance QoS in Internet of Vehicles with the Integration of 5G","authors":"Pramod Kumar P, A. R, S. K","doi":"10.1109/ICEARS53579.2022.9752097","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752097","url":null,"abstract":"In a de veloping country such as India, the intellection of smart city and the boom for a wide range of vehicles, Internet of Vehicles (IoV) has gained a lot of consideration by furnishing numerous benefits, including traffic congestion control, smart parking, vehicle emergency and monitoring levels of pollution. Furthermore, IoV provides support for vehicles over internet aid communication. In order to have a better communication between Vehicle-to-Everything (V2X), an advanced network infrastructure is required. The currently available networks like 3rd generation (3G), 4th generation (4G) or long term evolution (LTE) are not adequate for these kinds of communications; There comes the 5th Generation (5G) cellular network into the picture. The 5G offers real-time crowd sourcing, higher data rates, low latency for transmission and sensing as a complementary base for information. In addition to the leading edge network infrastructure, the mobility of vehicles urges to have a perfect handover (HO) mechanism among heterogeneous networks. This paper discuss about the integration IoV with 5G and the importance of vertical handover (VHO) mechanism using an Artificial Intelligence algorithm and analyze its performance based on few of the parameters such as data transfer rate, transmission delay, mean throughput, packet delivery ratio (PDR) and Quality of Service (QoS).","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132714010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751967
Swathi Dasi, Yerram Srinivas, M. Vadivel, R. Satpathy, B. B. Dash, Utpal Chandra De
Our daily lives are filled with a wide variety of electromagnetic waves . To ensure that radio products are safe to use, they must undergo RF exposure evaluation. RF exposure evaluation, EMF measurements, or SAR testing can be used to conduct this evaluation. Time-consuming SAR measurement methods are used by the SAR standard. Mobile wireless device compliance test lead times are incompatible with industry needs and are becoming a significant pain as 5G communications proliferate. When it comes to peak spatialaverage SAR evaluation, this study proposes a new technology aimed to solve this challenge and provide instantaneous and accurate peak SAR evaluation.
{"title":"Internet of Things (IoT) based Comprehensive testing of 5G network for Specific Absorption Rate (SAR)","authors":"Swathi Dasi, Yerram Srinivas, M. Vadivel, R. Satpathy, B. B. Dash, Utpal Chandra De","doi":"10.1109/ICEARS53579.2022.9751967","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751967","url":null,"abstract":"Our daily lives are filled with a wide variety of electromagnetic waves . To ensure that radio products are safe to use, they must undergo RF exposure evaluation. RF exposure evaluation, EMF measurements, or SAR testing can be used to conduct this evaluation. Time-consuming SAR measurement methods are used by the SAR standard. Mobile wireless device compliance test lead times are incompatible with industry needs and are becoming a significant pain as 5G communications proliferate. When it comes to peak spatialaverage SAR evaluation, this study proposes a new technology aimed to solve this challenge and provide instantaneous and accurate peak SAR evaluation.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128302352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751735
Rohan Appasaheb Borgalli, Sunil Surve
FER (facial expression recognition) is a significant study subject in the artificial intelligence and computer vision areas because of its widespread applicability in both academic and industrial sectors. Though FER can be carried out primarily utilizing multiple sensors, research shows that using facial images/videos for recognition of facial expression is better because visual expressions carry major information through which emotions can be conveyed.In the past, much research was conducted in the field of FER using different approaches such as the use of different sensors, machine learning, and deep learning framework with dynamic sequences and static images. The most recent state-of-the-art outcomes demonstrate In comparison to conventional FER techniques, deep learning Convolutional Neural Network (CNN) based systems are significantly more powerful. Deep learning-based FER methods utilizing deep networks enable extraction of features automatically instead of traditionally handcrafted feature extraction.This paper focuses on implementing different custom and standard CNN architectures for training and testing them on facial expression static image datasets scenario KDEF, RAFD, RAF-DB, SFEW, and AMFED+, both lab-controlled and wild.
{"title":"Deep Learning Framework for Facial Emotion Recognition using CNN Architectures","authors":"Rohan Appasaheb Borgalli, Sunil Surve","doi":"10.1109/ICEARS53579.2022.9751735","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751735","url":null,"abstract":"FER (facial expression recognition) is a significant study subject in the artificial intelligence and computer vision areas because of its widespread applicability in both academic and industrial sectors. Though FER can be carried out primarily utilizing multiple sensors, research shows that using facial images/videos for recognition of facial expression is better because visual expressions carry major information through which emotions can be conveyed.In the past, much research was conducted in the field of FER using different approaches such as the use of different sensors, machine learning, and deep learning framework with dynamic sequences and static images. The most recent state-of-the-art outcomes demonstrate In comparison to conventional FER techniques, deep learning Convolutional Neural Network (CNN) based systems are significantly more powerful. Deep learning-based FER methods utilizing deep networks enable extraction of features automatically instead of traditionally handcrafted feature extraction.This paper focuses on implementing different custom and standard CNN architectures for training and testing them on facial expression static image datasets scenario KDEF, RAFD, RAF-DB, SFEW, and AMFED+, both lab-controlled and wild.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131798512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751971
Sandeep Kaur, Navjeet Kaur
In this Research paper removal of faults associated in real life situation related to 11KV substations is investigated. The power system data is taken at different time periods under various fault conditions and voltage sag/swell both are mitigated from the real time data by using D-STATCOM. When Grey Wolf Optimization technique is associated with D-STATCOM, it has shown more efficient results for voltage sag/swell. Later, a FACT controller device called UPQC has been used to overcome the same problem of voltage fluctuation in distribution system. The results have shown that UPQC is more efficient in comparison to D-STATCOM and GWO as values obtained through MATLAB SIMULINK in case of UPQC are closer to normal values.
{"title":"Application of Optimization Techniques to Mitigate Voltage Sag and Swell by Using Real Time Values","authors":"Sandeep Kaur, Navjeet Kaur","doi":"10.1109/ICEARS53579.2022.9751971","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751971","url":null,"abstract":"In this Research paper removal of faults associated in real life situation related to 11KV substations is investigated. The power system data is taken at different time periods under various fault conditions and voltage sag/swell both are mitigated from the real time data by using D-STATCOM. When Grey Wolf Optimization technique is associated with D-STATCOM, it has shown more efficient results for voltage sag/swell. Later, a FACT controller device called UPQC has been used to overcome the same problem of voltage fluctuation in distribution system. The results have shown that UPQC is more efficient in comparison to D-STATCOM and GWO as values obtained through MATLAB SIMULINK in case of UPQC are closer to normal values.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134291500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752299
Nirupama P Srinivas, Sangeeta Modi
Recent global traction towards meeting energy demand through renewable resources due to ecological, resource depletion, and fiscal concerns has led to increased development in distributed energy generation. Microgrids have proven as promising solutions for energy generation due to their flexible yet robust topology with various control strategies. The main challenges with microgrids are associated with bidirectional flow of power and renewable injection at various points of the microgrid. Most protection schemes used in conventional utility grids are less effective against faults and disturbances in microgrids. Further, the inherent intermittency of renewable resources can make microgrid protection challenging. The work in this paper comprises of literature review of microgrids, fault analysis, and protection schemes employed for power systems. This paper aims to cover the simulation and fault analysis of DC (Direct Current) Pole-to-Pole faults in an islanded radial DC solar-based microgrid of two sources and three loads. Further, a fault detection algorithm using the energy slope values is proposed, implemented, and analyzed with respect to the system under consideration.
{"title":"Pole-to-Pole Fault Detection Algorithm Using Energy Slope for Microgrids","authors":"Nirupama P Srinivas, Sangeeta Modi","doi":"10.1109/ICEARS53579.2022.9752299","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752299","url":null,"abstract":"Recent global traction towards meeting energy demand through renewable resources due to ecological, resource depletion, and fiscal concerns has led to increased development in distributed energy generation. Microgrids have proven as promising solutions for energy generation due to their flexible yet robust topology with various control strategies. The main challenges with microgrids are associated with bidirectional flow of power and renewable injection at various points of the microgrid. Most protection schemes used in conventional utility grids are less effective against faults and disturbances in microgrids. Further, the inherent intermittency of renewable resources can make microgrid protection challenging. The work in this paper comprises of literature review of microgrids, fault analysis, and protection schemes employed for power systems. This paper aims to cover the simulation and fault analysis of DC (Direct Current) Pole-to-Pole faults in an islanded radial DC solar-based microgrid of two sources and three loads. Further, a fault detection algorithm using the energy slope values is proposed, implemented, and analyzed with respect to the system under consideration.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133212637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751872
P. A, V. Dhanakoti
The medical technology has seen a tremendous growth in this century. Innovative high- end technologies that are created for health care benefits the patients as well as the medical professional in a wider perspective. Diabetes mellitus is a medical complaint among all age groups which occurs due to the increase in the blood sugar level. Diabetic retinopathy is said to be a symptomless diabetic eye illness which affects the retina of human eye and leads to blindness. It affects the retinal blood vessels. There is a growth of abnormal blood vessels in the retinal surface. Diabetic retinopathy can be detected using Ridge based vessel segmentation, Computer Driven Tracing of Vessel Network, Adaptive Local Thresholding it does not have uniform illuminations. Latest technological advancements in image processing provide a more efficient diagnosis of diabetic retinopathy with the help of feature extraction. The retinal scanned image is first pre-processed and feature extraction is done using HAAR wavelet Transform for the quantitative measure of the accuracy of the disease. The image is segmented and classified based on the training sets of data using SVM classifier. This process tends to provides more accuracy and about 98% sensitivity in+ the retinal classification.
{"title":"Efficient Diabetic Retinopathy Detection using Machine Learning Techniques","authors":"P. A, V. Dhanakoti","doi":"10.1109/ICEARS53579.2022.9751872","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751872","url":null,"abstract":"The medical technology has seen a tremendous growth in this century. Innovative high- end technologies that are created for health care benefits the patients as well as the medical professional in a wider perspective. Diabetes mellitus is a medical complaint among all age groups which occurs due to the increase in the blood sugar level. Diabetic retinopathy is said to be a symptomless diabetic eye illness which affects the retina of human eye and leads to blindness. It affects the retinal blood vessels. There is a growth of abnormal blood vessels in the retinal surface. Diabetic retinopathy can be detected using Ridge based vessel segmentation, Computer Driven Tracing of Vessel Network, Adaptive Local Thresholding it does not have uniform illuminations. Latest technological advancements in image processing provide a more efficient diagnosis of diabetic retinopathy with the help of feature extraction. The retinal scanned image is first pre-processed and feature extraction is done using HAAR wavelet Transform for the quantitative measure of the accuracy of the disease. The image is segmented and classified based on the training sets of data using SVM classifier. This process tends to provides more accuracy and about 98% sensitivity in+ the retinal classification.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131744403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752355
Salna Joy, R. Baby Chithra, Ajay Sudhir Bale, Naveen Ghorpade, S. Varsha, Anish Sagar Naidu
With increase in vulnerability of data theft raises the question of protection of the very data. Other forms of security being obsolescence, a unique way of technology for protecting vulnerable data is thrown lights on Irish recognition biometric authentication. This study provides a global moving technology to authorize access to protect environment. The recent trends in recognition of Iris is discussed here. We have proposed an idea which can help in iris recognition based on melanin quantity in this paper.
{"title":"A Comparative Study on Recent Trends in Iris Recognition Techniques","authors":"Salna Joy, R. Baby Chithra, Ajay Sudhir Bale, Naveen Ghorpade, S. Varsha, Anish Sagar Naidu","doi":"10.1109/ICEARS53579.2022.9752355","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752355","url":null,"abstract":"With increase in vulnerability of data theft raises the question of protection of the very data. Other forms of security being obsolescence, a unique way of technology for protecting vulnerable data is thrown lights on Irish recognition biometric authentication. This study provides a global moving technology to authorize access to protect environment. The recent trends in recognition of Iris is discussed here. We have proposed an idea which can help in iris recognition based on melanin quantity in this paper.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133857863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751876
G. Kumar, J. Karthik, B. Rao, Chitturi Prasad
In programming frameworks, logging is customarily acquainted with record data about the execution of a program. Normally, logs are broken down by people after a conspicuous blunder happens or is accounted for, by an end client. In any case, as programming develops, it is at this point not feasible to screen application conduct and investigate mistakes with the unaided eye. AI based abnormality recognition can beat these issues and at last give an apparatus to identify bugs at a beginning phase while they are still somewhat innocuous. In this postulation, time series of log information delivered by Motorola Solution's Smart Connect is broken down. It is intended to demonstrate that it is feasible to distinguish peculiarities in a log dataset created by a true framework comprising of two primary entertainers - the foundation and the push-to-talk radios associated with Smart Connect. A peculiarity discovery design has been proposed, that comprises of gathering information from the framework, applying log parsing with Drain3, extricating occasion count and TF-IDF highlights, and taking care of the removed fixed-size time window structure into four oddity location AI models: Isolation Forest, PCA, Invariants Mining and Log Clustering. Since this is a profoundly classified area, it is required to track down an effective method for preparing AI models dependent exclusively upon datasets created in a test stage, which might be not the same as the datasets created in the creation climate. Two of the four calculations, PCA and Log Clustering, accomplishes ideal precision on the test dataset in recognizing typical and irregular conduct. To assess the models on the obscure dataset, the specialists from the Smart Connect group is requested to assess the expectations. They affirmed that the PCA model has the option to recognize one more irregularity that was not known before the investigation. Nonetheless, because of the intricacy and the enormous measure of logs they were given to review, they couldn't determine if the models accurately characterized non-atypical examples. At long last, it is observed that the models could likewise be utilized to acquire knowledge into the code inclusion of the framework tests.
{"title":"Anomaly Identification Performed Independently in Explanatory Machine using Log-based Method","authors":"G. Kumar, J. Karthik, B. Rao, Chitturi Prasad","doi":"10.1109/ICEARS53579.2022.9751876","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751876","url":null,"abstract":"In programming frameworks, logging is customarily acquainted with record data about the execution of a program. Normally, logs are broken down by people after a conspicuous blunder happens or is accounted for, by an end client. In any case, as programming develops, it is at this point not feasible to screen application conduct and investigate mistakes with the unaided eye. AI based abnormality recognition can beat these issues and at last give an apparatus to identify bugs at a beginning phase while they are still somewhat innocuous. In this postulation, time series of log information delivered by Motorola Solution's Smart Connect is broken down. It is intended to demonstrate that it is feasible to distinguish peculiarities in a log dataset created by a true framework comprising of two primary entertainers - the foundation and the push-to-talk radios associated with Smart Connect. A peculiarity discovery design has been proposed, that comprises of gathering information from the framework, applying log parsing with Drain3, extricating occasion count and TF-IDF highlights, and taking care of the removed fixed-size time window structure into four oddity location AI models: Isolation Forest, PCA, Invariants Mining and Log Clustering. Since this is a profoundly classified area, it is required to track down an effective method for preparing AI models dependent exclusively upon datasets created in a test stage, which might be not the same as the datasets created in the creation climate. Two of the four calculations, PCA and Log Clustering, accomplishes ideal precision on the test dataset in recognizing typical and irregular conduct. To assess the models on the obscure dataset, the specialists from the Smart Connect group is requested to assess the expectations. They affirmed that the PCA model has the option to recognize one more irregularity that was not known before the investigation. Nonetheless, because of the intricacy and the enormous measure of logs they were given to review, they couldn't determine if the models accurately characterized non-atypical examples. At long last, it is observed that the models could likewise be utilized to acquire knowledge into the code inclusion of the framework tests.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133889019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752215
Helen Josephine V L, Dhivya Rajan, K. Rajalakshmi
WSN (Wireless Sensor Network) is a unique variety of temporary type of Local area networks that are highly distributed self-organized systems. There is a detailed collection of various sensor nodes which are vastly deployed throughout the environment. Sensor node is a very small electronic device that is attached to a sensor network. They have an uncomplicated working mechanism that collects the data from any physical movement of an event that occurs or event query that is time driven. The notable feature of the sensor network is data gathering. Each sensory node can gather data, analyse that information and make that information to move to the location that is a destination. Routing algorithms play a vital role in making routing decision that delivers the packet to the exact point through optimal route. Since there is an energy restriction in WSNs, the energy related economisation becomes the most avoidable objective of various routing protocols. routing protocols of various sensor networks is reviewed and presented in this paper which provides a clear classification of various categories and comparison of the various methods.
{"title":"A Review Paper on Various Energy Saving Techniques in WSN","authors":"Helen Josephine V L, Dhivya Rajan, K. Rajalakshmi","doi":"10.1109/ICEARS53579.2022.9752215","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752215","url":null,"abstract":"WSN (Wireless Sensor Network) is a unique variety of temporary type of Local area networks that are highly distributed self-organized systems. There is a detailed collection of various sensor nodes which are vastly deployed throughout the environment. Sensor node is a very small electronic device that is attached to a sensor network. They have an uncomplicated working mechanism that collects the data from any physical movement of an event that occurs or event query that is time driven. The notable feature of the sensor network is data gathering. Each sensory node can gather data, analyse that information and make that information to move to the location that is a destination. Routing algorithms play a vital role in making routing decision that delivers the packet to the exact point through optimal route. Since there is an energy restriction in WSNs, the energy related economisation becomes the most avoidable objective of various routing protocols. routing protocols of various sensor networks is reviewed and presented in this paper which provides a clear classification of various categories and comparison of the various methods.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122875005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
According to WHO, brain stroke seems to be the second most common cause overall, accounting for about eleven percent of all mortality. Data security and privacy are in great demand in the healthcare industry. Data is now kept in a centralized manner in present systems, with all data being stored in a single area. In such systems, there is a high possibility for an intruder or third party to access and change the data. In Healthcare, as the data is the most crucial factor, so if there are any small changes made by the intruder in the data, it may lead to provide false outcome. In this proposed system, the data are secured in a decentralized approach using IPFS (InterPlanetary File System) protocol and Block chain. The risk of data failures and outages can be reduced while improving security, performance, and privacy using this strategy. The required data will be collected from the IPFS network by using the hash value and it will be trained with the ANN (Artificial Neural Network) algorithm to get the final model.
{"title":"Securing Healthcare Data using Decentralized Approach","authors":"Dodla Navya Shree, Dodda Venkata Lohitha Krishna, Rizwan Patan","doi":"10.1109/ICEARS53579.2022.9752114","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752114","url":null,"abstract":"According to WHO, brain stroke seems to be the second most common cause overall, accounting for about eleven percent of all mortality. Data security and privacy are in great demand in the healthcare industry. Data is now kept in a centralized manner in present systems, with all data being stored in a single area. In such systems, there is a high possibility for an intruder or third party to access and change the data. In Healthcare, as the data is the most crucial factor, so if there are any small changes made by the intruder in the data, it may lead to provide false outcome. In this proposed system, the data are secured in a decentralized approach using IPFS (InterPlanetary File System) protocol and Block chain. The risk of data failures and outages can be reduced while improving security, performance, and privacy using this strategy. The required data will be collected from the IPFS network by using the hash value and it will be trained with the ANN (Artificial Neural Network) algorithm to get the final model.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124074549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}